Symantec 11281411 Administration Guide - Page 7

Configuring Symantec AntiVirus, Scanning for viruses and other threats

Page 7 highlights

Contents 7 Section 2 Chapter 3 Configuring Symantec AntiVirus Scanning for viruses and other threats About threats ...91 About scans in Symantec AntiVirus 93 Understanding Auto-Protect scans 94 Understanding scheduled scans 94 Understanding manual scans 94 Selecting computers to scan 95 Configuring Auto-Protect scans 97 Configuring Auto-Protect for files 98 Configuring Auto-Protect email scanning for groupware applications 107 Configuring Auto-Protect scanning for Internet email 108 How to specify exclusions 110 Configuring Auto-Protect settings 111 How to lock and unlock Auto-Protect options 112 Configuring manual scans 112 How to specify exclusions 114 Deleting files and folders that are left on computers by threats .......115 Configuring scheduled scans 115 Scheduling scans for server groups or individual Symantec AntiVirus servers 115 Scheduling scans for Symantec AntiVirus clients 118 Setting options for missed scheduled scans 120 Editing, deleting, or disabling a scheduled scan 121 Running a scheduled scan on demand 122 Deleting files and folders that are left on computers by threats .......122 Handling Symantec AntiVirus clients with intermittent connectivity .....123 Configuring scan options 124 How to assign primary actions and secondary actions for detected viruses 124 How to assign primary actions and secondary actions for other detected threats 125 Controlling the user experience 126 Scanning for in-memory threats 134 Excluding files from scanning 134 Selecting file types and extensions to scan for viruses 136 Enabling expanded threat categories 140 Setting options for scanning compressed files 142 Configuring HSM settings 143 Setting CPU utilization 145

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216

7
Contents
Section
2
Configuring Symantec AntiVirus
Chapter
3
Scanning for viruses and other threats
About threats
........................................................................................................
91
About scans in Symantec AntiVirus
.................................................................
93
Understanding Auto-Protect scans
...........................................................
94
Understanding scheduled scans
................................................................
94
Understanding manual scans
....................................................................
94
Selecting computers to scan
......................................................................
95
Configuring Auto-Protect scans
........................................................................
97
Configuring Auto-Protect for files
............................................................
98
Configuring Auto-Protect email scanning for groupware
applications
.........................................................................................
107
Configuring Auto-Protect scanning for Internet email
.......................
108
How to specify exclusions
........................................................................
110
Configuring Auto-Protect settings
..........................................................
111
How to lock and unlock Auto-Protect options
......................................
112
Configuring manual scans
................................................................................
112
How to specify exclusions
........................................................................
114
Deleting files and folders that are left on computers by threats
.......
115
Configuring scheduled scans
...........................................................................
115
Scheduling scans for server groups or individual Symantec
AntiVirus servers
...............................................................................
115
Scheduling scans for Symantec AntiVirus clients
...............................
118
Setting options for missed scheduled scans
..........................................
120
Editing, deleting, or disabling a scheduled scan
...................................
121
Running a scheduled scan on demand
...................................................
122
Deleting files and folders that are left on computers by threats
.......
122
Handling Symantec AntiVirus clients with intermittent connectivity
.....
123
Configuring scan options
.................................................................................
124
How to assign primary actions and secondary actions for
detected viruses
.................................................................................
124
How to assign primary actions and secondary actions for
other detected threats
.......................................................................
125
Controlling the user experience
..............................................................
126
Scanning for in-memory threats
.............................................................
134
Excluding files from scanning
................................................................
134
Selecting file types and extensions to scan for viruses
.......................
136
Enabling expanded threat categories
.....................................................
140
Setting options for scanning compressed files
.....................................
142
Configuring HSM settings
........................................................................
143
Setting CPU utilization
.............................................................................
145