|
Option
|
Description
|
||
|
Backup file before cleaning
|
Creates a backup copy of an infected file before attempting
to clean the infection
|
||
|
Scan floppy disks during shutdown
|
Scans floppy disks during shutdown
|
||
|
Scan network drives
|
Scans directories physically located on other endpoints, but
mapped to the local endpoint
|
||
|
Scan the boot sector of the USB storage device after
plugging in
|
Automatically scans only the boot sector of a USB storage
device every time the user plugs it in
|
||
|
Scan all files on the USB storage device after plugging
in
|
Automatically scans all files on a USB storage device every
time the user plugs it in
|
||
|
Enable IntelliTrap
|
Detects malicious code, such as bots, in compressed
files
For details, see IntelliTrap.
|
||
|
Enable CVE exploit scanning for files downloaded through
web and email channels
|
Blocks processes that attempt to exploit known vulnerabilities in
commercially available products based on the Common Vulnerabilities and Exposures
(CVE)
system
|
||
|
Quarantine malware variants detected in
memory
|
Behavior Monitoring scans the system memory for suspicious
processes and Real-time Scan maps the process and scans it for malware threats. If
a malware
threat exists, Real-time scan quarantines the process and/or file.
|
||
|
Scan compressed files up to layer
|
A compressed file has one layer for each time it has been
compressed. If an infected file has been compressed to several layers, it must be
scanned
through the specified number of layer to detect the infection. Scanning through multiple
layers, however, requires more time and resources.
|
||
|
Scan OLE files up to layer
|
When a file contains multiple Object Linking and Embedding (OLE)
layers, the Security Agent scans the specified number of layers and ignores the
remaining layers.
Detect exploit code in OLE files: OLE Exploit Detection heuristically identifies
malware by checking Microsoft Office files for exploit code.
|
||
|
Scan Trigger
|
|
Views:
