From eScan Wiki
Revision as of 12:19, 23 April 2021 TechContent (Talk | contribs) ← Previous diff |
Current revision TechContent (Talk | contribs) |
||
Line 1: | Line 1: | ||
- | <h2 style='color:#00B050;font-size:24.0pt;font-family:"Open Sans"'>File Anti-Virus</h2> | + | <h4 style='color:#007FFF;font-size:18.0pt;font-family:"Open Sans"'>Settings</h4> |
- | + | ||
- | <p style='font-size:11.0pt;font-family:"Open Sans"'>File Anti-Virus module prevents infection of the computer's file system. This module is starts on the startup of the operating system and continuously monitors and scans all the files that opened, saved, or launched along with all the connected devices. The Proactive Behavior Monitoring system blocks any application that behaves maliciously or might be malicious.</p> | + | |
- | <p style='font-size:11.0pt;font-family:"Open Sans"'>eScan offers <b>Block Files</b> feature, which allows to block or quarantine the file from being accessed. It also comprises of <b>Folder Protection</b> function that prevents user from creating, updating, or deleting files/subfolders within the specified folder.</p> | + | |
- | + | ||
- | <p style='font-size:11.0pt;font-family:"Open Sans"'>The File Anti-Virus window will have the following sections that can be configured.</p> | + | |
- | + | ||
- | <ul > | + | |
- | <li style='font-size:11.0pt;font-family:"Open Sans"'>Configuration</li> | + | |
- | <li style='font-size:11.0pt;font-family:"Open Sans"'>Reports</li> | + | |
- | </ul> | + | |
- | + | ||
- | <h3 style='color:#00B050;font-size:22.0pt;font-family:"Open Sans"'>Configuration</h3> | + | |
- | + | ||
- | <p style='font-size:11.0pt;font-family:"Open Sans"'>This section displays the following information:</p> | + | |
- | + | ||
- | <ul> | + | |
- | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>File Anti-Virus Status</b>: Displays the status the File Anti-Virus module, that is, started or stopped.</li> | + | |
- | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Proactive Behavior Monitor Status</b>: Displays the status of the proactive scanning.</li> | + | |
- | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Action:</b> It displays the type of action to be taken by File Anti-Virus module.</li> | + | |
- | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Start/Stop</b>: Click an appropriate option to start/stop or enable/disable File Anti-Virus module.</li> | + | |
- | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Settings</b>: This options lets you to cpnfigure various options explained below.</li> | + | |
- | </ul> | + | |
- | + | ||
- | <h4 style='color:#00B050;font-size:18.0pt;font-family:"Open Sans"'>Settings</h4> | + | |
<p style='font-size:11.0pt;font-family:"Open Sans"'>Configure settings for File Anti-virus using the settings option present under configuration. Following tabs are available for configurations:</p> | <p style='font-size:11.0pt;font-family:"Open Sans"'>Configure settings for File Anti-virus using the settings option present under configuration. Following tabs are available for configurations:</p> | ||
Line 35: | Line 11: | ||
</ul> | </ul> | ||
- | <h5 style='color:#00B050;font-size:16.0pt;font-family:"Open Sans"'>Objects</h5> | + | <h5 style='color:#0276FD;font-size:16.0pt;font-family:"Open Sans"'>Objects</h5> |
<p style='font-size:11.0pt;font-family:"Open Sans"'>This tab will provide various option for fine tuning the settings available under File Anti-Virus. It provides options such as scanning a specific storage devices or excluding given file from scanning.</span></p> | <p style='font-size:11.0pt;font-family:"Open Sans"'>This tab will provide various option for fine tuning the settings available under File Anti-Virus. It provides options such as scanning a specific storage devices or excluding given file from scanning.</span></p> | ||
- | <p style='font-size:11.0pt;font-family:"Open Sans"'><b>Actions in case of virus definition</b></p> | + | <p style='color:#0276FDfont-size:12.0pt;font-family:"Open Sans"'><b>Actions in case of virus definition</b></p> |
<p style='font-size:11.0pt;font-family:"Open Sans"'>Displays the different actions that can be performed in case of any infection. The actions are:</p> | <p style='font-size:11.0pt;font-family:"Open Sans"'>Displays the different actions that can be performed in case of any infection. The actions are:</p> | ||
<ul> | <ul> | ||
Line 70: | Line 46: | ||
</ul> | </ul> | ||
- | <p style='font-size:11.0pt;font-family:"Open Sans"'><b>Scan files of following types</b></p> | + | <p style='color:#0276FD;font-size:12.0pt;font-family:"Open Sans"'><b>Scan files of following types</b></p> |
<p style='font-size:11.0pt;font-family:"Open Sans"'>This check box allows to choose the type of file to monitor while real-time scanning. It have 3 options to select files for scanning, whether <b>All infectable</b>, <b>All</b>, or<b> By mask</b>. The files listed in <b>By mask</b> option are the default file extensions that are defined by eScan. To add or delete files by mask, select and double-click <b>Add/Delete</b> option, and then add or delete files as required.</p> | <p style='font-size:11.0pt;font-family:"Open Sans"'>This check box allows to choose the type of file to monitor while real-time scanning. It have 3 options to select files for scanning, whether <b>All infectable</b>, <b>All</b>, or<b> By mask</b>. The files listed in <b>By mask</b> option are the default file extensions that are defined by eScan. To add or delete files by mask, select and double-click <b>Add/Delete</b> option, and then add or delete files as required.</p> | ||
- | <p style='color:#00B050;font-size:18.0pt;font-family:"Open Sans"'><b>Exclude by mask</b></p> | + | <p style='color:#0276FD;font-size:12.0pt;font-family:"Open Sans"'><b>Exclude by mask</b></p> |
- | <p style='color:#00B050;font-size:18.0pt;font-family:"Open Sans"'>This check box allows to monitors all | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>This check box allows to monitors all |
the excluded object in the <b>Exclude by mask</b> list during real‑time monitoring or scanning. You can add or delete a file or a particular file extension by double-clicking the <b>Add/Delete</b> option. This option is enabled by default.</p> | the excluded object in the <b>Exclude by mask</b> list during real‑time monitoring or scanning. You can add or delete a file or a particular file extension by double-clicking the <b>Add/Delete</b> option. This option is enabled by default.</p> | ||
- | <p style='color:#00B050;font-size:18.0pt;font-family:"Open Sans"'><b>Not a Virus List</b></p> | + | <p style='color:#0276FD;font-size:12.0pt;font-family:"Open Sans"'><b>Not a Virus List</b></p> |
- | <p style='color:#00B050;font-size:18.0pt;font-family:"Open Sans"'>File Anti‑Virus is able to detect | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>File Anti‑Virus is able to detect |
the riskware. Riskware are legitimate program that are not strictly malicious, but pose some sort of risk for the user in another way. You can add the names of riskware, such as remote admin software to the riskware list in the <b>Not a Virus List</b> dialog box by double-clicking the <b>Add / Delete</b> option, if you are certain that they are not malicious. This option is enabled by default and the riskware list is empty by default.</p> | the riskware. Riskware are legitimate program that are not strictly malicious, but pose some sort of risk for the user in another way. You can add the names of riskware, such as remote admin software to the riskware list in the <b>Not a Virus List</b> dialog box by double-clicking the <b>Add / Delete</b> option, if you are certain that they are not malicious. This option is enabled by default and the riskware list is empty by default.</p> | ||
- | <p style='color:#00B050;font-size:18.0pt;font-family:"Open Sans"'><b>Exclude Files/Folders</b></p> | + | <p style='color:#0276FD;font-size:12.0pt;font-family:"Open Sans"'><b>Exclude Files/Folders</b></p> |
- | <p style='color:#00B050;font-size:18.0pt;font-family:"Open Sans"'>This option excludes the listed | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>This option excludes the listed |
files, folders, and subfolders, while monitoring or scanning the folders. You can add or delete folders from the existing list of folders by double-clicking the <b>Add / Delete</b> option. This option is enabled by default.</p> | files, folders, and subfolders, while monitoring or scanning the folders. You can add or delete folders from the existing list of folders by double-clicking the <b>Add / Delete</b> option. This option is enabled by default.</p> | ||
- | <p style='color:#00B050;font-size:18.0pt;font-family:"Open Sans"'><b>Scan compound objects</b></p> | + | <p style='color:#0276FD;font-size:12.0pt;font-family:"Open Sans"'><b>Scan compound objects</b></p> |
- | <p style='color:#00B050;font-size:18.0pt;font-family:"Open Sans"'>This option allows to scan the archives and packed files during the scan. The <b>Archive</b> check box allows to scan archive files. The depth level of an archived file up to which you want to scan can be defined in <b>Archive Depth Level</b> field. By default, value is 16, but you can change it by double-clicking the arrow icon, and then type value in the size box. By default, <b>Packed</b> is selected. This option is enabled by default.</p> | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>This option allows to scan the archives and packed files during the scan. The <b>Archive</b> check box allows to scan archive files. The depth level of an archived file up to which you want to scan can be defined in <b>Archive Depth Level</b> field. By default, value is 16, but you can change it by double-clicking the arrow icon, and then type value in the size box. By default, <b>Packed</b> is selected. This option is enabled by default.</p> |
- | <p style='color:#00B050;font-size:18.0pt;font-family:"Open Sans"'><b>Enable code analyser</b></p> | + | <p style='color:#0276FD;font-size:12.0pt;font-family:"Open Sans"'><b>Enable code analyser</b></p> |
- | <p style='color:#00B050;font-size:18.0pt;font-family:"Open Sans"'>This option uses heuristic analyzer during the real-time scan of the computer for suspicious objects or unknown infections. It not only scans and detects infected objects by using the definitions or updates, but it also checks for suspicious files stored on the computer.</p> | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>This option uses heuristic analyzer during the real-time scan of the computer for suspicious objects or unknown infections. It not only scans and detects infected objects by using the definitions or updates, but it also checks for suspicious files stored on the computer.</p> |
- | <h5>Options</h5> | + | <h5 style='color:#0276FD;font-size:16.0pt;font-family:"Open Sans"'>Options</h5> |
- | <p class=MsoNormal style='margin-bottom:0in'>This tab will allow to configure the | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>This tab will allow to configure the |
basic settings such as the maximum size of log files and path of the | basic settings such as the maximum size of log files and path of the | ||
destination folder for storing log files, quarantined objects, and report | destination folder for storing log files, quarantined objects, and report | ||
files.</p> | files.</p> | ||
+ | <p style='font-size:11.0pt;font-family:"Open Sans"'>It provides the following options for configuration:</p> | ||
- | <p class=MsoNormal align=center style='margin-top:12.0pt;text-align:center'><img | + | <p style='color:#0276FD;font-size:12.0pt;font-family:"Open Sans"'><b>Save report file</b></p> |
- | border=0 width=624 height=434 src="TSS%20UG%20v20_reviewed_files/image020.jpg"></p> | + | |
- | <p class=MsoNormal>It provides the following options for configuration:</p> | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>This option allows to save the generated reports. The generates report consist of logs information about the scanned files and the action taken when an infected file is detected. This option is enabled by default and it also allows to configure following settings:</p> |
- | <p class=MsoNormal style='margin-bottom:0in'><b>Save report file</b></p> | + | <ul> |
- | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Show pack info in the report (Monvir.log):</b> This option is enabled by default and it allows to add details about the scanned compressed files, such as .ZIP and .RAR files to the Monvir.log file. </li> | |
- | <p class=MsoNormal style='margin-bottom:0in'>This option allows to save the generated | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Show clean object info in the report (Monvir.log):</b> This option allows to add details about uninfected files found during a scan operation to the <b>Monvir.log</b> file. This option helps to find out which files are not infected.</li> |
- | reports. The generates report consist of logs information about the scanned | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Limit size to (KB) (avpM.rpt):</b> This option helps to set the size limit of the <b>avpM.rpt</b> file. To specify the size of the log file, double-click the size box and define the size. The default value is <b>50</b> KB.</li> |
- | files and the action taken when an infected file is detected. This option is enabled | + | |
- | by default and it also allows to configure following settings:</p> | + | |
- | + | ||
- | <ul style='margin-top:0in' type=disc> | + | |
- | <li class=MsoNormal style='margin-bottom:0in'><b>Show pack info in the report | + | |
- | (Monvir.log):</b> This option is enabled by default and it allows to add details | + | |
- | about the scanned compressed files, such as .ZIP and .RAR files to the | + | |
- | Monvir.log file. </li> | + | |
- | <li class=MsoNormal style='margin-bottom:0in'><b>Show clean object info in the | + | |
- | report (Monvir.log):</b> This option allows to add details about uninfected | + | |
- | files found during a scan operation to the <b>Monvir.log</b> file. This | + | |
- | option helps to find out which files are not infected.</li> | + | |
- | <li class=MsoNormal><b>Limit size to (KB) (avpM.rpt):</b> This option helps to | + | |
- | set the size limit of the <b>avpM.rpt</b> file. To specify the size of the | + | |
- | log file, double-click the size box and define the size. The default value | + | |
- | is <b>50</b> KB.</li> | + | |
</ul> | </ul> | ||
- | <b><span style='font-size:11.0pt;line-height:115%;font-family:"Open Sans",sans-serif'><br | + | <p style='color:#0276FD;font-size:12.0pt;font-family:"Open Sans"'><b>For quarantining of infected objects</b></p> |
- | clear=all style='page-break-before:always'> | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>This option helps to specify the destination for storing quarantined objects. By default, the quarantined objects are stored in the <b>C:\Program Files\eScan\INFECTED [32-bit] </b>OR <b>C:\Program Files (x86)\ eScan\ INFECTED [64-bit]</b> folder. You can change the location of the destination folder if required.</p> |
- | </span></b> | + | |
- | <p class=MsoNormal style='margin-bottom:0in'><b>For quarantining of infected | + | <p style='color:#0276FD;font-size:12.0pt;font-family:"Open Sans"'><b>Enable Auto backup / Restore</b></p> |
- | objects</b></p> | + | |
- | <p class=MsoNormal>This option helps to specify the destination for storing | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>This option allows to takes automatic backup of critical files of the Windows® operating system installed on the computer and to restore the clean files when it finds an infection in any of the system files, which cannot be disinfected. This option allows to configure the following settings:</p> |
- | quarantined objects. By default, the quarantined objects are stored in the <b>C:\Program | + | |
- | Files\eScan\INFECTED [32-bit] </b>OR <b>C:\Program Files (x86)\ eScan\ INFECTED | + | |
- | [64-bit]</b> folder. You can change the location of the destination folder if | + | |
- | required.</p> | + | |
- | <p class=MsoNormal style='margin-bottom:0in'><b>Enable Auto backup / Restore</b></p> | + | <ul> |
- | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>For backup of clean objects:</b> eScan allows to backs up uninfected objects and store them in a given folder. By default, these objects are stored in a folder named Fbackup on the drive that has maximum free space. You can change the path of the destination folder if desired.</li> | |
- | <p class=MsoNormal style='margin-bottom:0in'>This option allows to takes | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Do not backup files above size (KB):</b> This option is enabled by default and helps to prevent File Anti‑Virus from creating backup of files that is larger than the defined file size. The default value is set to <b>32768</b> KB.</li> |
- | automatic backup of critical files of the Windows® operating system installed | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Minimum disk space (MB):</b> This option is enabled by default and enables to set the minimum free hard disk space up to which you want eScan to take backup of files. By default, value is <b>1</b> MB, but you can change it by double-clicking the arrow icon, and then type value in the size box.</li> |
- | on the computer and to restore the clean files when it finds an infection in | + | |
- | any of the system files, which cannot be disinfected. This option allows to configure | + | |
- | the following settings:</p> | + | |
- | + | ||
- | <ul style='margin-top:0in' type=disc> | + | |
- | <li class=MsoNormal style='margin-bottom:0in'><b>For backup of clean objects:</b> | + | |
- | eScan allows to backs up uninfected objects and store them in a given | + | |
- | folder. By default, these objects are stored in a folder named Fbackup on | + | |
- | the drive that has maximum free space. You can change the path of the | + | |
- | destination folder if desired.</li> | + | |
- | <li class=MsoNormal style='margin-bottom:0in'><b>Do not backup files above | + | |
- | size (KB):</b> This option is enabled by default and helps to prevent File | + | |
- | Anti‑Virus from creating backup of files that is larger than the defined file | + | |
- | size. The default value is set to <b>32768</b> KB.</li> | + | |
- | <li class=MsoNormal><b>Minimum disk space (MB):</b> This option is enabled by | + | |
- | default and enables to set the minimum free hard disk space up to which | + | |
- | you want eScan to take backup of files. By default, value is <b>1</b> MB, | + | |
- | but you can change it by double-clicking the <img border=0 width=19 | + | |
- | height=17 id="Picture 20" src="TSS%20UG%20v20_reviewed_files/image019.jpg" | + | |
- | alt="Description: Size box"> icon, and then type value in the size box.</li> | + | |
</ul> | </ul> | ||
- | <p class=MsoNormal style='margin-bottom:0in'><b>Use sound effects for the | + | <p style='color:#0276FD;font-size:12.0pt;font-family:"Open Sans"'><b>Use sound effects for the following events</b></p> |
- | following events</b></p> | + | |
- | <p class=MsoNormal><span lang=EN-IN style='color:black'>This check box option allows | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>This check box option allows to configure eScan to play a sound file and show the details regarding the infection within a message box when any malicious software is detected. However, you need to ensure that the computer speakers are switched on.</p> |
- | to configure eScan to play a sound file and show the details regarding the | + | |
- | infection within a message box when any malicious software is detected. | + | |
- | However, you need to ensure that the computer speakers are switched on.</span></p> | + | |
- | <p class=MsoNormal style='margin-bottom:0in'><b>Display attention messages</b></p> | + | <p style='color:#0276FD;font-size:12.0pt;font-family:"Open Sans"'><b>Display attention messages</b></p> |
- | <p class=MsoNormal>This option allow to displays an alert, which consist the | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>This option allow to displays an alert, which consist the path, name of the infected object, and the action taken. This option is enabled by default.</p> |
- | path, name of the infected object, and the action taken. This option is enabled | + | |
- | by default.</p> | + | |
- | <p class=MsoNormal style='margin-bottom:0in'><b>Enable Malware URL Filter</b></p> | + | <p style='color:#0276FD;font-size:12.0pt;font-family:"Open Sans"'><b>Enable Malware URL Filter</b></p> |
- | <p class=MsoNormal>This option is blocks the access to malicious websites/URL.</p> | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>This option is blocks the access to malicious websites/URL.</p> |
- | <p class=MsoNormal style='margin-bottom:0in'><b>Proactive Behavior Monitor</b></p> | + | <p style='color:#0276FD;font-size:12.0pt;font-family:"Open Sans"'><b>Proactive Behavior Monitor</b></p> |
- | <p class=MsoNormal style='margin-bottom:0in;text-align:justify'><span | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>This option allows to monitor the executable files that are running on your system. In case, if eScan finds any executable files suspicious that may cause any harm to your system, it alerts the user with a pop-up message. To access the suspicious file, you can White list them anytime.</p> |
- | lang=EN-IN style='color:black'>This option allows to monitor the executable | + | |
- | files that are running on your system. In case, if eScan finds any executable | + | |
- | files suspicious that may cause any harm to your system, it alerts the user | + | |
- | with a pop-up message. To access the suspicious file, you can White list them | + | |
- | anytime.</span></p> | + | |
- | <p class=MsoNormal><span lang=EN-IN style='color:black'>It also allows to view | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>It also allows to view the list of files that are blocked from executing on the system. You can add a File to White list or Block List using this option.</p> |
- | the list of files that are blocked from executing on the system. You can add a | + | |
- | File to White list or Block List using this option.</span></p> | + | |
- | <p class=MsoNormal style='margin-bottom:0in'><b>Enable Ransomware Protection</b></p> | + | <p style='color:#0276FD;font-size:12.0pt;font-family:"Open Sans"'><b>Enable Ransomware Protection</b></p> |
- | <p class=MsoNormal>This check box enables the protection against ransomware and | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>This check box enables the protection against ransomware and enabled by default.</p> |
- | enabled by default.</p> | + | |
- | <h5>Block Files</h5> | + | <h5 style='color:#0276FD;font-size:16.0pt;font-family:"Open Sans"'>Block Files</h5> |
- | <p class=MsoNormal style='margin-bottom:0in'>This tab allows to configure the settings | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>This tab allows to configure the settings for preventing executable and files, such as autorun.inf, on network drives, USB drives, and fixed drives from accessing your computer.</p> |
- | for preventing executable and files, such as autorun.inf, on network drives, | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>It provides the following options for configuration:</p> |
- | USB drives, and fixed drives from accessing your computer.</p> | + | |
- | <p class=MsoNormal align=center style='margin-top:12.0pt;text-align:center'><img | + | <p style='color:#0276FD;font-size:12.0pt;font-family:"Open Sans"'><b>Deny access of executables on |
- | border=0 width=567 height=395 src="TSS%20UG%20v20_reviewed_files/image021.jpg"></p> | + | |
- | + | ||
- | <p class=MsoNormal>It provides the following options for configuration:</p> | + | |
- | + | ||
- | <p class=MsoNormal style='margin-bottom:0in'><b>Deny access of executables on | + | |
USB Drive</b></p> | USB Drive</b></p> | ||
- | <p class=MsoNormal>This check box option helps to prevent executables stored on | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>This check box option helps to prevent executables stored on USB drives from being executed.</p> |
- | USB drives from being executed.</p> | + | |
- | <p class=MsoNormal style='margin-bottom:0in'><b>Disable Autoplay on USB and | + | <p style='color:#0276FD;font-size:12.0pt;font-family:"Open Sans"'><b>Disable Autoplay on USB and Fixed Drives</b></p> |
- | Fixed Drives</b></p> | + | |
- | <p class=MsoNormal>This check box option helps to disable Autoplay on USB and | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>This check box option helps to disable Autoplay on USB and Fixed Drives. This option is enabled by default.</p> |
- | Fixed Drives. This option is enabled by default.</p> | + | |
- | <p class=MsoNormal style='margin-bottom:0in'><b>Deny access of executable from | + | <p style='color:#0276FD;font-size:12.0pt;font-family:"Open Sans"'><b>Deny access of executable from Network</b></p> |
- | Network</b></p> | + | |
- | <p class=MsoNormal>This check box option helps to prevent executables from | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>This check box option helps to prevent executables from network from being executed on the computer. This option also allows to whitelist the folder/subfolder on the network as per the requirement. The whitelisted folder/subfolder can be access the executable from them.</p> |
- | network from being executed on the computer. This option also allows to whitelist | + | |
- | the folder/subfolder on the network as per the requirement. The whitelisted | + | |
- | folder/subfolder can be access the executable from them.</p> | + | |
- | <p class=MsoNormal style='margin-bottom:0in'><b>Deny Access of following files</b></p> | + | <p style='color:#0276FD;font-size:12.0pt;font-family:"Open Sans"'><b>Deny Access of following files</b></p> |
- | <p class=MsoNormal>This check box option helps to prevent the files in the list | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>This check box option helps to prevent the files in the list from running on the computer. This option is enabled by default.</p> |
- | from running on the computer. This option is enabled by default.</p> | + | |
- | <b><span style='font-size:11.0pt;line-height:115%;font-family:"Open Sans",sans-serif'><br | + | <p style='color:#0276FD;font-size:12.0pt;font-family:"Open Sans"'><b>Quarantine Access-denied files</b></p> |
- | clear=all style='page-break-before:always'> | + | |
- | </span></b> | + | |
- | <p class=MsoNormal style='margin-bottom:0in'><b>Quarantine Access-denied files</b></p> | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>This check box option allows to quarantine files that have been denied access. To prevent specific files from running on the computer by adding them to the Block Files list. By default, this list contains the value <b>%sysdir%\*.EXE@</b>.</p> |
- | <p class=MsoNormal style='margin-bottom:0in'>This check box option allows to | + | <h5 style='color:#0276FD;font-size:16.0pt;font-family:"Open Sans"'>Folder Protection</h5> |
- | quarantine files that have been denied access. To prevent specific files from | + | |
- | running on the computer by adding them to the Block Files list. By default, | + | |
- | this list contains the value <b>%sysdir%\*.EXE@</b>.</p> | + | |
- | <h5>Folder Protection</h5> | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>This tab helps to protect specific folders from being modified or deleted by adding them to the Folder Protection list.</p> |
- | <p class=MsoNormal style='margin-bottom:0in'>This tab helps to protect specific | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>It provides the following options for configuration:</p> |
- | folders from being modified or deleted by adding them to the Folder Protection | + | |
- | list.</p> | + | |
- | <p class=MsoNormal align=center style='margin-top:12.0pt;text-align:center'><img | + | <ul> |
- | border=0 width=534 height=372 src="TSS%20UG%20v20_reviewed_files/image022.jpg"></p> | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Protect files in following folders from modification and deletion</b>: This option is enabled by default. It protects the files in specific folders from being modified or deleted. Once you enable this check box, it will automatically enable the following buttons:</li> |
- | + | <ul > | |
- | <p class=MsoNormal style='margin-bottom:0in'>It provides the following options | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Add</b>: It allows you Add folders to be protected. Browse the folders and Add in the Folder List.</li> |
- | for configuration:</p> | + | |
- | + | ||
- | <ul style='margin-top:0in' type=disc> | + | |
- | <li class=MsoNormal style='margin-bottom:0in'><b>Protect files in following | + | |
- | folders from modification and deletion</b>: This option is enabled by | + | |
- | default. It protects the files in specific folders from being modified or | + | |
- | deleted. Once you enable this check box, it will automatically enable the | + | |
- | following buttons:</li> | + | |
- | <ul style='margin-top:0in' type=circle> | + | |
- | <li class=MsoNormal style='margin-bottom:0in'><b>Add</b>: It allows you Add | + | |
- | folders to be protected. Browse the folders and Add in the Folder List.</li> | + | |
</ul> | </ul> | ||
</ul> | </ul> | ||
- | <p class=MsoNormal align=center style='margin-top:12.0pt;text-align:center'><img | + | <ul > |
- | border=0 width=377 height=222 src="TSS%20UG%20v20_reviewed_files/image023.jpg"></p> | + | <ul > |
- | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Delete</b>: You can delete the folder from folder list. Click on the <b>Delete</b> button. A confirmation window appears. Click <b>Yes</b>, the folder will be | |
- | <b><span style='font-size:11.0pt;line-height:115%;font-family:"Open Sans",sans-serif'><br | + | deleted.</li> |
- | clear=all style='page-break-before:always'> | + | |
- | + | ||
- | <ul style='margin-top:0in' type=disc> | + | |
- | <ul style='margin-top:0in' type=circle> | + | |
- | <li class=MsoNormal style='margin-bottom:0in'>Delete<span style='font-weight: | + | |
- | normal'>: You can delete the folder from folder list. Click on the </span>Delete<span | + | |
- | style='font-weight:normal'> button. A confirmation window appears.</span></li> | + | |
</ul> | </ul> | ||
</ul> | </ul> | ||
- | + | <ul > | |
- | </span></b> | + | <ul > |
- | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Remove All</b>: You can remove/delete all the folders in the list at once.</li> | |
- | <p class=MsoNormal align=center style='margin-top:12.0pt;text-align:center'><img | + | |
- | border=0 width=423 height=348 src="TSS%20UG%20v20_reviewed_files/image024.png"></p> | + | |
- | + | ||
- | <p class=MsoNormal style='margin-top:0in;margin-right:0in;margin-bottom:0in; | + | |
- | margin-left:1.0in'><span lang=EN-IN>Click <b>Yes</b>, the folder will be | + | |
- | deleted.</span></p> | + | |
- | + | ||
- | <ul style='margin-top:0in' type=disc> | + | |
- | <ul style='margin-top:0in' type=circle> | + | |
- | <li class=MsoNormal style='margin-bottom:0in'><b>Remove All</b>: You can | + | |
- | remove/delete all the folders in the list at once.</li> | + | |
</ul> | </ul> | ||
</ul> | </ul> | ||
- | <span lang=EN-IN style='font-size:14.0pt;line-height:115%;font-family:"Open Sans",sans-serif; | + | <h5 style='color:#0276FD;font-size:16.0pt;font-family:"Open Sans"'>TSPM</h5> |
- | color:#00B050'><br clear=all style='page-break-before:always'> | + | |
- | </span> | + | |
- | <h5><span lang=EN-IN>TSPM</span></h5> | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>TSPM – Terminal Services Protection Module by eScan detects brute force attempts and heuristically identifies suspicious IP Addresses/Hosts and blocks any attempts to access the system. In order to safeguard the systems from future attacks, the IP addresses and Hosts from these attacks are banned from initiating any further connections to the system.</p> |
- | <p class=MsoNormal style='margin-bottom:0in'><span lang=EN-IN>TSPM – Terminal | + | <p style='color:#0276FD;font-size:12.0pt;font-family:"Open Sans"'><b>Enable Terminal Service Protection Module</b></p> |
- | Services Protection Module by eScan detects brute force attempts and | + | |
- | heuristically identifies suspicious IP Addresses/Hosts and blocks any attempts | + | |
- | to access the system. In order to safeguard the systems from future attacks, | + | |
- | the IP addresses and Hosts from these attacks are banned from initiating any | + | |
- | further connections to the system.</span></p> | + | |
- | <p class=MsoNormal align=center style='margin-top:12.0pt;text-align:center'><img | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>This option enables Terminal Service Protection Module. This will open a popup window from where you can add the IP address of the system you want to Whitelist. After adding the IP address, click on <b>Add</b> button. It will be added on the list.</span></p> |
- | border=0 width=534 height=372 src="TSS%20UG%20v20_reviewed_files/image025.jpg"></p> | + | |
- | + | ||
- | <p class=MsoNormal style='margin-bottom:0in'><b><span lang=EN-IN>Enable | + | |
- | Terminal Service Protection Module</span></b></p> | + | |
- | + | ||
- | <p class=MsoNormal style='margin-bottom:0in'><span lang=EN-IN>This option | + | |
- | enables Terminal Service Protection Module. This will open a popup window from | + | |
- | where you can add the IP address of the system you want to Whitelist.</span></p> | + | |
- | + | ||
- | <p class=MsoNormal align=center style='margin-top:12.0pt;text-align:center'><img | + | |
- | border=0 width=310 height=212 src="TSS%20UG%20v20_reviewed_files/image026.png"></p> | + | |
- | + | ||
- | <p class=MsoNormal><span lang=EN-IN>After adding the IP address, click on <b>Add</b> | + | |
- | button. It will be added on the list.</span></p> | + | |
<table class=MsoNormalTable border=1 cellspacing=0 cellpadding=0 | <table class=MsoNormalTable border=1 cellspacing=0 cellpadding=0 | ||
Line 339: | Line 188: | ||
<tr> | <tr> | ||
<td width=55 style='width:41.4pt;border:solid windowtext 1.0pt;padding:0in 5.4pt 0in 5.4pt'> | <td width=55 style='width:41.4pt;border:solid windowtext 1.0pt;padding:0in 5.4pt 0in 5.4pt'> | ||
- | <p class=MsoNormal align=center style='margin-bottom:0in;text-align:center'><b><span | + | <p style='font-size:11.0pt;font-family:"Open Sans"'><b>NOTE</b></p> |
- | lang=EN-IN>NOTE</span></b></p> | + | |
</td> | </td> | ||
<td width=561 valign=top style='width:420.7pt;border:solid windowtext 1.0pt; | <td width=561 valign=top style='width:420.7pt;border:solid windowtext 1.0pt; | ||
border-left:none;padding:0in 5.4pt 0in 5.4pt'> | border-left:none;padding:0in 5.4pt 0in 5.4pt'> | ||
- | <p class=MsoNormal style='margin-bottom:0in'><span lang=EN-IN | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>At the bottom of the screen of all the tabs — <b>Default</b>, <b>OK</b>, <b>Cancel</b>, and <b>Apply</b> buttons are present that you can |
- | style='color:black'>At the bottom of the screen of all the tabs — <b>Default</b>, | + | use after configuring the settings based on your requirement.</p> |
- | <b>OK</b>, <b>Cancel</b>, and <b>Apply</b> buttons are present that you can | + | |
- | use after configuring the settings based on your requirement.</span></p> | + | |
</td> | </td> | ||
</tr> | </tr> | ||
</table> | </table> | ||
- | + | <br> | |
- | <p class=MsoNormal style='margin-bottom:0in'><span lang=EN-IN> </span></p> | + | <ul> |
- | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Default</b>: Click this button to apply the default settings.</li> | |
- | <ul style='margin-top:0in' type=disc> | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>OK</b>: Click this button after you click the <b>Apply</b> button to apply the configured settings. </li> |
- | <li class=MsoNormal style='margin-bottom:0in'><b><span lang=EN-IN>Default</span></b><span | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Cancel</b>: Click this button to cancel the configured settings or to close the window.</li> |
- | lang=EN-IN>: Click this button to apply the default settings.</span></li> | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Apply</b>: Click this button to apply the configured settings.</span></li> |
- | <li class=MsoNormal style='margin-bottom:0in'><b><span lang=EN-IN>OK</span></b><span | + | |
- | lang=EN-IN>: Click this button after you click the <b>Apply</b> button to | + | |
- | apply the configured settings. </span></li> | + | |
- | <li class=MsoNormal style='margin-bottom:0in'><b><span lang=EN-IN>Cancel</span></b><span | + | |
- | lang=EN-IN>: Click this button to cancel the configured settings or to | + | |
- | close the window.</span></li> | + | |
- | <li class=MsoNormal style='margin-bottom:0in'><b><span lang=EN-IN>Apply</span></b><span | + | |
- | lang=EN-IN>: Click this button to apply the configured settings.</span></li> | + | |
</ul> | </ul> | ||
+ | <h3 style='color:#007FFF;font-size:20.0pt;font-family:"Open Sans"'>Reports</h3> | ||
+ | <p style='font-size:11.0pt;font-family:"Open Sans"'>This section displays the information along | ||
+ | with the reports, which are as follows:</p> | ||
- | <h3><a name="_Toc64042268"></a><a name="_Toc66462131"><span lang=EN-IN>Reports</span></a></h3> | + | <p style='color:#0276FD;font-size:12.0pt;font-family:"Open Sans"'><b>Total Files Scanned</b></p> |
- | <p class=MsoNormal><span lang=EN-IN>This section displays the information along | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>It shows the total number of files scanned by the real-time File Anti-Virus monitor.</p> |
- | with the reports, which are as follows:</span></p> | + | |
- | <p class=MsoNormal style='margin-bottom:0in'><b><span lang=EN-IN>Total Files | + | <p style='color:#0276FD;font-size:12.0pt;font-family:"Open Sans"'><b>Dangerous Objects Detected</b></p> |
- | Scanned</span></b></p> | + | |
- | <p class=MsoNormal><span lang=EN-IN>It shows the total number of files scanned | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>It shows the total number of viruses or malicious software detected by the File Anti-Virus monitor on a real-time basis.</p> |
- | by the real-time File Anti-Virus monitor.</span></p> | + | |
- | <p class=MsoNormal style='margin-bottom:0in'><b><span lang=EN-IN>Dangerous | + | <p style='color:#0276FD;font-size:12.0pt;font-family:"Open Sans"'><b>Last File Scanned</b></p> |
- | Objects Detected</span></b></p> | + | |
- | <p class=MsoNormal><span lang=EN-IN>It shows the total number of viruses or | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>It shows the name of last file scanned by File Anti-Virus monitor on real-time basis.</p> |
- | malicious software detected by the File Anti-Virus monitor on a real-time | + | |
- | basis.</span></p> | + | |
- | <p class=MsoNormal style='margin-bottom:0in'><b><span lang=EN-IN>Last File | + | <p style='color:#0276FD;font-size:12.0pt;font-family:"Open Sans"'><b>View Statistics</b></p> |
- | Scanned</span></b></p> | + | |
- | <p class=MsoNormal><span lang=EN-IN>It shows the name of last file scanned by | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>When you click this button, the statistics dialog box is displayed, which displays the latest activity report of the real-time monitor. The report contains information under two sections:</p> |
- | File Anti-Virus monitor on real-time basis.</span></p> | + | |
- | <b><span lang=EN-IN style='font-size:11.0pt;line-height:115%;font-family:"Open Sans",sans-serif; | + | <ul > |
- | color:black'><br clear=all style='page-break-before:always'> | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Scanned</b>: This section shows scanned details of objects of Virus bodies, Disinfected, Deleted, Quarantined etc.</li> |
- | </span></b> | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Found</b>: This section shows Virus details such as Virus bodies, Disinfected, Deleted, Quarantined, etc.</li> |
- | + | ||
- | <p class=MsoNormal style='margin-bottom:0in'><b><span lang=EN-IN | + | |
- | style='color:black'>View Statistics</span></b></p> | + | |
- | + | ||
- | <p class=MsoNormal style='margin-bottom:0in'><span lang=EN-IN>When you click | + | |
- | this button, the statistics dialog box is displayed, which displays the latest | + | |
- | activity report of the real-time monitor. The report contains information under | + | |
- | two sections:</span></p> | + | |
- | + | ||
- | <ul style='margin-top:0in' type=disc> | + | |
- | <li class=MsoNormal style='margin-bottom:0in'><b><span lang=EN-IN>Scanned</span></b><span | + | |
- | lang=EN-IN>: This section shows scanned details of objects of Virus | + | |
- | bodies, Disinfected, Deleted, Quarantined etc.</span></li> | + | |
- | <li class=MsoNormal style='margin-bottom:0in'><b><span lang=EN-IN>Found</span></b><span | + | |
- | lang=EN-IN>: This section shows Virus details such as Virus bodies, | + | |
- | Disinfected, Deleted, Quarantined, etc.</span></li> | + | |
</ul> | </ul> | ||
- | <p class=MsoNormal align=center style='margin-top:12.0pt;text-align:center'><img | + | <p style='color:#0276FD;font-size:12.0pt;font-family:"Open Sans"'><b>View Quarantined Objects</b></p> |
- | border=0 width=565 height=521 src="TSS%20UG%20v20_reviewed_files/image027.jpg"></p> | + | |
- | <p class=MsoNormal style='margin-bottom:0in'><b><span lang=EN-IN>View | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>Click on <b>View Quarantined Objects</b>, <b>Quarantine </b>popup gets displayed. It displays all the quarantined objects. There are two tabs present:</p> |
- | Quarantined Objects</span></b></p> | + | |
- | <p class=MsoNormal style='margin-bottom:0in'>Click on <b>View Quarantined | ||
- | Objects</b>, <b>Quarantine </b>popup gets displayed. It displays all the | ||
- | quarantined objects. There are two tabs present:</p> | ||
- | <span style='font-size:11.0pt;line-height:115%;font-family:"Open Sans",sans-serif'><br | + | <ul > |
- | clear=all style='page-break-before:always'> | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Quarantine</b>: This tab displays the files that have been quarantined. You can restore or delete the quarantined objects by right-clicking the object, and then clicking an appropriate option.</li> |
- | + | ||
- | <ul style='margin-top:0in' type=disc> | + | |
- | <li class=MsoNormal style='margin-bottom:0in'><b>Quarantine</b>: This tab | + | |
- | displays the files that have been quarantined. You can restore or delete | + | |
- | the quarantined objects by right-clicking the object, and then clicking an | + | |
- | appropriate option.</li> | + | |
</ul> | </ul> | ||
- | </span> | + | <ul > |
- | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Backup</b>: This tab displays the files that were backed up by file anti-virus before it tried to disinfect them. You can restore or delete the objects that were backed up by right-clicking the object, and then clicking an appropriate option. Before clicking any of these buttons, you should ensure that you have selected an appropriate row in the table for which you need to perform the action.</span></li> | |
- | <p class=MsoNormal align=center style='margin-top:12.0pt;text-align:center'><img | + | |
- | border=0 width=416 height=361 src="TSS%20UG%20v20_reviewed_files/image028.jpg"></p> | + | |
- | + | ||
- | <ul style='margin-top:0in' type=disc> | + | |
- | <li class=MsoNormal style='margin-bottom:0in'><b><span lang=EN-IN>Backup</span></b><span | + | |
- | lang=EN-IN>: This tab displays the files that were backed up by file | + | |
- | anti-virus before it tried to disinfect them. You can restore or delete | + | |
- | the objects that were backed up by right-clicking the object, and then | + | |
- | clicking an appropriate option. Before clicking any of these buttons, you | + | |
- | should ensure that you have selected an appropriate row in the table for | + | |
- | which you need to perform the action.</span></li> | + | |
</ul> | </ul> | ||
+ | <p style='color:#0276FD;font-size:12.0pt;font-family:"Open Sans"'><b>View Report</b></p> | ||
- | <p class=MsoNormal align=center style='margin-top:12.0pt;text-align:center'><img | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>When you click this button, the report for file anti-virus window is displayed. This window displays the report for the file anti-virus module for a given range of dates in a tabular format when you click the generate report button.</span></p> |
- | border=0 width=431 height=375 src="TSS%20UG%20v20_reviewed_files/image029.jpg"></p> | + | |
- | <b><span lang=EN-IN style='font-size:11.0pt;line-height:115%;font-family:"Open Sans",sans-serif'><br | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>You can export reports in the following formats:</p> |
- | clear=all style='page-break-before:always'> | + | |
- | </span></b> | + | |
- | <p class=MsoNormal style='margin-bottom:0in'><b><span lang=EN-IN | + | <ul > |
- | style='line-height:115%'>View Report</span></b></p> | + | <li style='font-size:11.0pt;font-family:"Open Sans"'>PDF</li> |
- | + | <li style='font-size:11.0pt;font-family:"Open Sans"'>HTML</li> | |
- | <p class=MsoNormal style='margin-bottom:0in;text-align:justify'><span | + | <li style='font-size:11.0pt;font-family:"Open Sans"'>CSV</li> |
- | lang=EN-IN>When you click this button, the report for file anti-virus window is | + | |
- | displayed. This window displays the report for the file anti-virus module for a | + | |
- | given range of dates in a tabular format when you click the generate report | + | |
- | button.</span></p> | + | |
- | + | ||
- | <p class=MsoNormal align=center style='margin-top:12.0pt;text-align:center'><img | + | |
- | border=0 width=624 height=415 src="TSS%20UG%20v20_reviewed_files/image030.jpg"></p> | + | |
- | + | ||
- | <p class=MsoNormal style='margin-bottom:0in'><span lang=EN-IN>You can export | + | |
- | reports in the following formats:</span></p> | + | |
- | + | ||
- | <ul style='margin-top:0in' type=disc> | + | |
- | <li class=MsoNormal style='margin-bottom:0in'><span lang=EN-IN>PDF</span></li> | + | |
- | <li class=MsoNormal style='margin-bottom:0in'><span lang=EN-IN>HTML</span></li> | + | |
- | <li class=MsoNormal style='margin-bottom:0in'><span lang=EN-IN>CSV</span></li> | + | |
</ul> | </ul> | ||
- | |||
- | <span style='font-size:20.0pt;line-height:115%;font-family:"Open Sans",sans-serif; | ||
- | color:#00B050'><br clear=all style='page-break-before:always'> | ||
- | </span> |
Current revision
Contents |
Settings
Configure settings for File Anti-virus using the settings option present under configuration. Following tabs are available for configurations:
- Objects
- Options
- Block Files
- Folder Protection
- TSPM
Objects
This tab will provide various option for fine tuning the settings available under File Anti-Virus. It provides options such as scanning a specific storage devices or excluding given file from scanning.</span>
Actions in case of virus definition
Displays the different actions that can be performed in case of any infection. The actions are:
- Report only: Reports to you on a popup without taking any action on the file in case of virus detection.
- Disinfect: Automatically disinfect any infected file on detection. Under this action, following two options are available:
- Make backup file before disinfection: This check box allows to make backup file before disinfection.
- If disinfection is impossible: You can configure from the following options:
- Report Only: This option reports if it is not able to disinfect any particular virus.
- Quarantine object: This option quarantines the infected object (isolate the objects) if it is not able to disinfect a virus.
- Delete object: This option deletes the object if it is not able to disinfection a virus.
By default the Disinfect option is selected.
- Quarantine object: Quarantines the file whenever an infection is detected (isolate the file). You can restore the Quarantine/Backup file by using the below procedure:
- Click View Quarantine Objects option present on the main interface of File Anti-virus. You will be forwarded to the Quarantine window, click object name that you wish to restore. Now click Restore button to restore. File will be restored instantly.
- Delete object: Automatically delete the file whenever an infected file is detected.
The following are the options that allows to scan specific disk or drive:
- Scan local removable disk drives: This check box allows to monitor the real-time scanning of all the local removable drives attached to the computer. This option is enabled by default.
- Scan local hard disk drives: This check box allows to monitor the real-time scanning of all the local hard drives installed on the computer. This option is enabled by default.
- Scan network drives: This check box allows to monitor the real-time scanning of all the network drives including mapped folders and drives that are connected to the computer. This option is enabled by default.
Scan files of following types
This check box allows to choose the type of file to monitor while real-time scanning. It have 3 options to select files for scanning, whether All infectable, All, or By mask. The files listed in By mask option are the default file extensions that are defined by eScan. To add or delete files by mask, select and double-click Add/Delete option, and then add or delete files as required.
Exclude by mask
This check box allows to monitors all the excluded object in the Exclude by mask list during real‑time monitoring or scanning. You can add or delete a file or a particular file extension by double-clicking the Add/Delete option. This option is enabled by default.
Not a Virus List
File Anti‑Virus is able to detect the riskware. Riskware are legitimate program that are not strictly malicious, but pose some sort of risk for the user in another way. You can add the names of riskware, such as remote admin software to the riskware list in the Not a Virus List dialog box by double-clicking the Add / Delete option, if you are certain that they are not malicious. This option is enabled by default and the riskware list is empty by default.
Exclude Files/Folders
This option excludes the listed files, folders, and subfolders, while monitoring or scanning the folders. You can add or delete folders from the existing list of folders by double-clicking the Add / Delete option. This option is enabled by default.
Scan compound objects
This option allows to scan the archives and packed files during the scan. The Archive check box allows to scan archive files. The depth level of an archived file up to which you want to scan can be defined in Archive Depth Level field. By default, value is 16, but you can change it by double-clicking the arrow icon, and then type value in the size box. By default, Packed is selected. This option is enabled by default.
Enable code analyser
This option uses heuristic analyzer during the real-time scan of the computer for suspicious objects or unknown infections. It not only scans and detects infected objects by using the definitions or updates, but it also checks for suspicious files stored on the computer.
Options
This tab will allow to configure the basic settings such as the maximum size of log files and path of the destination folder for storing log files, quarantined objects, and report files.
It provides the following options for configuration:
Save report file
This option allows to save the generated reports. The generates report consist of logs information about the scanned files and the action taken when an infected file is detected. This option is enabled by default and it also allows to configure following settings:
- Show pack info in the report (Monvir.log): This option is enabled by default and it allows to add details about the scanned compressed files, such as .ZIP and .RAR files to the Monvir.log file.
- Show clean object info in the report (Monvir.log): This option allows to add details about uninfected files found during a scan operation to the Monvir.log file. This option helps to find out which files are not infected.
- Limit size to (KB) (avpM.rpt): This option helps to set the size limit of the avpM.rpt file. To specify the size of the log file, double-click the size box and define the size. The default value is 50 KB.
For quarantining of infected objects
This option helps to specify the destination for storing quarantined objects. By default, the quarantined objects are stored in the C:\Program Files\eScan\INFECTED [32-bit] OR C:\Program Files (x86)\ eScan\ INFECTED [64-bit] folder. You can change the location of the destination folder if required.
Enable Auto backup / Restore
This option allows to takes automatic backup of critical files of the Windows® operating system installed on the computer and to restore the clean files when it finds an infection in any of the system files, which cannot be disinfected. This option allows to configure the following settings:
- For backup of clean objects: eScan allows to backs up uninfected objects and store them in a given folder. By default, these objects are stored in a folder named Fbackup on the drive that has maximum free space. You can change the path of the destination folder if desired.
- Do not backup files above size (KB): This option is enabled by default and helps to prevent File Anti‑Virus from creating backup of files that is larger than the defined file size. The default value is set to 32768 KB.
- Minimum disk space (MB): This option is enabled by default and enables to set the minimum free hard disk space up to which you want eScan to take backup of files. By default, value is 1 MB, but you can change it by double-clicking the arrow icon, and then type value in the size box.
Use sound effects for the following events
This check box option allows to configure eScan to play a sound file and show the details regarding the infection within a message box when any malicious software is detected. However, you need to ensure that the computer speakers are switched on.
Display attention messages
This option allow to displays an alert, which consist the path, name of the infected object, and the action taken. This option is enabled by default.
Enable Malware URL Filter
This option is blocks the access to malicious websites/URL.
Proactive Behavior Monitor
This option allows to monitor the executable files that are running on your system. In case, if eScan finds any executable files suspicious that may cause any harm to your system, it alerts the user with a pop-up message. To access the suspicious file, you can White list them anytime.
It also allows to view the list of files that are blocked from executing on the system. You can add a File to White list or Block List using this option.
Enable Ransomware Protection
This check box enables the protection against ransomware and enabled by default.
Block Files
This tab allows to configure the settings for preventing executable and files, such as autorun.inf, on network drives, USB drives, and fixed drives from accessing your computer.
It provides the following options for configuration:
Deny access of executables on USB Drive
This check box option helps to prevent executables stored on USB drives from being executed.
Disable Autoplay on USB and Fixed Drives
This check box option helps to disable Autoplay on USB and Fixed Drives. This option is enabled by default.
Deny access of executable from Network
This check box option helps to prevent executables from network from being executed on the computer. This option also allows to whitelist the folder/subfolder on the network as per the requirement. The whitelisted folder/subfolder can be access the executable from them.
Deny Access of following files
This check box option helps to prevent the files in the list from running on the computer. This option is enabled by default.
Quarantine Access-denied files
This check box option allows to quarantine files that have been denied access. To prevent specific files from running on the computer by adding them to the Block Files list. By default, this list contains the value %sysdir%\*.EXE@.
Folder Protection
This tab helps to protect specific folders from being modified or deleted by adding them to the Folder Protection list.
It provides the following options for configuration:
- Protect files in following folders from modification and deletion: This option is enabled by default. It protects the files in specific folders from being modified or deleted. Once you enable this check box, it will automatically enable the following buttons:
- Add: It allows you Add folders to be protected. Browse the folders and Add in the Folder List.
- Delete: You can delete the folder from folder list. Click on the Delete button. A confirmation window appears. Click Yes, the folder will be deleted.
- Remove All: You can remove/delete all the folders in the list at once.
TSPM
TSPM – Terminal Services Protection Module by eScan detects brute force attempts and heuristically identifies suspicious IP Addresses/Hosts and blocks any attempts to access the system. In order to safeguard the systems from future attacks, the IP addresses and Hosts from these attacks are banned from initiating any further connections to the system.
Enable Terminal Service Protection Module
This option enables Terminal Service Protection Module. This will open a popup window from where you can add the IP address of the system you want to Whitelist. After adding the IP address, click on Add button. It will be added on the list.</span>
NOTE |
At the bottom of the screen of all the tabs — Default, OK, Cancel, and Apply buttons are present that you can use after configuring the settings based on your requirement. |
- Default: Click this button to apply the default settings.
- OK: Click this button after you click the Apply button to apply the configured settings.
- Cancel: Click this button to cancel the configured settings or to close the window.
- Apply: Click this button to apply the configured settings.</span>
Reports
This section displays the information along with the reports, which are as follows:
Total Files Scanned
It shows the total number of files scanned by the real-time File Anti-Virus monitor.
Dangerous Objects Detected
It shows the total number of viruses or malicious software detected by the File Anti-Virus monitor on a real-time basis.
Last File Scanned
It shows the name of last file scanned by File Anti-Virus monitor on real-time basis.
View Statistics
When you click this button, the statistics dialog box is displayed, which displays the latest activity report of the real-time monitor. The report contains information under two sections:
- Scanned: This section shows scanned details of objects of Virus bodies, Disinfected, Deleted, Quarantined etc.
- Found: This section shows Virus details such as Virus bodies, Disinfected, Deleted, Quarantined, etc.
View Quarantined Objects
Click on View Quarantined Objects, Quarantine popup gets displayed. It displays all the quarantined objects. There are two tabs present:
- Quarantine: This tab displays the files that have been quarantined. You can restore or delete the quarantined objects by right-clicking the object, and then clicking an appropriate option.
- Backup: This tab displays the files that were backed up by file anti-virus before it tried to disinfect them. You can restore or delete the objects that were backed up by right-clicking the object, and then clicking an appropriate option. Before clicking any of these buttons, you should ensure that you have selected an appropriate row in the table for which you need to perform the action.</span>
View Report
When you click this button, the report for file anti-virus window is displayed. This window displays the report for the file anti-virus module for a given range of dates in a tabular format when you click the generate report button.</span>
You can export reports in the following formats:
- HTML
- CSV