Real-Time Scan: Target Tab

  1. In the Scan Settings section, select from the following under Files to scan:
    • All scannable files: Includes all scannable files. Unscannable files are password protected files, encrypted files, or files that exceed the user-defined scanning restrictions.

      Note:

      This option provides the maximum security possible. However, scanning every file requires a lot of time and resources and might be redundant in some situations. Therefore, you might want to limit the amount of files the agent includes in the scan.

    • File types scanned by IntelliScan: Scans files based on true-file type.

    • Files with specified extensions: Manually specify the files to scan based on their extensions. Separate multiple entries with commas.

      Note:

      Wildcard support for file extensions in scan settings is different from scan exclusion settings. The * character replaces zero to many characters.

      For example, scanning can still detect the .COM extension when COM* is specified.

  2. In the Scan Settings section, select which file operations trigger scanning under User activity on files.
    • Created, modified, or retrieved: Scans all files created, modified, or opened on the endpoint

    • Retrieved: Scans all files opened on the endpoint

    • Created or modified: Scans all files created or modified on the endpoint

  3. In the Advanced Settings section, configure the required settings.

    Setting

    Description

    Scan POP3 messages

    Protects endpoints in real-time against security risks and spam transmitted through POP3 email messages

    POP3 Mail Scan supports the following mail clients:

    Microsoft Outlook 2003, 2007, 2010, 2013, and 2016

    Enable IntelliTrap

    Detects malicious code, such as bots, in compressed files

    Quarantine malware variants detected in memory

    Behavior Monitoring scans the system memory for suspicious processes and Real-time Scan maps the process and scans it for malware threats. If a malware threat exists, Real-time scan quarantines the process and/or file.

    Scan mapped drives and shared folders on the network

    Scans directories physically located on other endpoints, but mapped to the local endpoint

    Scan floppy disks during system shutdown

    Scans floppy disks during shutdown

    Scan compressed files

    Scans the specified number of compression layers within an archived file

    Note:

    Scanning through more layers may detect malware intentionally buried within a compressed archive, however, the scan may affect system performance.