User guide
Define Profile
24
Report Password Protected Documents - If checked, reports password-protected document
attachments in email as threats.
Report Files containing macro - If checked, reports files containing macros attached to email as
threats.
Report hidden extensions - If checked, reports files that use a hidden extension. Some viruses hide
themselves by doubling their file extension. For example, the VBS/Iloveyou virus attaches a file,
ILOVEYOU.TXT.VBS, to emails. The default Windows setting is to hide known extensions, so the
file looks like ILOVEYOU.TXT. When you open it you do not open a .TXT text file but instead
execute a .VBS procedure file.
Move reported attachments to Virus Vault (incoming email only) - If checked, reported email attachments
are moved to the virus vault. They display in the Virus Vault tab of the View Threats (page 5) page
instead of in the Current Threats tab.
Full Scan
Scan Settings
Scan Potentially Unwanted Programs and Spyware threats - If checked, the scan detects executable
applications or DLL libraries that could be potentially unwanted programs. Some programs,
especially free ones, include adware and may be detected and reported by Endpoint Security as
a Potentially Unwanted Program.
Scan for Tracking Cookies - If checked, the scan includes internet browser tracking cookies. Found
tracking cookies are deleted immediately and not moved to the virus vault.
Scan Inside Archives - If checked, scanning includes archive files—such as ZIP and RAR files.
Use Heuristics - If checked, scanning includes heuristic analysis. Heuristic analysis performs a
dynamic emulation of a scanned object’s instructions within a virtual computing environment.
Scan system environment - If checked, system areas are scanned before the full scan is started.
Scan infectible files only - If checked, "infectible" files are scanned based on their contents
regardless of their file extensions. For example, an EXE file could be renamed but still be infected.
The following types of files are considered 'infectible' files:
EXE type - COM; DRV; EXE; OV?; PGM; SYS; BIN; CMD; DEV; 386; SMM; VXD; DLL; OCX;
BOO; SCR; ESL; CLA; CLASS; BAT; VBS; VBE; WSH; HTA; HTM; HTML; ?HTML; CHM;
INI; HTT; INF; JS; JSE; HLP; SHS; PRC; PDB; PIF; PHP; ZL?; ASP; LNK; EML; NWS; CPL;
WMF
DOC type - DO?; XL?; VBX; RTF; PP?; POT; MDA; MDB; XML; DOC?; DOT?; XLS?; XLT?;
XLAM; PPT?; POT?; PPS?; SLD?; PPAM; THMX
Performance
Select System Priority for Scan - Defines how fast the scan runs and how much system resources the
scan uses. You can set the scan to run as fast as possible while slowing down a computer
noticeably, or you can choose that you wish the scan to run using as little system resources as
possible, while prolonging the scan's run time.
Exchange
Enable AVG for Exchange Server - Enable or disable email scanning for assigned MS Exchange
Servers.
Note: If you install email protection on one or more MS Exchange Servers, create a unique profile
for MS Exchange Servers and only apply this profile to these MS Exchange Servers. The Define
Profile > Exchange tab settings should only be enabled and applied to MS Exchange Servers.
Mail Certification