Views:

Procedure

  1. Go to the File Transfer ScanVirus ScanTarget tab.
    The Target tab displays.
  2. Select one of the following for scanning:
    • All attachment files: IM Security scans for viruses/malware, worms, Trojans, and other malicious code in all files except unscannable files. Unscannable files are password protected files, encrypted files, or files that exceed the user-defined scanning restrictions. Other malicious code describes previously unknown threat types for which you want to configure a IM Security action.
    • IntelliScan: IntelliScan uses Trend Micro recommended settings to perform an efficient scan.
      Note
      Note
      There is one key difference between using IntelliScan and performing other scans using IM Security true file type recognition. IM Security true file type recognition allows users to define their own selection of files to scan, while IntelliScan always uses the Trend Micro recommended selection of files to scan.
    • Specify file types: Click the link to expand the list and select the files you want IM Security to scan. These files are "true file types". The scan engine examines the file header rather than the file name to ascertain the actual file type. Or, select to create a list of file extensions by selecting Specify file extensions.
      Note
      Note
      For example: If you click Specify file types and then click Application and executablesExecutable (.exe; .dll, .vxd) then IM Security scans executable, DLL and VXD file types - even when the file has a false file extension name (is labeled .txt when it is actually an .exe). However, if you click Specify file extensions and type .exe, then IM Security scans only .exe type files. IM Security does not recognize falsely labeled file types.
  3. To use IntelliTrap technology, select Enable IntelliTrap.
    For details on IntelliTrap scanning, see IntelliTrap.
  4. To scan for spyware/grayware, select Select All for Spyware/Grayware Scan or select from the list.
  5. Click Scan Restriction Criteria if performance improvement is required.
    For details on compressed file restrictions, see Virus Scan Compressed File Restrictions.
    Tip
    Tip
    Trend Micro recommends using scanning restrictions to protect against Denial-of-Service attacks. Denial-of-Service is an attack on a computer or network that causes a loss of 'service', namely a network connection. Typically, Denial-of-Service (DoS) attacks negatively affect network bandwidth or overload computer resources such as memory.
  6. Click Save.