Scan and Update: Difference between pages

From eScan Wiki
(Difference between pages)
Jump to navigation Jump to search
No edit summary
 
mNo edit summary
 
Line 1: Line 1:
This option helps in correctly configuring the updater modules of eScan so that the AntiVirus Definitions are downloaded and applied to the software. The eScan Updater can be set by clicking on the “Settings” option. The option pages available within are "General Config", "After Update" and "Scheduling".


{| class="wikitable" border="0"
'''A) General Config:-'''
|}


{| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;"
This is the configuration page through which you can configure the updater to download the updates.  
| style="width:10%; color:#000;" |
{| style="width:100px; border:none; background:none;"
| [[Image:escan-g.jpg]]
|}
|style="text-align:left;"|'''·''' [[Escan/english/eScan-Articles|<font size=1.5 color="blue" align="left">Articles</font>]]&nbsp;&nbsp;'''·''' [[Escan/english/eScan-FAQ|<font size=1.5 color="blue">FAQ</font>]]&nbsp;&nbsp;'''·''' [[Escan/english/eScan-Troubleshooting|<font size=1.5 color="blue">Troubleshooting</font>]]
|style="text-align:right;"|&nbsp;&nbsp;'''·''' [[Technical Info|<font size=1.5 color="blue">Technical Information - Main Page</font>]]
|}


{| class="wikitable" border="0"
1. Select Mode of download –
|}


This Scan option page enables you to scan the system areas, registry, services and startup, full computer or specific directories/files for viruses and other malicious programs.
This helps in defining the mode of how the updates would be downloaded


* This page has different options available, like –
a. FTP - this is the File Transfer Protocol (FTP) method of downloading the updates.
When selected, the same has to be configured as explained below:-


'''A) Check memory, registry and services –'''
i) FTP Proxy Server details - the Ftp Proxy Server IP Address and Port have to be defined, using which the updates would be download.


This option checks the system memory, registry and services that load at system startup /bootup for any infection from malwares.  
ii) Login name - if the FTP Proxy Server requires authentication then the necessary valid credentials need to be provided, like the login name.  


iii) Password - if the FTP Proxy Server requires authentication then the necessary valid credentials need to be provided, like the password.


iv) Logon Type - the FTP server that is going to be used for downloading the updates may require additional configuration settings by which it authenticates the login. There are different logon types as explained below:-


'''B) Check computer –'''
v) User@siteaddress - This is the format the proxy server requires the logon to be in.


This option checks the system local disks for any infection from malwares.  
vi) OPEN siteaddress: This is the format the proxy server requires the logon to be in.  


vii) PASV Mode: This is the format the proxy server requires the logon to be in.


When a system connects to a proxy server, the proxy server may filter unwanted data and access may not be granted. By using the passive or PASV mode, the server opens a random port, not secured by the proxy and allows it to connect.


'''C) Check directories/files –'''
viii) Socks: This is the format the proxy server requires the logon to be in. The version specific numbers like 4, 4A, 5 can be selected from the list box provided only when the Socks option is selected.


This option checks for the system's specific directories and files.  
b. HTTP - this is the Hyper Text Transfer Protocol (HTTP) method of downloading the updates.  


At the bottom end of this Scan page, an additional option is available, viz- start.
When selected, the same has to be configured as explained below:-


1. Start –
i) HTTP Proxy Server IP and Port - the Http Proxy Server IP Address and Port have to be defined, using which the updates would be download.  


runs /executes the desired process like "check computer", "check directories/files", etc...  
ii) Login name - if the HTTP Proxy Server requires authentication then the valid credentials need to be provided, like the login name.  


Other Options include -
iii) Password - if the HTTP Proxy Server requires authentication then the valid credentials need to be provided, like the password.


c. Network - this is the Network method of downloading the updates (Universal Naming Convention).


When selected, the same has to be configured as explained below:-


'''D) Scheduler '''
i. Source UNC Path –  


This option is used to set or assign a task of scanning. The option of "Add task" available at the below end of the "Scheduler" page enables the administrator/user to configure/set a scheduled task (scan), the requirements of which are as below -  
This option is available at the bottom end of the “General Config” page.
The name and path to the shared drive and directory of the main (primary) server needs to be provided in this field, i.e. the server system (share details) where all the antivirus updates are downloaded first. For example - \\abc\c\pub\update.


1. Job -


Name of the scan task


a. If the program should start in the background or foreground
b. If the program should quit if a virus infection is detected


2. Analysis extent –


What to scan


a. Check local hard drives
b. Check for specific directories and files


3. Schedule –
'''B) After Update -'''


When it should run /execute
This is the configuration page through which you can configure what has to be run /executed after an update is downloaded.


a. When the program should run /execute
1) Execute this program after downloading the updates -
i) Once, Hourly, Daily, Weekly, Monthly, With System Startup ii)Time


4. Virus Check –
This is an option provided among many others that helps in case there is a need to run /execute a particular application /program after a successful download of the updates is over.


Properties of the scan task
2) After downloading the updates, make a Virus List –
This option automatically creates a virus list after a successful download of the updates is over. 


a. In the case of an infection - the default action set is to "Automatic", but can be set as per requirements.
3) Update Notification -
b. Priority of Scanner - the default action set is on "Normal", but can be set as per requirements.
c. File types - the default action set is on "Automatic", but can be set as per requirements.
d. Settings - these are the different ways of detecting an infection on the system's different objects and areas and they are as mentioned below:-  


i) Heuristic: The system is checked for any suspicious activity/unusual sequence, pattern or behavior and when detected, the software takes the necessary action.
This option when enabled helps to send an email notification /alert to the email address specified in the "TO" field of the "Update Notification" option.  
ii) Packed Objects: Files that are zipped are scanned.
iii) Prepare Log: A log of all the scanning activity is generated and maintained.This includes details of when the scan was run, infected file names along with the path and action taken.
iv) Full Log: A full (detailed) log is maintained of the activities done by the scanner.
v) Archived Objects: Files that are archived are scanned.
vi) System Area: The system areas like the boot or partition sectors are scanned.  


At the bottom end of this Scheduler option page, four additional options are available, viz- refresh, clear all, add new task, start now and edit.


1. Refresh - displays the latest status
2. Clear All - clears/deletes all the scheduled scans.
3. Add task - this enables to define a new task (scan).
4. Start now- this enables you to start the scan process manually.
5. Edit - this enables you to edit settings of the scan task defined.




'''C) Scheduling –'''


'''E) Options –'''
This is the scheduler which automatically polls /queries to the internet and downloads the latest updates. The time interval can be set as per requirement (the time is set in minutes) after which it would automatically download the latest updates. The default time interval set is to 60, alternatively the download, can also be scheduled.


This option helps in customizing the On Demand Scanner (ODS) using the below -
At the bottom end of this Update option page, there is a “Reports” section, in which “View Log” option is available. This option when clicked on displays the full log (with the latest status) of the downloader.
 
1) Virus Check -
 
a. In the case of an infection -
 
The default action set is to "Automatic", but can be set as per requirements.
 
b. Priority of Scanner -
 
The default action set is to "Normal", but can be set as per requirements.
 
c. File types -
 
The default action set is on "Automatic", but can be set as per requirements.
 
d. Settings -
 
These are the different ways of detecting an infection on the system's different objects and areas and they are as mentioned below:-
 
i) Heuristic:
 
The system is checked for any suspicious activity or behavior/unusual sequence, pattern and when detected the software takes the necessary action.
 
ii) Packed Objects: Files that are zipped are scanned.
 
iii) Check Memory: this option when enabled, would check the system's memory (ram).
 
iv) Archived Objects: Files that are archived are scanned.
 
v) System Area: The system areas like the boot or partition sectors are scanned.
 
vi) File size limit for scanning: this option helps to set the limit for scanning based on the size of the file (beyond which the scanner would not scan). By default, the limit is set to 5 MB.
 
vii) Calculate Analysis: this option calculates and displays the details of the analysis done and/or it displays after calculation the remainder(percentage) of the scan to be done.
 
viii) Send mail to admin if infection is found: this option helps in notifying the administrator of eScan or the network (designated) that an infection was detected on the system.
 
 
Other option:
 
1) Set to default:
 
This option will revert back to the original/default settings i.e. all the latest changes made to the eScan "Virus Check" option page would be lost.
 
 
2) Alert -
 
This option helps in alerting/notifying the user in the below said conditions -
 
a) Warn, if virus signature is more than -
 
This option is set as default. It notifies/alerts the user if the virus signature is more than 3 days old.  
 
b) Warn, if the last computer analysis was more than -
 
This option is not set as default. It notifies/alerts the user if the last computer analysis done is more than 14 days old.
 
c) Log Settings -
 
A log of all the scanning activity is generated and maintained.This includes details of when the scan was run, infected file names along with the path and action taken.The path can be customized as per requirements.
 
d) Only infection to be logged:
 
The log would only have details of the infection and none other details.
 
e) Full Log:
 
A full (detailed) log is maintained of the activities done by the scanner.
 
 
3) Restrictions -
 
This option helps in speeding up the scan process and also in best utilizing the system's resources.
 
a. Delete infected files having these extentions - this is a list of file types that would be deleted if found infected by default. It can be customized as per requirement and also set to default.
 
b. Size Restrictions for files having these extentions - this is a list of file types that would not be scanned if the size exceeds the defined limit. It can be customized as per requirement and also set to default.
c. Scan Restrictions for files having these extentions - this is a list of file types that would not be scanned. It can be customized as per requirement and also set to default.
 
 
Other option:
 
1. Set to default: this option will revert back to the original/default settings i.e. all the latest changes made to the eScan "Virus Check" option page would be lost.
 
At the bottom end of this Options option page, two additional options are available, viz- refresh and save.
 
1. Refresh - displays the latest status  
2. Save - saves all the settings done.
 
 
 
'''F) Logs -'''
 
This option enables you to check the logs created and maintained within the software after the completion of the defined scan task. It displays, the complete details like the "File Name", "Start Time" and "Directory" where the logs are stored.
 
 
At the bottom end of this Log option page, two additional options are available, viz- refresh and clear all.
 
1. Refresh - displays the latest status
2. Clear All - clears/deletes all the logs.
3. View Log – the log/s created can be viewed.






Note:- Depending on the subscription, some of the listed items may be unavailable.
Note:- Depending on the subscription, some of the listed items may be unavailable.

Revision as of 12:48, 30 August 2008

This option helps in correctly configuring the updater modules of eScan so that the AntiVirus Definitions are downloaded and applied to the software. The eScan Updater can be set by clicking on the “Settings” option. The option pages available within are "General Config", "After Update" and "Scheduling".

A) General Config:-

This is the configuration page through which you can configure the updater to download the updates.

1. Select Mode of download –

This helps in defining the mode of how the updates would be downloaded

a. FTP - this is the File Transfer Protocol (FTP) method of downloading the updates. When selected, the same has to be configured as explained below:-

i) FTP Proxy Server details - the Ftp Proxy Server IP Address and Port have to be defined, using which the updates would be download.

ii) Login name - if the FTP Proxy Server requires authentication then the necessary valid credentials need to be provided, like the login name.

iii) Password - if the FTP Proxy Server requires authentication then the necessary valid credentials need to be provided, like the password.

iv) Logon Type - the FTP server that is going to be used for downloading the updates may require additional configuration settings by which it authenticates the login. There are different logon types as explained below:-

v) User@siteaddress - This is the format the proxy server requires the logon to be in.

vi) OPEN siteaddress: This is the format the proxy server requires the logon to be in.

vii) PASV Mode: This is the format the proxy server requires the logon to be in.

When a system connects to a proxy server, the proxy server may filter unwanted data and access may not be granted. By using the passive or PASV mode, the server opens a random port, not secured by the proxy and allows it to connect.

viii) Socks: This is the format the proxy server requires the logon to be in. The version specific numbers like 4, 4A, 5 can be selected from the list box provided only when the Socks option is selected.

b. HTTP - this is the Hyper Text Transfer Protocol (HTTP) method of downloading the updates.

When selected, the same has to be configured as explained below:-

i) HTTP Proxy Server IP and Port - the Http Proxy Server IP Address and Port have to be defined, using which the updates would be download.

ii) Login name - if the HTTP Proxy Server requires authentication then the valid credentials need to be provided, like the login name.

iii) Password - if the HTTP Proxy Server requires authentication then the valid credentials need to be provided, like the password.

c. Network - this is the Network method of downloading the updates (Universal Naming Convention).

When selected, the same has to be configured as explained below:-

i. Source UNC Path –

This option is available at the bottom end of the “General Config” page. The name and path to the shared drive and directory of the main (primary) server needs to be provided in this field, i.e. the server system (share details) where all the antivirus updates are downloaded first. For example - \\abc\c\pub\update.




B) After Update -

This is the configuration page through which you can configure what has to be run /executed after an update is downloaded.

1) Execute this program after downloading the updates -

This is an option provided among many others that helps in case there is a need to run /execute a particular application /program after a successful download of the updates is over.

2) After downloading the updates, make a Virus List – This option automatically creates a virus list after a successful download of the updates is over.

3) Update Notification -

This option when enabled helps to send an email notification /alert to the email address specified in the "TO" field of the "Update Notification" option.



C) Scheduling –

This is the scheduler which automatically polls /queries to the internet and downloads the latest updates. The time interval can be set as per requirement (the time is set in minutes) after which it would automatically download the latest updates. The default time interval set is to 60, alternatively the download, can also be scheduled.

At the bottom end of this Update option page, there is a “Reports” section, in which “View Log” option is available. This option when clicked on displays the full log (with the latest status) of the downloader.


Note:- Depending on the subscription, some of the listed items may be unavailable.