Technical Support

Need help?

 

1-844-956-2648
10/5 availability

Email us
Response time: 24 h

1-844-255-7356
Remote PC access
Premium Support

How do I configure the heuristic scan of executable files in GateDefender Performa?

Information applies to:

Products
Panda GateDefender Performa 8050
Panda GateDefender Performa 8100
Panda GateDefender Performa 8200

Panda GateDefender Performa incorporates latest generation heuristic technology to detect unknown malware in all types of executable files downloaded or sent through any of the protocols activated.

The heuristic technique searches and detects malware that has not yet been included in the Virus Signature File. It is therefore a technique that is extremely useful for blocking or filtering suspicious or dangerous content.

 

Steps for configuring the heuristic scan

  1. Go to the web administration console.
  2. Click on Settings in the protection menu and select Anti-malware protection.
  3. Go to Heuristic protection settings to view the configuration options.

    This window shows the protocols that are enabled for the antivirus scan and that will be scanned.
  4. Check that the Enable protection against unknown threats checkbox is selected. If it is, all files transferred by the protocols enabled in the antivirus scan will be checked by the heuristic scan.
  5. Select the sensitivity level:

    • High sensitivity
    • Medium sensitivity
    • Low sensitivity

      Bear in mind that the higher the sensitivity level, the higher the protection level, but the risk of false positives will also increase.

  6. Select the action to take if suspicious files are detected:

    • Send the suspicious file to Quarantine. Selecting this option, detected files will be moved to the Quarantine area and no other actions will be available.
    • HTTP and FTP: the transfer of the infected file will be blocked, if possible, otherwise the file will be rendered unusable.
    • For the rest of the protocols, the actions are:

      • Delete the suspicious file.
        A text will be inserted in the messages, informing the user that the attachment has been deleted.
      • Forward the message.
        Enter the email address mail will be forwarded to.
Help nº- 20081222 31319 EN

Have you resolved your query with this article?

yes no

Thanks for your answer


Why didn't you find it helpful?


The instructions are too complex.
The instructions are too long.
The instructions don't work.
I'd rather have a video.
Other reasons.




Talk to a technician!

 

Business hours: Mondays-Fridays 9:00 to 18:00 CET

Outside business hours, please use the online form.





Do you need one of our technicians to connect to
your PC or device remotely to fix a problem?

Discover our Premium Services

ALWAYS ONLINE TO HELP YOU TWITTER FORUM RATE US CHAT
ALWAYS ONLINE TO HELP YOU TWITTER FORUM RATE US CHAT