About the types of scans and real-time protection
|Article:HOWTO54873|||||Created: 2011-06-29|||||Updated: 2011-12-20|||||Article URL http://www.symantec.com/docs/HOWTO54873|
By default, Symantec Endpoint Protection Small Business Edition runs an active scan every day at 12:30 P.M. Symantec Endpoint Protection Small Business Edition also runs an active scan when new definitions arrive on the client computer. On unmanaged computers, Symantec Endpoint Protection Small Business Edition also includes a default startup scan that is disabled.
You should make sure that you run an active scan every day on the computers in your network. You might want to schedule a full scan once a week or once a month if you suspect that you have an inactive threat in your network. Full scans consume more computer resources and might impact computer performance.
Table: Scan types
Auto-Protect continuously inspects files and email data as they are written to or read from a computer. Auto-Protect automatically neutralizes or eliminates detected viruses and security risks.
Download Insight boosts the security of Auto-Protect scans by inspecting files when users try to download them from browsers and other portals.
Download Insight uses reputation information to make decisions about files. A Symantec technology that is called Insight determines the file reputation. Insight uses not only the source of a file but also its context to determine a file's reputation. Insight provides a security rating that Download Insight uses to make decisions about the files.
Download Insight functions as part of Auto-Protect and requires Auto-Protect to be enabled.
Administrator-defined scans detect viruses and security risks by examining all files and processes on the client computer. Administrator-defined scans can also inspect memory and load points.
The following types of administrator-defined scans are available:
SONAR offers real-time protection against zero-day attacks. SONAR can stop attacks even before traditional signature-based definitions detect a threat. SONAR uses heuristics as well as file reputation data to make decisions about applications or files.
Like proactive threat scans, SONAR detects keyloggers, spyware, and any other application that might be malicious or potentially malicious.
See About SONAR.
TruScan proactive threat scans
Supported on Windows computers that run Symantec Endpoint Protection version 11.x. SONAR is not supported on any computers that run version 11.x.
TruScan proactive threat scans provide protection to legacy clients against zero-day attacks. TruScan proactive threat scans determine if an application or a process exhibits characteristics of known threats. These scans detect Trojan horses, worms, keyloggers, adware and spyware, and the applications that are used for malicious purposes.
Unlike SONAR, which runs in real time, TruScan proactive threat scans run on a set frequency.
Article URL http://www.symantec.com/docs/HOWTO54873