Procedure
- In the Scan Settings section, select from the following
under Files to scan:
-
All scannable files: Includes all scannable files. Unscannable files are password protected files, encrypted files, or files that exceed the user-defined scanning restrictions.
Note
This option provides the maximum security possible. However, scanning every file requires a lot of time and resources and might be redundant in some situations. Therefore, you might want to limit the amount of files the agent includes in the scan. -
File types scanned by IntelliScan: Scans files based on true-file type.
-
Files with specified extensions: Manually specify the files to scan based on their extensions. Separate multiple entries with commas.
Note
Wildcard support for file extensions in scan settings is different from scan exclusion settings. The * character replaces zero to many characters.For example, scanning can still detect the.COM
extension when COM* is specified.
-
- In the Scan Settings section, select which file operations trigger
scanning under User activity on files.
-
Created, modified, or retrieved: Scans all files created, modified, or opened on the endpoint
-
Retrieved: Scans all files opened on the endpoint
-
Created or modified: Scans all files created or modified on the endpoint
-
- In the Advanced Settings
section, configure the required settings.SettingDescriptionScan POP3 messagesProtects endpoints in real-time against security risks transmitted through POP3 email messagesPOP3 Mail Scan supports the following mail clients:
-
Microsoft Outlook 2010, 2013, 2016, 2019
-
Microsoft 365 Outlook
Enable IntelliTrapDetects malicious code, such as bots, in compressed filesQuarantine malware variants detected in memoryBehavior Monitoring scans the system memory for suspicious processes and Real-time Scan maps the process and scans it for malware threats. If a malware threat exists, Real-time scan quarantines the process and/or file.Scan floppy disks during system shutdownScans floppy disks during shutdownScan compressed filesScans the specified number of compression layers within an archived fileNote
Scanning through more layers may detect malware intentionally buried within a compressed archive, however, the scan may affect system performance.Scan applications that can terminate processes without the user’s permissionScans advanced tools that allow you to access system resources and terminate processes. Consider disabling the setting if your tool has triggered threat detectionsEnable CVE exploit scanning for files downloaded through web and email channelsBlocks processes that attempt to exploit known vulnerabilities in commercially available products based on the Common Vulnerabilities and Exposures (CVE) system -