Real-time Scan: Advanced Settings Parent topic

Option
Description
Backup file before cleaning
Creates a backup copy of an infected file before attempting to clean the infection
Scan floppy disks during shutdown
Scans floppy disks during shutdown
Scan network drives
Scans directories physically located on other endpoints, but mapped to the local endpoint
Scan the boot sector of the USB storage device after plugging in
Automatically scans only the boot sector of a USB storage device every time the user plugs it in
Scan all files on the USB storage device after plugging in
Automatically scans all files on a USB storage device every time the user plugs it in
Enable IntelliTrap
Detects malicious code, such as bots, in compressed files
Enable CVE exploit scanning for files downloaded through web and email channels
Blocks processes that attempt to exploit known vulnerabilities in commercially available products based on the Common Vulnerabilities and Exposures (CVE) system
Quarantine malware variants detected in memory
Behavior Monitoring scans the system memory for suspicious processes and Real-time Scan maps the process and scans it for malware threats. If a malware threat exists, Real-time scan quarantines the process and/or file.
Important
Important
Memory scanning works in conjunction with Anti-exploit Protection in Behavior Monitoring to provide enhanced protection against Fileless Attacks.
Scan compressed files up to layer
A compressed file has one layer for each time it has been compressed. If an infected file has been compressed to several layers, it must be scanned through the specified number of layer to detect the infection. Scanning through multiple layers, however, requires more time and resources.
Scan OLE files up to layer
When a file contains multiple Object Linking and Embedding (OLE) layers, the Security Agent scans the specified number of layers and ignores the remaining layers.
Detect exploit code in OLE files: OLE Exploit Detection heuristically identifies malware by checking Microsoft Office files for exploit code.
Note
Note
The specified number of layers is applicable to both the Scan OLE files up to layer and Detect exploit code in OLE files options.
Scan Trigger
  • Read: Scans files whose contents are read; files are read when they are opened, executed, copied, or moved
  • Write: Scans files whose contents are being written; a file's contents are written when the file is modified, saved, downloaded, or copied from another location
  • Read or write