Reference Guide
Manage Policies
222
Reputation Service
Sensitivity
Medium
Disable
Very Low
Low
Medium
High
Very High
When enabled, samples are submitted to the lab to determine if they are
malware. Sensitivity level configures the sensitivity level to use when
determining if a detected sample is malware.
The higher the sensitivity level, the higher the number of malware detections.
However, allowing more detections might result in more false positive results.
Risk levels:
Very low - The detections and risk of false positives are the same as with
regular content files. A detection is made available to Threat Protection when
the lab publishes it instead of waiting for the next content file update. Use this
setting for desktops and servers with restricted user rights and a strong
security footprint. This setting results in an average of 10–15 queries per day,
per computer.
Low - This setting is the minimum recommendation for laptops or desktops
and servers with a strong security footprint. This setting results in an average
of 10–15 queries per day, per computer.
Medium - Use this level when the regular risk of exposure to malware is
greater than
the risk of a false positive. The proprietary, heuristic checks result
in detections that are likely to be malware. However, some detections might
result in a false positive. With this setting, the lab checks that popular
applications and operating system files do not result in a false positive. This
setting is the minimum recommendation for laptops or desktops and servers.
This setting results in an average of 20–25 queries per day, per computer.
High - Use this setting for deployment to systems or areas which are regularly
infected. This setting results in an average of 20–25 queries per day, per
computer.
Very high - Dell recommends using this level only for scanning volumes and
directories that do not support executing programs or operating systems.
Detections found with this level are presumed malicious, but have not been
fully tested to determine if they are false positives. Use this setting for on-
demand scans on non-operating system volumes. This setting results in an
average of 20–25 queries per day, per computer.
Exclusions String
String - Comma-separated list of parameters
Specify files, folders, and drives to exclude from scanning.
Comma separated list of parameters:
<ExclusionType>,<ExclusionData>,<ExcludeSubfolders
(only applies to FileOrFolder type)>
Possible values: <FileOrFolder|FileType|ModifiedAge|
AccessedAge|CreatedAge>,<PathToFileOrFolder|
FileType|Age>,<true|false>
Examples:
FileOrFolder,C:\Users,false
FileType,xml,false
FileType,mp?,false
ModifiedAge,120,true
AccessedAge,150,false
CreatedAge,300,true