Configuring a Real-Time Scan

Real-time scanning constantly runs in the background, scanning all files as the system accesses them. The following features can be configured as follows:

Enable Real-Time Scan

To enable Real-time Scan, select the Enable Real-time scan check box.

Select Scan Directions

Real-time scan can detect viruses for incoming files and outgoing files.

You can scan incoming, or outgoing files by selecting the appropriate check box(es). Click Save to apply any changes.

File Types To Scan

There are three main options for this feature:

    1. Scan Trend Micro recommended extensions: This option takes advantage of the constantly updated extensions list embedded within the virus pattern file.

    2. Scan selected extensions: You can specify extensions from a list of extensions. To do so, do the following:

    1. Select the extension from the left list box.

    2. Click Add to add the extension to the File types to scan list

To remove previously excluded extensions, do the following:

    1. Select the extension from the right list box. See above for multiple selection instructions.

    2. Click Remove to clear the extension from the File types to scan list.

    1. Other extensions: Type custom file extensions in this text box. Use colons (:) or semicolons (;) to separate entries.

Compressed File Scanning Options

To enable compressed file scanning, do the following:

  1. Select Scan compressed files.

  2. Specify the number of compression layers to scan. The permitted values are from 1 to 20.

  3. Specify the maximum file size that is extracted for scanning. The minimum value you can set is 1-MB, while the maximum value is 2000-MB.

  4. The user may experience errors when storing files on the Trend Micro NAS Security™ device if a large number of compression layers to scan is specified or if the maximum file size specified is large.

Action When Security Risk Found

To configure:

  1. Decide whether to back up files before performing an action. To create copies of the files, select Back up file containing security risk before action is taken.

  2. Select an appropriate action from the following:

For viruses and other security risks you may also specify a secondary action, in the event that the clean action fails. Select the action in the drop-down list in the Second Action column. The secondary action is performed only if the first action performed is not successful.

The following table shows the default action for each type of threat when customized scan action is selected.

Threat Type

Default Action

Secondary Action
(if applicable)

Joke

quarantine

none

Trojan

quarantine

none

Virus

clean

quarantine

Test Virus

pass

none

Spyware/Grayware

quarantine

none

Packer

clean

quarantine

Other

clean

quarantine

 

Summary

These settings can be configured on the Real-Time Scan screen. On the left menu, click Scan Options > Real-Time Scan.

See also:

Configuring a Scheduled Scan

Configuring a Manual Scan

Performing a Manual Scan