From eScan Wiki
Revision as of 08:50, 4 May 2021 TechContent (Talk | contribs) ← Previous diff |
Current revision TechContent (Talk | contribs) |
||
Line 1: | Line 1: | ||
- | <h4 style='margin:0in'><a name="_Toc47530337"></a><a name="_Toc47530518">ODS | + | <h2 id="mp-tfp-h2" style="margin:0; background:#C7E587; font-size:120%; font-weight:bold; border:10 solid #afa3bf; text- |
- | Settings </a><img border=0 width=14 height=14 id="Picture 145" | + | |
- | src="eScan_Corporate360_UserGuide_revised_files/image150.png" | + | |
- | alt="Description: http://192.168.0.151:10443/emcwebadmin/images/os_linux.png"><span | + | |
- | style='font-size:7.5pt;line-height:115%'> </span><img border=0 width=16 | + | |
- | height=16 id="Picture 146" | + | |
- | src="eScan_Corporate360_UserGuide_revised_files/image151.png" | + | |
- | alt="Description: http://192.168.0.151:10443/emcwebadmin/images/os_mac.png"></h4> | + | |
- | <p class=MsoNormal style='margin-bottom:0in;line-height:110%'>With ODS Settings | + | align:left; color:#000; padding:0.2em 0.4em">eScan Version 11 (and above) Online Help</h2> |
- | you can define actions in case of infection, you can also define list of files | + | {| class="wikitable" border="0" |
- | by mask, Files or Folders to be excluded from Scanning. It also lets you | + | |- |
- | configure settings for various other Scan options like Include Sub directories, | + | |width="1000pt"| |
- | Mails, Archives Heuristic Scanning etc. by selecting respective options.</p> | + | |} |
- | <p class=MsoNormal align=center style='margin-top:12.0pt;margin-right:0in; | + | <h4 style='color:#008000;font-size:18.0pt;font-family:"Open Sans"'>ODS Settings </h4> |
- | margin-bottom:12.0pt;margin-left:0in;text-align:center;line-height:110%'><img | + | |
- | border=0 width=464 height=474 id="Picture 147" | + | |
- | src="eScan_Corporate360_UserGuide_revised_files/image214.png"></p> | + | |
- | <p class=MsoNormal style='margin-bottom:0in;line-height:110%'><b>Actions in | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>With ODS Settings you can define actions in case of infection, you can also define list of files by mask, Files or Folders to be excluded from Scanning. It also lets you configure settings for various other Scan options like Include Subdirectories, Mails, Archives Heuristic Scanning etc. by selecting respective options.<br><br> |
- | case of infection [Drop-down]</b></p> | + | |
- | <p class=MsoNormal align=center style='margin-top:12.0pt;margin-right:0in; | + | <b>Actions in case of infection [Drop-down]</b><br> |
- | margin-bottom:12.0pt;margin-left:0in;text-align:center;line-height:110%'><img | + | It indicates a type of action which you want eScan real-time protection to take, in case of virus detection.<br> |
- | border=0 width=434 height=125 id="Picture 375" | + | By default, Disinfect if not possible, quarantine file) option is selected. Following actions can be taken:</p> |
- | src="eScan_Corporate360_UserGuide_revised_files/image215.jpg"></p> | + | |
- | <p class=MsoNormal style='margin-bottom:0in;line-height:110%'>It indicates a | + | <ul > |
- | type of action which you want eScan real-time protection to take, in case of | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Log Only</b>: It indicates or alerts the user about the infection detected.</li> |
- | virus detection.</p> | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Disinfect (if not possible, log)</b>: It tries to disinfect and if disinfection is not possible it logs the information of only the infected object.</li> |
- | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Disinfect (if not possible, delete file)</b>: It tries to disinfect and if disinfection is not possible it deletes the infected object.</li> | |
- | <p class=MsoNormal style='margin-bottom:0in;line-height:110%'>By default, Disinfect | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Disinfect (if not possible, Rename file)</b>: It tries to disinfect and if disinfection is not possible it renames the infected object.</li> |
- | (if not possible, quarantine file) option is selected. Following actions can be | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Disinfect (if not possible, quarantine)</b>: It tries to disinfect and if disinfection is not possible it quarantines the infected object.</li> |
- | taken:</p> | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Delete Infected File</b>: It directly deletes the infected object.</li> |
- | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Rename Infected File</b>: It directly renames the infected object.</li> | |
- | <ul style='margin-top:0in' type=disc> | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Quarantine</b>: It directly quarantines the infected object.</li> |
- | <li class=MsoNormal style='margin-bottom:0in;line-height:110%'><b>Log Only:</b> | + | |
- | It indicates or alerts the user about the infection detected.</li> | + | |
- | <li class=MsoNormal style='margin-bottom:0in;line-height:110%'><b>Disinfect | + | |
- | (if not possible, log):</b> It tries to disinfect and if disinfection is | + | |
- | not possible it logs the information of only the infected object.</li> | + | |
- | <li class=MsoNormal style='margin-bottom:0in;line-height:110%'><b>Disinfect | + | |
- | (if not possible, delete file):</b> It tries to disinfect and if | + | |
- | disinfection is not possible it deletes the infected object.</li> | + | |
- | <li class=MsoNormal style='margin-bottom:0in;line-height:110%'><b>Disinfect | + | |
- | (if not </b><b><span style='line-height:110%'>possible, Rename file</span></b><b>):</b> | + | |
- | It tries to disinfect and if disinfection is not possible it renames the | + | |
- | infected object.</li> | + | |
- | <li class=MsoNormal style='margin-bottom:0in;line-height:110%'><b>Disinfect (if | + | |
- | not </b><b><span style='line-height:110%'>possible, quarantine</span></b><b>):</b> | + | |
- | It tries to disinfect and if disinfection is not possible it quarantines | + | |
- | the infected object.</li> | + | |
- | <li class=MsoNormal style='margin-bottom:0in;line-height:110%'><b>Delete | + | |
- | Infected File:</b> It directly deletes the infected object.</li> | + | |
- | <li class=MsoNormal style='margin-bottom:0in;line-height:110%'><b>Rename | + | |
- | Infected File: </b>It directly renames the infected object.</li> | + | |
- | <li class=MsoNormal style='margin-bottom:0in;line-height:110%'><b>Quarantine:</b> | + | |
- | It directly quarantines the infected object.</li> | + | |
</ul> | </ul> | ||
+ | <br> | ||
+ | <p style='font-size:11.0pt;font-family:"Open Sans"'><b>Priority of Scanner</b> – You can select the priority of scanning as <b>High (short runtime)</b>, <b>Normal (normal runtime)</b>, or <b>Low (long runtime).</b></p> | ||
- | <p class=MsoNormal style='margin-top:12.0pt;margin-right:0in;margin-bottom: | + | <ul > |
- | 0in;margin-left:0in'><b><span lang=EN-IN>Priority of Scanner</span></b><span | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>High</b> <b>(short runtime)</b> – Has a short runtime.</li> |
- | lang=EN-IN> – You can select the priority of scanning as </span><b>High (short | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Normal</b> <b>(normal runtime)</b> – Has a normal runtime.</li> |
- | runtime)</b>, <b>Normal (normal runtime)</b>, or <b>Low (long runtime).</b></p> | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Low (long runtime) </b>– Has a long runtime.</li> |
- | + | ||
- | <ul style='margin-top:0in' type=disc> | + | |
- | <li class=MsoNormal style='margin-bottom:0in;margin-bottom:0in;margin-top: | + | |
- | 0in;line-height:110%'><b>High</b> <b>(short runtime)</b> – Has a short | + | |
- | runtime.</li> | + | |
- | <li class=MsoNormal style='margin-bottom:0in;margin-bottom:0in;margin-top: | + | |
- | 0in;line-height:110%'><b>Normal</b> <b>(normal runtime)</b> – Has a normal | + | |
- | runtime.</li> | + | |
- | <li class=MsoNormal style='margin-bottom:0in;margin-bottom:0in;margin-top: | + | |
- | 0in;line-height:110%'><b>Low (long runtime) </b>– Has a long runtime.</li> | + | |
</ul> | </ul> | ||
+ | <br> | ||
+ | <p style='font-size:11.0pt;font-family:"Open Sans"'><b>Exclude by Mask</b> – Select this check box if you want eScan real-time protection to exclude specific files, and Remove any or all Added Files whenever required.<br> | ||
+ | <b>Exclude Folders and Files</b> – Select this check box if you want eScan real-time protection to exclude Folders and files from scanning. eScan lets you add; Remove any or all Added Files or Folders whenever required during On Demand Scanning.<br> | ||
+ | <br> | ||
+ | <b>Scan options</b></p> | ||
- | <p class=MsoNormal style='margin-top:12.0pt'><b><span lang=EN-IN>Exclude by | + | <ul > |
- | Mask</span></b><span lang=EN-IN> – Select this check box if you want eScan | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Mails</b> – It indicates scanning the mail files. By default, it is selected. Select this check box if you want eScan real-time protection to scan mails.</li> |
- | real-time protection to exclude specific files, and Remove any or all Added | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Archives</b> – It indicates the archived files, such as zip, rar, and so on. Select this check box if you want eScan real-time protection to scan archived files.</li> |
- | Files whenever required.</span></p> | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Packed</b> – It indicates the compressed executable. </li> |
- | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Memory Scan</b> – This option ensures eScan scans the system's memory for any infection from malwares.</li> | |
- | <p class=MsoNormal><b><span lang=EN-IN>Exclude Folders and Files</span></b><span | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Include Sub Directories</b> – This option ensures eScan scans all the subdirectories recursively under every directory and not only the first level of directories.</li> |
- | lang=EN-IN> – Select this check box if you want eScan real-time protection to | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Heuristic</b> – Heuristic scanning is almost identical to signature scanning, which instead of looking for specific signatures looks for certain instructions or commands within a program/application. This results in the detection of potentially malicious function in program/application.</li> |
- | exclude Folders and files from scanning. eScan lets you add; Remove any or all | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Cross File System </b>that facilitates scanning of files over cross-file systems.</li> |
- | Added Files or Folders whenever required during On Demand Scanning.</span></p> | + | <li style='font-size:11.0pt;font-family:"Open Sans"'><b>Follow Symbolic Links: </b>scans the files following the symbolic links.</li> |
- | + | ||
- | <p class=MsoNormal style='margin-bottom:0in;line-height:110%'><b>Scan options</b></p> | + | |
- | + | ||
- | <ul style='margin-top:0in' type=disc> | + | |
- | <li class=MsoNormal style='margin-bottom:0in;line-height:110%'><b>Mails</b> – | + | |
- | It indicates scanning the mail files. By default, it is selected. Select | + | |
- | this check box if you want eScan real-time protection to scan mails.</li> | + | |
- | <li class=MsoNormal style='margin-bottom:0in;line-height:110%'><b>Archives</b> | + | |
- | – It indicates the archived files, such as zip, rar, and so on. Select | + | |
- | this check box if you want eScan real-time protection to scan archived | + | |
- | files.</li> | + | |
- | <li class=MsoNormal style='margin-bottom:0in;line-height:110%'><b>Packed</b> – | + | |
- | It indicates the compressed executable. </li> | + | |
- | <li class=MsoNormal style='margin-bottom:0in;line-height:110%'><b>Memory Scan</b> | + | |
- | – This option ensures eScan scans the system's memory for any infection | + | |
- | from malwares.</li> | + | |
- | <li class=MsoNormal style='margin-bottom:0in;line-height:110%'><b>Include Sub | + | |
- | Directories</b> – This option ensures eScan scans all the sub directories | + | |
- | recursively under every directory and not only the first level of | + | |
- | directories.</li> | + | |
- | <li class=MsoNormal style='margin-bottom:0in;line-height:110%'><b>Heuristic</b> | + | |
- | – Heuristic scanning is almost identical to signature scanning, which | + | |
- | instead of looking for specific signatures looks for certain instructions | + | |
- | or commands within a program/application. This results in the detection of | + | |
- | potentially malicious function in program/application.</li> | + | |
- | <li class=MsoNormal style='margin-bottom:0in;line-height:110%'><b>Cross File | + | |
- | System </b>that facilitates scanning of files over cross-file systems.</li> | + | |
- | <li class=MsoNormal style='margin-bottom:0in;line-height:110%'><b>Follow | + | |
- | Symbolic Links: </b>scans the files following the symbolic links.</li> | + | |
</ul> | </ul> | ||
- | + | <br> | |
- | <p class=MsoNormal style='margin-top:12.0pt;margin-right:0in;margin-bottom: | + | <p style='font-size:11.0pt;font-family:"Open Sans"'>You can restore default eScan settings by clicking <b>Default</b>.</p> |
- | 0in;margin-left:0in;line-height:110%'>You can restore default eScan settings by | + | |
- | clicking <b>Default</b>.</p> | + |
Current revision
eScan Version 11 (and above) Online Help
ODS Settings
With ODS Settings you can define actions in case of infection, you can also define list of files by mask, Files or Folders to be excluded from Scanning. It also lets you configure settings for various other Scan options like Include Subdirectories, Mails, Archives Heuristic Scanning etc. by selecting respective options.
Actions in case of infection [Drop-down]
It indicates a type of action which you want eScan real-time protection to take, in case of virus detection.
By default, Disinfect if not possible, quarantine file) option is selected. Following actions can be taken:
- Log Only: It indicates or alerts the user about the infection detected.
- Disinfect (if not possible, log): It tries to disinfect and if disinfection is not possible it logs the information of only the infected object.
- Disinfect (if not possible, delete file): It tries to disinfect and if disinfection is not possible it deletes the infected object.
- Disinfect (if not possible, Rename file): It tries to disinfect and if disinfection is not possible it renames the infected object.
- Disinfect (if not possible, quarantine): It tries to disinfect and if disinfection is not possible it quarantines the infected object.
- Delete Infected File: It directly deletes the infected object.
- Rename Infected File: It directly renames the infected object.
- Quarantine: It directly quarantines the infected object.
Priority of Scanner – You can select the priority of scanning as High (short runtime), Normal (normal runtime), or Low (long runtime).
- High (short runtime) – Has a short runtime.
- Normal (normal runtime) – Has a normal runtime.
- Low (long runtime) – Has a long runtime.
Exclude by Mask – Select this check box if you want eScan real-time protection to exclude specific files, and Remove any or all Added Files whenever required.
Exclude Folders and Files – Select this check box if you want eScan real-time protection to exclude Folders and files from scanning. eScan lets you add; Remove any or all Added Files or Folders whenever required during On Demand Scanning.
Scan options
- Mails – It indicates scanning the mail files. By default, it is selected. Select this check box if you want eScan real-time protection to scan mails.
- Archives – It indicates the archived files, such as zip, rar, and so on. Select this check box if you want eScan real-time protection to scan archived files.
- Packed – It indicates the compressed executable.
- Memory Scan – This option ensures eScan scans the system's memory for any infection from malwares.
- Include Sub Directories – This option ensures eScan scans all the subdirectories recursively under every directory and not only the first level of directories.
- Heuristic – Heuristic scanning is almost identical to signature scanning, which instead of looking for specific signatures looks for certain instructions or commands within a program/application. This results in the detection of potentially malicious function in program/application.
- Cross File System that facilitates scanning of files over cross-file systems.
- Follow Symbolic Links: scans the files following the symbolic links.
You can restore default eScan settings by clicking Default.