Running an OnDemand Scan via User Interface

This section allows you to configure scheduled or manual scans for your endpoints.

Setting Action
OnDemand Scan This toggle activates scanning initiated manually or according to a defined schedule.
Create Scan Task Define the on-demand scan job, including its name, schedule, scope, and actions to perform when threats are detected. See Create Scan Task
Optional Settings

Device Scan: Select this checkbox to allow scanning of external storage devices such as CD/DVD media or USB drives.

Retain a Backup File Copy: Select this checkbox to exclude the entire storage device from scanning. Specify the data size limit in MB.

Retain a Backup File Copy: Select this checkbox to disinfect the original file and retain a quarantined copy of it.

Create Scan Task
Setting Action
Task Details

Name: Provide a name for the scan task.

Description: Describe the scan task.

Run with low priority: Select this checkbox to run the anti-malware scan or remediation process with reduced system resource usage.

Shut down the computer when scan is finished: Select this checkbox to power off the system automatically after the scheduled or on-demand malware scan completes.

Scan Options: Define the scope of the scan—Quick, Full, Network, or Custom

  • Quick Scan – Select this checkbox to scan locations most likely to contain malware infections.
  • Full Scan – Select this checkbox to scan all files and folders on the system.
  • Network Scan – Select this checkbox to scan network devices only.
  • Custom Scan – Select this checkbox to scan the locations specified in the Scan Configuration.

Target Section: Specify the target to be scanned.

Scan Configuration

Name: Provide a name for the scan configuration.

Scope: Define a scope.

Scan Settings: Selects the scanning intensity—Aggressive, Normal, Permissive, or Custom.

  • Aggressive - Select this option to scan all accessed files from local and network drives and archived and zero-risk files.
  • Normal - Select this option to scan all accessed files from local drives and application files from network drives.
  • Permissive - Select this option to scan accessed application files from local and network drives and incoming emails select this option.
  • Custom - Select this option to define the scan settings according to your organization's requirements.

Archive: Select this checkbox to allow scanning of compressed archive files.

Scan Email Archives: Select this checkbox to allow scanning of email archive files.

Miscellaneous: Select the checkboxes of the scan options from the list. 

  • Scan boot sectors: Checks the system’s boot area for malware that loads before the operating system
  • Scan registry: Examines system registry entries for malicious or suspicious modifications
  • Scan rookits: Detects hidden malware designed to conceal itself and gain privileged system access.
  • Scan for keylogger: Identifies software that secretly records keystrokes to steal sensitive information.
  • Scan network shares: Scans shared network drives and folders for malware and infected files.
  • Scan memory: Analyzes system memory to detect malware running actively in RAM.
  • Scan cookies: Checks browser cookies for tracking components or potentially malicious behavior.
  • Scan only new and changed files: Scans files that are newly added or modified since the last scan to reduce scan time.
  • Scan PUA: Detects applications that may not be malicious but can negatively affect performance or privacy.
  • Password prompt for protected files: Sends prompts for a password to scan encrypted or password‑protected files securely.
    The following is an example of the prompts received for password-protected files.

Actions: Define primary and secondary actions for infected, suspected, and rootkit detections. 

Schedule

Recurrence: Configure the scan frequency as Daily, Weekly, or Monthly.

Start Date / Start Time: Specify when the scheduled scan begins.

If scheduled run time is missed, run task as soon as possible: Select this checkbox to run a scan automatically if the scheduled time was missed.