ThreatSense parameters

ThreatSense is technology comprised of many complex threat detection methods. This technology is proactive, which means it also provides protection during the early spread of a new threat. It uses a combination of code analysis, code emulation, generic signatures and virus signatures which work in concert to significantly enhance system security. The scanning engine is capable of controlling several data streams simultaneously, maximizing the efficiency and detection rate. ThreatSense technology also successfully eliminates rootkits.


note

For details about automatic startup file check, see Startup scan.

ThreatSense engine setup options allow you to specify several scan parameters:

File types and extensions that are to be scanned

The combination of various detection methods

Levels of cleaning, etc.

To enter the setup window, click ThreatSense engine parameter setup in the Advanced setup (F5) window for any module that uses ThreatSense technology (see below). Different security scenarios may require different configurations. With this in mind, ThreatSense is individually configurable for the following protection modules:

Hyper-V scan

OneDrive scan

Real-time file system protection

Malware scans

Idle-state scanning

Startup scan

Document protection

Email client protection

Web access protection

ThreatSense parameters are highly optimized for each module, and their modification can significantly influence system operation. For example, changing parameters to always scan runtime packers, or enabling advanced heuristics in the Real-time file system protection module could result in a system slow-down (normally, only newly-created files are scanned using these methods). We recommend that you leave the default ThreatSense parameters unchanged for all modules except Computer scan.

arrow_down_businessObjects to scan
arrow_down_businessScan options
arrow_down_businessCleaning
arrow_down_businessExclusions
arrow_down_businessLimits