eScan BlogeScan Blog    eScan WebsiteeScan Website    eScan ForumeScan Forum    eScan FeedseScan Feeds     
    
Languages:     

From eScan Wiki

(Difference between revisions)
Jump to: navigation, search
Revision as of 06:12, 30 June 2012
Webmktg (Talk | contribs)
(<b>Scan</b>)
← Previous diff
Current revision
Webmktg (Talk | contribs)
(<b> Scan </b>)
Line 18: Line 18:
{| class="wikitable" border="0" {| class="wikitable" border="0"
|} |}
-<h2 id="mp-tfp-h2" style="margin:0; background:#95C33D; font-size:120%; font-weight:bold; border:10 solid #afa3bf; text-align:left; color:#000; padding:0.2em 0.4em">eScan Anti-Virus for Mac Version 5.x Online Help</h2>+<h2 id="mp-tfp-h2" style="margin:0; background:#95C33D; font-size:120%; font-weight:bold; border:10 solid #afa3bf; text-align:left; color:#000; padding:0.2em 0.4em">eScan Anti-Virus Security for Mac Version 5.x Online Help</h2>
-{| class="wikitable" border="0"+
-|-+
-|width="1200pt"|+
-|}+
-<U><B><font size=4>'''Scan'''</font></B></U>+__TOC__
 +== <b> Scan </b>==
-__TOC__+The Scan module helps you to perform on-demand scanning on the selected files/directories, home directories, and my computer. Apart from system scanning, you can scan all the connected USB’s and CD-ROM devices, through auto and manual scan feature. You have various options to set for eScan to take action when any viruses are detected. The logs of scanning can be located at a specific location with a level of log you want to view. You can quarantine the suspected or infected files, and also perform real-time monitoring on files and reports.
-== <b>Scan</b>==+Click this module, to access the scan screen. On the screen, you can configure the following settings:
 +&nbsp;
 +[[Image:Scan window5.5 4.jpg|center]]
 +&nbsp;
 +* <h3><b>Scan Options:</b></h3>
-The Scan module helps you to perform on-demand scanning on the selected files/directories, home directories, and my computer. Apart from system scanning, you can scan all the connected USB’s and CD-ROM devices, through auto and manual scan feature. You have various options to set for eScan to take action when any viruses are detected. The logs of scanning can be located at a specific location with a level of log you want to view. You can quarantine the suspected or infected files, and also perform real-time monitoring on files and reports. +::<li><h5><b>Scan My Computer:</b></h5> Click this link, if you want to scan the entire system.</li>
 +::<li><h5><b>Scan home directories:</b></h5> Click this link, if you want to scan all files and folders of home directories of the logged in&nbsp;user.</li>
 +::<li><h5><b>Custom Scan:</b></h5> Click this link, if you want to scan specific files/ directories.</li>
 +::<li><h5><b>Scan USB devices:</b></h5> Click this link, if you want to scan any specific USB storage devices like Pen drive, CD-ROM device, and so on. Automatic scanning of the USB storage devices, as and when it is connected and mounted, is always active by default.</li>
-Click this module, to access the scan screen. On the screen, you can configure the following settings:+*<h3><b>Additional Options:</b></h3>
 + 
 +::<li><h5><b>Options:</b></h5></li>
 + 
 +:This option helps you configure scan settings for virus detection.
&nbsp; &nbsp;
-[[Image:Scan window.jpg|center]]+[[Image:Options .jpg|center]]
&nbsp; &nbsp;
-*<b>Scan Options:</b>+<ol>
 +<li>On the <b>Options</b> tab, specify the following field details.</li>
-::<li><b>Scan My Computer:</b> Click this link, if you want to scan the entire system.</li>+{| id="table1" style="border-collapse: collapse; border-color: #000000; padding: 1px" width="110%" border="1" cellspacing="1"
-::<li><b>Scan home directories:</b> Click this link, if you want to scan all files and folders of home directories of the logged in&nbsp;user.</li>+|- bgcolor="#ffffff" valign="center"
-::<li><b>Custom Scan:</b> Click this link, if you want to scan specific files/ directories.</li>+| style="border-style: solid; border:"1"; border-width: 1px" width="30%" height="25" bgcolor="#D0E7F6" align="left" |
-::<li><b>Scan USB devices:</b> Click this link, if you want to scan any specific USB storage devices like Pen drive, CD-ROM device, and so on. Automatic scanning of the USB storage devices, as and when it is connected and mounted, is always active by default.</li>+<font face="Arial">'''Field'''</font>
 +| style="border-style: solid; border:"1"; border-width: 1px" width="200" bgcolor="#D0E7F6" align="left" |
 +<font face="Arial">'''Description'''</font>
 +|- bgcolor="#ffffff"
 +| style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial">'''Action in case of virus detection'''</font>
 +| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" |It indicates a type of action which you want eScan real-time scanner to take, in case of virus detection.
 +By default, Disinfect (if not possible, quarantine file) option is selected. Following are the types of actions:
 +:• <b>Log Only:</b> It indicates the log that logs information of only the infected object.
-*<b>Additional Options:</b>+:• <b>Disinfect (if not possible, log):</b> It tries to disinfect and if disinfection is not possible it logs the information of only the infected object.
 +:• <b>Disinfect (if not possible, delete file):</b> It tries to disinfect and if disinfection is not possible it deletes the infected object.
-::<li><b>Options:</b></li> +:<b>Disinfect (if not possible, quarantine file):</b> It tries to disinfect and if disinfection is not possible it quarantines the infected object.
-::Click this link, if you want to configure settings for virus detection. During scanning a log is created, which you can save at your preferred location. The <b>Log level</b> option helps you decide on, whether you want to log information about infected files, all files, or minimum information. If you want to block all connected USB’s and CD-ROM storage devices from scanning, then select <b>Block USB storage device(s)</b> check box.+:• <b>Disinfect (if not possible, rename file):</b> It tries to disinfect and if disinfection is not possible it renames the infected object.
 + 
 +:• <b>Disinfect (if not possible, ask user):</b> It tries to disinfect and if disinfection is not possible it asks user to take an action on the infected object.
 + 
 +:• <b>Delete:</b> It directly deletes the infected object.
 + 
 +:• <b>Quarantine:</b> It directly quarantines the infected object.
 + 
 +:• <b>Rename:</b> It directly renames the infected object.
 + 
 +:• <b>Ask user:</b> It asks user to take an action on the infected object.
 + 
 +Select an appropriate option from the box.
 +|- bgcolor="#ffffff"
 +| style="border-style: solid; border:"1"; border-width: 1px" width="300" colspan = "3" align="left" | <font face="Arial">'''Scan Settings'''</font>
 + 
 +|- bgcolor="#ffffff"
 +| style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Include Sub-directory'''</font>
 +| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" |It indicates the archived files, such as zip, rar, and so on.
 +Select this check box if you want eScan real-time protection to scan archived files.
 +|- bgcolor="#ffffff"
 +| style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Mails'''</font>
 +| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" | It indicates the compressed executables.
 +By default, it is selected. Select this check box if you want eScan real-time protection to scan packed files.
 +|- bgcolor="#ffffff"
 +| style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Heuristic'''</font>
 +| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" |
 +Select this check box if you want eScan to check for unusual sequence(s), pattern(s), or content.
 +|- bgcolor="#ffffff"
 +| style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Cross file system'''</font>
 +| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" |
 +Cross file system means checking files on different partitions and/or network mounted file systems. Select this check box if you want eScan on-demand scanner to check cross file system in scan path.
 +|- bgcolor="#ffffff"
 +| style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Archives'''</font>
 +| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" | It indicates the archived files, such as zip, rar, and so on.
 +Select this check box if you want eScan real-time protection to scan archived files.
 +|- bgcolor="#ffffff"
 +| style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Packed'''</font>
 +| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" |It indicates the compressed executables.
 +By default, it is selected. Select this check box if you want eScan real-time protection to scan packed files.
 +|- bgcolor="#ffffff"
 +| style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Follow symbolic links'''</font>
 +| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" | It indicates the symbolic links that allows you to access one file from another through links. This option specifies the on-demand scanner whether to resolve the symbolic link before actually scanning the object or to skip any such links.
 +Select this check box if you want to follow symbolic links.
 +|- bgcolor="#ffffff"
 +| style="border-style: solid; border:"1"; border-width: 1px" width="300" colspan = "3" align="left" | <font face="Arial">'''Log Settings'''</font>
 +|- bgcolor="#ffffff"
 +| style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Log location'''</font>
 +| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" | It indicates the location where you want eScan real-time scanner to save the log file.
 +By default, /var/MicroWorld/var/log location appears. If you want you can change the location.
 +Click the [[Image:Browse icon.jpg]] button and then click the <b>Browse</b> button to select the folder where you want to save the log file.
 +|- bgcolor="#ffffff"
 +| style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Log level'''</font>
 +| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" | It indicates a type of log level which you want eScan real-time protection to display. Following are the type of log level:
 +By default, infected is selected.
 + 
 +:• <b>All:</b> This option will specify a detailed eScan log.
 + 
 +:• <b>Infected:</b> This option will specify only details of the infected objects in the eScan log.
 + 
 +:• <b>Minimum:</b> This option will specify only a minimum detail of the objects scanned in the eScan log.
 + 
 +Click an appropriate option.
 +|- bgcolor="#ffffff"
 +| style="border-style: solid; border:"1"; border-width: 1px" width="300" colspan = "3" align="left" | <font face="Arial">'''Exclude Options'''</font>
 + 
 +|- bgcolor="#ffffff"
 +| style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Files and directories'''</font>
 +| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" | Click the [[Image:Exclude icon.jpg]] icon and then click the <b>Browse</b> button to select the files and directories that you want to exclude from real-time scanning.
 +|- bgcolor="#ffffff"
 +| style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''File types'''</font>
 +| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" |
 +Click the [[Image:Exclude icon.jpg]] icon and then click the <b>Browse</b> button to select the file types that you want to exclude from real-time scanning.
 +|- bgcolor="#ffffff"
 +| style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Block USB storage device(s)'''</font>
 +| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" |
 +Select this check box, if you want to block all connected USB’s and CD-ROM storage devices from real-time scanning.
 +|- bgcolor="#ffffff"
 +| style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Restore global settings'''</font>
 +| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" |
 +It indicates the settings of an administrator. It is available only for normal user.
 + 
 +Click this link, if you want to restore global settings.
 +|- bgcolor="#ffffff"
 +| style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Set to default'''</font>
 +| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" |
 +It indicates the default settings set at first time installation.
 +Click this link to set the default settings.
 +|}
 + 
 + 
 +<li>Click the <b>Save</b> button.</li>
 +The settings get saved.
 +</ol>
 + 
 +::<li><h5><b>Logs:</b></h5></li>
 + 
 +::Click this link, if you want to view and delete the scan log. It displays log list of the scanned files with file name, date, and file size.
&nbsp; &nbsp;
-[[Image:Options window.jpg|center]]+[[Image:Log 5.5 4.jpg|center]]
&nbsp; &nbsp;
-::<li><b>Logs:</b></li> +::<li><h5><b>Quarantined:</b></h5></li>
-::Click this link, if you want to view and delete the scan log. It displays log list of the scanned files with file name, date, and file size.+::Click this link, if you want to view and delete the infected files. You can also restore the deleted files, if needed. It displays the list of infected files that have been quarantined with file name, date, file size, and virus name. It also displays the path where quarantined files are saved with number of quarantined files.
-::<li><b>Quarantined:</b></li>+&nbsp;
 +[[Image:Quarantined 5.5 4.jpg|center]]
 +&nbsp;
-::Click this link, if you want to view and delete the infected files. It displays the list of infected files that have been quarantined with file name, date, file size, and virus name. It also displays the path where quarantined files are saved with number of quarantined files.+::<li><h5><b>Scheduler:</b></h5></li>
-::<li><b>Monitor:</b></li>+:The scheduler module helps you to perform scanning on local hard disk drives and selected directories and files on a schedule month, date, hour, minute, and day. Under <b>Options</b> window, you have various options to set for eScan to take action when any viruses are detected.
-::By default, real-time monitoring starts after you add a license key. This link is available only for an administrator. Click this link, if you want to configure settings for real-time monitor. You can enable or disable eScan monitor and set the action you want eScan to take when any virus is detected. eScan provides automatic eScan virus alert pop-ups, whenever any viruses are detected by eScan monitor, provided monitor is in On mode.+:This module is available only for administrator, but a normal user can also access and configure the scheduler settings by logging on as an administrator. It displays the list of scheduled tasks to be executed at a specific time. Click this module, to schedule the tasks for scanning. You can also edit, delete, or purge the scheduled tasks. With <b>Delete</b> button, you can delete any scheduled task, but <b>Purge</b> button is meant only for outdated schedules, wherein if you click <b>Purge</b> button outdated schedules get automatically deleted.
 + 
 +&nbsp;
 +[[Image:scheduler 5.5 4.jpg|center]]
 +&nbsp;
 + 
 +:<b>Note:</b> The<b>*Schedule(s) outdated</b> displayed at the lower-left corner of the window indicates the outdated schedules. The schedules, which are run only once, are called outdated schedules.
 + 
 +:When you click <b>Add task</b> button, the following two tabs appear:
 + 
 +:::::<li><b>Schedule:</b></li>
 + 
 +:::::It helps you to scan local hard disk drives and selected directories/files. When you select <b>Scan my computer</b> option, eScan scans the entire system. If you want to scan only specific directories and files, click the <b>Scan following directories and files</b> option, and then click the <b>Browse</b> button to select the directories and files of your choice.
 + 
 +:::::You can schedule the month, date, hour, minute, and day, on which you want to run the task.
 + 
 +&nbsp;
 +[[Image:Scan Scheduler - Schedule window.jpg|center]]
 +&nbsp;
 + 
 +:::::<li><b>Options:</b></li>
 + 
 +:::::It helps you to set an action to be taken by eScan when any virus is detected. Under <b>Settings</b> section, select appropriate check boxes, on which you want to perform scanning.
 + 
 +&nbsp;
 +[[Image:Scan Scheduler - Options window.jpg|center]]
 +&nbsp;

Current revision

Image:escan-g.jpg
· eScan  · MailScan  · Technologies   · Technical Info  · Security Awareness  · User Guides

eScan Anti-Virus Security for Mac Version 5.x Online Help


Contents


Scan

The Scan module helps you to perform on-demand scanning on the selected files/directories, home directories, and my computer. Apart from system scanning, you can scan all the connected USB’s and CD-ROM devices, through auto and manual scan feature. You have various options to set for eScan to take action when any viruses are detected. The logs of scanning can be located at a specific location with a level of log you want to view. You can quarantine the suspected or infected files, and also perform real-time monitoring on files and reports.

Click this module, to access the scan screen. On the screen, you can configure the following settings:

 

 

  • Scan Options:

  • Scan My Computer:
    Click this link, if you want to scan the entire system.
  • Scan home directories:
    Click this link, if you want to scan all files and folders of home directories of the logged in user.
  • Custom Scan:
    Click this link, if you want to scan specific files/ directories.
  • Scan USB devices:
    Click this link, if you want to scan any specific USB storage devices like Pen drive, CD-ROM device, and so on. Automatic scanning of the USB storage devices, as and when it is connected and mounted, is always active by default.
    • Additional Options:

  • Options:
  • This option helps you configure scan settings for virus detection.

     

     

    1. On the Options tab, specify the following field details.

    2. Field

      Description

      Action in case of virus detection It indicates a type of action which you want eScan real-time scanner to take, in case of virus detection.

      By default, Disinfect (if not possible, quarantine file) option is selected. Following are the types of actions:

      Log Only: It indicates the log that logs information of only the infected object.
      Disinfect (if not possible, log): It tries to disinfect and if disinfection is not possible it logs the information of only the infected object.
      Disinfect (if not possible, delete file): It tries to disinfect and if disinfection is not possible it deletes the infected object.
      Disinfect (if not possible, quarantine file): It tries to disinfect and if disinfection is not possible it quarantines the infected object.
      Disinfect (if not possible, rename file): It tries to disinfect and if disinfection is not possible it renames the infected object.
      Disinfect (if not possible, ask user): It tries to disinfect and if disinfection is not possible it asks user to take an action on the infected object.
      Delete: It directly deletes the infected object.
      Quarantine: It directly quarantines the infected object.
      Rename: It directly renames the infected object.
      Ask user: It asks user to take an action on the infected object.

      Select an appropriate option from the box.

      Scan Settings
      Include Sub-directory It indicates the archived files, such as zip, rar, and so on.

      Select this check box if you want eScan real-time protection to scan archived files.

      Mails It indicates the compressed executables.

      By default, it is selected. Select this check box if you want eScan real-time protection to scan packed files.

      Heuristic

      Select this check box if you want eScan to check for unusual sequence(s), pattern(s), or content.

      Cross file system

      Cross file system means checking files on different partitions and/or network mounted file systems. Select this check box if you want eScan on-demand scanner to check cross file system in scan path.

      Archives It indicates the archived files, such as zip, rar, and so on.

      Select this check box if you want eScan real-time protection to scan archived files.

      Packed It indicates the compressed executables.

      By default, it is selected. Select this check box if you want eScan real-time protection to scan packed files.

      Follow symbolic links It indicates the symbolic links that allows you to access one file from another through links. This option specifies the on-demand scanner whether to resolve the symbolic link before actually scanning the object or to skip any such links.

      Select this check box if you want to follow symbolic links.

      Log Settings
      Log location It indicates the location where you want eScan real-time scanner to save the log file.

      By default, /var/MicroWorld/var/log location appears. If you want you can change the location. Click the Image:Browse icon.jpg button and then click the Browse button to select the folder where you want to save the log file.

      Log level It indicates a type of log level which you want eScan real-time protection to display. Following are the type of log level:

      By default, infected is selected.

      All: This option will specify a detailed eScan log.
      Infected: This option will specify only details of the infected objects in the eScan log.
      Minimum: This option will specify only a minimum detail of the objects scanned in the eScan log.

      Click an appropriate option.

      Exclude Options
      Files and directories Click the Image:Exclude icon.jpg icon and then click the Browse button to select the files and directories that you want to exclude from real-time scanning.
      File types

      Click the Image:Exclude icon.jpg icon and then click the Browse button to select the file types that you want to exclude from real-time scanning.

      Block USB storage device(s)

      Select this check box, if you want to block all connected USB’s and CD-ROM storage devices from real-time scanning.

      Restore global settings

      It indicates the settings of an administrator. It is available only for normal user.

      Click this link, if you want to restore global settings.

      Set to default

      It indicates the default settings set at first time installation. Click this link to set the default settings.


    3. Click the Save button.
    4. The settings get saved.

  • Logs:
  • Click this link, if you want to view and delete the scan log. It displays log list of the scanned files with file name, date, and file size.

     

     

  • Quarantined:
  • Click this link, if you want to view and delete the infected files. You can also restore the deleted files, if needed. It displays the list of infected files that have been quarantined with file name, date, file size, and virus name. It also displays the path where quarantined files are saved with number of quarantined files.

     

     

  • Scheduler:
  • The scheduler module helps you to perform scanning on local hard disk drives and selected directories and files on a schedule month, date, hour, minute, and day. Under Options window, you have various options to set for eScan to take action when any viruses are detected.
    This module is available only for administrator, but a normal user can also access and configure the scheduler settings by logging on as an administrator. It displays the list of scheduled tasks to be executed at a specific time. Click this module, to schedule the tasks for scanning. You can also edit, delete, or purge the scheduled tasks. With Delete button, you can delete any scheduled task, but Purge button is meant only for outdated schedules, wherein if you click Purge button outdated schedules get automatically deleted.

     

     

    Note: The*Schedule(s) outdated displayed at the lower-left corner of the window indicates the outdated schedules. The schedules, which are run only once, are called outdated schedules.
    When you click Add task button, the following two tabs appear:
  • Schedule:
  • It helps you to scan local hard disk drives and selected directories/files. When you select Scan my computer option, eScan scans the entire system. If you want to scan only specific directories and files, click the Scan following directories and files option, and then click the Browse button to select the directories and files of your choice.
    You can schedule the month, date, hour, minute, and day, on which you want to run the task.

     

     

  • Options:
  • It helps you to set an action to be taken by eScan when any virus is detected. Under Settings section, select appropriate check boxes, on which you want to perform scanning.

     

     


    eScan Copyright © 2015 MicroWorld Technologies Inc.- AntiVirus & Content Security.       Send your feedback to solutions@escanav.com eScan Wiki

        Privacy policy  About eScan Wiki  Disclaimers   This page has been accessed 62,291 times.