Page tree
Skip to end of metadata
Go to start of metadata

Manual virus check

Here you can configure basic program settings for the manual virus check (also called on-demand scan).

However, in normal operation this is not required.

  • Use engines: The software works with two engines – two virus checking programs optimized for one another. You can accelerate the virus check in older and slower computers by using just one engine, but normally you should keep the setting Both engines.
  • Infected files: Has your software detected a virus? In the standard setting, the software now asks you what you would like to do with the infected file. If you would always like to perform the same action, you can set this here. The highest protection for your data is offered here by the setting Disinfect (if not possible: place in quarantine).
  • Infected archive: Here you determine whether archive files (e.g. files with the extension RAR, ZIP or PST) should be handled differently from normal files. However, please note that moving an archive to quarantine can damage it so that it can no longer be used after it is moved back from Quarantine.
  • Pause the virus check at times of high system load: A virus check should normally be carried out when the computer is not being used. If you then need to use the computer, the virus check is paused so that your computer can run at normal speed for you. This virus check will then carry on when you stop working.

Exceptions for on-demand scan

By clicking on the EXCEPTIONS button you can exclude specific drives, directories and files from the scan and so significantly accelerate parts of the virus detection process.

To do this, proceed as follows:

1. Click the EXCEPTIONS button.

2. Click on  NEW  in the  Exceptions for on-demand scan  window .

3. Now, select whether you want to exclude a drive, a directory or a file or a file type.

4. Underneath this, select the directory or drive you want to protect. In order to protect files, enter the complete file name in the entry field under File mask. You can also use wildcards here.

Note: Wildcards function as follows:

  • The question mark symbol (?) represents individual characters.
  • The asterisk symbol (*) represents entire character strings.

For instance, in order to protect all files with the file extension .sav, enter *.sav. In order to protect a special selection of files with sequential file names (e.g., text1.doc, text2.doc, text3.doc), enter text?.doc for example.

You can repeat this procedure as often as desired and also delete or modify the existing exceptions.

Apply exceptions to idle scan: While the on-demand scan checks the computer for viruses at one specific time, the idle scan is an intelligent virus scanner that continuously checks all files on your computer to see if they aren't already infected. The idle scan works like a screen saver; it only activates when you do not use your computer for a while and stops immediately as soon as you continue to use it again. Here you can specify whether the defined exceptions should also apply to the idle scan.

Manual virus check - Advanced

You can create additional virus scan settings by clicking the ADVANCED button.

In most cases, however, it is completely sufficient to use the specified default settings.

File types: You can specify here which file types should be inspected by the software for viruses. Selecting the option "Program files and documents only" entails certain speed benefits.

Heuristics: In the heuristic analysis, viruses are not only detected by the virus database, which you receive with every update of the antivirus software, but are also identified on the basis of particular characteristics typical of viruses. This method increases the level of security, but in rare cases may generate false alarms.

Check archive: Checking compressed data in archives (these can be recognized by their file extensions such as ZIP, RAR or PST) is very time-consuming and can normally be omitted if the virus monitor is generally active on the system. To increase the speed of the virus check, you can limit the size of the archive files that are browsed to a specific value in kilobytes.

Check email archives: Here you can specify whether your email archive is examined for infections as well.

Check system areas: In general, system areas (e.g. boot sectors) in your computer should not be excluded from virus checks.

Check for diallers / spyware / adware / riskware: You can also check your system for dialers and other malicious programs with this function. These are e.g. programs that establish expensive, unwanted Internet connections, in which the potential for financial damage is no less significant than that of a virus. They may for example secretly record your surfing habits or even all the keyboard entries you make (including your passwords) and forward these to third parties via the Internet at the earliest opportunity.

Check for rootkits: Rootkits attempt to evade conventional virus detection methods. Additional monitoring for this malware is always advisable.

Only check new or modified files: If you activate this function, files that have not been changed for a long time and that were previously flagged as harmless are skipped. This provides a performance improvement in everyday work – without compromising security.

Generate log: You can use this checkbox to require the software to set up a log for the virus check process. This log can be viewed in the Logs area.

Offer virus checking for removable data media: If you check this box, whenever a removable data medium (USB stick, external hard drive etc) is connected to your computer, you will be asked whether the device should be checked for viruses.

  • No labels