Forming the protection scope of the File Threat Protection component

The protection scope refers to the objects that the component scans when enabled. The protection scopes of different components have different properties. The location and type of files to be scanned are properties of the protection scope of the File Threat Protection component. By default, the File Threat Protection component scans only potentially infectable files that are run from hard drives, removable drives and network drives.

To create the protection scope:

  1. In the main application window, click the Settings button.
  2. In the application settings window, select Essential Threat ProtectionFile Threat Protection.
  3. In the Security level section, click the Settings button.

    The File Threat Protection window opens.

  4. In the File Threat Protection window, select the General tab.
  5. In the File types section, specify the type of files that you want the File Threat Protection component to scan:
    • If you want to scan all files, select All files.
    • If you want to scan files of formats which are the most vulnerable to infection, select Files scanned by format.
    • If you want to scan files with extensions that are the most vulnerable to infection, select Files scanned by extension.

    When selecting the type of files to scan, remember the following information:

    • There are some file formats (such as .txt) for which the probability of intrusion of malicious code and its subsequent activation is quite low. At the same time, there are file formats that contain or may contain executable code (such as .exe, .dll, and .doc). The risk of intrusion and activation of malicious code in such files is quite high.
    • An intruder may send a virus or another malicious program to your computer in an executable file that has been renamed with the .txt extension. If you select scanning of files by extension, such a file is skipped by the scan. If scanning of files by format is selected, the File Threat Protection component analyzes the file header regardless of the extension. This analysis may reveal that the file is in EXE format. Such a file is thoroughly scanned for viruses and other malware.
  6. In the Protection scope list, do one of the following:
    • If you want to add a new object to the scan scope, click the Add button.
    • If you want to change the location of an object, select the object from the scan scope and click the Edit button.

    The Select scan scope window opens.

    • If you want to remove an object from the list of objects to be scanned, select one from the list of objects to be scanned and click the Delete button.

      A window for confirming deletion opens.

  7. Do one of the following:
    • If you want to add a new object or change the location of an object from the list of objects to be scanned, select the object in the Select scan scope window and click the Add button.

      All objects that are selected in the Select scan scope window are displayed in the Protection scope list in the File Threat Protection window.

      Click OK.

    • If you want to remove an object, click the Yes button in the window for confirming removal.
  8. To exclude an object from the list of objects to be scanned, clear the check box next to the object in the Protection scope list. However, the object remains on the list of objects to be scanned, though it is excluded from scanning by the File Threat Protection component.
  9. Save your changes.

     

Page top