Symantec 11281411 Administration Guide - Page 101
Heuristics, Under Backup options, ensure that Back up file before attempting repair is
UPC - 037648327237
View all Symantec 11281411 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 101 highlights
Scanning for viruses and other threats 101 Configuring Auto-Protect scans Custom file cache Select the number of custom file cache entries to include. This entries option is useful for file servers or Web servers where you want to be able to cache a large number of files. See "File cache options" on page 104. 7 Under Threat Tracer, to set options for tracing threats from computers running under Windows NT/2000/XP/2003 operating systems, do the following: Enable Threat Tracer Ensure that this option is checked to use Threat Tracer. Resolve source computer IP address If Resolve source computer IP address is unchecked, Symantec AntiVirus looks up and records the computer's NetBIOS name only. Poll for network sessions every Symantec AntiVirus polls once every second (1000 ___ milliseconds milliseconds) by default. Lower values use greater amounts of CPU and memory. Higher values decrease Threat Tracer's ability to detect infections. Client firewall auto blocks IP address of the source computer Enable this option if you are using Symantec Client Security firewall client and want the firewall to automatically block the IP addresses of computers that transmit infected files. The firewall automatically blocks all IP traffic to the IP address for 30 minutes by default. See "How to trace threats" on page 104. 8 Under Automatic enabler, ensure that When Auto-Protect is disabled, enable after is checked, and then specify a length of time after which Auto-Protect is enabled on the computers for which you are configuring options. For example, if an end user disables Auto-Protect on the desktop, you can set this option to enable it automatically after thirty minutes. 9 Under Backup options, ensure that Back up file before attempting repair is checked as a data safety precaution. The files are encrypted and backed up to the Quarantine directory. Once a file is backed up, it must be restored before it can be accessed again. 10 Under Additional advanced options, if you want to change the level of protection that is provided by Bloodhound Heuristic Scanning, click Heuristics.