4.1.4.1
Type of scan
Two types are available. The Standard scan quickly scans the system
with no need for further configuration of the scan parameters. The
Custom scan... allows the user to select any of the predefined scan
profiles, as well as choose scan objects from the tree structure.
4.1.4.1.1
Standard scan
Standard scan is a user‑friendly method which allows the user to
quickly launch a computer scan and clean infected files with no need
for user intervention. Its main advantages are easy operation with no
detailed scanning configuration. Standard scan checks all files on local
drives (excluding email and archive files) and automatically cleans or
deletes detected infiltrations. The cleaning level is automatically set to
the default value. For more detailed information on types of cleaning,
see Cleaning (see page 18).
The standard scanning profile is designed for users who wish to quickly
and easily scan their computers. It offers an effective scanning and
cleaning solution without requiring an extensive configuration process.
4.1.4.1.2
Custom scan
Custom scan is an optimal solution if you wish to specify scanning
parameters such as scan targets and scanning methods. The
advantage of Custom scan is the ability to configure the parameters in
detail. The configurations can be saved to user‑defined scan profiles,
which can be useful if scanning is repeatedly performed with the same
parameters.
To select scan targets, use the drop‑down menu of the quick target
selection feature or select targets from the tree structure listing all
devices available on the computer. Furthermore, you can choose
from three cleaning levels by clicking Setup... > Cleaning. If you are
only interested in scanning the system with no additional actions
performed, select the Scan without cleaning check box.
Performing computer scans using the Custom scan mode is suitable
for advanced users with previous experience using antivirus programs.
4.1.4.2
Scan targets
The Scan targets drop‑down menu allows you to select files, folders
and devices (disks) to be scanned for viruses.
Using the quick scan targets menu option, you can select the
following targets:
Local drives – controls all system hard drives
Removable media – diskettes, USB storage devices, CD/DVD
16
Network drives – all mapped drives
A scan target can also be more precisely specified by entering the path
to the folder or file(s) you wish to include in scanning. Select targets
from the tree structure listing all devices available on the computer.
4.1.4.3
Scan profiles
The preferred computer scan parameters can be saved to profiles.
The advantage of creating scan profiles is that they can be used
regularly for scanning in the future. We recommend that you create
as many profiles (with various scan targets, scan methods and other
parameters) as the user regularly uses.
To create a new profile that can be used repeatedly for future scans,
navigate to Advanced setup (F5) > On‑demand computer scan.
Click the Profiles... button on the right to display the list of existing
scan profiles and the option to create a new one. The following
ThreatSense engine parameters setup describe each parameter
of the scan setup. This will help you create a scan profile to fit your
needs.
Example:
Suppose that you want to create your own scan profile and the
configuration assigned to the profile Smart scan is partially suitable.
But you don't want to scan runtime packers or potentially unsafe
applications and you also want to apply Strict cleaning. From the
Configuration profiles window, click the Add... button. Enter the
name of your new profile in the Profile name field, and select Smart
scan from the Copy settings from profile: drop‑down menu. Then
adjust the remaining parameters to meet your requirements.
4.1.5
ThreatSense engine parameters setup
ThreatSense is the name of the technology consisting of complex
threat detection methods. This technology is proactive, which means
it also provides protection during the early hours of the spread of
a new threat. It uses a combination of several methods (code analysis,
code emulation, generic signatures, virus signatures) which work
Need help?
Do you have a question about the SMART SECURITY and is the answer not in the manual?
Questions and answers