Define ProfileThe Define Profile page manages security profiles. Each security profile represents a different set of enabled or disabled security options. Changes to a security profile affect all machine IDs assigned that security profile. A security profile is assigned to machine IDs using Security > Assign Profile. Typically different types of machines or networks require different security profiles. A sample profile is provided for you. You can't change the sample profile, but you can save it under a new name and make changes to the copy. This page provides you with the following actions:
To Define or Maintain a Security Profile
General Virus Vault Limit Size of the Vault - If checked, limits the size of the vault as specified using the following options:
Automatic File Deletion - If checked, deletes files automatically as specified by the following options:
System Tray Notifications Display system tray notifications - If checked, the following system tray notifications can be optionally enabled. All notification messages display on the managed machine next to the system tray. Display tray notifications about update - If checked, displays a notification message that the Endpoint Security software is being updated. Display tray notifications about scanning - If checked, displays a notification message that the machine is being scanned. Display Resident Shield related tray notifications (automatic action) - If checked, displays a notification message that Resident Shield has taken action against a threat. Display components state change notification - If checked, displays a notification message that the state of one of the Endpoint Security components has changed. Display Email Scanner related notifications - If checked, displays a notification message that email scanning has taken action against an email threat. Agent Icon Menu Display option to Enable/Disable Resident Shield in Agent Icon Menu - If checked:
Resident Shield Resident shield is a memory-resident feature. Enable Resident Shield - If checked, the following types of files are scanned as they are copied, opened or saved. If blank, no other Resident Shield options are evaluated. Note: You can also Enable/Disable Resident Shield by Agent Procedure. File Types Scan all files - If selected, all files on the managed machine are scanned. Scan Infectible files and Selected Document Types - If selected, specifies the additional file extensions of programs and documents to include or exclude using the following options:
Additional Options Scan for Tracking Cookies - If checked, the scan includes internet browser tracking cookies. Found tracking cookies are deleted immediately and not moved to the virus vault. Scan Potentially Unwanted Programs and Spyware threats - If checked, the scan detects executable applications or DLL libraries that could be potentially unwanted programs. Some programs, especially free ones, include adware and may be detected and reported by Endpoint Security as a Potentially Unwanted Program. Scan files on close - If checked, files are scanned as they are closed. Scan boot sector of removable media - If checked, the scan includes the boot sector of removable media. Use Heuristics - If checked, scanning includes heuristic analysis. Heuristic analysis performs a dynamic emulation of a scanned object’s instructions within a virtual computing environment. Email Scanner Enable Email Scanner - If checked, inbound and outbound email and attachments are scanned for viruses. If blank, no other Email Protection options are evaluated. Note: Email Scanner is not recommended for servers. See the Exchange tab below. Email Scanning Check Incoming Email - If checked, incoming email is scanned. Certification: Some email clients support appending text to email messages certifying that the email has been scanned for viruses.
Check Outgoing Email - If checked, outgoing email is scanned.
Modify Subject for Messages Marked as Virus - Adds prefix text to the subject of a message that contains a virus. Scanning Properties Use Heuristics - Applies to an email message. If checked, scanning includes heuristic analysis. Heuristic analysis performs a dynamic emulation of a scanned object’s instructions within a virtual computing environment. Scan Potentially Unwanted Programs and Spyware threats - If checked, email scanning includes scanning for spyware, adware, and potentially unwanted programs. Scan inside archives (RAR, RAR 3.0, ZIP, ARJ, CAB) - If checked, email archives are scanned. Email Attachments Reporting (as a threat) Report Password Protected Archives - If checked, reports password-protected archive attachments (zip, rar, etc) in email as threats. Report Password Protected Documents - If checked, reports password-protected document attachments in email as threats. Report Files containing macro - If checked, reports files containing macros attached to email as threats. Report hidden extensions - If checked, reports files that use a hidden extension. Some viruses hide themselves by doubling their file extension. For example, the Move reported attachments to Virus Vault (incoming email only) - If checked, reported email attachments are moved to the virus vault. They display in the Virus Vault tab of the View Threats page instead of in the Current Threats tab. Full Scan Scan Settings Scan Potentially Unwanted Programs and Spyware threats - If checked, the scan detects executable applications or DLL libraries that could be potentially unwanted programs. Some programs, especially free ones, include adware and may be detected and reported by Endpoint Security as a Potentially Unwanted Program. Scan for Tracking Cookies - If checked, the scan includes internet browser tracking cookies. Found tracking cookies are deleted immediately and not moved to the virus vault. Scan Inside Archives - If checked, scanning includes archive files—such as ZIP and RAR files. Use Heuristics - If checked, scanning includes heuristic analysis. Heuristic analysis performs a dynamic emulation of a scanned object’s instructions within a virtual computing environment. Scan system environment - If checked, system areas are scanned before the full scan is started. Scan infectible files only - If checked, "infectible" files are scanned based on their contents regardless of their file extensions. For example, an EXE file could be renamed but still be infected. The following types of files are considered 'infectible' files:
Performance Select System Priority for Scan - Defines how fast the scan runs and how much system resources the scan uses. You can set the scan to run as fast as possible while slowing down a computer noticeably, or you can choose that you wish the scan to run using as little system resources as possible, while prolonging the scan's run time. Exchange Enable AVG for Exchange Server - Enable or disable email scanning for assigned MS Exchange Servers. Note: If you install email protection on one or more MS Exchange Servers, create a unique profile for MS Exchange Servers and only apply this profile to these MS Exchange Servers. The Define Profile > Exchange tab settings should only be enabled and applied to MS Exchange Servers. Mail Certification - Enable or disable adding a certification note to scanned email on MS Exchange Servers. Customize the certification note in the text field. Performance Run scans in background - Enable or disable background scanning. Background scanning is one of the features of the VSAPI 2.0/2.5 application interface. It provides threaded scanning of the Exchange Messaging Databases. Whenever an item that has not been scanned before is encountered in users’ mailbox folders, it is submitted to AVG for Exchange 2000/2003 Server to be scanned. Scanning and searching for unexamined objects runs in parallel. A specific low priority thread is used for each database, which guarantees other tasks, for example email messages storage in the Microsoft Exchange database, are always carried out preferentially. Scan Proactively - Enable or disable VSAPI 2.0/2.5 proactive scanning. Proactive scanning involves dynamical priority management of items in the scanning queue. Lower priority items are not scanned unless all higher priority ones have been scanned. An item’s priority rises if a client tries to use it, so an items’ precedence changes dynamically according to user activity. Scan RTF Files - Specify whether RTF files should be scanned or not. Scanning Threads - The scanning process is threaded by default to increase the overall scanning performance by a certain level of parallelism. The default number of threads is computed as 2 times the ‘number_ of_processors’ + 1. Scan Timeout - The maximum continuous interval, in seconds, for one thread to access the message that is being scanned. Exclude Dirs Exclude Directories Add new record - Adds directories excluded from a scan. Some directories may be threat-free but contain files that are erroneously interpreted as malware. Warning: Do not exclude directories unless the contents of the directories are known to be threat-free. Exclude PUPs Exclude Potentially Unwanted Programs Use this tab to exclude potentially unwanted programs, or PUPs, manually. The View Threats page provides a quicker method of identifying and excluding PUPs. Note: Non-PUP threats cannot be added to the PUP Exclusion List. Add new record - Adds PUP files to exclude from a scan. Some files may be threat-free but be erroneously interpreted as potentially unwanted programs (PUPs). You need to identify the filename, its checksum value and its file size in bytes. Warning: Do not exclude files unless the contents of the files are known to be threat-free. Click Add New Record then enter the following:
Updates Use this tab to configure how AVG updates are downloaded. Proxy Settings Enables/disables using a proxy server to download AVG updates.
Manual - Sets proxy settings manually.
Auto - Sets proxy settings automatically.
Update URL AVG provides a default URL to download updates. You can preferentially download updates from a custom URL. Use Custom Update URL - Select this option to preferentially download updates from a custom URL. Name - Enter the name of the custom update URL. URL - Enter the URL. | |||
Topic 2945: Send Feedback. Download a PDF of this online book from the first topic in the table of contents. Print this topic. |