Product guide
DescriptionTab
• On-Access Low-Risk Processes — Specify the processes that you define as
low-risk.
• On-Access High-Risk Processes — Specify the processes that you define as
high-risk.
NOTE: The Configure different scanning policies for high-risk, low-risk, and
default processes option must be selected on the On-Access Default Processes
tab before you can configure individual policies for low-risk and/or high-risk processes.
Scan Items • Configure whether to scan files on read, on write, on network drives and/or opened
for backup.
• Configure which files and file types to scan.
• Scan for potential threats that resemble unwanted programs, Trojan horses and
macro viruses.
• Scan inside archives and decode MIME encoded files.
• Enable on-access scanning for unwanted programs.
Configure which disks, files, and folders to exclude from scanning.Exclusions
For threat detections:Actions
• Primary action to take when a threat is detected.
• Secondary action to take on a threat detection if the first action fails.
For unwanted program detections:
• Primary action to take when an unwanted program is detected.
• Secondary action to take on an unwanted program detection if the first action
fails.
Scanning Items On-Access
Configuring process settings
McAfee VirusScan Enterprise 8.7i34