Product guide
4 From the On-Access Default, Low-Risk, or High-Risk Processes Policies page, configure the
options on each tab. Refer to
Process setting tab options
.
Process setting tab options
The following table describes the on-access scanner tab options.
DefinitionsTab
Processes • On-Access Default Processes — Choose to configure one scanning policy for
all processes or configure different scanning policies for default processes, low-risk
processes, and high-risk processes.
NOTE: If you choose to configure one scanning policy, this policy applies to all
processes. If you choose to configure different scanning policies for low-risk and
high risk policies, this policy applies only to the processes that are not defined as
low-risk or high-risk.
• On-Access Low-Risk Processes — Specify the processes that you define as
low-risk.
• On-Access High-Risk Processes — Specify the processes that you define as
high-risk.
NOTE: The Configure different scanning policies for high-risk, low-risk, and
default processes option must be selected on the On-Access Default Processes
tab before you can configure individual policies for low-risk and high-risk processes.
Scan Items • Configure whether to scan files on read, on write, on network drives and opened
for backup.
CAUTION: Failure to enable When writing to disk and When reading from
disk leaves your system unprotected from numerous malware attacks.
• Configure which files and file types to scan.
CAUTION: Failure to enable All files leaves your system unprotected from
numerous malware attacks.
• Scan for potential threats that resemble unwanted programs, Trojan horses and
macro viruses.
• Scan inside archives and decode MIME encoded files.
• Enable on-access scanning for unwanted programs.
Configure which disks, files, and folders to exclude from scanning.Exclusions
For threat detections:Actions
• Primary action to take when a threat is detected.
• Secondary action to take on a threat detection if the first action fails.
For unwanted program detections:
• Primary action to take when an unwanted program is detected.
• Secondary action to take on an unwanted program detection if the first action
fails.
Enabling on-network drives
To scan mapped network drives, you must enable the On Network Drives option.
Configure the on-access scanning of on-network drives from the On-Access Default Processes
Policies using one of the following user interface consoles.
Part II - Detection: Finding Threats
Scanning items on-access
McAfee VirusScan Enterprise 8.8 Product Guide60