x
48h OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
SPECIAL OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
BUY NOW AND GET A 50% OFF
x
CHRISTMAS OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 40% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 50% OFF
x
BLACKFRIDAY OFFER
Buy the best antivirus
at the best price
TODAY ONLY UP TO 70% OFF
x
CYBERMONDAY OFFER
Buy the best antivirus
at the best price
(Only for homeusers)
TODAY ONLY UP TO 70% OFF

Technical Support

Need help?

 

How do I  configure the heuristic scan of executable files in Panda GateDefender Integra?

Information applies to:

Products
Panda GateDefender Integra 100
Panda GateDefender Integra 300

Panda GateDefender Integra incorporates latest generation heuristic technology to detect unknown malware in all types of executable files downloaded or sent through any of the protocols activated.

The heuristic technique searches and detects malware that has not yet been included in the Virus Signature File. It is therefore a technique that is extremely useful or blocking or filtering suspicious or dangerous content.

 

Steps for configuring the heuristic scan

  1. Go to the web administration console.
  2. Click on Anti-malware and filtering in the protection menu and select Anti-malware protection.
  3. Go to Heuristic protection settings to view the configuration options.

    This window shows the protocols that are enabled for the antivirus scan and that will be scanned.
  4. Check that the Enable protection against unknown threats checkbox is selected. If it is, all files transferred by the protocols enabled in the antivirus scan will be checked by the heuristic scan.
  5. Select the sensitivity level:

    • High sensitivity
    • Medium sensitivity
    • Low sensitivity

      Bear in mind that the higher the sensitivity level, the higher the protection level, but the risk of false positives will also increase.
  6. Select the action to take if suspicious files are detected:

    • HTTP and FTP: the transfer of the infected file will be blocked, if possible, otherwise the file will be rendered unusable.
    • For the rest of the protocols, the actions are:

      • Delete the suspicious file.
        A text will be inserted in the messages, informing the user that the attachment has been deleted.
      • Forward the message.
        Enter the email address mail will be forwarded to.
Help nº- 20070702 31429 EN

Have you resolved your query with this article?

yes no

Thanks for your answer


Why didn't you find it helpful?


The instructions are too complex.
The instructions are too long.
The instructions don't work.
I'd rather have a video.
Other reasons.




Talk to a technician!

 

Business hours: Mondays-Fridays 9:00 to 18:00 CET

Outside business hours, please use the online form.





ALWAYS ONLINE TO HELP YOU TWITTER FORUM RATE US CHAT
ALWAYS ONLINE TO HELP YOU TWITTER FORUM RATE US CHAT