Default On-Demand Scan tasks settings
By default On-Demand Scan tasks have the settings described in the table below. You can configure system and custom On-Demand Scan tasks.
Default On-Demand Scan tasks settings
Setting | Default value | Description |
---|---|---|
Scan scope | Applied in system and custom tasks:
| You can change the scan scope. The scan scope cannot be configured for the Quarantine Scan and Application Integrity Control system tasks. |
Security settings | Common settings for the entire scan scope correspond to the Recommended security level. | For nodes selected in the protected device's file resource list or tree, you can:
|
Use heuristic analyzer | It is used with the Medium analysis level for Critical Areas Scan, Scan at Operating System Startup, and custom tasks. It is used with the Deep analysis level for the Quarantine Scan task. | Heuristic Analyzer can be enabled or disabled and the analysis level can be configured. The Quarantine Scan task analysis level cannot be configured. Heuristic Analyzer is not used in the Application Integrity Control and Baseline File Integrity Monitor tasks. |
Apply Trusted Zone | Applied (Not applied for Quarantine Scan task)
| General list of exclusions that can be used in selected tasks. |
Use KSN for scanning | Applied | You can improve your device's protection using the Kaspersky Security Network cloud service infrastructure. |
Settings to start a task with specific permissions | The task is started under the system account. | You can edit settings to start tasks with specific account permissions for all system and custom On-Demand Scan tasks, except Quarantine Scan and Application Integrity Control tasks. |
Perform task in background mode (low priority) | Not applied | You can configure the priority level of On-Demand Scan tasks. |
Task start schedule | Applied in system tasks:
| You can configure the settings for scheduled task startup. |
Registering scan execution and updating the device protection status | The device protection status is updated weekly after the Critical Areas Scan is performed. | You can configure settings for registering the execution of the Critical Areas Scan in the following ways:
|