Escan/english/antispam and Scan: Difference between pages

From eScan Wiki
(Difference between pages)
Jump to navigation Jump to search
No edit summary
 
No edit summary
 
Line 1: Line 1:
{| class="wikitable" border="0"
|-
{| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;"
|style="text-align:left;"|'''Languages :'''&nbsp;&nbsp;'''·''' [[EPC|<font size=1.5 color="blue">English</font>]]&nbsp;&nbsp;'''·''' [[Escan/latinspanish/protection|<font size=1.5 color="blue">Español</font>]]&nbsp;&nbsp;'''·''' [[Escan/italian/protection|<font size=1.5 color="blue">Italiano</font>]]&nbsp;&nbsp;'''·''' [[Escan/chinese/EPC|<font size=1.5 color="blue">中文(繁體)</font>]]
|}
{| class="wikitable" border="0"


{| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;"
| style="width:56%; color:#000;" |
{| style="width:280px; border:none; background:none;"
| [[Image:escan_tm_logo1.jpg|left|<!--We add confidence to computing-->]]
|}
|width="1000pt" style="width:11%; font-size:95%;" white-space:nowrap;|
&nbsp;<B>General</B>
* [[Main Page|<font color="blue">Home</font>]]
* [[Marketing|<font color="blue">Marketing</font>]]
* [[Events|<font color="blue">Events</font>]]
* [[Marketing/Advertisement|<font color="blue">Advertisement</font>]]
|width="1000pt" style="width:11%; font-size:95%; white-space:nowrap;" |
&nbsp;<B>Knowledgebase</B>
* [[Technical Info|<font color="blue">Technical Information</font>]]
* [[Beta Testing|<font color="blue">Beta Testing</font>]]
* [[Release Candidate|<font color="blue">Release Candidate</font>]]
* [[User Guide|<font color="blue">User Guides</font>]]
|width="1000pt" style="width:11%; font-size:95%;white-space:nowrap;" |
&nbsp;<B><p>&nbsp;&nbsp;Support</p></B>
* [[EMail|<font color="blue">eMail</font>]]
* [[Online Chat|<font color="blue">Online Chat</font>]]
* [[Telephonic Support|<font color="blue">Telephone</font>]]
* [[Remote Support|<font color="blue">Remote Support</font>]]
* [[Forums|<font color="blue">Forums</font>]]
|}
{| class="wikitable" border="0"  
{| class="wikitable" border="0"  
|}
|}
Line 44: Line 13:


{| class="wikitable" border="0"  
{| class="wikitable" border="0"  
|}
!<h2  id="mp-tfp-h2" style="margin:0; background:#C7E587; font-size:120%; font-weight:bold; border:10 solid #afa3bf; text-align:left; color:#000; padding:0.2em 0.4em">eScan Version 10 Online Help</h2>
{| class="wikitable" border="0"
|-
|width="1000pt"|
|}
|}


This Scan option page enables you to scan the system areas, registry, services and startup, full computer or specific directories/files for viruses and other malicious programs.


<U>'''Anti-Spam'''</U>
* This page has different options available, like –


This section provides the decription and settings of eScan's Anti-Spam for scanning of spam / junk emails.
'''A) Check memory, registry and services –'''  


This option checks the system memory, registry and services that load at system startup /bootup for any infection from malwares.


__TOC__
=='''Description'''==


Anti-Spam based on the NILP (Non Intrusive Learning Pattern) technology, intelligently filters all your junk and spam emails.


'''B) Check computer –'''


=='''Status in main Protection Center Window'''==
This option checks the system local disks for any infection from malwares.


The <B><font color="Green"> '''green''' </font></B> colored Tick <U><B><font color="Green">(√)</font></B></U> mark indicates the Anti-Spam is active and running.


The <B><font color="Red"> '''red''' </font></B> colored Cross <U><B><font color="Red">(X)</font></B></U> mark indicates the Anti-Spam is inactive and stopped.


'''C) Check directories/files –'''


=='''Configuration section'''==
This option checks for the system's specific directories and files.


<U>''Status''</U>
At the bottom end of this Scan page, an additional option is available, viz- start.


:*Anti-Spam Status This will display the status of the Anti-Spam in Running or Disabled mode.
1. Start –  


:*Anti-Phishing Status – This will display the status of Anti-Phishing module is in Enabled or Disabled mode. (For more detail please check in the section '''B. Spam Filter Configuration Section''' below).
runs /executes the desired process like "check computer", "check directories/files", etc...  


:*Action – This will display the Action that will be taken on the email considered as Spam i.e. Quarantine/Delete.
Other Options include -




:''Stop / Start buttons'' – Clicking stop / start button will disable or enable the Anti Spam.


:''Settings button'' – To configure the Anti-Spam for email scanning click on the Settings button.
'''D) Scheduler –'''


This option is used to set or assign a task of scanning. The option of "Add task" available at the below end of the "Scheduler" page enables the administrator/user to configure/set a scheduled task (scan), the requirements of which are as below -


'''I. Advanced'''
1. Job -


Name of the scan task


:'''A. General Options section'''
a. If the program should start in the background or foreground
b. If the program should quit if a virus infection is detected


::# Send Original Mail to User (default) - This option when enabled will send the email (though tagged as spam) to the original recipient of the email also. <U><B>'''Note:'''</B></U> If the email has been tagged as '''SPAM''', the email will be in the SPAM folder of the email client (i.e. Outlook Express). SPAM folder in the mail client is created by eScan.
2. Analysis extent –  
::# Do not check content of Replied or Forwarded Mails This option when enabled will not check contents of email that are either replied or forwarded.
::# Check Content of Outgoing Mails – This option when enabled will also check outgoing emails for restricted contents.


What to scan


::<U>'''Buttons'''</U>
a. Check local hard drives
b. Check for specific directories and files


:::'''a) Phrases '''Clicking on this button, will enable the users to define a list of phrases to be checked in the body of an email and take the necessary actions i.e. either Quarantine / Delete the email.
3. Schedule –  


:::* '''Enable E-Mail Content Scanning''' – When this option is enabled, body of the email will be checked for any listed words/phrases is found and the defined action will be taken.
When it should run /execute


:::* '''User specified whitelist of words/phrases '''- This will list the words/phrases defined and whitelisted by the users (Color Code - <font color="Green"><B>GREEN</B></font>).
a. When the program should run /execute
i) Once, Hourly, Daily, Weekly, Monthly, With System Startup ii)Time


:::* '''User specified List of Blocked words/phrases''' - This will list the words/phrases defined and block listed by the users(Color Code - <font color="Red"><B>RED</B></font>).
4. Virus Check –


:::* '''User specified words/phrases disabled''' - This will list the words/phrases defined but disabled (excluded for scanning) by the users (Color Code - <font color="Gray"><B>GRAY</B></font>).
Properties of the scan task


a. In the case of an infection - the default action set is to "Automatic", but can be set as per requirements.
b. Priority of Scanner - the default action set is on "Normal", but can be set as per requirements.
c. File types - the default action set is on "Automatic", but can be set as per requirements.
d. Settings - these are the different ways of detecting an infection on the system's different objects and areas and they are as mentioned below:-


:::<U>'''Options on Right Click:'''</U>
i) Heuristic: The system is checked for any suspicious activity/unusual sequence, pattern or behavior and when detected, the software takes the necessary action.
ii) Packed Objects: Files that are zipped are scanned.
iii) Prepare Log: A log of all the scanning activity is generated and maintained.This includes details of when the scan was run, infected file names along with the path and action taken.
iv) Full Log: A full (detailed) log is maintained of the activities done by the scanner.
v) Archived Objects: Files that are archived are scanned.
vi) System Area: The system areas like the boot or partition sectors are scanned.


::::* '''Add Phrase:''' To add a word/phrase, right click and select Add Phrase. Add the word/phrase in the section and select the Action (Quarantine the Mail/Delete the Mail) to be taken on the email if the word/phrase is found in the content of the email.
At the bottom end of this Scheduler option page, four additional options are available, viz- refresh, clear all, add new task, start now and edit.  


::::* '''Edit Phrase – '''select this option to edit/modify the word/phrase or the action to be taken.
1. Refresh - displays the latest status
2. Clear All - clears/deletes all the scheduled scans.
3. Add task - this enables to define a new task (scan).
4. Start now- this enables you to start the scan process manually.
5. Edit - this enables you to edit settings of the scan task defined.  


::::* '''Enable Phrase – '''shall enable the listed word/phrase for Content check in the email and the defined action will be taken.


::::* '''Disable Phrase – '''shall disable the listed word/phrase for Content check in the email and no action will be taken.


::::* '''White List – '''shall add the listed word/phrase in the White list for Content check. White listed word/phrase will not be checked for Email Content Scanning.
'''E) Options –'''


::::* '''Block List – '''shall add the listed word/phrase in the Block List for content check. Block listed word/phrase will be checked for Email Content Scanning.
This option helps in customizing the On Demand Scanner (ODS) using the below -


::::* '''Find – '''this will help to search and locate a word / phrase.
1) Virus Check -


a. In the case of an infection -


:'''B. Spam Filter Configuration Section '''
The default action set is to "Automatic", but can be set as per requirements.  


::# Check for Mail Phishing – This option when enabled will check for fraudulent emails and will be quarantined.
b. Priority of Scanner -  
::# Treat Mails with Chinese / Korean character set as SPAM - This option when enabled will scan emails with Chinese / Korean characters. This check is based on our research done on various spam email samples collected world wide, wherein it is observed that spammers do use Chinese / Korean characters in their emails.
::# Treat Subject with more than 5 whitespaces as SPAM – This option when enabled will check if "spacing" between characters / words in the subject of emails. This is also as per our research  and studies on various types of spam emails.
::# Check content of HTML mails – This option when enabled will scan emails in HTML format along with Text.
::# Quaranting Advertisement mails – This option when enabled, will check for advertisement types of emails and will be quarantined.


The default action set is to "Normal", but can be set as per requirements.


:::<U>'''Button'''</U>
c. File types -


:::'''Advanced (Advanced Spam Filtering options) – '''For advance setting in Spam Filter Configuration click on the Advanced button.
The default action set is on "Automatic", but can be set as per requirements.  


::::# Enable Non Intrusive Learning Pattern (NILP) check – Non Intrusive Learning Pattern (NILP) is an advanced Bayesian Filtering method with the intelligence to analyze each mail according to the Behavioral Patterns of the user and comes with a self learning capability. It is one of the component of the Anti-Spam Module that helps prevent spam emails from reaching the user’s mailbox/inbox.
d. Settings -  
::::# Enable eMail Header check – This option when enabled, will check the validity of certain generic fields like From id, To id, CC id.
::::# Enable X-Spam Rules check – This option when enabled, will check the contents in the body of the email as per defined in the database of eScan. The database contains a list of  words / phrases each assigned a score / threshold. This database will referred and accordingly action on the email will be taken.
::::# Enable Sender Policy Framework (SPF) check – This option when enabled will check the SPF record of the sender domain. (This option, when enabled, requires direct internet connection).
::::# Enable Spam URI Realtime Blacklist (SURBL) check – This option when enabled, will check the URL’s in the message body of an email. If the URL is listed in the SURBL site, the email will be blocked from being downloaded..(''This option, when enabled it is recommended to have a  direct internet connection)''.
::::# Enable Realtime Blackhole List (RBL) check – This option when enabled, will check the senders IP address in the RBL sites. If the sender ip address is blacklisted in the RBL site, the email will be blocked from being downloaded''.(This option when enabled it is recommended to have a  direct internet connection)''.
::::# RBL Servers - This contains a list of servers / sites which maintains a list of Spammers details and can be changed as per one’s requirement (add / delete).
::::# Auto Spam Whitelist – This contains a list of valid email addresses which can bypass the above Spam filtering options. Thus allowing emails from the whitelisted are allowed to download to the recipient’s inbox.


These are the different ways of detecting an infection on the system's different objects and areas and they are as mentioned below:-


:'''C. Mail Tagging Options –'''
i) Heuristic:  
::# Do not change email at all – This option when enabled will not add Spam Tag to the email, identified as Spam
::# Both subject and body is changed. [Spam] tag is added in Subject. Actual spam content is embedded in Body – This option when enabled will add a Spam Tag in the Subject and the Body of email identified as Spam. This helps to identify the Spam emails.
::# "X-Mailscan Spam: 1" header line is added. Actual spam content is embedded in Body – This option when enabled will add a Spam Tag in the Body of the email identified as Spam and a header line is added to the email
::# Only [Spam] tag is added in Subject. Body is left unchanged – This option when enabled will add the Spam Tag only in the Subject of the email identified as Spam.
::# "X-Mailscan-Spam: 1" header line is added. Body and subject both remain unchanged - This option when enabled will add a header line to the email but no tag is added to the Subject or body of the email.


The system is checked for any suspicious activity or behavior/unusual sequence, pattern and when detected the software takes the necessary action.


'''II. Disclaimer'''
ii) Packed Objects: Files that are zipped are scanned.  
:The disclaimer is a footer or signature that gets added /appended to all emails. The disclaimer can be added in the space provided.  


::(a) Add Disclaimer to Outgoing emails - This option when enabled adds the disclaimer to all outgoing emails and as a result the recipient is made aware that the email received is scanned and virus free.  
iii) Check Memory: this option when enabled, would check the system's memory (ram).  


::(b) Add Disclaimer to Incoming emails - This option when enabled adds the disclaimer to all incoming emails and as a result the recipient is made aware that the email received is scanned and virus free.
iv) Archived Objects: Files that are archived are scanned.  


::(c) Outgoing mails excluded from adding disclaimer – This option is activated /enabled when the option (a) is enabled. Using this option, the disclaimer is restricted from being added /appended to certain or specific email addresses or domains.  
v) System Area: The system areas like the boot or partition sectors are scanned.  


vi) File size limit for scanning: this option helps to set the limit for scanning based on the size of the file (beyond which the scanner would not scan). By default, the limit is set to 5 MB.


vii) Calculate Analysis: this option calculates and displays the details of the analysis done and/or it displays after calculation the remainder(percentage) of the scan to be done.


viii) Send mail to admin if infection is found: this option helps in notifying the administrator of eScan or the network (designated) that an infection was detected on the system.


:''Notification Setting button'' – To configure the eScan Warning Notification Settings on actions taken on the emails click on the Notification button.


Other option:


::* '''Virus Alerts section – '''Selecting the Alert Dialog-box will pop-up an alert window displaying the action taken on a particular email.
1) Set to default:  


This option will revert back to the original/default settings i.e. all the latest changes made to the eScan "Virus Check" option page would be lost.


::* '''Warning Mails section – '''This contains a  predefined Notifications which will be sent either to the recipient.


:::# Attachment Removed Warning to Sender – When selected a notification email will be sent to the sender of the email informing about the Attachment removed by eScan attached in the email.
2) Alert -
:::# Attachment Removed Warning to Recepient – When selected a notification email will be sent to the recepient of the email informing about the Attachment removed by eScan attached in the email.
:::# Virus Warning to Sender – When selected a notification email will be sent to the sender of the email informing about the virus in the email and the action taken by eScan.
:::# Virus Warning to Recepient – When selected a notification email will be sent to the recepient of the email informing about the virus in the email and the action taken by eScan.
:::# Content Warning to Sender – When selected a notification email will be sent to the Sender of the email informing about the email sent has been considered as SPAM and has been quarantined at the recipient end.
:::# Content Warning to Recepient – When selected a notification email will be sent to the recepeint of the email informing about the email sent has been considered as SPAM and has been quarantined.


This option helps in alerting/notifying the user in the below said conditions -


::* '''Delete Mails From User section – '''If any email from a particular sender or a domain has to be banned or not allowed to be downloaded, can be listed in this section. For eg. [mailto:xyz@domain.com xyz@domain.com] (for a single sender) or [mailto:*@domain.com *@domain.com] (for an entire domain).
a) Warn, if virus signature is more than -


This option is set as default. It notifies/alerts the user if the virus signature is more than 3 days old.


=='''Reports section '''==
b) Warn, if the last computer analysis was more than -


:''Statistics''
This option is not set as default. It notifies/alerts the user if the last computer analysis done is more than 14 days old.


::''Total Quarantined Mails'' – Shows the total number of emails Quarantined.
c) Log Settings -


::''Total Clear Mails'' – Shows the total number of clean emails received and delivered.
A log of all the scanning activity is generated and maintained.This includes details of when the scan was run, infected file names along with the path and action taken.The path can be customized as per requirements.  


d) Only infection to be logged:


:'''a. View Quarantined Mails –''' This displays all the emails that have been quarantined (i.e. marked as spam) by eScan for any of the defined rules /policies in eScan.  
The log would only have details of the infection and none other details.  


e) Full Log:


::'''Buttons '''
A full (detailed) log is maintained of the activities done by the scanner.




:::* Refresh – Clicking on this button refreshes the View Quarantined Mails Window.
3) Restrictions -  
:::* Stop – Clicking on this button stops the current process if started - for example – searching for a quarantined email.
:::* View – Clicking on this button will open the email and can be viewed.
:::* Find – Clicking on this button will search for a specific quarantined email.
:::* Delete – Clicking on this button will permanently delete the selected quarantined email.
:::* Message Source – Clicking on this button will provide more detail of the quarantined email like the Sender id, Sender IP address, etc…
:::* Hide emails – Clicking on this option will hide the quarantined emails.


This option helps in speeding up the scan process and also in best utilizing the system's resources.


::'''Other Options –'''
a. Delete infected files having these extentions - this is a list of file types that would be deleted if found infected by default. It can be customized as per requirement and also set to default.  
:::* Subfolder Also – Selecting this option will show all the quarantined emails received on the current day including those received on the previous days.
:::* Show Attachment (s) – Selecting this option will show the attachment in the list.
:::* Open email(s) with MailClient – Selecting this option, the quarantined email can be opened / viewed using the default mail-client, for eg. Outlook Express, Microsoft Outlook. If this option is unchecked, then the email can be viewed using the eScan mail viewer.
:::* Show Only Hidden eMails – Selecting this option will only display the hidden emails.
:::* Show Only Unhidden eMails - Selecting this option will only display the unhidden emails.
:::* Show all eMails – Selecting this option will display all the email including hidden emails.
:::* Add Sender’s eMail-ID to White List - This option is accessible when right clicking on a particular email. Clicking on this option will add the email-id of the sender in the eScan white list. When next time the email is received from the whitelisted sender id, will not be quarantined and delivered to the recepient.
 
 
:'''b. View Ham Mails -''' This displays all the emails that have not been quarantined (not marked as spam) by eScan.
 
 
::'''Buttons '''
 
:::* Refresh – Clicking on this button refreshes the View Ham Mails Window.
:::* Stop – Clicking on this button stops the current process if started - for example – searching for a Ham email.  
:::* View – Clicking on this button will open the email and can be viewed.
:::* Find – Clicking on this button will search for a specific quarantined email.
:::* Delete – Clicking on this button will permanently delete the selected quarantined email.  
:::* Message Source – Clicking on this button will provide more detail of the quarantined email like the Sender id, Sender IP address, etc…


b. Size Restrictions for files having these extentions - this is a list of file types that would not be scanned if the size exceeds the defined limit. It can be customized as per requirement and also set to default.
c. Scan Restrictions for files having these extentions - this is a list of file types that would not be scanned. It can be customized as per requirement and also set to default.


::'''Other Options –'''


::* Subfolder Also – Selecting this option will show all the Ham emails received on the current day including those received on the previous days.
Other option:  
::* Show Attachment (s) – Selecting this option will show the attachment in the list.
::* Open email(s) with MailClient – Selecting this option, the Ham email can be opened / viewed using the default mail-client, for eg. Outlook Express, Microsoft Outlook. If this option is unchecked, then the email can be viewed using the eScan mail viewer.
::* Train as Spam - This option is accessible when right clicking on a particular email. Clicking on this option will add the email-id of the sender in the eScan Black list. When next time the email is received from the blacklisted sender id, will be quarantined.


1. Set to default: this option will revert back to the original/default settings i.e. all the latest changes made to the eScan "Virus Check" option page would be lost.


:'''c. View Report – '''This will display a summary / report of all the emails that has been received (including quarantined and allowed emails).
At the bottom end of this Options option page, two additional options are available, viz- refresh and save.  


1. Refresh - displays the latest status
2. Save - saves all the settings done.




==<I>'''[http://download1.mwti.net/wiki/index.php/Glossary Glossary]'''</I>==
==<I>'''[http://download1.mwti.net/wiki/index.php/EScan_ver.10 Main Feature Index]'''</I>==


'''F) Logs -'''


This option enables you to check the logs created and maintained within the software after the completion of the defined scan task. It displays, the complete details like the "File Name", "Start Time" and "Directory" where the logs are stored.




<br/>
At the bottom end of this Log option page, two additional options are available, viz- refresh and clear all.


1. Refresh - displays the latest status
2. Clear All - clears/deletes all the logs.
3. View Log – the log/s created can be viewed.






<!--{| id="mp-bottombanner" style="width:100%; background:#fcfcfc; margin-top:1em; border:0px solid #ccc;"
Note:- Depending on the subscription, some of the listed items may be unavailable.
| style="width:56%; color:#000;" |
{|align="center" width="150px" |
|[[Image:product_logo.JPG|centre]]
|}
-->

Revision as of 10:29, 14 October 2010

File:Escan-g.jpg
· Articles  · FAQ  · Troubleshooting   · Technical Information - Main Page

This Scan option page enables you to scan the system areas, registry, services and startup, full computer or specific directories/files for viruses and other malicious programs.

  • This page has different options available, like –

A) Check memory, registry and services –

This option checks the system memory, registry and services that load at system startup /bootup for any infection from malwares.


B) Check computer –

This option checks the system local disks for any infection from malwares.


C) Check directories/files –

This option checks for the system's specific directories and files.

At the bottom end of this Scan page, an additional option is available, viz- start.

1. Start –

runs /executes the desired process like "check computer", "check directories/files", etc...

Other Options include -


D) Scheduler –

This option is used to set or assign a task of scanning. The option of "Add task" available at the below end of the "Scheduler" page enables the administrator/user to configure/set a scheduled task (scan), the requirements of which are as below -

1. Job -

Name of the scan task

a. If the program should start in the background or foreground b. If the program should quit if a virus infection is detected

2. Analysis extent –

What to scan

a. Check local hard drives b. Check for specific directories and files

3. Schedule –

When it should run /execute

a. When the program should run /execute i) Once, Hourly, Daily, Weekly, Monthly, With System Startup ii)Time

4. Virus Check –

Properties of the scan task

a. In the case of an infection - the default action set is to "Automatic", but can be set as per requirements. b. Priority of Scanner - the default action set is on "Normal", but can be set as per requirements. c. File types - the default action set is on "Automatic", but can be set as per requirements. d. Settings - these are the different ways of detecting an infection on the system's different objects and areas and they are as mentioned below:-

i) Heuristic: The system is checked for any suspicious activity/unusual sequence, pattern or behavior and when detected, the software takes the necessary action. ii) Packed Objects: Files that are zipped are scanned. iii) Prepare Log: A log of all the scanning activity is generated and maintained.This includes details of when the scan was run, infected file names along with the path and action taken. iv) Full Log: A full (detailed) log is maintained of the activities done by the scanner. v) Archived Objects: Files that are archived are scanned. vi) System Area: The system areas like the boot or partition sectors are scanned.

At the bottom end of this Scheduler option page, four additional options are available, viz- refresh, clear all, add new task, start now and edit.

1. Refresh - displays the latest status 2. Clear All - clears/deletes all the scheduled scans. 3. Add task - this enables to define a new task (scan). 4. Start now- this enables you to start the scan process manually. 5. Edit - this enables you to edit settings of the scan task defined.


E) Options –

This option helps in customizing the On Demand Scanner (ODS) using the below -

1) Virus Check -

a. In the case of an infection -

The default action set is to "Automatic", but can be set as per requirements.

b. Priority of Scanner -

The default action set is to "Normal", but can be set as per requirements.

c. File types -

The default action set is on "Automatic", but can be set as per requirements.

d. Settings -

These are the different ways of detecting an infection on the system's different objects and areas and they are as mentioned below:-

i) Heuristic:

The system is checked for any suspicious activity or behavior/unusual sequence, pattern and when detected the software takes the necessary action.

ii) Packed Objects: Files that are zipped are scanned.

iii) Check Memory: this option when enabled, would check the system's memory (ram).

iv) Archived Objects: Files that are archived are scanned.

v) System Area: The system areas like the boot or partition sectors are scanned.

vi) File size limit for scanning: this option helps to set the limit for scanning based on the size of the file (beyond which the scanner would not scan). By default, the limit is set to 5 MB.

vii) Calculate Analysis: this option calculates and displays the details of the analysis done and/or it displays after calculation the remainder(percentage) of the scan to be done.

viii) Send mail to admin if infection is found: this option helps in notifying the administrator of eScan or the network (designated) that an infection was detected on the system.


Other option:

1) Set to default:

This option will revert back to the original/default settings i.e. all the latest changes made to the eScan "Virus Check" option page would be lost.


2) Alert -

This option helps in alerting/notifying the user in the below said conditions -

a) Warn, if virus signature is more than -

This option is set as default. It notifies/alerts the user if the virus signature is more than 3 days old.

b) Warn, if the last computer analysis was more than -

This option is not set as default. It notifies/alerts the user if the last computer analysis done is more than 14 days old.

c) Log Settings -

A log of all the scanning activity is generated and maintained.This includes details of when the scan was run, infected file names along with the path and action taken.The path can be customized as per requirements.

d) Only infection to be logged:

The log would only have details of the infection and none other details.

e) Full Log:

A full (detailed) log is maintained of the activities done by the scanner.


3) Restrictions -

This option helps in speeding up the scan process and also in best utilizing the system's resources.

a. Delete infected files having these extentions - this is a list of file types that would be deleted if found infected by default. It can be customized as per requirement and also set to default.

b. Size Restrictions for files having these extentions - this is a list of file types that would not be scanned if the size exceeds the defined limit. It can be customized as per requirement and also set to default.

c. Scan Restrictions for files having these extentions - this is a list of file types that would not be scanned. It can be customized as per requirement and also set to default.


Other option:

1. Set to default: this option will revert back to the original/default settings i.e. all the latest changes made to the eScan "Virus Check" option page would be lost.

At the bottom end of this Options option page, two additional options are available, viz- refresh and save.

1. Refresh - displays the latest status 2. Save - saves all the settings done.


F) Logs -

This option enables you to check the logs created and maintained within the software after the completion of the defined scan task. It displays, the complete details like the "File Name", "Start Time" and "Directory" where the logs are stored.


At the bottom end of this Log option page, two additional options are available, viz- refresh and clear all.

1. Refresh - displays the latest status 2. Clear All - clears/deletes all the logs. 3. View Log – the log/s created can be viewed.


Note:- Depending on the subscription, some of the listed items may be unavailable.