Scan hidden folders
|
Allows the Security Agent to
detect and then scan hidden folders on the endpoint
|
Scan network drive
|
Scans directories physically located on other endpoints, but
mapped to the local endpoint
|
Scan compressed files
|
Scans the specified number of compression layers within an archived
file
 |
Note
Scanning through more layers may detect malware intentionally
buried within a compressed archive, however, the scan may affect system performance.
|
Select this option and configure the following settings:
-
Maximum layers: Scans the specified
number of compression layers within an archived file
 |
Note
Scanning through more layers may detect malware intentionally
buried within a compressed archive, however, the scan may affect system performance.
|
-
Do not scan files if the compressed file size exceeds
XX MB: Enables the Security Agent to check the sizes of individual files within a
compressed archive and skips scanning files if the individual file size exceeds the
configured threshold
-
In a compressed file, scan only the first XX
files: Prevents the Security Agent from scanning all files in archives that contain
more files than the configured threshold
|
Scan OLE objects
|
Scans the specified number of Object Linking and Embedding (OLE)
layers in a file
Detect exploit code in OLE files: OLE Exploit Detection heuristically identifies
malware by checking Microsoft Office files for exploit code.
 |
Note
The specified number of layers is applicable to both the
Scan OLE objects and Detect exploit code in OLE files
options.
|
|
Scan boot area
|
Scans the boot sector of the hard disk on the endpoint for
virus/malware
|