Configuring general settings

General settings apply to the scanning of all processes and include parameters such as maximum scan time, scanning scripts, blocking unwanted threats from a remote computer, sending messages when threats are detected, and reporting detections.

Use the following process to access and configure the On-Access General Policies properties:

Configure the options on each tab. For option descriptions, click ? or Help on each tab.


  1. Refer to the section, Accessing the policy configuration interface to display the On-Access General Policies configuration page.
  2. Click the General tab to configure what on-access items to scan, when to scan, the maximum scan time, and if cookies should be scanned.
  3. Click the ScriptScan tab to enable ScriptScan and configure any scripts to exclude from scanning.
  4. Click the Blocking tab to block connections from remote computers that have files with potential threats or unwanted programs in a shared folder. You can also configure a message sent to users who connect to these remote computers.
  5. Click the Messages tab to notify local users when detections occur with a configured message, and specify what actions the user can take against the threat.
  6. Click the Reports tab and enable the scanning activity log files, where they are stored, their size, format, and any additional scan logging to help you diagnose this threat. These log files are very helpful when you diagnose security threats and help determine what actions to take against these threats.