User guide
27
4.1.1.3.1 Automatic startup file check
When creating a System startup file check scheduled task, you have several options to adjust the following
parameters:
The Scan level drop-down menu specifies the scan depth for files run at system startup. Files are arranged in
ascending order according to the following criteria:
Only the most frequently used files (least files scanned)
Frequently used files
Commonly used files
Rarely used files
All registered files (most files scanned)
Two specific Scan level groups are also included:
Files run before user logon – Contains files from locations that may be accessed without the user being logged in
(includes almost all startup locations such as services, browser helper objects, winlogon notify, Windows
scheduler entries, known dll's, etc.).
Files run after user logon – Contains files from locations that may only be accessed after a user has logged in
(includes files that are only run by a specific user, typically files in HKEY_CURRENT_USER\SOFTWARE\Microsoft
\Windows\CurrentVersion\Run).
Lists of files to be scanned are fixed for each aforementioned group.
Scan priority – The level of priority used to determine when a scan will start:
Normal – at an average system load
Lower – at a low system load
Lowest – when the system load is the lowest possible
When idle – the task will be performed only when the system is idle
4.1.1.4 Idle-state scanning
The idle-state scanner can be configured and enabled in Advanced setup under Computer > Antivirus and
antispyware > Idle-state scanning. When the computer is in idle state, a silent computer scan is performed on all
local drives. See Idle state detection triggers for a full list of conditions that must be met in order to trigger the idle-
state scanner.
By default, the idle-state scanner will not run when the computer (notebook) is operating on battery power. You
can override this setting by selecting the check box next to Run even if the computer is on the battery in Advanced
setup.
Select Enable logging in Advanced setup to record a computer scan output in the Log files section (from the main
program window click Tools > Log files and select Computer scan from the Log drop-down menu).
The last setting here is ThreatSense engine parameter setup. Click Setup... if you want to modify several scan
parameters (for example, detection methods).
4.1.1.5 Exclusions
Exclusions enable you to exclude files and folders from scanning. To ensure that all objects are scanned for threats,
we recommend only creating exclusions when it is absolutely necessary. However, there are situations where you
may need to exclude an object, for example large database entries that would slow your computer during a scan or
software that conflicts with the scan.
To exclude an object from scanning:
1. Click Add...,
2. Enter the path to an object or select it in the tree structure.
You can use wildcards to cover a group of files. A question mark (?) represents a single variable character whereas










