If the agent detects a security risk, it displays a notification message that shows the name of the infected file and the specific security risk. If the agent detects no security risk, the file remains in its location and users can proceed to access the file. Scan immediately each time a file is received, opened, downloaded, copied, or modified, the agent scans the file for security risks. See also Select the types of scans to perform. The Anti-Malware module performs several types of scans. ![]() To turn on and configure the Anti-Malware module, see Enable and configure Anti-Malware. ![]() It can also terminate processes and delete other system objects that are associated with identified threats. The Anti-Malware module can clean, delete, or quarantine malicious files. The Anti-Malware module eliminates threats while minimizing the impact on system performance. Ensure that your agents can communicate with a relay or the Trend Micro Update Server after installation. Agents periodically download anti-malware patterns and updates to ensure protection against the latest threats.Ī newly-installed agent cannot provide anti-malware protection until it has contacted an update server to download anti-malware patterns and updates. Portions of the threat database are hosted on Trend Micro servers or stored locally as patterns. The Anti-Malware module also checks files for certain characteristics, such as compression and known exploit code. ![]() To identify threats, the Anti-Malware module checks files on the local hard drive against a comprehensive threat database. The Anti-Malware module provides agent computers with both real-time and on-demand protection against file-based threats, including malware, viruses, Trojans, and spyware.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |