Tab
|
Definitions
|
Processes
|
- On-Access Default
Processes — Choose to configure one scanning policy for all
processes or configure different scanning policies for default processes,
low-risk processes, and high-risk processes.
Note: If you choose to configure one scanning
policy, this policy applies to all processes. If you choose to configure
different scanning policies for low-risk and high risk policies, this policy
applies only to the processes that are not defined as low-risk or high-risk.
- On-Access Low-Risk
Processes — Specify the processes that you define as low-risk.
- On-Access High-Risk
Processes — Specify the processes that you define as high-risk.
Note: The
Configure different scanning policies for
high-risk, low-risk, and default processes option must be selected
on the
On-Access Default Processes tab
before you can configure individual policies for low-risk and high-risk
processes.
|
Scan Items
|
- Configure
whether to scan files on read, on write, on network drives and opened for
backup.
CAUTION: Failure to enable
When writing to disk and
When reading from disk leaves
your system unprotected from numerous malware attacks.
- Configure
which files and file types to scan.
CAUTION: Failure to enable
All files leaves your system
unprotected from numerous malware attacks.
- Scan for
potential threats that resemble unwanted programs, Trojan horses and macro
viruses.
- Scan inside
archives and decode MIME encoded files.
- Enable
on-access scanning for unwanted programs.
|
Exclusions
|
Configure which disks, files, and
folders to exclude from scanning.
|
Actions
|
For threat detections:
- Primary action
to take when a threat is detected.
- Secondary
action to take on a threat detection if the first action fails.
For unwanted program detections:
- Primary action
to take when an unwanted program is detected.
- Secondary
action to take on an unwanted program detection if the first action fails.
|
|