Configuring Scan Options
To configure scan options:
- In the ANTIVIRUS tab click .
The Antivirus/Anti-spyware Settings window opens.
- Select from the navigation tree.
- Select options from the Scan Options list:
|
Specify the size in Megabytes. Most virus files are smaller than 8MB. Therefore, not scanning larger files improves the scan time. Viruses in larger files can be detected through on-access scanning.
|
|
Creates scanning rules based on the data scanned before, and optimizes scanning based on those rules. Works on limited file sizes and formats. Most efficient when cpSwift is also enabled.
|
|
Creates scanning rules based on the data scanned before, and optimizes scanning based on those rules. Works on all file types, sizes and formats. Most efficient when cpChecker is also enabled.
|
|
Scans alternative data streams (ADS), which can sometimes hide malware in otherwise benign files.
|
|
Scans files for specific information or characteristics associated with malware. Adds another layer of security by detecting viruses or spyware not yet known to virus signature databases.
|
|
Prevents false positive results by assuming files signed by Microsoft are safe.
|
|
Automatically attempts to treat files that contain viruses. If a file cannot be treated, it is placed in Quarantine so that it cannot harm your computer.
|
|
By default, archives are not scanned, until they are opened. This option enables scanning unopened archives to detect malware hidden inside.
|
- Click the down arrow button to expand the Riskware Categories.
- Select additional options from the Riskware Categories list:
|
Adware is considered to be riskware, if there are known associated security vulnerabilities.
|
|
Automatic dialing programs are considered to be riskware, if there are known associated security vulnerabilities.
|
|
Other programs that can be detected as riskware include remote administration programs, FTP servers, proxy servers, password recovery tools, monitoring programs, telnet servers, Web servers, computer tools, network tools, peer-to-peer client programs, SMTP clients, Web toolbars, and known fraudulent programs. Of these categories of programs, only those with known associated security vulnerabilities are detected as riskware.
|
|
|