General

info

Settings that are not supported in check of stations under UNIX system-based and macOS are included into square brackets [ ].

Settings that are not supported in check of stations under Android OS are included into brackets ( ).

In the General section, you can configure the following settings of anti-virus check:

Set the Use heuristic analysis flag so Scanner will check for unknown viruses via the heuristic analyzer. In this mode the Scanner may give false positives though.

The Scan boot sectors flag so Scanner will check boot sectors of the drives. Both boot sectors of logical drives and main boot sectors of physical drives are scanned.

The [Scan programs that run on startup] flag to scan files that automatically launched at operating system startup.

Set the Follow symbolic links flag to follow symbolic links during scan.

See the [(Scan loading programs and modules)] flag to scan processes that are run in the RAM.

Set the [(Scan for rootkits)] flag to enable scanning for malware that hides its presence in the system.

Set the [(Interrupt scanning when switching to battery mode)] flag to interrupt scanning when switching computer of a user to battery mode.

The [(Scan priority)] drop-down list defines priority of the check process relatively computing resources of operating system.

Set the [(Load level of computer resources)] flag to limit the use of computer resources when scanning, set the flag and select from the drop-down list the maximum allowed load of resources by Scanner. In absence of other tasks, computer resources are used in maximum.

info

The Load level of computer resources option has no effect on the actual resources load when launching the scan on a single-processor system with one core.

In the [(Number of cores to use)] field, specify the maximum number of processor cores used by the scanner. Integers from 0 to 32 are allowed. The 0 value instructs to use all available cores.

If you are configuring a group of stations, please note that this parameter has an absolute value, not a percentage from the total number of available cores. Because of this, the same value may lead to different relative load of stations with different number of processor cores.

The (Actions after scan) drop-down list instructs to perform specified action automatically when the check is completed:

do nothing—no actions perform on user computer after the check is completed.

[shutdown station]—shutdown the user computer after the check is complete. Before shutdown the computer, the  Scanner applies specified actions to detected threats.

[reboot station]—restart the user computer after the check is complete. Before restart the computer, the  Scanner applies specified actions to detected threats.

[suspend station].

hibernate station.

Set the [Disable network while scanning] flag to disable network and Internet connections during scanning process.

Set the Scan fixed volumes flag to scan fixed hard drives (hard disk drives, etc.).

Set the Scan removable media flag to scan all removable data storages such as floppy or CD/DVD disks, flash drives etc.

In the Paths selected for scan field, specify the list of checked paths (how to specify paths is described below).

To add a new string to the list, click icon-item-add and specify required path to the opened string.

To remove an item from the list, click icon-item-remove next to the corresponding string.

If you set the Paths selected for scan flag, only specified paths will be scanned. If the flag is cleared, all disks will be checked.