eScan BlogeScan Blog    eScan WebsiteeScan Website    eScan ForumeScan Forum    eScan FeedseScan Feeds     
    
Languages:     

From eScan Wiki

(Difference between revisions)
Jump to: navigation, search
Revision as of 09:15, 30 July 2012
Webmktg (Talk | contribs)

← Previous diff
Current revision
Webmktg (Talk | contribs)
(<b> Scan </b>)
Line 22: Line 22:
__TOC__ __TOC__
-== <h2><b>Scan</b></h2>== 
 +== <b> Scan </b>==
The Scan module helps you to perform on-demand scanning on the selected files/directories, home directories, and my computer. Apart from system scanning, you can scan all the connected USB’s and CD-ROM devices, through auto and manual scan feature. You have various options to set for eScan to take action when any viruses are detected. The logs of scanning can be located at a specific location with a level of log you want to view. You can quarantine the suspected or infected files, and also perform real-time monitoring on files and reports. The Scan module helps you to perform on-demand scanning on the selected files/directories, home directories, and my computer. Apart from system scanning, you can scan all the connected USB’s and CD-ROM devices, through auto and manual scan feature. You have various options to set for eScan to take action when any viruses are detected. The logs of scanning can be located at a specific location with a level of log you want to view. You can quarantine the suspected or infected files, and also perform real-time monitoring on files and reports.
Line 44: Line 44:
::<li><h5><b>Options:</b></h5></li> ::<li><h5><b>Options:</b></h5></li>
-This option helps you configure scan settings for virus detection. +:This option helps you configure scan settings for virus detection.
&nbsp; &nbsp;
Line 65: Line 65:
By default, Disinfect (if not possible, quarantine file) option is selected. Following are the types of actions: By default, Disinfect (if not possible, quarantine file) option is selected. Following are the types of actions:
-• <b>Log Only:</b> It indicates the log that logs information of only the infected object.+:• <b>Log Only:</b> It indicates the log that logs information of only the infected object.
-• <b>Disinfect (if not possible, log):</b> It tries to disinfect and if disinfection is not possible it logs the information of only the infected object.+:• <b>Disinfect (if not possible, log):</b> It tries to disinfect and if disinfection is not possible it logs the information of only the infected object.
-• <b>Disinfect (if not possible, delete file):</b> It tries to disinfect and if disinfection is not possible it deletes the infected object.+:• <b>Disinfect (if not possible, delete file):</b> It tries to disinfect and if disinfection is not possible it deletes the infected object.
-• <b>Disinfect (if not possible, quarantine file):</b> It tries to disinfect and if disinfection is not possible it quarantines the infected object.+:• <b>Disinfect (if not possible, quarantine file):</b> It tries to disinfect and if disinfection is not possible it quarantines the infected object.
-• <b>Disinfect (if not possible, rename file):</b> It tries to disinfect and if disinfection is not possible it renames the infected object.+:• <b>Disinfect (if not possible, rename file):</b> It tries to disinfect and if disinfection is not possible it renames the infected object.
-• <b>Disinfect (if not possible, ask user):</b> It tries to disinfect and if disinfection is not possible it asks user to take an action on the infected object.+:• <b>Disinfect (if not possible, ask user):</b> It tries to disinfect and if disinfection is not possible it asks user to take an action on the infected object.
-• <b>Delete:</b> It directly deletes the infected object.+:• <b>Delete:</b> It directly deletes the infected object.
-• <b>Quarantine:</b> It directly quarantines the infected object.+:• <b>Quarantine:</b> It directly quarantines the infected object.
-• <b>Rename:</b> It directly renames the infected object.+:• <b>Rename:</b> It directly renames the infected object.
-• <b>Ask user:</b> It asks user to take an action on the infected object.+:• <b>Ask user:</b> It asks user to take an action on the infected object.
Select an appropriate option from the box. Select an appropriate option from the box.
|- bgcolor="#ffffff" |- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300" colspan = "3" align="left" | <font face="Arial">'''Scan Settings'''</font> | style="border-style: solid; border:"1"; border-width: 1px" width="300" colspan = "3" align="left" | <font face="Arial">'''Scan Settings'''</font>
 +
|- bgcolor="#ffffff" |- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Include Sub-directory'''</font> | style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Include Sub-directory'''</font>
Line 99: Line 100:
| style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Heuristic'''</font> | style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Heuristic'''</font>
| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" | | style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" |
-Select this check box if you want eScan real-time protection to exclude directories and files from scanning.+Select this check box if you want eScan to check for unusual sequence(s), pattern(s), or content.
-Click the [[Image:Exclude icon.jpg]] icon and then click the Browse button to select the directories and files that you want to exclude.+
|- bgcolor="#ffffff" |- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Cross file system'''</font> | style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Cross file system'''</font>
| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" | | style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" |
-Select this check box if you want eScan real-time protection to exclude specific files.+Cross file system means checking files on different partitions and/or network mounted file systems. Select this check box if you want eScan on-demand scanner to check cross file system in scan path.
-Click the [[Image:Exclude icon.jpg]] icon and then click the Browse button to select the directories and files that you want to exclude.+
|- bgcolor="#ffffff" |- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Archives'''</font> | style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Archives'''</font>
Line 124: Line 123:
| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" | It indicates the location where you want eScan real-time scanner to save the log file. | style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" | It indicates the location where you want eScan real-time scanner to save the log file.
By default, /var/MicroWorld/var/log location appears. If you want you can change the location. By default, /var/MicroWorld/var/log location appears. If you want you can change the location.
-Click the [[Image:Browse icon.jpg]] button and then click the Browse button to select the folder where you want to save the log file.+Click the [[Image:Browse icon.jpg]] button and then click the <b>Browse</b> button to select the folder where you want to save the log file.
-|- bgcolor="#ffffff"+
-| style="border-style: solid; border:"1"; border-width: 1px" width="300" colspan = "3" align="left" | <font face="Arial">'''Log Settings'''</font>+
-|- bgcolor="#ffffff"+
-| style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Log location'''</font>+
-| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" | It indicates the location where you want eScan real-time scanner to save the log file. +
-By default, /var/MicroWorld/var/log location appears. If you want you can change the location.+
-Click the [[Image:Browse icon.jpg]] button and then click the Browse button to select the folder where you want to save the log file.+
|- bgcolor="#ffffff" |- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Log level'''</font> | style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Log level'''</font>
Line 137: Line 129:
By default, infected is selected. By default, infected is selected.
-• <b>All:</b> This option will specify a detailed eScan log.+:• <b>All:</b> This option will specify a detailed eScan log.
-• <b>Infected:</b> This option will specify only details of the infected objects in the eScan log.+:• <b>Infected:</b> This option will specify only details of the infected objects in the eScan log.
-• <b>Minimum:</b> This option will specify only a minimum detail of the objects scanned in the eScan log.+:• <b>Minimum:</b> This option will specify only a minimum detail of the objects scanned in the eScan log.
Click an appropriate option. Click an appropriate option.
|- bgcolor="#ffffff" |- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300" colspan = "3" align="left" | <font face="Arial">'''Exclude Options'''</font> | style="border-style: solid; border:"1"; border-width: 1px" width="300" colspan = "3" align="left" | <font face="Arial">'''Exclude Options'''</font>
 +
|- bgcolor="#ffffff" |- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Files and directories'''</font> | style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Files and directories'''</font>
-| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" | Click the [[Image:Exclude icon.jpg]] icon and then click the Browse button to select the files and directories that you want to exclude from real-time scanning.+| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" | Click the [[Image:Exclude icon.jpg]] icon and then click the <b>Browse</b> button to select the files and directories that you want to exclude from real-time scanning.
|- bgcolor="#ffffff" |- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''File types'''</font> | style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''File types'''</font>
| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" | | style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" |
-Click the [[Image:Exclude icon.jpg]] icon and then click the Browse button to select the file types that you want to exclude from real-time scanning.+Click the [[Image:Exclude icon.jpg]] icon and then click the <b>Browse</b> button to select the file types that you want to exclude from real-time scanning.
|- bgcolor="#ffffff" |- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Block USB storage device(s)'''</font> | style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Block USB storage device(s)'''</font>
Line 161: Line 154:
| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" | | style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" |
It indicates the settings of an administrator. It is available only for normal user. It indicates the settings of an administrator. It is available only for normal user.
 +
Click this link, if you want to restore global settings. Click this link, if you want to restore global settings.
|- bgcolor="#ffffff" |- bgcolor="#ffffff"
Line 202: Line 196:
:<b>Note:</b> The<b>*Schedule(s) outdated</b> displayed at the lower-left corner of the window indicates the outdated schedules. The schedules, which are run only once, are called outdated schedules. :<b>Note:</b> The<b>*Schedule(s) outdated</b> displayed at the lower-left corner of the window indicates the outdated schedules. The schedules, which are run only once, are called outdated schedules.
-:When you click Add task button, the following two tabs appear:+:When you click <b>Add task</b> button, the following two tabs appear:
:::::<li><b>Schedule:</b></li> :::::<li><b>Schedule:</b></li>
-:::::It helps you to scan local hard disk drives and selected directories/files. When you select Scan my computer option, eScan scans the entire system. If you want to scan only specific directories and files, click the Scan following directories and files option, and then click the Browse button to select the directories and files of your choice. +:::::It helps you to scan local hard disk drives and selected directories/files. When you select <b>Scan my computer</b> option, eScan scans the entire system. If you want to scan only specific directories and files, click the <b>Scan following directories and files</b> option, and then click the <b>Browse</b> button to select the directories and files of your choice.
:::::You can schedule the month, date, hour, minute, and day, on which you want to run the task. :::::You can schedule the month, date, hour, minute, and day, on which you want to run the task.
Line 216: Line 210:
:::::<li><b>Options:</b></li> :::::<li><b>Options:</b></li>
-:::::It helps you to set an action to be taken by eScan when any virus is detected. Under Settings section, select appropriate check boxes, on which you want to perform scanning.+:::::It helps you to set an action to be taken by eScan when any virus is detected. Under <b>Settings</b> section, select appropriate check boxes, on which you want to perform scanning.
&nbsp; &nbsp;
[[Image:Scan Scheduler - Options window.jpg|center]] [[Image:Scan Scheduler - Options window.jpg|center]]
&nbsp; &nbsp;

Current revision

Image:escan-g.jpg
· eScan  · MailScan  · Technologies   · Technical Info  · Security Awareness  · User Guides

eScan Anti-Virus Security for Mac Version 5.x Online Help


Contents


Scan

The Scan module helps you to perform on-demand scanning on the selected files/directories, home directories, and my computer. Apart from system scanning, you can scan all the connected USB’s and CD-ROM devices, through auto and manual scan feature. You have various options to set for eScan to take action when any viruses are detected. The logs of scanning can be located at a specific location with a level of log you want to view. You can quarantine the suspected or infected files, and also perform real-time monitoring on files and reports.

Click this module, to access the scan screen. On the screen, you can configure the following settings:

 

 

  • Scan Options:

  • Scan My Computer:
    Click this link, if you want to scan the entire system.
  • Scan home directories:
    Click this link, if you want to scan all files and folders of home directories of the logged in user.
  • Custom Scan:
    Click this link, if you want to scan specific files/ directories.
  • Scan USB devices:
    Click this link, if you want to scan any specific USB storage devices like Pen drive, CD-ROM device, and so on. Automatic scanning of the USB storage devices, as and when it is connected and mounted, is always active by default.
    • Additional Options:

  • Options:
  • This option helps you configure scan settings for virus detection.

     

     

    1. On the Options tab, specify the following field details.

    2. Field

      Description

      Action in case of virus detection It indicates a type of action which you want eScan real-time scanner to take, in case of virus detection.

      By default, Disinfect (if not possible, quarantine file) option is selected. Following are the types of actions:

      Log Only: It indicates the log that logs information of only the infected object.
      Disinfect (if not possible, log): It tries to disinfect and if disinfection is not possible it logs the information of only the infected object.
      Disinfect (if not possible, delete file): It tries to disinfect and if disinfection is not possible it deletes the infected object.
      Disinfect (if not possible, quarantine file): It tries to disinfect and if disinfection is not possible it quarantines the infected object.
      Disinfect (if not possible, rename file): It tries to disinfect and if disinfection is not possible it renames the infected object.
      Disinfect (if not possible, ask user): It tries to disinfect and if disinfection is not possible it asks user to take an action on the infected object.
      Delete: It directly deletes the infected object.
      Quarantine: It directly quarantines the infected object.
      Rename: It directly renames the infected object.
      Ask user: It asks user to take an action on the infected object.

      Select an appropriate option from the box.

      Scan Settings
      Include Sub-directory It indicates the archived files, such as zip, rar, and so on.

      Select this check box if you want eScan real-time protection to scan archived files.

      Mails It indicates the compressed executables.

      By default, it is selected. Select this check box if you want eScan real-time protection to scan packed files.

      Heuristic

      Select this check box if you want eScan to check for unusual sequence(s), pattern(s), or content.

      Cross file system

      Cross file system means checking files on different partitions and/or network mounted file systems. Select this check box if you want eScan on-demand scanner to check cross file system in scan path.

      Archives It indicates the archived files, such as zip, rar, and so on.

      Select this check box if you want eScan real-time protection to scan archived files.

      Packed It indicates the compressed executables.

      By default, it is selected. Select this check box if you want eScan real-time protection to scan packed files.

      Follow symbolic links It indicates the symbolic links that allows you to access one file from another through links. This option specifies the on-demand scanner whether to resolve the symbolic link before actually scanning the object or to skip any such links.

      Select this check box if you want to follow symbolic links.

      Log Settings
      Log location It indicates the location where you want eScan real-time scanner to save the log file.

      By default, /var/MicroWorld/var/log location appears. If you want you can change the location. Click the Image:Browse icon.jpg button and then click the Browse button to select the folder where you want to save the log file.

      Log level It indicates a type of log level which you want eScan real-time protection to display. Following are the type of log level:

      By default, infected is selected.

      All: This option will specify a detailed eScan log.
      Infected: This option will specify only details of the infected objects in the eScan log.
      Minimum: This option will specify only a minimum detail of the objects scanned in the eScan log.

      Click an appropriate option.

      Exclude Options
      Files and directories Click the Image:Exclude icon.jpg icon and then click the Browse button to select the files and directories that you want to exclude from real-time scanning.
      File types

      Click the Image:Exclude icon.jpg icon and then click the Browse button to select the file types that you want to exclude from real-time scanning.

      Block USB storage device(s)

      Select this check box, if you want to block all connected USB’s and CD-ROM storage devices from real-time scanning.

      Restore global settings

      It indicates the settings of an administrator. It is available only for normal user.

      Click this link, if you want to restore global settings.

      Set to default

      It indicates the default settings set at first time installation. Click this link to set the default settings.


    3. Click the Save button.
    4. The settings get saved.

  • Logs:
  • Click this link, if you want to view and delete the scan log. It displays log list of the scanned files with file name, date, and file size.

     

     

  • Quarantined:
  • Click this link, if you want to view and delete the infected files. You can also restore the deleted files, if needed. It displays the list of infected files that have been quarantined with file name, date, file size, and virus name. It also displays the path where quarantined files are saved with number of quarantined files.

     

     

  • Scheduler:
  • The scheduler module helps you to perform scanning on local hard disk drives and selected directories and files on a schedule month, date, hour, minute, and day. Under Options window, you have various options to set for eScan to take action when any viruses are detected.
    This module is available only for administrator, but a normal user can also access and configure the scheduler settings by logging on as an administrator. It displays the list of scheduled tasks to be executed at a specific time. Click this module, to schedule the tasks for scanning. You can also edit, delete, or purge the scheduled tasks. With Delete button, you can delete any scheduled task, but Purge button is meant only for outdated schedules, wherein if you click Purge button outdated schedules get automatically deleted.

     

     

    Note: The*Schedule(s) outdated displayed at the lower-left corner of the window indicates the outdated schedules. The schedules, which are run only once, are called outdated schedules.
    When you click Add task button, the following two tabs appear:
  • Schedule:
  • It helps you to scan local hard disk drives and selected directories/files. When you select Scan my computer option, eScan scans the entire system. If you want to scan only specific directories and files, click the Scan following directories and files option, and then click the Browse button to select the directories and files of your choice.
    You can schedule the month, date, hour, minute, and day, on which you want to run the task.

     

     

  • Options:
  • It helps you to set an action to be taken by eScan when any virus is detected. Under Settings section, select appropriate check boxes, on which you want to perform scanning.

     

     


    eScan Copyright © 2015 MicroWorld Technologies Inc.- AntiVirus & Content Security.       Send your feedback to solutions@escanav.com eScan Wiki

        Privacy policy  About eScan Wiki  Disclaimers   This page has been accessed 62,160 times.