Configuring Virus Scan Targets Parent topic

Procedure

  1. Go to the File Transfer ScanVirus ScanTarget tab.
    The Target tab displays.
  2. Select one of the following for scanning:
    • All scannable files: IM Security scans for viruses/malware, worms, Trojans, and other malicious code in all files except unscannable files. Unscannable files are password protected files, encrypted files, or files that exceed the user-defined scanning restrictions. Other malicious code describes previously unknown threat types for which you want to configure a IM Security action.
    • IntelliScan: IntelliScan uses Trend Micro recommended settings to perform an efficient scan.
      Note
      Note
      There is one key difference between using IntelliScan and performing other scans using IM Security true file type recognition. IM Security true file type recognition allows users to define their own selection of files to scan, while IntelliScan always uses the Trend Micro recommended selection of files to scan.
    • Specified file types: Click the link to expand the list and select the files you want IM Security to scan. These files are "true file types". The scan engine examines the file header rather than the file name to ascertain the actual file type. Or, select to create a list of file extensions by selecting Specified file extensions.
      Note
      Note
      For example: If you click Specified file types and then click Application and executablesExecutable (.exe; .dll, .vxd) then IM Security scans executable, DLL and VXD file types - even when the file has a false file extension name (is labeled .txt when it is actually an .exe). However, if you click Specified file extensions and type .exe, then IM Security scans only .exe type files. IM Security does not recognize falsely labeled file types.
  3. To use IntelliTrap technology, select Enable IntelliTrap.
    For details on IntelliTrap scanning, see IntelliTrap.
  4. To scan for spyware/grayware, select Select all for Additional Virus Scanning or select from the list.
  5. Click Compressed File Scan Restrictions if performance improvement is required.
    For details on compressed file restrictions, see Virus Scan Compressed File Restrictions.
    Tip
    Tip
    Trend Micro recommends using scanning restrictions to protect against Denial-of-Service attacks. Denial-of-Service is an attack on a computer or network that causes a loss of 'service', namely a network connection. Typically, Denial-of-Service (DoS) attacks negatively affect network bandwidth or overload computer resources such as memory.
  6. Click Save.