File Threat Protection settings

You can perform the following actions for configuring the File Threat Protection component:

In this section:

Changing the security level

Changing the action taken on infected files by the File Threat Protection component

Forming the protection scope of the File Threat Protection component

Using heuristic analysis in the operation of the File Threat Protection component

Using scan technologies in the operation of the File Threat Protection component

Optimizing file scanning

Scanning compound files

Changing the scan mode

Page top