Escan/polish/escan11/webprotection and Escan/english/escanmac5/scan: Difference between pages

From eScan Wiki
(Difference between pages)
Jump to navigation Jump to search
imported>Proav
 
imported>Webmktg
No edit summary
 
Line 1: Line 1:
<h2  id="mp-tfp-h2" style="margin:0; background:#C7E587; font-size:120%; font-weight:bold; border:10 solid #afa3bf; text-align:left; color:#000; padding:0.2em 0.4em">eScan Wersja 11 Pomoc Online</h2>
<!--<dynbox title="eScan 11 Offically Released" posx=XXpx posy=XXpx iconcolor="color" iconbgcolor="color" boxcolor="color" boxbgcolor="color" color="color" bgcolor="color">To Download please check Windows Downloads Section</dynbox>-->
{| class="wikitable" border="0"
{| class="wikitable" border="0"  
|-
|-
|width="1000pt"|
{| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;"
| style="width:10%; color:#000;" |
{| style="width:100px; border:none; background:none;"
| [[Image:escan-g.jpg]]
|}
|style="text-align:left;"|'''·''' [[Escan/english/FAQ-eScan|<font size=1.5 color="blue"
align="left">eScan</font>]]&nbsp;&nbsp;'''·''' [[Escan/english/MailScan-AFT|<font size=1.5
color="blue">MailScan</font>]]&nbsp;&nbsp;'''·''' [[Escan/english/Technologies|<font size=1.5
color="blue">Technologies</font>]]
|style="text-align:right;"|&nbsp;&nbsp;'''·''' [[Technical Info|<font size=1.5 color="blue">Technical
Info</font>]]&nbsp;&nbsp;'''·''' [[Escan/english/Security_Awareness|<font size=1.5 color="blue">Security
Awareness</font>]]&nbsp;&nbsp;'''·''' [[User_Guides|<font size=1.5 color="blue">User Guides</font>]]
|}
|}


<span class="plainlinks neverexpand"><div style="text-align: right;">[[Escan/polish/escan11|Wstecz]]</div></span><br/>
{| class="wikitable" border="0"  
 
|}
<U>'''Ochrona WWW '''</U>
<h2  id="mp-tfp-h2" style="margin:0; background:#95C33D; font-size:120%; font-weight:bold; border:10 solid #afa3bf; text-align:left; color:#000; padding:0.2em 0.4em">eScan Anti-Virus Security for Mac Version 5.x Online Help</h2>


Ta sekcja opisuje moduł Ochrony WWW oraz ustawienia, które są w niej dostępne.


__TOC__
== <h2><b>Scan</b></h2>==


__TOC__


=='''Opis'''==
The Scan module helps you to perform on-demand scanning on the selected files/directories, home directories, and my computer. Apart from system scanning, you can scan all the connected USB’s and CD-ROM devices, through auto and manual scan feature. You have various options to set for eScan to take action when any viruses are detected. The logs of scanning can be located at a specific location with a level of log you want to view. You can quarantine the suspected or infected files, and also perform real-time monitoring on files and reports.


Moduł ten wykorzystuje zaawansowane algorytmy oparte na występowaniu określonych wyrazów, fraz w zawartości witryny WWW. Ochrona WWW blokuje strony zawierające treści pornograficzne, obraźliwe materiały. Funkcja ta jest przydatna dla rodziców, ponieważ uniemożliwia dzieciom korzystanie ze stron, które zawierają szkodliwe treści. Administratorzy mogą również korzystać z tej funkcji, aby zablokować pracownikom dostęp do stron nie związanych z pracą. Moduł ten posiada zaawansowane funkcje raportowania witryn które zostały zablokowane przez ‘e Scan. Możemy między innymi przeglądać dzienniki log, konfigurować funkcję wyskakujących okienek (popup), tworzyć raporty.
Click this module, to access the scan screen. On the screen, you can configure the following settings:


&nbsp;
&nbsp;
[[Image:ochronawww.JPG|center]]
[[Image:Scan window.jpg|center]]
&nbsp;
&nbsp;


Po kliknięciu na ikonę Ochrona WWW, pojawia się okno, które wyświetla informacje o statusie modułu, opcjach konfiguracji, odnośniki do raportów oraz strony WWW, które zostały przeskanowane lub zablokowane przez moduł Ochrony WWW. To okno zawiera dwie sekcje:  
* <h3><b>Scan Options:</b></h3>
 
Poniżej opisane są dwie sekcje zawarte w Ochronie WWW: Konfiguracja oraz Raporty


=='''Konfiguracja'''==
::<li><h5><b>Scan My Computer:</b></h5> Click this link, if you want to scan the entire system.</li>
::<li><h5><b>Scan home directories:</b></h5> Click this link, if you want to scan all files and folders of home directories of the logged in&nbsp;user.</li>
::<li><h5><b>Custom Scan:</b></h5> Click this link, if you want to scan specific files/ directories.</li>
::<li><h5><b>Scan USB devices:</b></h5> Click this link, if you want to scan any specific USB storage devices like Pen drive, CD-ROM device, and so on. Automatic scanning of the USB storage devices, as and when it is connected and mounted, is always active by default.</li>


Sekcja ta dostarcza informacji o statusie modułu Ochrony WWW oraz Phishing Filter jak i o wybranym profilu użytkownika.
*<h3><b>Additional Options:</b></h3>


:'''Ta sekcja wyświetla następujące informacje'''.
::<li><h5><b>Options:</b></h5></li>


:''' ''Status Ochrony WWW''' –'' Pokazuje czy moduł jest włączony, czy nie.
This option helps you configure scan settings for virus detection.  
:''' ''Wybierz Profil Użytkownika''' –'' Pokazuje wybrany profil użytkownika.
:''' ''Status Filtra Phishin'gowego''' –'' Pokazuje czy ta opcja jest włączona, czy nie.


&nbsp;
&nbsp;
[[Image:ochronawwwconf.jpg|center]]
[[Image:Options .jpg|center]]
&nbsp;
&nbsp;


Dodatkowo można skonfigurować następujące ustawienia.
<ol>
 
<li>On the <b>Options</b> tab, specify the following field details.</li>
:'''''Start/Stop''''' – Ten odnośnik pozwala włączyć lub wyłączyć moduł Ochrony WWW. Możemy w prosty sposób przełączyć moduł, aby był włączony klikając odnośnik Start i na odwrót.
:'''''wyłącz Phishing Filter''''' – Ten odnośnik pozwala włączyć lub wyłączyć filtr phishing'owy. Możemy w prosty sposób przełączyć go aby był włączony klikając odnośnik Włącz i na odwrót.
:'''''Ustawienia''''' – Ten odnośnik otwiera okno z ustawieniami Ochrony WWW, które pomoże skonfigurować ten moduł dla monitorowania ruchu w sieci.
 
'''Okno ustawień Ochrony WWW'''


:Pokazuje listę wszystkich stworzonych użytkowników na komputerze..


&nbsp;
{| id="table1" style="border-collapse: collapse; border-color: #000000; padding: 1px" width="110%" border="1" cellspacing="1"
[[Image:ustawieniaochronywww.jpg|center]]
|- bgcolor="#ffffff" valign="center"
&nbsp;
| style="border-style: solid; border:"1"; border-width: 1px" width="30%" height="25" bgcolor="#D0E7F6" align="left" |
   
<font face="Arial">'''Field'''</font>  
| style="border-style: solid; border:"1"; border-width: 1px" width="200" bgcolor="#D0E7F6" align="left" |
<font face="Arial">'''Description'''</font>
|- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial">'''Action in case of virus detection'''</font>
| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" |It indicates a type of action which you want eScan real-time scanner to take, in case of virus detection.
By default, Disinfect (if not possible, quarantine file) option is selected. Following are the types of actions:


:Okno to pokazuje także dodatkowe opcje.
• <b>Log Only:</b> It indicates the log that logs information of only the infected object.


'''I. Uruchom/Wyłącz – '''Ten odnośnik pomoże aktywować, lub dezaktywować zaznaczony profil użytkownika. Aby aktywować dany profil należy należy zaznaczyć nazwę użytkownika i kliknąć Start. Ochrona WWW będzie działała zgodnie z wytycznymi, jakie zostały określone dla tego profilu.
• <b>Disinfect (if not possible, log):</b> It tries to disinfect and if disinfection is not possible it logs the information of only the infected object.
'''II. Wybierz Profil – ''' Ta lista pokazuje cztery podstawowe opcje dostępne w eScan, opisane poniżej:


:# '''Dziecko – ''' You should select this profile if you need to block all Web sites except the ones that are present in the whitelist. MicroWorld recommends this profile for children up to the age of 10.
• <b>Disinfect (if not possible, delete file):</b> It tries to disinfect and if disinfection is not possible it deletes the infected object.
:# '''Nastolatek – ''' – należy wybrać ten profil, jeśli chcemy zablokować strony dodane do czarnej listy. Dzięki tej opcji możemy włączyć filtry stron WWW, filtry domen. Profil korzysta domyślnie z nazw stron, wszystkich apletów Java i skryptów ActiveX z wyjątkiem tych zdefiniowanych w liście.
Ten profil jest najlepszy dla dzieci w wieku od 11 do 15.
:# '''Młodzież – ''' Należy wybrać ten profil, aby zablokować strony dodane do czarnej listy i aktywować inne filtry (stron WWW, domen). Ten profil działa najlepiej w przedziale wiekowym 15-18 lat. Domyślny status filtrów jest aktywny.
:# '''Dorosły – ''' ten profil zezwala na cały ruch w sieci z wyjątkiem pozycji dodanych do czarnej listy. Domyślnie status filtrów jest aktywny.


'''III. Opis profilu – ''' Ten odnośnik otwiera okno, które dostarcza informacje na temat każdego rodzaju profilu..
• <b>Disinfect (if not possible, quarantine file):</b> It tries to disinfect and if disinfection is not possible it quarantines the infected object.
'''IV. Edytuj Profil – ''' Ten odnośnik otwiera okno, które pomoże dostosować poniższe ustawienia dla wybranego użytkownika.


• <b>Disinfect (if not possible, rename file):</b> It tries to disinfect and if disinfection is not possible it renames the infected object.


'''Okno Ochrona WWW'''
• <b>Disinfect (if not possible, ask user):</b> It tries to disinfect and if disinfection is not possible it asks user to take an action on the infected object.


:Okno to pozwala na ustalenie następujących ustawień dla wybranego użytkownika.
• <b>Delete:</b> It directly deletes the infected object.


:'''I) Opcje Filtrowania ''' Zakładka ta umożliwia zdefiniowanie kategorii, które pozwolą na kontrolę do dostępnych treści w internecie.
• <b>Quarantine:</b> It directly quarantines the infected object.
&nbsp;
[[Image:opcjefiltrowania.png|center]]
&nbsp;


:'''Sekcja Stan: ''' ta sekcja zezwala lub blokuje dostęp do określonej witryny WWW w oparciu o filtr.  
• <b>Rename:</b> It directly renames the infected object.


::* '''Aktywny: '''Blokuje wszystkie witryny WWW wymienione na liście filtrowania.
• <b>Ask user:</b> It asks user to take an action on the infected object.
::* ''' Zablokuj dostęp WWW : '''Blokuje wszystkie strony WWW z wyjątkiem tych, które zostały wymienione na liście filtrowania.


:'''Kategorie filtrowania:''' Ta sekcja obejmuje następujące kolory dla dozwolonych i blokowanych witryn WWW.  
Select an appropriate option from the box.
|- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300"  colspan = "3" align="left" | <font face="Arial">'''Scan Settings'''</font>
|- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300" align="left" valign=top | <font face="Arial"> '''Include Sub-directory'''</font>
| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" |It indicates the archived files, such as zip, rar, and so on.
Select this check box if you want eScan real-time protection to scan archived files.
|- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300"  align="left" valign=top | <font face="Arial"> '''Mails'''</font>
| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" | It indicates the compressed executables.
By default, it is selected. Select this check box if you want eScan real-time protection to scan packed files.
|- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300"  align="left" valign=top | <font face="Arial"> '''Heuristic'''</font>
| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" |
Select this check box if you want eScan real-time protection to exclude directories and files from scanning.
Click the [[Image:Exclude icon.jpg]] icon and then click the Browse button to select the directories and files that you want to exclude.
|- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300"  align="left" valign=top | <font face="Arial"> '''Cross file system'''</font>
| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" |
Select this check box if you want eScan real-time protection to exclude specific files.
Click the [[Image:Exclude icon.jpg]] icon and then click the Browse button to select the directories and files that you want to exclude.
|- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300"  align="left" valign=top | <font face="Arial"> '''Archives'''</font>
| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" | It indicates the archived files, such as zip, rar, and so on.
Select this check box if you want eScan real-time protection to scan archived files.
|- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300"  align="left" valign=top | <font face="Arial"> '''Packed'''</font>
| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" |It indicates the compressed executables.
By default, it is selected. Select this check box if you want eScan real-time protection to scan packed files.
|- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300"  align="left" valign=top | <font face="Arial"> '''Follow symbolic links'''</font>
| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" | It indicates the symbolic links that allows you to access one file from another through links. This option specifies the on-demand scanner whether to resolve the symbolic link before actually scanning the object or to skip any such links.
Select this check box if you want to follow symbolic links.
|- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300"  colspan = "3" align="left" | <font face="Arial">'''Log Settings'''</font>
|- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300"  align="left" valign=top | <font face="Arial"> '''Log location'''</font>
| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" | It indicates the location where you want eScan real-time scanner to save the log file.
By default, /var/MicroWorld/var/log location appears. If you want you can change the location.
Click the [[Image:Browse icon.jpg]] button and then click the Browse button to select the folder where you want to save the log file.
|- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300"  colspan = "3" align="left" | <font face="Arial">'''Log Settings'''</font>
|- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300"  align="left" valign=top | <font face="Arial"> '''Log location'''</font>
| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" | It indicates the location where you want eScan real-time scanner to save the log file.
By default, /var/MicroWorld/var/log location appears. If you want you can change the location.
Click the [[Image:Browse icon.jpg]] button and then click the Browse button to select the folder where you want to save the log file.
|- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300"  align="left" valign=top | <font face="Arial"> '''Log level'''</font>
| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" | It indicates a type of log level which you want eScan real-time protection to display. Following are the type of log level:
By default, infected is selected.
• <b>All:</b> This option will specify a detailed eScan log.
• <b>Infected:</b> This option will specify only details of the infected objects in the eScan log.
• <b>Minimum:</b> This option will specify only a minimum detail of the objects scanned in the eScan log.
Click an appropriate option.
|- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300"  colspan = "3" align="left" | <font face="Arial">'''Exclude Options'''</font>
|- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300"  align="left" valign=top | <font face="Arial"> '''Files and directories'''</font>
| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" | Click the [[Image:Exclude icon.jpg]] icon and then click the Browse button to select the files and directories that you want to exclude from real-time scanning.
|- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300"  align="left" valign=top | <font face="Arial"> '''File types'''</font>
| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" |
Click the [[Image:Exclude icon.jpg]] icon and then click the Browse button to select the file types  that you want to exclude from real-time scanning.
|- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300"  align="left" valign=top | <font face="Arial"> '''Block USB storage device(s)'''</font>
| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" |
Select this check box, if you want to block all connected USB’s and CD-ROM storage devices from real-time scanning.
|- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300"  align="left" valign=top | <font face="Arial"> '''Restore global settings'''</font>
| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" |
It indicates the settings of an administrator. It is available only for normal user.
Click this link, if you want to restore global settings.
|- bgcolor="#ffffff"
| style="border-style: solid; border:"1"; border-width: 1px" width="300"  align="left" valign=top | <font face="Arial"> '''Set to default'''</font>
| style="border-style: solid; border:"1"; border-width: 1px" width="336" align="left" valign="center" |
It indicates the default settings set at first time installation.
Click this link to set the default settings.  
|}


::1. <B><font color="GREEN"> '''ZIELONY''' </font></B>. Dozwolona strona WWW
<li>Click the <b>Save</b> button.</li>
::2. <B><font color="red"> '''CZERWONY''' </font></B>. Zablokowana strona WWW
The settings get saved.
</ol>


:Lista filtrowania zawiera strony o tematyce: pornografia, hazard, czat, alkohol, przemoc, narkotyki. Możemy dodawać lub usuwać pozycje na liście w zależności od potrzeb. Należy nacisnąć na jeden z dwóch przycisków:
::<li><h5><b>Logs:</b></h5></li>


::::*'''Dodaj''' - Dodaje pozycje na liście filtrowania.
::Click this link, if you want to view and delete the scan log. It displays log list of the scanned files      with file name, date, and file size.
::::*'''Usuń''' - Usuwa pozycje na liście filtrowania.


:'''Kategoria: [Nazwa Kategorii]:''' Ta sekcja przedstawia następujące informacje:
&nbsp;
[[Image:Log window.jpg|center]]
&nbsp;


::* ''' Wyrazy / Frazy - ''' Ta lista przedstawia słowa lub frazy w wybranej kategorii.
::<li><h5><b>Quarantined:</b></h5></li>
::* ''' Nazway Stron - ''' ta lista pokazuje nazwy stron internetowych znajdujących się na liście Możemy
również dodać lub usunąć pozycje w zależności od potrzeb.


::::*'''Dodaj''' - Dodaje nazwę: strony WWW, frazy, słowa do listy.
::Click this link, if you want to view and delete the infected files. It displays the list of infected files that have been quarantined with file name, date, file size, and virus name. It also displays the path where quarantined files are saved with number of quarantined files.
::::*'''Usuń''' - Usuwa nazwę strony WWW z listy.
::::*'''Zapisz''' - Zapisuje zmianę w danej kategorii.


:'''Ustawienia filtra:'''  Ta sekcja zawiera opcje konfiguracji filtrów dla witryn WWW
&nbsp;
[[Image:Quarantined window.jpg|center]]
&nbsp;


::* '''Dodaj strony zatrzymane przez filtr do kategorii Zablokuj - ''' e Scan automatycznie dodaje strony WWW, które mają dostęp do odpowiednich kategorii na liście.
::<li><h5><b>Monitor:</b></h5></li>


:'''II) Opcje Skanowania - ''' Ta zakładka dopasowuje zawartość stron WWW oraz blokuje obrazy, formaty ActiveX, części mediów i aplikacji przed pojawieniem się w przeglądarce.
::By default, real-time monitoring starts after you add a license key. This link is available only for an administrator. Click this link, if you want to configure settings for real-time monitor. You can enable or disable eScan monitor and set the action you want eScan to take when any virus is detected. eScan provides automatic eScan virus alert pop-ups, whenever any viruses are detected by eScan monitor, provided monitor is in On mode.


&nbsp;
&nbsp;
[[Image:opcjeskanowaniawww.png|center]]
[[Image:Monitor window.jpg|center]]
&nbsp;
&nbsp;
::'''Content Matching Options ''' This section allows you to configure the settings for controlling and blocking access to Internet, based on different criteria.
:::#'''Search in Site Name''' - You should select this check box if you need Web Protection to check whether the name of the Web site or its URL contains any reserved word or phrase listed in any of the restricted or blocked categories.

Revision as of 08:50, 30 July 2012

File:Escan-g.jpg
· eScan  · MailScan  · Technologies   · Technical Info  · Security Awareness  · User Guides

eScan Anti-Virus Security for Mac Version 5.x Online Help


Scan

The Scan module helps you to perform on-demand scanning on the selected files/directories, home directories, and my computer. Apart from system scanning, you can scan all the connected USB’s and CD-ROM devices, through auto and manual scan feature. You have various options to set for eScan to take action when any viruses are detected. The logs of scanning can be located at a specific location with a level of log you want to view. You can quarantine the suspected or infected files, and also perform real-time monitoring on files and reports.

Click this module, to access the scan screen. On the screen, you can configure the following settings:

 

File:Scan window.jpg

 

  • Scan Options:

  • Scan My Computer:
    Click this link, if you want to scan the entire system.
  • Scan home directories:
    Click this link, if you want to scan all files and folders of home directories of the logged in user.
  • Custom Scan:
    Click this link, if you want to scan specific files/ directories.
  • Scan USB devices:
    Click this link, if you want to scan any specific USB storage devices like Pen drive, CD-ROM device, and so on. Automatic scanning of the USB storage devices, as and when it is connected and mounted, is always active by default.
    • Additional Options:

  • Options:
  • This option helps you configure scan settings for virus detection.

     

    File:Options .jpg

     

    1. On the Options tab, specify the following field details.
    2. Field

      Description

      Action in case of virus detection It indicates a type of action which you want eScan real-time scanner to take, in case of virus detection.

      By default, Disinfect (if not possible, quarantine file) option is selected. Following are the types of actions:

      Log Only: It indicates the log that logs information of only the infected object.

      Disinfect (if not possible, log): It tries to disinfect and if disinfection is not possible it logs the information of only the infected object.

      Disinfect (if not possible, delete file): It tries to disinfect and if disinfection is not possible it deletes the infected object.

      Disinfect (if not possible, quarantine file): It tries to disinfect and if disinfection is not possible it quarantines the infected object.

      Disinfect (if not possible, rename file): It tries to disinfect and if disinfection is not possible it renames the infected object.

      Disinfect (if not possible, ask user): It tries to disinfect and if disinfection is not possible it asks user to take an action on the infected object.

      Delete: It directly deletes the infected object.

      Quarantine: It directly quarantines the infected object.

      Rename: It directly renames the infected object.

      Ask user: It asks user to take an action on the infected object.

      Select an appropriate option from the box.

      Scan Settings
      Include Sub-directory It indicates the archived files, such as zip, rar, and so on.

      Select this check box if you want eScan real-time protection to scan archived files.

      Mails It indicates the compressed executables.

      By default, it is selected. Select this check box if you want eScan real-time protection to scan packed files.

      Heuristic

      Select this check box if you want eScan real-time protection to exclude directories and files from scanning. Click the File:Exclude icon.jpg icon and then click the Browse button to select the directories and files that you want to exclude.

      Cross file system

      Select this check box if you want eScan real-time protection to exclude specific files. Click the File:Exclude icon.jpg icon and then click the Browse button to select the directories and files that you want to exclude.

      Archives It indicates the archived files, such as zip, rar, and so on.

      Select this check box if you want eScan real-time protection to scan archived files.

      Packed It indicates the compressed executables.

      By default, it is selected. Select this check box if you want eScan real-time protection to scan packed files.

      Follow symbolic links It indicates the symbolic links that allows you to access one file from another through links. This option specifies the on-demand scanner whether to resolve the symbolic link before actually scanning the object or to skip any such links.

      Select this check box if you want to follow symbolic links.

      Log Settings
      Log location It indicates the location where you want eScan real-time scanner to save the log file.

      By default, /var/MicroWorld/var/log location appears. If you want you can change the location. Click the File:Browse icon.jpg button and then click the Browse button to select the folder where you want to save the log file.

      Log Settings
      Log location It indicates the location where you want eScan real-time scanner to save the log file.

      By default, /var/MicroWorld/var/log location appears. If you want you can change the location. Click the File:Browse icon.jpg button and then click the Browse button to select the folder where you want to save the log file.

      Log level It indicates a type of log level which you want eScan real-time protection to display. Following are the type of log level:

      By default, infected is selected. • All: This option will specify a detailed eScan log. • Infected: This option will specify only details of the infected objects in the eScan log. • Minimum: This option will specify only a minimum detail of the objects scanned in the eScan log. Click an appropriate option.

      Exclude Options
      Files and directories Click the File:Exclude icon.jpg icon and then click the Browse button to select the files and directories that you want to exclude from real-time scanning.
      File types

      Click the File:Exclude icon.jpg icon and then click the Browse button to select the file types that you want to exclude from real-time scanning.

      Block USB storage device(s)

      Select this check box, if you want to block all connected USB’s and CD-ROM storage devices from real-time scanning.

      Restore global settings

      It indicates the settings of an administrator. It is available only for normal user. Click this link, if you want to restore global settings.

      Set to default

      It indicates the default settings set at first time installation. Click this link to set the default settings.

    3. Click the Save button.
    4. The settings get saved.
  • Logs:
  • Click this link, if you want to view and delete the scan log. It displays log list of the scanned files with file name, date, and file size.

     

    File:Log window.jpg

     

  • Quarantined:
  • Click this link, if you want to view and delete the infected files. It displays the list of infected files that have been quarantined with file name, date, file size, and virus name. It also displays the path where quarantined files are saved with number of quarantined files.

     

    File:Quarantined window.jpg

     

  • Monitor:
  • By default, real-time monitoring starts after you add a license key. This link is available only for an administrator. Click this link, if you want to configure settings for real-time monitor. You can enable or disable eScan monitor and set the action you want eScan to take when any virus is detected. eScan provides automatic eScan virus alert pop-ups, whenever any viruses are detected by eScan monitor, provided monitor is in On mode.

     

    File:Monitor window.jpg