Define ProfileThe Define Profile page manages security profiles. Each security profile represents a different set of of enabled or disabled security options. Changes to a security profile affect all machine IDs assigned that security profile. A security profile is assigned to machine IDs using Security > Assign Profile. Typically different types of machines or networks require different security profiles. The page provides you with four actions
To Define or Maintain a Security Profile
General Keep files in quarantine for this many days before deleting - Enter the number of days to store quarantined threats before they are automatically deleted. Minimum MB To preserve on disk - Enter the minimum number of megabytes to allocate on the disk to the storage of quarantined threats. Maximum per centage of disk used - Enter the maximum percentage of disk space to allocate for the storage of quarantined threats. Allow user to enable/disable Security Protection in agent task menu - If checked:
Scan System Areas on Startup - If checked, security protection scans the following system areas on startup:
File Protection File protection is a memory resident feature. Files are scanned for viruses as they are copied, opened or saved on the managed machine. Enable File Protection - If check, the following types of files are scanned as they are copied, opened or saved. 386; ASP; BAT; BIN; BMP; BOO; CHM; CLA; CLAS*; CMD; CNM; COM; CPL; DEV; DLL; DO*; DRV; EML; EXE; GIF; HLP; HT*; INI; JPEG*; JPG; JS*; LNK; MD*; MSG; NWS; OCX; OV*; PCX; PGM; PHP*; PIF; PL*; PNG; POT; PP*; SCR; SHS; SMM; SYS; TIF; VBE; VBS; VBX; VXD; WMF; XL*; XML; ZL*; Scan all files - If selected, all files on the managed machine are scanned. Scan programs and documents (by extension) - If selected, specifies the file extensions of programs and documents to include or exclude. Exclude files with these extensions - Specifies the file extensions of programs and documents to exclude from a scan. Excluded extensions have precedence over included extensions. Enter each extension separated by a semi-colon (;) character. Always scan files with the following extensions - Specifies the file extensions of programs and documents to include in a scan. Enter each extension separated by a semi-colon (;) character. Also scan files without an extension - If checked, the scan includes files without an extension. Scan floppy drives - If checked, the scan includes floppy drives. Use Heuristic Analysis - If checked, scanning includes heuristic analysis. Heuristic analysis performs a dynamic emulation of a scanned object's instructions within a virtual computing environment. Scan on close of files - If checked, files are scanned as they are closed. Scan potentially unwanted programs - If checked, the scan detects executable applications or DLL libraries that could be potentially unwanted programs. Some programs, especially free ones, include adware and may be detected and reported by Kaseya Endpoint Security as a Potentially Unwanted Program. Scan cookies - If checked, the scan includes internet browser cookies. Once detected an infected file can be moved or deleted, but it cannot be opened, saved or copied. Use the following list to determine how to set the Disinfect and Delete checkboxes:
Mail Protection Enable Mail Protection - If checked, inbound and outbound email and attachments are scanned for viruses. Check Incoming Mail - If checked, incoming email is scanned. Certification: Some email clients support appending text to email messages certifying that the email has been scanned for viruses. Do Not Certify - If selected, incoming email is not certified. Certify all mail - If selected, all incoming email is certified. Certify mail with attachments only - If selected, only incoming email with attachments are certified. Check Outgoing Mail - If checked, outgoing email is scanned. Do Not Certify - If selected, outgoing email is not certified. Certify all mail - If selected, all outgoing email is certified. Certify mail with attachments only - If selected, only outgoing email with attachments are certified. Use Heuristic Analysis - If checked, scanning includes heuristic analysis. Heuristic analysis performs a dynamic emulation of a scanned object's instructions within a virtual computing environment. Enable Anti-Spyware engine - If checked, email scanning includes scanning for spyware, adware, and potentially unwanted programs. Scan Inside Archives - If checked, email archives are scanned. Automatically move password-protected archives to quarantine - Automatically quarantines password-protected archives. Password-protected archives may contain virus/spyware/malware threats. You can recover password-protected archives using the Security > View Threats page. Remove all attached executable files - If checked, executables files, whether infected or not, are removed from email. Remove all attached documents - If checked, attachments, whether infected or not, are removed from email. Remove files with these extensions - Enter the extensions of files that should be automatically removed from email. Enter each extension separated by a semi-colon (;) character. Note: The term file in the following discussion refers to an individual email message. Once detected an infected file can be moved or deleted, but it cannot be opened, saved or copied. Use the following list to determine how to set the Disinfect and Delete checkboxes:
Full Scan The following types of files are considered 'infectable' files:
Scan all files (except those excluded below) - If checked, all files are scanned for viruses on the managed machine. Scan infectable files (filter by file content) - If checked, "infectible" files are scanned based on their contents regardless of their file extensions. For example, an exe file could be renamed but still be infected. Scan infectable files (filter by extension type) - If selected, specifies the file extensions of programs and documents to include or exclude. Always scan files with the following extensions - Specifies the file extensions of programs and documents to include in a scan. Enter each extension separated by a semi-colon (;) character. Exclude files with these extensions - Specifies the file extensions of programs and documents to exclude from a scan. Applies to any of the three radio options above. Excluded extensions have precedence over included extensions. Enter each extension separated by a semi-colon (;) character. Scan System Areas before starting the full scan - If checked, system areas are scanned before the full scan is started. Scan active processes - These are running applications. Applications can be normal software or virus/spyware/malware. Use Heuristic Analysis - If checked, scanning includes heuristic analysis. Heuristic analysis performs a dynamic emulation of a scanned object's instructions within a virtual computing environment. SCAN NTFS Alternate Data Streams - If checked, scanning includes alternate data streams. Each file in a NTFS volume can support alternate file names and alternate file data. Alternate data streams can hide data, especially rootkits, viruses, trojans, and other forms of malware. Scan Inside Archives - If checked, scanning includes archive filessuch as ZIP and RAR files. Scan for spyware, adware, etc. - If checked, scanning includes spyware, adware, DLL-trojans, keyloggers and potentially unwanted programs. Include cookies in spyware scan - If checked, scanning includes spyware cookies. Include registry in spyware scan - If checked, scanning includes spyware entries in the registry. Set priority of the scan to - Adjusts the priority of the scan against other tasks being performed on the managed machine.
Set a pause between files - If set to a value other than Once detected an infected file can be moved or deleted, but it cannot be opened, saved or copied. Use the following list to determine how to set the Disinfect and Delete checkboxes:
Exclude Dirs Add new record - Adds directories excluded from a scan. Some directories may be threat-free but contain files that are erroneously interpreted as malware. Warning: Do not exclude directories unless the contents of the directories are known to be threat-free. | ||
Topic 2945: Send Feedback. Download a PDF of this online book from the top topic. |