File Threat Protection task settings
July 3, 2024
ID 234812
The table describes all available values and default values of all the settings that you can specify for the File Threat Protection task.
File Threat Protection task settings
Setting | Description | Values | |
---|---|---|---|
| Enables scanning of archives (including SFX self-extracting archives). The application scans the following archives: .zip; .7z*; .7-z; .rar; .iso; .cab; .jar; .bz; .bz2; .tbz; .tbz2; .gz; .tgz; .arj. The list of supported archive formats depends on the application databases being used. |
| |
| Enables scanning of self-extracting archives only (archives that contain an executable extraction module). |
| |
| Enables scanning email databases of Microsoft Outlook, Outlook Express, The Bat, and other mail clients. |
| |
| Enables scanning of plain text email messages. |
| |
| Temporary exclusion of files in text format from scans. If the value of this setting is |
| |
| Maximum size of an object to be scanned (in megabytes). If the object to be scanned is larger than the specified value, the application skips this object. | 0 – 999999 0 — The application scans objects of any size. Default value: 0. | |
| Maximum object scan duration (in seconds). The application stops scanning the object if it takes longer than the time specified by this setting. | 0 – 9999 0 — The object scan time is unlimited. Default value: 60. | |
| Selection of the first action to be performed by the application on the infected objects. Before performing the action specified by you on an object, Kaspersky Endpoint Security blocks access to the object by applications that attempt to access it.
If |
Default value: | |
| Selection of the second action to be performed by the application on the infected objects. The application performs the second action if the first action fails. If InterceptorProtectionMode is set to | The possible values of the If Default value: | |
| Enables scan exclusions for the objects specified by the |
| |
| Excludes objects from being scanned by name or mask. You can use this setting to exclude an individual file from the specified scan scope by name or exclude several files at once using masks in the shell format. | The default value is not defined.
| |
| Enables scan exclusions for objects containing the threats specified by the |
| |
| Excludes objects from scans by the name of the threats detected in them. Before specifying a value for this setting, make sure that the In order to exclude an object from scans, specify the full name of the threat detected in this object – the string containing the application's decision that the object is infected. For example, you may be using a utility to collect information about your network. To keep the application from blocking it, add the full name of the threat contained in it to the list of threats excluded from scans. You can find the full name of the threat detected in an object in the application log or on the Virus Encyclopedia website. | The setting value is case-sensitive. The default value is not defined.
| |
| Enables logging of information about scanned objects that the application reports as not being infected. You can enable this setting, for example, to make sure that a particular object was scanned by the application. |
| |
| Enables logging of information about scanned objects that are part of compound objects. You can enable this setting, for example, to make sure that an object within an archive has been scanned by the application. |
| |
| Enables logging of information about objects that have not been processed for some reason. |
| |
| Enables heuristic analysis. Heuristic analysis helps the application to detect threats even before they become known to virus analysts. |
| |
| Specifies the heuristic analysis level. The heuristic analysis level sets the balance between the thoroughness of searches for threats, the load on the operating system's resources, and the scan duration. The higher the heuristic analysis level, the more resources and time are required for scanning. |
| |
| Enables usage of the iChecker technology. |
| |
| File Threat Protection task operation mode. The |
| |
The [ScanScope.item_#] section contains the following settings: | |||
| Description of the scan scope, which contains additional information about the scan scope. The maximum length of the string specified using this setting is 4096 characters. | Default value:
| |
| Enables scans of the specified scope. To run the task, enable scans of at least one scope. |
| |
| Scan scope limitation. With this scan scope, the application only scans files that are specified using masks in the shell format. If this setting is not specified, the application scans all the objects in the scan scope. You can specify several values for this setting. | The default value is
| |
| Path to the directory with objects to be scanned.
|
| |
The [ExcludedFromScanScope.item_#] section contains the following settings: | |||
| Description of the scan exclusion scope, which contains additional information about the exclusion scope. | The default value is not defined. | |
| Excludes the specified scope from scans. |
| |
| Limitation of scan exclusion scope. In the exclusion scope, the application excludes from scans only files that are specified using masks in the shell format. If this setting is not specified, the application does not scan any of the objects within the exclusion scope. You can specify several values for this setting. | Default value: | |
| Path to the directory with objects to be excluded.
|
In order to optimize the operation of scan tasks, it is recommended to add the path with snapshots mounted by the system in the read-only mode to the exclusions for the systems with the btrfs file system and enabled active snapshots. For example, for the systems based on SUSE/OpenSUSE, you can add the following exclusion
Remote directories are excluded from scans by the application only if they were mounted before the task was started. Remote directories mounted after the task is started are not excluded from scans. | |
The [ExcludedForProgram.item_#] section contains the following settings: | |||
| Path to excluded process. |
| |
| Exclude child processes of the excluded process specified by the |
| |
| Description of the process exclusion scope. | Default value: | |
| Excludes the specified scope from scans. |
| |
| Limitation of the process exclusion scope. In the process exclusion scope, the application excludes from scans only the files that are specified using masks in the shell format. If this setting is not specified, the application excludes from scans all the objects within the process exclusion scope. You can specify several values for this setting. | Default value: | |
| Path to a directory with files that are modified by the process.
|
|