Configure and manage the Anti-Malware scan settings.
![]() |
Important
|
Anti-Malware proactively detects and eliminates malware threats by analyzing files,
processes,
and system activities in real time. Utilizing signature-based detection, heuristic
analysis, and
machine learning, Anti-Malware identifies known and emerging threats, including viruses,
ransomware, spyware, and trojans. Anti-Malware also automatically quarantines, deletes,
or
remediates threats based on severity, keeping systems protected without manual intervention.
Procedure
- To allow Anti-Malware to scan and protect your endpoints, select Enable.
- Configure the Monitoring level.Monitoring level is the degree of vigilance and strictness applied when detecting and responding to potential threats. Higher monitoring levels provide greater sensitivity but might generate a large number of nonessential logs and impact endpoint performance. Trend Micro recommends setting your monitoring level to 2 - Moderate for more relevant data with minimal impact on your endpoints.
- To configure the sensitivity of Anti-malware rules, set the Detection level.
- To configure the strictness of response actions, set the Prevention level.
Important
The Prevention level must be equal to or lower than the Detection level.
- To allow the agent to actively scan folders and endpoint resources commonly targeted by threats, select Enable real-time scan under Scan settings.
- To enable a regular scan of the endpoint, add a schedule to the schedule list.
Important
Anti-malware currently only supports one schedule at a time. If you need to change the schedule, select a new schedule, unlink () the current schedule, then add a new one.
- To add a new schedule, click Add schedule.
- In the Select schedule window, select the schedule you configured in policy resources to use for Anti-Malware scans.
- Click Select.
- To remove a schedule, click the Unlink icon (
).
- To exclude certain files and directories from Anti-Malware scans, manage the Scan exclusions.
Important
Anti-malware currently only supports selecting one of each type of list at a time. You can change the list at any time or manage the following lists in Policy Resources:You can also specify trusted programs to exclude from all security scans in Exclusions.- To manage your selected exclusion lists, click Manage exclusions.
- To exclude a list of file directories, select a Directory list you configured in policy resources.
- To exclude a list of files, select a File list you configured in policy resources.
- To exclude a list of file extensions, select a File extension list you configured in policy resources.
- Click Save.