|
The component settings can be adjusted if the administrator of the central protection server, to which Dr.Web is connected, enabled this option.
To access the SpIDer Guard settings, you are prompted to enter the password if you enabled the Protect Dr.Web settings with a password option in the Settings window.
|
The default settings are optimal for most cases. Do not change them unnecessarily.
Scan options
By default, SpIDer Guard checks objects on removable media such as CD/DVD, flash memory, and so on. This option helps to protect your computer from viruses transmitted via removable media.
|
If any problem occurs during installation with the autorun option, it is recommended to temporary disable the Block autoruns from removable media option.
|
Actions
On this page, you can configure reactions of SpIDer Guard to detection of infected or suspicious files and malware.
For different types of compromised objects, actions are assigned separately from the respective drop-down lists:
•Infected—objects infected with a known and (supposedly) curable virus. •Suspicious—objects supposedly infected with a virus or containing a malicious object. •Various potentially dangerous objects (riskware). To expand the entire list of objects, click the Advanced settings link. Separate reaction of SpIDer Guard to detection of each object type. Set of actions available for the selection depends on the threat type.
By default, SpIDer Guard attempts to cure infected and supposedly curable files, moves other most dangerous objects to Quarantine, and ignores minor threats such as jokes, hacktools, and riskware. Details
You can select one of the following actions for detected threats:
Action
|
Description
|
Cure, move to quarantine if not cured
|
Instructs to restore the original state of the object before infection. If the object is incurable, or the attempt of curing fails, this object is moved to quarantine.
The action is available only for objects infected with a known virus that can be cured except for Trojan programs and files within complex objects such as archives, mailboxes, or file containers.
|
Cure, delete if not cured
|
Instructs to restore the original state of the object before infection. If the object is incurable, or the attempt of curing fails, this object is deleted.
The action is available only for objects infected with a known virus that can be cured except for Trojan programs and files within complex objects such as archives, mailboxes, or file containers.
|
Delete
|
Instructs to delete the object.
This action is not available for boot sectors.
|
Move to Quarantine
|
Instructs to move the object to a specific folder of Quarantine.
This action is not available for boot sectors.
|
Ignore
|
Instructs to skip the object without performing any action or displaying a notification.
The action is available only for potentially dangerous files: adware, dialers, jokes, hacktools and riskware.
|
Report
|
Instructs to display the notification and skip the object without performing any actions.
The action is available only for suspicious objects and malware.
|
|
SpIDer Guard does not check complex objects such as archives, mailboxes, or file containers. No action is performed on such objects or on files within them.
Copies of all processed objects are stored in Quarantine.
|
|
Scan mode
In this group, you can set up what actions with objects require scanning “on-the-fly” with SpIDer Guard.
Option
|
Description
|
Optimal (recommended)
|
This scan mode is used by default.
In this mode, SpIDer Guard scans objects only when one of the following actions is traced:
•For objects on hard drives, an attempt to execute a file, create a new file, or add a record to an existing file or boot sector. •For objects on removable media, an attempt to access file or boot sectors in any way (write, read, execute). |
Paranoid
|
In this mode, SpIDer Guard scans files and boot sectors on hard or network drives and removable media at any attempt to access them (create, write, read, execute).
|
|
When running in the Optimal mode, SpIDer Guard does not terminate execution of an EICAR test file and the file is not processed as malicious since it does not pose any actual threat to your system. However, if you copy or create such a file in your system, it will be detected by SpIDer Guard and moved to Quarantine by default.
|
Details and recommendations
The Optimal mode is recommended to use after a thorough scan of all hard drives by Dr.Web Scanner. With this mode activated, SpIDer Guard prevents penetration of new viruses and other malicious objects via removable media into your computer while preserving performance by omitting knowingly “clean” objects from repeated scans.
The Paranoid mode ensures maximum protection but considerably reduces computer performance.
In any mode, objects on removable media and network drives are scanned only if the corresponding options in the Scan options group are enabled.
|
Operating system may register some removable media as hard drives (for example, portable USB hard drives). Scan such devices with Dr.Web Scanner when you connect them to the computer.
By default, files within archives and mailboxes are not scanned. This does not affect security of your computer when it is constantly protected by SpIDer Guard, only delays the moment of detection. If a file within an archive or email attachment is infected, the malicious object will be detected and neutralized by SpIDer Guard immediately when you try to extract the archived files or download the attachment.
|
|
Advanced settings
The settings of this group allow to specify parameters for scanning objects on-the-fly and are always applied regardless of the selected SpIDer Guard operation mode. You can enable:
•Use of heuristic analysis; •scan of programs and modules to download; •scan of installation packages; •scan of files on network drives (not recommended); •scan of a computer for the presence of rootkits (recommended). Heuristic analysis
By default, SpIDer Guard performs scan using heuristic analysis. If this option is disabled, SpIDer Guard will use signature analysis only.
Background rootkit scanning
Anti-rootkit component included in Dr.Web provides options for background scanning of the operating system for complex threats and curing of detected active infections when necessary.
If this option is enabled, Dr.Web Anti-rootkit constantly resides in memory. In contrast to the on-the-fly scanning of files by SpIDer Guard, scanning for rootkits i.e. malicious programs that are used for hiding changes in the operating system such as running of particular processes, registry changes, modifications of files and folders includes checking of autorun objects, running processes and modules, Random Access Memory (RAM), MBR/VBR disks, computer BIOS system, and other system objects.
One of the key features of Dr.Web Anti-rootkit is delicate attitude towards consumption of system resources (processor time, free RAM, and others) as well as consideration of hardware capacity.
When Dr.Web Anti-rootkit detects a threat, it notifies you on the detection and neutralizes the malicious activity.
|
During background rootkit scanning, files and folders specified on the Excluded files page are excluded from scanning.
|
Background rootkit scanning is enabled by default.
|
Disabling of SpIDer Guard does not affect background scanning. If the option is enabled, background scanning is performed regardless of whether SpIDer Guard is running or not.
|
|