Profile targets

You can specify what will be scanned for infiltrations. Choose objects (memory, boot sectors and UEFI, drives, files and folders or network) from the tree structure that lists all available targets on your system. Click the gear icon in the top-left corner to access the Scan targets and Scan profile drop-down menus.


note

This scan profile selector applies to On-demand scan, Hyper-V scan and OneDrive scan.

Operating memory

Scans all processes and data currently used by operating memory.

Boot sectors/UEFI

Scans Boot sectors and UEFI for the presence of malware. Read more about the UEFI scanner in the glossary.

WMI database

Scans the whole Windows Management Instrumentation (WMI) database, all namespaces, all class instances, and all properties. Searches for references to infected files or malware embedded as data.

System registry

Scans the whole system registry, all keys, and subkeys. Searches for references to infected files or malware embedded as data. When cleaning the detections, the reference remains in the registry to make sure no important data will be lost.

To quickly navigate to a scan target or add a target folder or file(s), enter the target directory in the blank field below the folder list.

scan_target

The Scan targets drop-down menu enables you to select pre-defined scan targets:

By profile settings

Selects targets set in the selected scan profile.

Removable media

Selects diskettes, USB storage devices, CD/DVD.

Local drives

Selects all system hard drives.

Network drives

Selects all mapped network drives.

Shared Folders

Selects all folders on the local server that are shared.

Custom selection

Clears all selections. Ones cleared, you can make your custom selection.

To quickly navigate to a scan target (file or folder) to include it for scanning, enter its path into the text field below the tree structure. The path entry is case sensitive.

The Scan profile drop-down menu enables you to select pre-defined scan profiles:

Smart scan

Context menu scan

In-depth scan

These scan profiles use different ThreatSense engine parameters.

Scan without cleaning

If you are only interested in scanning the system without additional cleaning actions, select Scan without cleaning. This is useful when you only want to obtain an overview whether there are infected items and get details about these infections, if there are any. You can choose from three cleaning levels by clicking Setup > ThreatSense parameters > Cleaning. Information about scanning is saved to a scan log.

Ignore exclusions

When you select Ignore exclusions, it lets you perform a scan while ignoring exclusions that otherwise apply.