Scan Preferences

Tip:

How to find this setting:

Main Console > Settings > Security & Tuneup Controls > Scan Preferences

Keep your computer protected

Your security software analyzes basic information about every file that you open, save, or download. For threats like viruses, it attempts to remove the threat from the infected file. If unable to remove the threat, it deletes the infected file along with the threat.

Select Scan for threats when opening, saving, or downloading files to detect and eliminate security threats automatically.

Maximize your protection

Your security software can search for threats in files and settings as well as check for suspicious behavior on your computer.

Option

Description

Enable real-time scanning for compressed files (like ZIP files)

Checks files reduced in size through data compression techniques. Such files commonly end with the ZIP or RAR extension and require a specific program to "unpack," "unzip," or "decompress" the contents.

Enable machine-learning to protect from new or unknown threats

Uses advanced machine learning technology to correlate threat information and perform in-depth file analysis to detect and protect against new and unknown security risks.

Check if programs try to make unauthorized changes to system settings that could threaten your security

Blocks suspicious changes to the computer. Such changes can result in web browser hijackings, unwanted, but unremovable, web browser toolbars, or reduced computer performance, among other problems.

Prevent programs on portable drives from launching automatically

Blocks programs that try to start running without your permission when you plug a USB drive into the computer. Flash memory or other portable USB drives rarely include certain kinds of programs that launch automatically, so they usually represent a threat if found.

Immediately close programs that have been exploited by hackers

Stops programs known to help with attacks and shows an alert to announce what happened.

Protect documents against unauthorized encryption or modification

Blocks suspicious changes to your documents that might lock you out for the purpose of extortion.

Back up files encrypted or modified by suspicious programs

Saves a copy of your files upon detecting a security risk and recovers the originals after stopping the attack.

Scan for suspicious files as the computer starts

For computers running Microsoft Windows 8 or above, your Trend Micro security software can start checking for threats as the operating system starts to get a jump on any malicious software that has infected fundamental Windows components.

Automatically delete files that show any signs of a threat

Gets rid of any file that might cause trouble. This aggressive response could remove some harmless files along with the unsafe ones, so consider using this protection only when receiving files or installing programs that seem risky.

Automatically delete potentially unwanted applications

Removes additional programs that may have been included with the software you wanted to install. These unwanted programs may contain potential threats, slow down your computer's performance, or monitor your Internet activities.

Automatically delete joke programs

Removes relatively harmless programs that neither cause damage nor spread automatically, but which do annoy some people.

Display a warning after detecting viruses, spyware, or suspicious behavior

Provides a notification when a threat is detected, quarantined, or removed, or when programs on the computer behave in a suspicious manner.

Your security software takes a balanced approach to detecting threats. You can override this automatic system to select a Normal protection level, which helps avoid false positive identifications of malicious software. Selecting a Hypersensitive protection level makes sense if viruses or spyware have already taken up residence on your computer. In general, you can just let your security software switch between these protection levels automatically.

Stay informed when something important happens

Important warnings appear when your security software deals with a threat.

Select Display a warning after detecting viruses, spyware, or suspicious behavior to make sure you see these messages.