Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Anti-Virus Scan Time Policies -- You can determine what time and what actually gets scanned when you choose the Full Anti-Virus Management model.  At this time, workstations and laptops can be scanned every day, 7 days a week, 365 days a year at any of the following times (assuming the system is left at the time the anti-virus scan is initiated:
    • 2:00 AM
    • 5:00 AM
    • 12:00 PM (noon)
    • 12:00 PM and 7:00PM
    • 4:00 PM
    • 6:00 PM
    • 7:00 PM
    • 8:00 PM
    • 10:00 PM
    • 11:00 PM
  2. Anti-Virus and Host Intrusion Prevention System Policies
    • Authorization -- Authorization or denial of applications to run on a system, based upon the following criteria:
    • Adware and Potentially Unwanted Applications (PUAs) -- Certain applications can be incorrectly identified as adware or PUAs.  This policy allows an administrator to "set" the application to be available to run or not run on a computer.
    • Buffer Overflow -- Again, the administrator can set or deny access to specific applications that seem to be misbehaving by overflow their memory buffers.  Sometimes this is a method used by hackers to gain access to your computer, but sometimes, buffer overflows can occur from a poorly written application that doesn't manage memory in an effective fashion.
    • Suspicious Files -- Some applications raise red flags by how they are named.  For example, infection.exe might be something you may or may not want to run on your computer.  Well, anti-virus programs don't know what to do with them, so they get flagged for review by support personnel.
    • Suspicious Behavior -- Sometimes, infected files are good files that have been rewritten to misbehave on a computer.  If a file begins to act in a suspicious fashion on a system, it can be allowed or denied on your system by support personnel.
    • Website Blocking -- Certain websites might be blocked by the anti-virus system, or they can be "opened" by a systems administrator to allow access to them.