...
- Anti-Virus Scan Time Policies -- You can determine what time and what actually gets scanned when you choose the Full Anti-Virus Management model. At this time, workstations and laptops can be scanned every day, 7 days a week, 365 days a year at any of the following times (assuming the system is left at the time the anti-virus scan is initiated:
- 2:00 AM
- 5:00 AM
- 12:00 PM (noon)
- 12:00 PM and 7:00PM
- 4:00 PM
- 6:00 PM
- 7:00 PM
- 8:00 PM
- 10:00 PM
- 11:00 PM
- Anti-Virus and Host Intrusion Prevention System Policies
- Authorization -- Authorization or denial of applications to run on a system, based upon the following criteria:
- Adware and Potentially Unwanted Applications (PUAs) -- Certain applications can be incorrectly identified as adware or PUAs. This policy allows an administrator to "set" the application to be available to run or not run on a computer.
- Buffer Overflow -- Again, the administrator can set or deny access to specific applications that seem to be misbehaving by overflow their memory buffers. Sometimes this is a method used by hackers to gain access to your computer, but sometimes, buffer overflows can occur from a poorly written application that doesn't manage memory in an effective fashion.
- Suspicious Files -- Some applications raise red flags by how they are named. For example, infection.exe might be something you may or may not want to run on your computer. Well, anti-virus programs don't know what to do with them, so they get flagged for review by support personnel.
- Suspicious Behavior -- Sometimes, infected files are good files that have been rewritten to misbehave on a computer. If a file begins to act in a suspicious fashion on a system, it can be allowed or denied on your system by support personnel.
- Website Blocking -- Certain websites might be blocked by the anti-virus system, or they can be "opened" by a systems administrator to allow access to them.