eScan BlogeScan Blog    eScan WebsiteeScan Website    eScan ForumeScan Forum    eScan FeedseScan Feeds     
    
Languages:     

From eScan Wiki

(Difference between revisions)
Jump to: navigation, search
Revision as of 11:20, 30 August 2008
WikiSysop (Talk | contribs)

← Previous diff
Revision as of 12:04, 30 August 2008
WikiSysop (Talk | contribs)

Next diff →
Line 121: Line 121:
Along with the above statistical reports, it also displays the total files scanned, total infected objects and last file scanned. Along with the above statistical reports, it also displays the total files scanned, total infected objects and last file scanned.
 +
 +
 +
 +Note:- Depending on the subscription, some of the listed items may be unavailable.

Revision as of 12:04, 30 August 2008

File Anti-Virus (Virus & Malware protection) -

Shows the current status of the Virus & Malware Protection level. The green color right tick mark denotes that the module is “Active” while the red color cross mark denotes that the module is “InActive”.

On the File Anti-Virus (Virus & Malware protection) option page in the “Configuration” section, when clicked on the “Settings” option, one can change the Virus & Malware Protection level, whereas clicking on the “Start” and /or “Stop” option (next to Settings) makes the module “Active” and /or “InActive”.


Configuration section

When clicked on “Settings” the below options are available, through which the eScan software’s real-time Virus and Monitor protection can be customized -

a. Objects - This option helps in customizing the different objects that need to be scanned, actions to be taken along with the exclusions that can be set as per requirements.

  • On the left hand side:-

a. Objects to be scanned – This lists the drives removable and non-removable including the network drives that would be scanned.

  • On the right hand side:-

a. Action in case of virus detection - The default action set is to first disinfect (clean) and then delete. It is recommended, that you do not change the default settings.

b. Scan local removable disk drives - This option scans for all local removable disk drives attached onto the system like the floppy, cd, usb, etc...

c. Scan local hard disk drives - This option scans for all the local hard disk drives.

d. Scan network drives - This option scans for the network drives (mapped) on to this system.

e. Scan files of following types - This option enables you to choose the file types (objects) that need to be scanned in case found infected.

i. All Infectable - This option scans for all objects that are infectable.

ii. All - This option scans for all objects.

iii. By Mask - This option scans for all file types (objects) that are listed.

f. Exclude by mask -

This option excludes or does not scan file types (objects) that are listed and the same can be customized as per requirements.

g. Not a virus list - This option excludes or does not scan file types (objects) that are listed and the same can be customized as per requirements. For example - remote admin softwares like Vnc, RaAdmin, etc...

h. Exclude folders - This option excludes or does not scan folders that are listed and the same can be customized as per requirements.

i. Scan compound objects - This option enables to scan files that are archived and packed.

j. Enable code analyzer - This option scans for suspicious objects or unknown activity happening on the infected system using the heuristic analyzer i.e. it scans using the traditional method of detecting an object as infected based on the definitions /updates (cure) available within the software, but in addition, also checks for the behavioral activity happening on the system.


b. Options -This option is helpful in defining the path of the report file (log), folder to be used in case of an infection, size limit of the compound object.

i. Save report file - This option enables you to select the path of the report file (log), this would log information on the packed files scanned.

ii. For renaming or copying of infected objects - This option enables you to select the action to be taken when a file has to be renamed or copied to another folder, the default action set is to rename the infected object to .VIR extension.

iii. Limit compound object size to (KB) - This option enables you to set the size of the compound object for scanning, the default value set is 800.


c. Customize -This option helps to further customize the sound and attention warnings (alerts) when an infection is found.

i. Use sound effects for the following events - When an infected object is detected, the infected.wav file would be used to generate a sound to notify the user of the detection and the action taken on the infection, (the system speakers need to be switched on for this).

ii. Display attention messages - This option when enabled would display a attention warning (alert) displaying the path and name of the infected object.

At the bottom end of this File Anti-Virus (Virus & Malware protection) option page in the “Reports” section, there are different options available like “View Statistics”, “View Quarantined Objects” and “View Log”.


Report section

The below options are available within -

a. View Statistics -

This option displays the latest statistics of the real-time monitor like -

i) The current details of the system date and time - This displays details of the current system date and time along with the details if the eScan Anti-Virus monitor is loaded (running) or not.

ii) The number of viruses being detected - This displays the current total number of known viruses and malwares being detected.

iii) The scanning details - This displays the scan details like the total objects, compound objects, packed object, last object, virus name and clean objects.

iv) The found details - This displays the infection found details like the known virus, virus bodies, disinfected, deleted, renamed, suspicious, corrupted, I/O errors.


b. View Quarantined Objects -

This option displays the files that are quarantined and taken as backup

i) Quarantine - This option displays the files that are quarantined.

ii) Backup - This option displays the files that are backed up before taking any action.


c. View Log –

This option displays the full log.

Along with the above statistical reports, it also displays the total files scanned, total infected objects and last file scanned.


Note:- Depending on the subscription, some of the listed items may be unavailable.


eScan Copyright © 2015 MicroWorld Technologies Inc.- AntiVirus & Content Security.       Send your feedback to solutions@escanav.com eScan Wiki

    Privacy policy  About eScan Wiki  Disclaimers