Scan OLE objects
|
Scans the specified number of Object Linking and Embedding (OLE)
layers in a file
Detect exploit code in OLE files: OLE Exploit Detection heuristically identifies
malware by checking Microsoft Office files for exploit code.
 |
Note
The specified number of layers is applicable to both the
Scan OLE objects and Detect exploit code in OLE files
options.
|
|
Remind users of the Scheduled Scan XX minutes before it runs
|
Select this option to display a notification message on the endpoint before Scheduled
Scan begins.
 |
Note
You can disable the notification message on the Other Settings
tab of the Privileges and Other Settings screen.
|
|
Postpone Scheduled Scan for up to XX hour(s) and XX
minute(s)
|
Set the maximum amount of time users with the Postpone Scheduled
Scan privilege can delay or pause a Scheduled Scan for.
 |
Note
You can grant the Postpone Scheduled Scan privilege on the
Privileges tab of the Privileges and Other
Settings screen.
|
|
Automatically stop Scheduled Scan when scanning lasts more than XX hour(s)
and XX minute(s)
|
Stops a long Scheduled Scan after reaching the configured time duration.
|
Skip Scheduled Scan when a wireless endpoint's battery life is less than XX%
and its AC adapter is unplugged
|
Prevents the Security Agent from starting a Scheduled Scan if the battery life is
low.
|
Resume an interrupted Scheduled Scan
|
Resumes a Scheduled Scan at the specified time if the user interrupted the scan by
turning off the endpoint.
|
Resume a missed Scheduled Scan
|
Starts a Scheduled Scan at the specified time if the endpoint was not running when
the
Scheduled Scan should have started.
|
Scan compressed files
|
Scans the specified number of compression layers within an archived
file
 |
Note
Scanning through more layers may detect malware intentionally
buried within a compressed archive, however, the scan may affect system performance.
|
Select this option and configure the following settings:
-
Maximum layers: Scans the specified
number of compression layers within an archived file
 |
Note
Scanning through more layers may detect malware intentionally
buried within a compressed archive, however, the scan may affect system performance.
|
-
Do not scan files if the compressed file size exceeds
XX MB: Enables the Security Agent to check the sizes of individual files within a
compressed archive and skips scanning files if the individual file size exceeds the
configured threshold
-
In a compressed file, scan only the first XX
files: Prevents the Security Agent from scanning all files in archives that contain
more files than the configured threshold
|
Scan boot area
|
Scans the boot sector of the hard disk on the endpoint for
virus/malware
|