Configuring File Threat Protection requires the IS Administrator permissions.
To configure File Threat Protection:
The window for configuring the File Threat Protection settings opens.
For example, Trojans are deleted immediately as they do not infect other files and disinfection is not applicable here.
We recommend specifying both actions for detected objects.
Consider the following when selecting actions to perform on detected objects:
The solution scans archives in such formats as .ZIP, .7Z *, .7-Z, .RAR, .ISO, .CAB, .JAR, .BZ, .BZ2, .TBZ, .TBZ2, .GZ, .TGZ, .ARJ, as well as .SFX self-extracting archives. The list of supported archive formats depends on the databases used.
If archive scanning is enabled and Perform recommended action is set as the first action on a detected object, the solution deletes the infected object or the entire archive containing the threat, depending on the archive type.
You can define the scope of archives for scanning by specifying Self-extracting archives or All archives. If you choose to scan self-extracting archives, the solution scans only archives that contain an executable unpacker.
To start scanning, the solution first unpacks the archive, which may slow down the scan. You can reduce the duration of archive scanning by enabling and configuring the Skip object if scan takes longer than (sec) and Skip objects larger than (MB) settings.
Available values: 0–999999. If the value is set to 0, the solution scans files of any size.
Default value: 0.
Available values: 0–9999. If the value is set to 0, the scan time is unlimited.
Default value: 60.
If the check box is selected, the solution scans only new files and those modified since the last scan. If the check box is cleared, the solution scans files regardless of their creation or modification dates.
The check box is selected by default.
The check box is selected by default.
If the Use heuristic analysis check box is selected, you can select the heuristic analysis level. A heuristic analysis level balances the rigor of security threat scanning, the load on the operating system, and the scan duration. The higher the level, the more resources the scan requires, and the longer it takes. You can select one of the following options:
If the check box is selected, the solution logs the event for all objects. If the check box is cleared, the event is not logged. The check box is cleared by default.