Page tree
Skip to end of metadata
Go to start of metadata

Scan settings

This area allows you to define which settings should be used for the automatic virus check.

  • Use engines: The software works with two engines – two virus checking programs optimized for one another. You can accelerate the virus check in older and slower computers by using just one engine, but normally you should keep the setting Both engines.
  • Infected files: Has your software detected a virus? In the standard setting, the software now asks you what you would like to do with the infected file. If you would always like to perform the same action, you can set this here. The highest protection for your data is offered here by the setting Disinfect and copy to quarantine.
  • Infected archive: Here you determine whether archive files (e.g. files with the extension RAR, ZIP or PST) should be handled differently from normal files. However, please note that moving an archive to quarantine can damage it so that it can no longer be used after it is moved back.

Furthermore, you can click the button ADVANCED to specify which additional virus checks should be performed or omitted.

In most cases, however, it is completely sufficient to use the specified default settings.

  • File types: You can specify here which file types should be inspected by the software for viruses.
  • Heuristics: In the heuristic analysis, viruses are not only detected by the virus database, which you receive with every update of the software, but are also identified on the basis of particular characteristics typical of viruses. This method increases the level of security, but in rare cases may generate false alarms.
  • Check archive: Checking compressed data in archives (these can be recognized by their file extensions such as ZIP, RAR or PST) is very time-consuming and can normally be omitted if the virus monitor is generally active on the system. The monitor can detect a previously hidden virus while the archive is being unzipped and can automatically prevent it from spreading.
  • Check email archives: Here you can specify whether your email archive is examined for infections as well.
  • Check system areas: In general, system areas (e.g. boot sectors) in your computer should not be excluded from virus checks.
  • Check for diallers / spyware / adware / riskware: You can also use this function to check your system for dialers and other malware (spyware, adware and riskware). These are e.g. programs that establish expensive, unwanted Internet connections, of which the potential for financial damage is no less significant than that of the virus. They may for example secretly record your surfing habits or even all the keyboard entries you make (including your passwords) and forward these to third parties via the Internet at the earliest opportunity.
  • Check for rootkits: Rootkits attempt to evade conventional virus detection methods. Additional monitoring for this malware is always advisable.
  • Generate log: By checking this box, you can specify that the software creates a log of the virus check process. This log can be viewed in the Logs area.
  • No labels