Enforced Client Product Guide User Interface Definitions
194
A
Edit Policy: Virus Protection Settings
Policies are made up of security settings for all of your protection services. These settings define
how your services operate on client computers.
Use this page to rename a policy or modify its virus protection settings. Changes do not take
effect until you click Save.
Set basic virus protection options
Assign a policy to a group
Check for updates every 12 hours: Client computers check for updated detection definition
(
DAT) files and product components every 12 hours.
Detect ... Enabled: The following threats are detected during scans:
Jokes: Programs designed to be mistaken for a virus. They may
alarm or annoy a user but do not harm files or data. They are
intended to waste time and resources.
Remote admin tools: Programs that can be used from a remote
location to access a computer. Some remote administration tools
serve useful purposes, such as allowing users to access their files
from home, but others can be used by unauthorized persons to
monitor user activities and take control of a computer.
Spyware: Programs that covertly gather user information
through the user’s Internet connection without the user’s
knowledge. Once installed, spyware monitors user activity on the
Internet and transmits that information in the background to
someone else. Spyware can gather information such as email
addresses, websites visited, passwords, and credit card numbers.
Dialers: Programs that hijack a user’s modem and dial
premium-rate phone numbers, such as those required to access
pornographic websites.
Password crackers: Programs that find passwords or encryption
keys by trying every possible combination of characters until the
code is broken.
Adware: Programs that display unsolicited advertisements.
Adware often includes code that tracks a user's personal
information and transmits it to someone else, without the user's
knowledge.
Potentially unwanted applications: Programs that perform
some unauthorized (and often harmful or undesirable) act such as
viruses, worms, and Trojan horses.
Key loggers: Programs that record every keystroke a user
makes. They can be used to steal passwords and other
confidential information.
Item Description
Policy name
Type a new name for the policy if you want to rename it.
On-Demand Scan
Select On to schedule an on-demand scan, then select the time
and frequency.
Select Off to schedule no on-demand scans.
Regardless of this setting, on-access scans occur every time users
run, open, or download files.
Item Description