Symantec 11281411 Administration Guide - Page 91

About scans in Symantec AntiVirus - internet security

Page 91 highlights

Scanning for viruses and other threats 91 About scans in Symantec AntiVirus ■ Trackware: Stand-alone or appended applications that trace a user's path on the Internet and send information to the target system. For example, the application can be downloaded from a Web site, email message, or instant messenger program. It can then obtain confidential information regarding user behavior. ■ Security risks: Threats that do not conform to the strict definitions of viruses, Trojan horses, worms, or other expanded threat categories, but which may present a threat to a user's computer and its data. Viruses, Trojan horses, and worms are scanned for by default. You must enable expanded threat scanning for Symantec AntiVirus to detect other types of threats. Some threats, such as Back Orifice, were detected as viruses in earlier versions of Symantec AntiVirus. They remain detected as viruses so that Symantec AntiVirus can continue to provide protection for legacy systems. About scans in Symantec AntiVirus You can configure the following types of scans from the Symantec System Center console: ■ File System Auto-Protect scans ■ Scheduled scans ■ Manual scans ■ Auto-Protect email attachment scanning for Lotus Notes, and Microsoft Exchange and Outlook (MAPI) ■ Auto-Protect scanning for Internet email messages and attachments that use the POP3 or SMTP communications protocols; Auto-Protect scanning for Internet email also includes outbound email heuristics scanning File System Auto-Protect and Auto-Protect email scans detect viruses. Manual and scheduled scans detect viruses and other threats, such as adware and spyware. You can perform scans on: ■ Individual and multiple Symantec AntiVirus servers and clients ■ Groups of Symantec AntiVirus servers and clients, using server groups

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216

91
Scanning for viruses and other threats
About scans in Symantec AntiVirus
Trackware
: Stand-alone or appended applications that trace a user's path on
the Internet and send information to the target system. For example, the
application can be downloaded from a Web site, email message, or instant
messenger program. It can then obtain confidential information regarding
user behavior.
Security risks
: Threats that do not conform to the strict definitions of
viruses, Trojan horses, worms, or other expanded threat categories, but
which may present a threat to a user’s computer and its data.
Viruses, Trojan horses, and worms are scanned for by default. You must enable
expanded threat scanning for Symantec AntiVirus to detect other types of
threats.
Some threats, such as Back Orifice, were detected as viruses in earlier versions
of Symantec AntiVirus. They remain detected as viruses so that Symantec
AntiVirus can continue to provide protection for legacy systems.
About scans in Symantec AntiVirus
You can configure the following types of scans from the Symantec System
Center console:
File System Auto-Protect scans
Scheduled scans
Manual scans
Auto-Protect email attachment scanning for Lotus Notes, and Microsoft
Exchange and Outlook (MAPI)
Auto-Protect scanning for Internet email messages and attachments that
use the POP3 or SMTP communications protocols; Auto-Protect scanning
for Internet email also includes outbound email heuristics scanning
File System Auto-Protect and Auto-Protect email scans detect viruses. Manual
and scheduled scans detect viruses and other threats, such as adware and
spyware.
You can perform scans on:
Individual and multiple Symantec AntiVirus servers and clients
Groups of Symantec AntiVirus servers and clients, using server groups