Monitor

Navigation:  Settings > AntiVirus >

Monitor

Previous pageReturn to chapter overviewNext page

The following setting options exist in the Options dialogue in the virus monitor: Changes only need to be made here in the event of exceptions occurring:

Monitor status: Specify here whether the monitor should be enabled or disabled.

Use engines: The software works with two engines, which are two essentially independent virus checking programs. Every engine by itself would already provide you with a high degree of protection against viruses, but it is precisely the combination of both engines that gives the very best results. You can accelerate the virus check in older and slower computers by using just one engine, but normally you should keep the setting Both engines.

Infected files: If a virus is detected, you will be asked in the default setting how you want to deal with the virus and the infected file. If you would always like to perform the same action, you can set this here. The highest protection for your data is offered here by the setting Disinfect (if not possible: place in quarantine).

Infected archive: Here you can determine whether archive files (e.g. files with the extension RAR, ZIP or PST) should be handled differently from normal files. However, please note that moving an archive to quarantine can damage it so that it can no longer be used after it is moved back.

System protection: If behaviour monitoring is enabled, every activity on the system is monitored regardless of the virus monitor. This means that malware for which no signature yet exists is also detected.

Exceptions

By clicking on the Exceptions button you can exclude specific drives, directories and files from the scan and so significantly accelerate parts of the virus detection process. To do this, proceed as follows:

1

Click on the Exceptions button.

2

Click New in the Monitor exceptions window.

3

Now select whether you want to exclude a drive, a directory, or a file or file type.

4

Underneath this, select the directory or drive you want to protect. In order to protect files, enter the complete file name in the entry field under file mask. You can also work with wildcards here.

 

The Wildcards function works as follows:

The question mark symbol (?) represents individual characters.

The asterisk symbol (*) represents entire character strings.

For instance, in order to protect all files with the file extension .sav, enter *.sav. In order to protect a special selection of files with sequential file names (e.g., text1.doc, text2.doc, text3.doc), enter text?.doc for example.

You can repeat this procedure as often as desired and also delete or modify the existing exceptions.

Advanced

Furthermore, you can click the button Advanced to specify which additional tests should be performed by the virus monitor. Normally you do not have to enter any more settings here.

Mode: Here you can specify whether files should be checked when run, when read or when written to and read. If a file is checked when written to, the check is carried out as soon as a new file or file version is created to see if an unknown process may have infected this file. Otherwise files are only checked when they are read by programs.

Check network access: If your computer has a network connection to unprotected computers (for example, other laptops), it is a good idea to check the network accesses to see if any malicious programs are being transferred. If you use your computer as a stand-alone computer without network access, you don't need to enable this option. If you have installed virus protection on each computer in the network, it is recommended that you turn off this option. Otherwise, some files will be checked twice, which negatively affects speed.

Heuristics: In the heuristical analysis, viruses are not only detected by means of virus updates that you regularly receive from us online, but are also identified on the basis of certain characteristics typical of viruses. This method increases the level of security, but in rare cases may also generate a false alarm.

Check archive: Checking compressed data in archives (these can be recognised by file extensions such as ZIP, RAR or PST) is very time-consuming and can normally be omitted if the virus monitor is usually active on the system. To increase the speed of the virus check, you can limit the size of the archive files that are browsed to a specific value in kilobytes.

Check email archives: Because the software already checks incoming and outgoing mails for virus infections, it is usually a good idea to omit regular checks of email archives since this process may take several minutes, depending on the size of the mail archive.

Check system areas during system start: In general, system areas (for example boot sectors) in your computer should not be excluded from virus checks. You can specify here whether you want to run a check on system start-up or during a media exchange (e.g. new CD-ROM). Generally you should have at least one of these two functions activated.

Check system areas on media exchange: In general, system areas (for example boot sectors) in your computer should not be excluded from virus checks. You can specify here whether whether you want to run a check on system start-up or during a media exchange(e.g., new CD-ROM or similar). Generally you should have at least one of these two functions activated.

Check for dialers / spyware / adware / riskware: You can also use this function to check your system for diallers and other malware (spyware, adware and riskware). These are e.g. programs that establish expensive, unwanted Internet connections, of which the potential for financial damage is no less significant than that of the virus. They may for example secretly record your surfing habits or even all the keyboard entries you make (including your passwords) and forward these to third parties via the Internet at the earliest opportunity.

Only check new or modified files: If you activate this function, files that have not been changed for a long time and that were previously flagged as harmless are skipped. This generates a performance gain in everyday work – with no security risk.