General |
In the section, you can configure the following settings of anti-virus check: •In the drop-down list, select one of the check mode: ▫—perform the anti-virus check on all available local drives. ▪The flag so Scanner will check boot sectors of the drives. Both boot sectors of logical drives and main boot sectors of physical drives are scanned. ▪The flag to scan files that automatically launched at operating system startup. ▪See the flag to scan processes that are run in the RAM. ▪Set the flag to enable scanning for malware that hides its presence in the system. ▪Set the flag to scan fixed hard drives (hard disk drives, etc.). ▪Set the flag to scan all removable data storages such as floppy or CD/DVD disks, flash drives etc. ▫—perform the anti-virus check by specified paths only. ▪To add a new line, click , and specify a path in the new line. ▪To remove a path from the list, click next to the corresponding line. •Set the flag so Scanner will check for unknown viruses via the heuristic analyzer. In this mode the Scanner may give false positives though. •Set the flag to follow symbolic links during scan. •Set the flag to interrupt scanning when switching computer of a user to battery mode. •Set the flag to disable network and internet connections during scanning process. •Set the flag to search for viruses in files within archives. •Set the flag to scan mailboxes. •Set the flag to search for viruses in packages for program installation. •The drop-down list defines priority of the check process relatively computing resources of operating system. •Set the flag to limit the use of computer resources when scanning, set the flag and select from the drop-down list the maximum allowed load of resources by Scanner. In absence of other tasks, computer resources are used in maximum.
•In the field, specify the maximum number of processor cores used by the scanner. Integers from 0 to 32 are allowed. The 0 value instructs to use all available cores. If you are configuring a group of stations, please note that this parameter has an absolute value, not a percentage from the total number of available cores. Because of this, the same value may lead to different relative load of stations with different number of processor cores. •The drop-down list instructs to perform specified action automatically when the check is completed: ▫—no actions perform on user computer after the check is completed. ▫—shutdown the user computer after the check is complete. Before shutdown the computer, the Scanner applies specified actions to detected threats. ▫—restart the user computer after the check is complete. Before restart the computer, the Scanner applies specified actions to detected threats. ▫. ▫. |