Configure System Shield Settings window

On-demand tab

Overview of the Settings window

On-demand scanning allows you to run virus and spyware scans at any time. The On-demand tab allows you to change various settings that control what is included in these scans.

 

Click a field name below for instructions; to the right of each field name is a brief description of the functionality.

Set Actions for Infected Data

 

When an infected file is found:

When an infected archive is found:

Set the action System Shield takes when an infected file or archive file is found.

To edit or reorder the actions, click Change. The options are Quarantine, Rename, and Delete.

Specify What to Scan

 

Scan only dangerous file types (recommended)

Scan all file types

Select a general type to scan.

 

One of these two options must be selected.

Scan archives (e.g., .zip, .cab, .arj)

Archive recursion levels

Scan packed executables

Set whether compressed archives and packed executables should or should not be included in scans.

 

By default, both check boxes are selected and archives/packed executables are included in scanning.  

Excluded folders

Excluded files

Included file extensions

Exclude specific folders and files from scanning, or include specific file extensions in scanning.

 

To make changes or view existing entries, click Change.

Advanced Settings

 

Use artificial intelligence

Artificial intelligence looks for various behaviors and coding patterns that viruses commonly use.

 

This process can stop brand-new infections that are not yet a part of a virus or spyware definition. However, while this feature is enabled it can slow scanning and lead to false positives.

Detect macro variants

A macro variant is a new virus that borrows portions of code from other known viruses.

 

This option controls whether macro variants are detected.

Ignore remote templates

A template is a frame into which every web page is embedded when the page is rendered. Remote templates allow for automatic downloads and the execution of content from a remote URL.

While this can pose a security risk, some Microsoft products rely on it to function.

Related topics:

Run on-demand scanning