Scan floppy disks during shutdown
|
Scans floppy disks during shutdown
|
Scan network drive
|
Scans directories physically located on other endpoints, but
mapped to the local endpoint
|
Scan the boot sector of the USB storage device after
plugging in
|
Automatically scans only the boot sector of a USB storage
device every time the user plugs it in
|
Scan all files in removable storage devices after
plugging in
|
Automatically scans all files on a USB storage device every
time the user plugs it in
|
Quarantine malware variants detected in
memory
|
Behavior Monitoring scans the system memory for suspicious
processes and Real-time Scan maps the process and scans it for malware threats. If
a malware
threat exists, Real-time scan quarantines the process and/or file.
|
Note
Memory scanning works in conjunction with Anti-exploit
Protection in Behavior Monitoring to provide enhanced protection against Fileless
Attacks.
|
|
Scan compressed files
|
Scans the specified number of compression layers within an archived
file
|
Note
Scanning through more layers may detect malware intentionally
buried within a compressed archive, however, the scan may affect system performance.
|
|
Scan OLE objects
|
Scans the specified number of Object Linking and Embedding (OLE)
layers in a file
Detect exploit code in OLE files: OLE Exploit Detection heuristically identifies
malware by checking Microsoft Office files for exploit code.
|
Note
The specified number of layers is applicable to both the
Scan OLE objects and Detect exploit code in OLE files
options.
|
|
Enable IntelliTrap
|
Detects malicious code, such as bots, in compressed
files
|
Enable CVE exploit scanning for files downloaded through
web and email channels
|
Blocks processes that attempt to exploit known vulnerabilities in
commercially available products based on the Common Vulnerabilities and Exposures
(CVE)
system
|