User guide

Table Of Contents
25
4.1.1.4 Idle-state scanning
Idle scanner can be configured and enabled in Advanced setup under Computer > Antivirus and antispyware > Idle-
state scanning. When the computer is in idle state, then a silent computer scan is performed on all local drives. See
also Idle state detection triggers (e.g. screen saver, user logoff), which must be met in order to run the Idle scanner.
By default, Idle scanner does not run when the computer (notebook) is powered from the battery and is not connected
to the power grid. However, you can override this exception here.
Click Enable logging to see computer scan output in the Log files section (from the main program window click Tools >
Log files and from the Log drop-down menu choose Computer scan).
The last setting here is ThreatSense engine parameter setup. Click Setup... if you wish to modify several scan
parameters (e.g. detection methods).
4.1.1.5 Exclusions
Exclusions enable you to exclude files and folders from scanning. To ensure that all objects are scanned for threats, we
recommend only creating exceptions when it is absolutely necessary. However, there are situations where you may
need to exclude an object, for example large database entries that would slow your computer during a scan or software
that conflicts with the scan.
To exclude an object from scanning:
1. Click Add...,
2. Enter the path to an object or select it in the tree structure.
You can use wildcards to cover a group of files. A question mark (?) represents a single variable character whereas an
asterisk (*) represents a variable string of zero or more characters.
Examples
If you wish to exclude all files in a folder, type the path to the folder and use the mask “*.*”.
To exclude an entire drive including all files and subfolders, use the mask "D:\*".
If you want to exclude doc files only, use the mask “*.doc“.
If the name of an executable file has a certain number of characters (and characters vary) and you only know the first
one for sure (say “D”), use the following format: “D????.exe”. Question marks replace the missing (unknown)
characters.
Note: A threat within a file will not be detected by the Real-time file system protection module or Computer scan
module if a file meets the criteria for exclusion from scanning.