Views:
  1. In the Files to Scan section, select from the following:
    • All scannable files: Includes all scannable files. Unscannable files are password protected files, encrypted files, or files that exceed the user-defined scanning restrictions.

      Note:

      This option provides the maximum security possible. However, scanning every file requires a lot of time and resources and might be redundant in some situations. Therefore, you might want to limit the amount of files the agent includes in the scan.

    • File types scanned by IntelliScan: Scans files based on true-file type.

    • Files with the following extensions (use commas to separate entries): Manually specify the files to scan based on their extensions. Separate multiple entries with commas.

      Note:

      When configuring a parent policy, specify how other users can configure child policies.

      • Inherit from parent: Child policies must use the settings configured in the parent policy

      • Extend from parent: Child policies can append additional settings to the settings inherited from the parent policy

  2. In the Scan Settings section, configure the required settings.

    Setting

    Description

    Scan hidden folders

    Allows the Security Agent to detect and then scan hidden folders on the endpoint

    Scan network drive

    Scans directories physically located on other endpoints, but mapped to the local endpoint

    Scan compressed files

    Scans the specified number of compression layers within an archived file

    Note:

    Scanning through more layers may detect malware intentionally buried within a compressed archive, however, the scan may affect system performance.

    Scan OLE objects

    Scans the specified number of Object Linking and Embedding (OLE) layers in a file

    Detect exploit code in OLE files: OLE Exploit Detection heuristically identifies malware by checking Microsoft Office files for exploit code.

    Note:

    The specified number of layers is applicable to both the Scan OLE objects and Detect exploit code in OLE files options.

    Scan boot area

    Scans the boot sector of the hard disk on the endpoint for virus/malware

  3. In the CPU Usage section, select from the following:
    • High: No pausing between scans

    • Medium: Pause between file scans if CPU consumption is higher than 50%, and do not pause if 50% or lower

    • Low: Pause between file scans if CPU consumption is higher than 20%, and do not pause if 20% or lower