Configuring process settings

On-access scan processes are configured based on the risk that you assign to each process. You can configure one default scanning policy for all processes or configure different policies based on the risk assigned to each process. Parameters include assigning risk to processes, defining items to scan, performing Artemis scanning, scanning compressed files, taking actions on detections, and scanning for potentially unwanted programs.

You can configure scanning of all processes currently running on your system whenever on-access scanning is enabled. This improves your system security, but can impact your system boot-time performance. To access the scan processes on enable feature, complete the following:

For option descriptions, click ? or Help on each tab.
  1. Refer to the section, Accessing the policy configuration interface to display the Default, Low-Risk, or High-Risk Processes Policies configuration page.
  2. From the On-Access General Policies page, click General to configure the general policy that applies to all on-access scanning.
  3. Next to Scan, click Processes on enable to scan all processes currently running on your system whenever on-access scanning is enabled.
    Note: Enabling this feature can impact boot-time performance.

To access the On-Access Default Processes, Low-Risk Processes, or High-Risk Processes properties:

For option descriptions, click ? or Help on each tab.
  1. Refer to the section, Accessing the policy configuration interface to display the Default, Low-Risk, or High-Risk Processes Policies configuration page.
  2. From the On-Access Default, Low-Risk, or High-Risk Processes Policies page, configure the options on each tab using the following table.

Tab descriptions

Tab Description
Processes
  • On-Access Default Processes — Choose to configure one scanning policy for all processes or configure different scanning policies for default processes, low-risk processes, and/or high-risk processes.
    Note: If you choose to configure one scanning policy, this policy applies to all processes. If you choose to configure different scanning policies for low-risk and/or high risk policies, this policy applies only to the processes that are not defined as low-risk or high-risk.
  • On-Access Low-Risk Processes — Specify the processes that you define as low-risk.
  • On-Access High-Risk Processes — Specify the processes that you define as high-risk.
Note: The Configure different scanning policies for high-risk, low-risk, and default processes option must be selected on the On-Access Default Processes tab before you can configure individual policies for low-risk and/or high-risk processes.
Scan Items
  • Configure whether to scan files on read, on write, on network drives and/or opened for backup.
    CAUTION:
    Failure to enable When writing to disk and When reading from disk leaves your system unprotected from numerous malware attacks.
  • Configure which files and file types to scan.
    CAUTION:
    Failure to enable All files leaves your system unprotected from numerous malware attacks.
  • Scan for potential threats that resemble unwanted programs, Trojan horses and macro viruses.
  • Scan inside archives and decode MIME encoded files.
  • Enable on-access scanning for unwanted programs.
Exclusions Configure which disks, files, and folders to exclude from scanning.
Actions
For threat detections:
  • Primary action to take when a threat is detected.
  • Secondary action to take on a threat detection if the first action fails.
For unwanted program detections:
  • Primary action to take when an unwanted program is detected.
  • Secondary action to take on an unwanted program detection if the first action fails.