Table of Contents
5
6.4. Starting virus scan and update tasks under another profile............................... 77
6.5. Configuring virus scan and update schedules ................................................... 78
6.6. Power options...................................................................................................... 80
6.7. Advanced Disinfection Technology .................................................................... 81
CHAPTER 7. FILE ANTI-VIRUS ................................................................................... 82
7.1. Selecting a file security level ............................................................................... 82
7.2. Configuring File Anti-Virus................................................................................... 84
7.2.1. Defining the file types to be scanned ........................................................... 84
7.2.2. Defining protection scope............................................................................. 87
7.2.3. Configuring advanced settings..................................................................... 88
7.2.4. Restoring default File Anti-Virus settings ..................................................... 91
7.2.5. Selecting actions for objects......................................................................... 91
7.3. Postponed disinfection ........................................................................................ 93
CHAPTER 8. MAIL ANTI-VIRUS .................................................................................. 94
8.1. Selecting an email security level......................................................................... 95
8.2. Configuring Mail Anti-Virus.................................................................................. 96
8.2.1. Selecting a protected email group................................................................ 97
8.2.2. Configuring email processing in Microsoft Office Outlook........................... 99
8.2.3. Configuring email scans in The Bat! .......................................................... 101
8.2.4. Restoring default Mail Anti-Virus settings .................................................. 103
8.2.5. Selecting actions for dangerous email objects .......................................... 103
CHAPTER 9. WEB ANTI-VIRUS ................................................................................ 106
9.1. Selecting the web security level........................................................................ 107
9.2. Configuring Web Anti-Virus............................................................................... 109
9.2.1. Setting a scan method................................................................................ 109
9.2.2. Creating a trusted address list.................................................................... 111
9.2.3. Restoring default Web Anti-Virus settings ................................................. 111
9.2.4. Selecting responses to dangerous objects................................................ 112
CHAPTER 10. PROACTIVE DEFENSE .................................................................... 114
10.1. Proactive Defense settings ............................................................................. 117
10.1.1. Activity control rules.................................................................................. 119
10.1.2. Application Integrity Control...................................................................... 122
10.1.2.1. Configuring Application Integrity Control rules.................................. 123
10.1.2.2. Creating a list of shared components................................................ 125