You can configure Scanner parameters, and change default actions for detected threats. The default settings are optimal for most cases. Do not change them unnecessarily.
To open file scan options
1.Open Dr.Web , then select .
2.Make sure Dr.Web operates in (the lock at the bottom of the program window is open ). Otherwise, click the lock .
3.At the top of the program window, click .
Figure 38. Scanner settings
In this group, you can configure general parameters of Dr.Web Scanner operation.
•. Enable this option to pause scanning when switching to battery mode. Option is disabled by default.
•. Enable this option for Dr.Web Scanner to use sound alerts for every event of detecting or neutralizing a threat. Option is disabled by default.
•. This option limits the use of computer resources by Dr.Web Scanner. The default value is optimal for most cases.
In this setting group, you can specify Scanner reaction to detection of infected or suspicious files and malware.
For different types of compromised objects, actions are assigned separately from the respective drop-down lists:
•—objects infected with a known and (supposedly) curable virus.
•—objects supposedly infected with a virus or containing a malicious object.
•Objects that pose potential threat (riskware).
By default, Scanner attempts to cure files infected by a known or potentially curable virus. Scanner moves the other most dangerous objects to . You can change reaction of Scanner to detection of each type of malware separately. Set of available reactions depends on the threat type. The default actions are optimal and marked as recommended.More about reactions
To open advanced settings, click the link in the window Figure .
You can disable check of installation packages, archives, and email files. This option is enabled by default.
You can also select one of the following actions for Scanner to perform once scanning is completed:
•. Scanner will display the list of detected threats.
•. Scanner will neutralize threats automatically.
•. Scanner will shut down the computer once threats are automatically neutralized.