Scan settings

Navigation:  Settings > AntiVirus > Automatic virus checks >

Scan settings

Previous pageReturn to chapter overviewNext page

This area allows you to define which settings should be used for the automatic virus check.

Use engines: The software works with two engines, in other words, two virus check programs that work essentially independent of each other. Every engine by itself would already provide you with a high degree of protection against viruses, but it is precisely the combination of both engines that gives the very best results. You can accelerate the virus check in older and slower computers by using just one engine, but normally you should keep the setting Both engines.

Infected files: Has your software detected a virus? In the standard setting, the software now asks you what you would like to do with the infected file. If you would always like to perform the same action, you can set this here. The highest protection for your data is offered here by the setting Disinfect (if not possible: place in quarantine).

Infected archive: Here you can determine whether archive files (e.g. files with the extension RAR, ZIP or PST) should be handled differently from normal files. However, please note that moving an archive to quarantine can damage it so that it can no longer be used after it is moved back.

Furthermore, you can click the button Advanced to specify which additional virus checks should be performed or omitted.

In most cases, however, it is completely sufficient to use the specified default settings.

File types: You can specify here which file types should be inspected by the software for viruses.

Heuristics: In the heuristic analysis, viruses are not only detected by the virus database, which you receive with every update of the software, but are also identified on the basis of particular characteristics typical of viruses. This method increases the level of security, but in rare cases may also generate a false alarm.

Check archive: Checking compressed data in archives (these can be recognised by file extensions such as ZIP, RAR or PST) is very time-consuming and can normally be omitted if the virus monitor is usually active on the system. The monitor can detect a previously hidden virus while the archive is being unzipped and can automatically prevent it from spreading.

Check email archives: Here you can specify whether your email archive is examined for infections as well.

Check system areas: In general, system areas (for example boot sectors) in your computer should not be excluded from virus checks.

Check for dialers / spyware / adware / riskware: You can also use this function to check your system for diallers and other malware (spyware, adware and riskware). These are e.g. programs that establish expensive, unwanted Internet connections, of which the potential for financial damage is no less significant than that of the virus. They may for example secretly record your surfing habits or even all the keyboard entries you make (including your passwords) and forward these to third parties via the Internet at the earliest opportunity.

Check for rootkits: Rootkits attempt to evade conventional virus detection methods. Additional monitoring for this malware is always advisable.

Generate log: By checking this box, you can specify that the software creates a log of the virus check process. This log can be viewed in the Logs area.