eScan BlogeScan Blog    eScan WebsiteeScan Website    eScan ForumeScan Forum    eScan FeedseScan Feeds     
    
Languages:     

From eScan Wiki

Jump to: navigation, search
Image:escan-g.jpg
· eScan  · MailScan  · Technologies   · Technical Info  · Security Awareness  · User Guides

This Scan option page enables you to scan the system areas, registry, services and startup, full computer or specific directories/files for viruses and other malicious programs.

  • This page has different options available, like –

A) Check memory, registry and services – this option checks the system memory, registry and services for any infection from malwares that load at system startup /bootup.

B) Scan Spyware – this option checks the system for infection from spyware, adware and other malwares like key logger, rootkit, etc...

C) Scan Startup – this option checks the system startup area for any infection from malwares.

D) Scan USB drives – this option checks the external media like the USB drives for any infection from malwares.

E) Custom scan – this option enables you to customize the scan targets (what you want to scan). When clicked on the “Start” option button (available at the bottom end of this “Custom Scan” option), the objects and areas that need to be scanned are made available, like the CD-ROM, Spyware, Adware, Key logger, Rootkit, Memory, Registry and Services, Local Hard Drives, specific Directories and Files, USB drives, Startup.

The three dots […] available on the “Custom Scan Options “ page when clicked on helps in selecting the different drives, directories and files that need be scanned in particular.


At the bottom end of this Scan page, a option is available, viz- start. 1. Start – runs/ executes the desired process like "scan spyware", "custom scan", etc...


Other Options include -

F) Scheduler

This option is used to set or assign a task of scanning. The option of "Add task" available at the below end of the "Scheduler" page enables the administrator/user to configure/set a scheduled task (scan), the requirements of which are as below -

1. Job - name of the scan task a. If the program should start in the background or foreground b. If the program should quit if a virus infection is detected

2. Analysis extent – what to scan a. Check local hard drives b. Check for specific directories and files

3. Schedule – when it should run /execute a. When the program should run /execute i) Once, Hourly, Daily, Weekly, Monthly, With System Startup ii)Time

4. Virus Check – properties of the scan task a. In the case of an infection - the default action set is to "Automatic", but can be set as per requirements. b. Priority of Scanner - the default action set is on "Normal", but can be set as per requirements. c. File types - the default action set is on "Automatic", but can be set as per requirements. d. Settings - these are the different ways of detecting an infection on the system's different objects and areas and they are as mentioned below:-

i) Heuristic: The system is checked for any suspicious activity/unusual sequence, pattern or behavior and when detected, the software takes the necessary action. ii) Packed Objects: Files that are zipped are scanned. iii) Prepare Log: A log of all the scanning activity is generated and maintained.This includes details of when the scan was run, infected file names along with the path and action taken. iv) Full Log: A full (detailed) log is maintained of the activities done by the scanner. v) Archived Objects: Files that are archived are scanned. vi) System Area: The system areas like the boot or partition sectors are scanned.

At the bottom end of this Scheduler option page, four additional options are available, viz- refresh, clear all, add new task, start now and edit.

1. Refresh - displays the latest status 2. Clear All - clears/deletes all the scheduled scans. 3. Add task - this enables to define a new task (scan). 4. Start now- this enables you to start the scan process manually. 5. Edit - this enables you to edit settings of the scan task defined.

G) Options – This option helps in customizing the On Demand Scanner (ODS) using the below -

1) Virus Check - a. In the case of an infection - the default action set is to "Automatic", but can be set as per requirements. b. Priority of Scanner - the default action set is to "Normal", but can be set as per requirements. c. File types - the default action set is on "Automatic", but can be set as per requirements. d. Settings - these are the different ways of detecting an infection on the system's different objects and areas and they are as mentioned below:-

i) Heuristic: The system is checked for any suspicious activity or behavior/unusual sequence, pattern and when detected the software takes the necessary action. ii) Packed Objects: Files that are zipped are scanned. iii) Check Memory: this option when enabled, would check the system's memory (ram). iv) Archived Objects: Files that are archived are scanned. v) System Area: The system areas like the boot or partition sectors are scanned. vi) File size limit for scanning: this option helps to set the limit for scanning based on the size of the file (beyond which the scanner would not scan). By default, the limit is set to 5 MB. vii) Calculate Analysis: this option calculates and displays the details of the analysis done and/or it displays after calculation the remainder(percentage) of the scan to be done. viii) Send mail to admin if infection is found: this option helps in notifying the administrator of eScan or the network (designated) that an infection was detected on the system.

Other option:

1) Set to default: this option will revert back to the original/default settings i.e. all the latest changes made to the eScan "Virus Check" option page would be lost.

2) Alert - This option helps in alerting/notifying the user in the below said conditions -

a) Warn, if virus signature is more than - this option is set as default. It notifies/alerts the user if the virus signature is more than 3 days old. b) Warn, if the last computer analysis was more than - this option is not set as default. It notifies/alerts the user if the last computer analysis done is more than 14 days old. c) Log Settings - A log of all the scanning activity is generated and maintained.This includes details of when the scan was run, infected file names along with the path and action taken.The path can be customized as per requirements. d) Only infection to be logged: The log would only have details of the infection and none other details. e) Full Log: A full (detailed) log is maintained of the activities done by the scanner.

3) Restrictions - This option helps in speeding up the scan process and also in best utilizing the system's resources.

a. Delete infected files having these extentions - this is a list of file types that would be deleted if found infected by default. It can be customized as per requirement and also set to default. b. Size Restrictions for files having these extentions - this is a list of file types that would not be scanned if the size exceeds the defined limit. It can be customized as per requirement and also set to default. c. Scan Restrictions for files having these extentions - this is a list of file types that would not be scanned. It can be customized as per requirement and also set to default.


Other option: 1. Set to default: this option will revert back to the original/default settings i.e. all the latest changes made to the eScan "Virus Check" option page would be lost.

At the bottom end of this Options option page, two additional options are available, viz- refresh and save. 1. Refresh - displays the latest status 2. Save - saves all the settings done.

H) Logs - This option enables you to check the logs created and maintained within the software after the completion of the defined scan task. It displays, the complete details like the "File Name", "Start Time" and "Directory" where the logs are stored.

At the bottom end of this Log option page, two additional options are available, viz- refresh and clear all. 1. Refresh - displays the latest status 2. Clear All - clears/deletes all the logs. 3. View Log – the log/s created can be viewed.


eScan Copyright © 2015 MicroWorld Technologies Inc.- AntiVirus & Content Security.       Send your feedback to solutions@escanav.com eScan Wiki

    Privacy policy  About eScan Wiki  Disclaimers   This page has been accessed 5,318 times.