Symantec 11281411 Administration Guide - Page 101

Heuristics, Under Backup options, ensure that Back up file before attempting repair is

Page 101 highlights

Scanning for viruses and other threats 101 Configuring Auto-Protect scans Custom file cache Select the number of custom file cache entries to include. This entries option is useful for file servers or Web servers where you want to be able to cache a large number of files. See "File cache options" on page 104. 7 Under Threat Tracer, to set options for tracing threats from computers running under Windows NT/2000/XP/2003 operating systems, do the following: Enable Threat Tracer Ensure that this option is checked to use Threat Tracer. Resolve source computer IP address If Resolve source computer IP address is unchecked, Symantec AntiVirus looks up and records the computer's NetBIOS name only. Poll for network sessions every Symantec AntiVirus polls once every second (1000 ___ milliseconds milliseconds) by default. Lower values use greater amounts of CPU and memory. Higher values decrease Threat Tracer's ability to detect infections. Client firewall auto blocks IP address of the source computer Enable this option if you are using Symantec Client Security firewall client and want the firewall to automatically block the IP addresses of computers that transmit infected files. The firewall automatically blocks all IP traffic to the IP address for 30 minutes by default. See "How to trace threats" on page 104. 8 Under Automatic enabler, ensure that When Auto-Protect is disabled, enable after is checked, and then specify a length of time after which Auto-Protect is enabled on the computers for which you are configuring options. For example, if an end user disables Auto-Protect on the desktop, you can set this option to enable it automatically after thirty minutes. 9 Under Backup options, ensure that Back up file before attempting repair is checked as a data safety precaution. The files are encrypted and backed up to the Quarantine directory. Once a file is backed up, it must be restored before it can be accessed again. 10 Under Additional advanced options, if you want to change the level of protection that is provided by Bloodhound Heuristic Scanning, click Heuristics.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216

101
Scanning for viruses and other threats
Configuring Auto-Protect scans
See
“File cache options”
on page 104.
7
Under Threat Tracer, to set options for tracing threats from computers
running under Windows NT/2000/XP/2003 operating systems, do the
following:
See
“How to trace threats”
on page 104.
8
Under Automatic enabler, ensure that When Auto-Protect is disabled, enable
after is checked, and then specify a length of time after which Auto-Protect
is enabled on the computers for which you are configuring options.
For example, if an end user disables Auto-Protect on the desktop, you can set
this option to enable it automatically after thirty minutes.
9
Under Backup options, ensure that Back up file before attempting repair is
checked as a data safety precaution.
The files are encrypted and backed up to the Quarantine directory. Once a
file is backed up, it must be restored before it can be accessed again.
10
Under Additional advanced options, if you want to change the level of
protection that is provided by Bloodhound Heuristic Scanning, click
Heuristics
.
Custom file cache
entries
Select the number of custom file cache entries to include. This
option is useful for file servers or Web servers where you want to
be able to cache a large number of files.
Enable Threat Tracer
Ensure that this option is checked to use Threat
Tracer.
Resolve source computer IP
address
If Resolve source computer IP address is
unchecked, Symantec AntiVirus looks up and
records the computer’s NetBIOS name only.
Poll for network sessions every
___ milliseconds
Symantec AntiVirus polls once every second (1000
milliseconds) by default.
Lower values use greater amounts of CPU and
memory. Higher values decrease Threat Tracer’s
ability to detect infections.
Client firewall auto blocks IP
address of the source computer
Enable this option if you are using Symantec Client
Security firewall client and want the firewall to
automatically block the IP addresses of computers
that transmit infected files.
The firewall automatically blocks all IP traffic to
the IP address for 30 minutes by default.