specified by entering the path to the folder or file(s) you
wish to include. If you are only interested in scanning the
system without additional cleaning actions, select the
Scan without cleaning
choose from three cleaning levels by clicking
Cleaning.
Performing computer scans with Custom scan is
recommended for advanced users with previous
experience using antivirus programs.
4.1.2.2 Scan targets
The Scan targets tree structure allows you to select files
and folders to be scanned for viruses. Folders may also
be selected according to a profile's settings.
A scan target can be more precisely defined by entering
the path to the folder or file(s) you wish to include in
scanning. Select targets from the tree structure that lists
all available folders on the computer.
4.1.2.3 Scan profiles
Your preferred scan settings can be saved for future
scanning. We recommend that you create a different
profile (with various scan targets, scan methods and
other parameters) for each regularly used scan.
To create a new profile, go to
preferences ...
>
Protection
Edit...
next to the list of current profiles.
To help you create a scan profile to fit your needs, see
the
ThreatSense engine parameters setup
a description of each parameter of the scan setup.
Example: Suppose that you want to create your own
scan profile and the Smart scan configuration is partially
suitable, but you do not want to scan runtime packers or
potentially unsafe applications and you also want to
apply Strict cleaning. In the
Profiles List
window, write the profile name, click the
Add
button and confirm by OK. Then adjust the
parameters to meet your requirements by setting
ThreatSense Engine
and
option. Furthermore, you can
Setup...
Setup
>
Enter application
>
Computer Scan
and click
section for
11
On-demand Scanner
Scan
Targets.
>
4.1.3 ThreatSense engine parameters setup
ThreatSense is the name of the technology consisting of
complex threat detection methods. This technology is
proactive, which means it also provides protection
during the early hours of the spread of a new threat. It
uses a combination of several methods (code analysis,
code emulation, generic signatures, virus signatures)
which work in concert to significantly enhance system
security. The scanning engine is capable of controlling
several data streams simultaneously, maximizing the
efficiency and detection rate. ThreatSense technology
also successfully eliminates rootkits.
The ThreatSense technology setup options allow you to
specify several scan parameters:
File types and extensions that are to be scanned
The combination of various detection methods
Levels of cleaning, etc.
To enter the setup window, click
antispyware
>
protection setup
located in the
System
Protection
and
ThreatSense technology (see below). Different security
scenarios could require different configurations. With
this in mind, ThreatSense is individually configurable for
the following protection modules:
System Protection
Real-Time Protection
protection
Computer Scan
The ThreatSense parameters are specifically optimized
for each module, and their modification can significantly
influence system operation. For example, changing
settings to always scan runtime packers, or enabling
advanced heuristics in the Real-time file system
protection module could result in a slower system .
Therefore, we recommend that you leave the default
ThreatSense parameters unchanged for all modules
except Computer scan.
Setup
Advanced Antivirus and antispyware
and then click the
Setup...
Protection,
Real-Time
Computer Scan
wildcards, which all use
> Automatic startup file check
> Real-time file system
> On-demand computer scan
>
Antivirus and
button
11
Need help?
Do you have a question about the CYBERSECURITY and is the answer not in the manual?
Questions and answers