Product guide

4 From the On-Access Default, Low-Risk, or High-Risk Processes Policies page, configure the
options on each tab. Refer to
Process setting tab options
.
Process setting tab options
The following table describes the on-access scanner tab options.
DefinitionsTab
Processes On-Access Default Processes — Choose to configure one scanning policy for
all processes or configure different scanning policies for default processes, low-risk
processes, and high-risk processes.
NOTE: If you choose to configure one scanning policy, this policy applies to all
processes. If you choose to configure different scanning policies for low-risk and
high risk policies, this policy applies only to the processes that are not defined as
low-risk or high-risk.
On-Access Low-Risk Processes — Specify the processes that you define as
low-risk.
On-Access High-Risk Processes — Specify the processes that you define as
high-risk.
NOTE: The Configure different scanning policies for high-risk, low-risk, and
default processes option must be selected on the On-Access Default Processes
tab before you can configure individual policies for low-risk and high-risk processes.
Scan Items Configure whether to scan files on read, on write, on network drives and opened
for backup.
CAUTION: Failure to enable When writing to disk and When reading from
disk leaves your system unprotected from numerous malware attacks.
Configure which files and file types to scan.
CAUTION: Failure to enable All files leaves your system unprotected from
numerous malware attacks.
Scan for potential threats that resemble unwanted programs, Trojan horses and
macro viruses.
Scan inside archives and decode MIME encoded files.
Enable on-access scanning for unwanted programs.
Configure which disks, files, and folders to exclude from scanning.Exclusions
For threat detections:Actions
Primary action to take when a threat is detected.
Secondary action to take on a threat detection if the first action fails.
For unwanted program detections:
Primary action to take when an unwanted program is detected.
Secondary action to take on an unwanted program detection if the first action
fails.
Enabling on-network drives
To scan mapped network drives, you must enable the On Network Drives option.
Configure the on-access scanning of on-network drives from the On-Access Default Processes
Policies using one of the following user interface consoles.
Part II - Detection: Finding Threats
Scanning items on-access
McAfee VirusScan Enterprise 8.8 Product Guide60