Scanner setup |
![]() |
|||
|
Scan setup window contains basic scanning options (objects and methods) of the on-demand scanner, the way the output scanning log is formatted and named and, finally, the way system reacts when a virus is detected.
To select a particular type of objects to scan, select desired checkbox in the Objects to diagnose specific group in the list (Files, Boot sectors, Operating memory, Runtime packers, Archives and E-mail files(databases)).
The first three of the aforementioned options are set in the default mode. Selection of archive scanning should only be used under special circumstances.
Diagnostic methods group contains two chceckbox to select method of diagnostic. There are two basic scanning methods:
Virus signatures - The signature scanning relies on analysis of previously know virus infiltrations and their corresponding virus signature database.
Heuristics - Is a sophisticated suite of algorithms which allows detection of yet unknown viruses.
It is not
recommended to disable any of the above scanning methods. The highest protection
is provided by concurrent use of both the aforementioned methods.
Heuristics sensitivity, a relating group in the right hand side of the Tab, has been carefully optimized and the Standard level should be used. Selection of Deep level might result in increased number of false alarms.
The System groups contains three checkbox:
"List all files" checkbox, if selected, will result in inclusion of all scanned file in the scanning log.
"Sound alert" checkbox sets the sound alert of the on demand scanner triggered by detection of a virus.
"Use MAPI interface" provides MAPI support to scan Microsoft (R) Outlook databases.
The Scanning Log group defines basic characteristics of the scanning log. Selection of the "Append" radio button casuses new scanning log to be appended to the old one.
If the size of a new scanning log is larger than the value defined by the "Maximum size" parameter, the old scanning log is deleted completely, however, the new scanning log is saved entirely, in spite of its volume beingin excess of the defined limit.
To change the list of the extensions of the files to be scanned, click the Extension button.
To set advanced features of the on-demand scanner (communication/warning messages), click the Advanced button.
|
|||
![]() |