New/Edit/Duplicate On-Demand Configuration pane

How to get there

  • To create a new Configuration, on the Configurations page, choose Add > On-Demand Configuration.
  • To create a new Configuration starting with the settings of an existing Configuration, on the Configurations page, for an existing On-Demand Configuration, click > Properties.
  • To edit an existing Configuration, on the Configurations page, for an existing On-Demand Configuration, click > Properties.

What it does

The New/Edit/Duplicate On-Demand Configuration pane allows you to set configuration options, including notification settings, for on-demand scanning.

Options

Click Actions to open a submenu with the following connection management options:

  • Duplicate. Choose this option to duplicate the configuration.
  • Delete. Opens the Delete Configuration dialog box, where you are prompted to specify a new Configuration for endpoints assigned to the Configuration you are deleting.
  • Close. Choose this option to close the submenu.
Name • Description

The name and description of the configuration.

Set as Primary

Endpoints set to the Primary Configuration (see Endpoint Properties pane) inherit the settings of the Configuration that is set as Primary. Toggle this switch to On to indicate that you would like to set endpoints currently assigned to the Primary Configuration to the Configuration you are editing. When you click Save, the number of endpoints that will change is indicated and you are prompted to confirm. Toggle this switch to Off to indicate that you would like to set endpoints assigned to the Primary Configuration to the Default Configuration. The Configuration that is currently set to Primary is indicated in the Configurations page.

Common

Include

A required colon-delimited list of path names to be included for on-demand scanning. A file that exists within any of the path names specified will be subject to scanning unless the file path name is specified as an Exclude Path. IBM i Endpoints support single paths only.

Exclude

A colon-delimited list of path names to be excluded from on-demand scanning. The exclude paths take precedence over include paths. A file that exists within any of these path names will not be subject to scanning.

Recursive

If set to On, the scan descends the specified directories recursively. If set to Off, the current directory is scanned without descending subdirectories.

Heuristic Analysis

Include heuristic analysis to find new viruses. If set to On, Powertech Antivirus employs heuristic technology to detect potentially unknown viruses in executable files (programs). If set to Off, the engine can only find viruses that are already known and identified in the current virus definition files.

Macro

If set to On, Powertech Antivirus treats embedded macros that have code resembling a virus as if they are viruses. This parameter is similar to Heuristic analysis but scans for new viruses in compound document formats; for example, Microsoft OLE formats such as Word documents. If set to Off, embedded macros that have code resembling a virus are not treated as viruses.

Programs

If set to On, Powertech Antivirus detects some widely available applications, such as password crackers or remote access utilities that can be used maliciously or pose a security threat. If set to Off, these applications are not detected.

Archive Files

If set to On, Powertech Antivirus includes archive files. Archive files contain embedded files and usually end with one of the following extensions: .ZIP, .TAR, .CAB, .LZH, .JAR and .UUE. This option will also permit scanning of MSCompress files. If set to Off, archive file types are not scanned.

Clean

If set to On, Powertech Antivirus cleans infected files by repairing the infection. Please note most infections cannot be cleaned.

WARNING: If the file cannot be cleaned, it will be deleted (unless Quarantine is set to On).
Quarantine

If set to On, Powertech Antivirus quarantines the infected files by moving them to the /Quarantined directory. When Quarantine and Clean are both On, Powertech Antivirus attempts to clean the file first, and if unsuccessful, moves the file to the quarantine directory. If they are both off, no actions are taken on infected files.

Timeout

Specifies the maximum number of seconds the scan will execute in total. After the number of seconds has elapsed, the command will end without scanning any remaining files. The return code will indicate a timeout has occurred. For IBM i endpoints, the seconds you enter are converted to minutes.

Linux/Unix Only

Mime

If set to On, Powertech Antivirus scans inside MIME-encoded files, UU-encoded files, XX-encoded files, and BinHex files. If set to Off, Powertech Antivirus does not scan inside these types of files. This parameter reduces scanning performance.

Log Level

Specifies the number of directory levels that will be printed in the output listing. The default is 99.

Ignore Links

If set to On, the scan ignores all symbolic links. If set to Off, symbolic links are scanned.

Scan Only EXE Files

If set to On, Powertech Antivirus scans executable files only. The scan engine uses the file extension alone to determine whether the file is an executable. If set to Off, Powertech Antivirus scans all files regardless of the file extension.

Command

Runs the specified command string when infections are found, passing the file name as a parameter. This allows a user-written script to perform actions such as alerting an administrator. Please note this file will be a live infected file and in no way should the script attempt to read it. The intention is to allow you to process the file name. You may want to implement a procedure to notify an administrator, for example. Scripts must have execute permissions in order to be run.

Notify

Notify those notifiers in the comma separated list, which are defined in the [notify] section of config.ini. This list will override the list defined by the config.ini avscan:notify parameter. See Notification Support in avconfig command.

Max Wait

Specifies the maximum number of seconds to spend scanning any one file. After the number of seconds has elapsed the product assumes the file is OK and proceeds with the next file. The default is 300. Use this option cautiously.

Delay Scan Progress

The amount of time in microseconds the scanner should pause with each progress beat from a scanning operation. This can be used as a simple CPU limiting technique. It can be an integer value between 0 and 999999. The default value of 0 disables the feature.

Quiet

Prints minimal information to the output stream, useful for parsing the output file.

IBM i Only

File Types

Specifies the types of files to scan. The options are:

  • Most Susceptible to Infection

  • All files

  • Examine Files for Known Macro Viruses

Force rescan of scanned files

Specifies if the objects scan settings should be overridden. The options are:

  • Do not force rescan

  • Rescan all files

  • If file's "Object scanning" attribute is *NO

  • If file's "Object scanning" attribute is *CHGONLY

Restart

If set to On, the system will restart the scan from a previous timeout. If set to Off, the system will not restart the scan.

Related Topics