Encontra-se em: Panda Security > IT Security for Business > support > Soporte Productos Panda Security

Que tipo de ajuda necessita?
(Exemplo:“Panda AdminSecure”, “erro 2093”)
Print

How do I configure the heuristic scan of executable files in GateDefender Performa?

Informações se aplicam a:

Produtos
Panda GateDefender Performa 8050
Panda GateDefender Performa 8100
Panda GateDefender Performa 8200

Panda GateDefender Performa incorporates latest generation heuristic technology to detect unknown malware in all types of executable files downloaded or sent through any of the protocols activated.

The heuristic technique searches and detects malware that has not yet been included in the Virus Signature File. It is therefore a technique that is extremely useful for blocking or filtering suspicious or dangerous content.

 

Steps for configuring the heuristic scan

  1. Go to the web administration console.
  2. Click on Settings in the protection menu and select Anti-malware protection.
  3. Go to Heuristic protection settings to view the configuration options.

    This window shows the protocols that are enabled for the antivirus scan and that will be scanned.
  4. Check that the Enable protection against unknown threats checkbox is selected. If it is, all files transferred by the protocols enabled in the antivirus scan will be checked by the heuristic scan.
  5. Select the sensitivity level:

    • High sensitivity
    • Medium sensitivity
    • Low sensitivity

      Bear in mind that the higher the sensitivity level, the higher the protection level, but the risk of false positives will also increase.

  6. Select the action to take if suspicious files are detected:

    • Send the suspicious file to Quarantine. Selecting this option, detected files will be moved to the Quarantine area and no other actions will be available.
    • HTTP and FTP: the transfer of the infected file will be blocked, if possible, otherwise the file will be rendered unusable.
    • For the rest of the protocols, the actions are:

      • Delete the suspicious file.
        A text will be inserted in the messages, informing the user that the attachment has been deleted.
      • Forward the message.
        Enter the email address mail will be forwarded to.
Número do artigo- 20081222 31319 EN
survey

Ajude-nos a melhorar o nosso serviço partilhando a sua opinião.

As suas sugestões ajudar-nos-ão a resolver as suas questões de forma mais rápida e eficaz.

Esclareceu a sua questão com este artigo? SIM NÃO Obrigado pela sua resposta

De que modo poderíamos melhorar este artigo?

Pretende contactar o Suporte Técnico?