McAfee VSF09EMB1RAA User Guide - Page 47

Setting up virus protection

Page 47 highlights

45 CHAPTER 11 Setting up virus protection You can set different options for scheduled, custom, and real-time scanning. For example, because real-time protection continuously monitors your computer, you might select a certain set of basic scanning options, reserving a more comprehensive set of scanning options for manual, on-demand protection. You can also decide how you would like VirusScan to monitor and manage potentially unauthorized or unwanted changes on your PC using SystemGuards and Trusted Lists. SystemGuards monitor, log, report, and manage potentially unauthorized changes made to the Windows registry or critical system files on your computer. Unauthorized registry and file changes can harm your computer, compromise its security, and damage valuable system files. You can use Trusted Lists to decide whether you want to trust or remove rules that detect file or registry changes (SystemGuard), program, or buffer overflows. If you trust the item and indicate that you do not want to receive future notification about its activity, the item is added to a trusted list and VirusScan no longer detects it or notifies you about its activity. In this chapter Setting real-time scan options 46 Setting custom scan options 48 Scheduling a scan 51 Using SystemGuards options 52 Using trusted lists 58

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205

45
Setting up virus protection
You can set different options for scheduled, custom, and
real-time scanning. For example, because real-time protection
continuously monitors your computer, you might select a certain
set of basic scanning options, reserving a more comprehensive
set of scanning options for manual, on-demand protection.
You can also decide how you would like VirusScan to monitor
and manage potentially unauthorized or unwanted changes on
your PC using SystemGuards and Trusted Lists. SystemGuards
monitor, log, report, and manage potentially unauthorized
changes made to the Windows registry or critical system files on
your computer. Unauthorized registry and file changes can harm
your computer, compromise its security, and damage valuable
system files. You can use Trusted Lists to decide whether you
want to trust or remove rules that detect file or registry changes
(SystemGuard), program, or buffer overflows.
If you trust the
item and indicate that you do not want to receive future
notification about its activity, the item is added to a trusted list
and VirusScan no longer detects it or notifies you about its
activity.
In this chapter
Setting real-time scan options
...................................
46
Setting custom scan options
......................................
48
Scheduling a scan
........................................................
51
Using SystemGuards options
.....................................
52
Using trusted lists
........................................................
58
C
HAPTER
11