McAfee AVDCDE-AA-AA User Guide - Page 99

Choosing Detection options, Scan files as you work with them

Page 99 highlights

Using the VShield Scanner The module can take a variety of automatic actions to respond to any viruses it finds, and can report what it has done either with an alert message when it takes the action or in a log file you can examine at your leisure. You can also set it to ask you what to do when it finds a virus. Elsewhere in this module, you can choose options that tell the VShield scanner to display a state icon in the Windows taskbar that tells you at a glance which, if any, VShield modules are active. Another option lets you disable the System Scan module. This option might not be available if you run the VirusScan software in secure mode. To choose your options, click the System Scan icon at the left side of the System Scan Properties dialog box to display the property pages for this module. The next sections describe each of the configuration options for this module. Choosing Detection options When you first activate it, the System Scan module initially assumes that you want it to scan for viruses each time you work with any file susceptible to virus infection, whether on your hard disk or on floppy disks, and whether you read the file from or write the file to your hard disk. The module will also examine compressed files by default, but will not use heuristic scanning unless you activate it. Š NOTE: This property page will vary its appearance and have a different option set, depending on which operating system your computer runs. To modify these settings, follow these steps: 1. Verify that the Enable System Scan checkbox is selected. Selecting this checkbox activates the remaining options in this property page. Clear the checkbox to disable all configuration options in this page and to prevent the System Scan module from scanning your system. 2. Tell the module when and where you want it to look for viruses. You can have it • Scan files as you work with them. Each time you open, run, copy, save, rename, or otherwise use files on your hard disk, virus code can execute and spread infections to other files. To prevent this on computers that run Windows NT Workstation v4.0 or Windows 2000 Professional, select both the Inbound files and the Outbound files checkboxes. On computers that run Windows 95 or Windows 98, select each of the Run, Copy, Create, and Rename checkboxes for full coverage. User's Guide 99

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344

User
s Guide
99
Using the VShield Scanner
The module can take a variety of automatic actions to respond to any viruses
it finds, and can report what it has done either with an alert message when it
takes the action or in a log file you can examine at your leisure. You can also
set it to ask you what to do when it finds a virus.
Elsewhere in this module, you can choose options that tell the VShield scanner
to display a state icon
in the Windows taskbar that tells you at a glance
which, if any, VShield modules are active. Another option lets you disable the
System Scan module. This option might not be available if you run the
VirusScan software in secure mode.
To choose your options, click the System Scan icon at the left side of the System
Scan Properties dialog box to display the property pages for this module. The
next sections describe each of the configuration options for this module.
Choosing Detection options
When you first activate it, the System Scan module initially assumes that you
want it to scan for viruses each time you work with any file susceptible to virus
infection, whether on your hard disk or on floppy disks, and whether you read
the file from or write the file to your hard disk. The module will also examine
compressed files by default, but will not use heuristic scanning unless you
activate it.
NOTE:
This property page will vary its appearance and have a different
option set, depending on which operating system your computer runs.
To modify these settings, follow these steps:
1.
Verify that the
Enable System Scan
checkbox is selected.
Selecting this checkbox activates the remaining options in this property
page. Clear the checkbox to disable all configuration options in this page
and to prevent the System Scan module from scanning your system.
2.
Tell the module when and where you want it to look for viruses. You can
have it
Scan files as you work with them
. Each time you open, run, copy,
save, rename, or otherwise use files on your hard disk, virus code
can execute and spread infections to other files.
To prevent this on computers that run Windows NT Workstation
v4.0 or Windows 2000 Professional, select both the
Inbound files
and the
Outbound files
checkboxes. On computers that run
Windows 95 or Windows 98, select each of the
Run
,
Copy
,
Create
,
and
Rename
checkboxes for full coverage.