ThreatSense is the name of the technology consisting of complex threat detection methods. This technology is proactive, which means it also provides protection during the early hours of the spread of a new threat. It uses a combination of several methods (code analysis, code emulation, generic signatures, virus signatures) which work in concert to greatly enhance system security. The scanning engine is capable of controlling several data streams simultaneously, maximizing the efficiency and detection rate. ThreatSense technology also successfully eliminates rootkits.
The ThreatSense technology setup options allow the user to specify several scan parameters:
- file types and extensions that are to be scanned
- the combination of various detection methods
- levels of cleaning, etc.
To enter the setup window, click on the, button located in any module’s setup window which uses ThreatSense technology (see below). ifferent security scenarios could require different configurations. ThreatSense is individually configurable for the following protection modules:
- Real-time file system protection
- System startup file check
- Email client protection
- Web access protection
- Computer scan
The ThreatSense parameters are highly optimized for each module, and their modification can significantly influence system operation. For example, changing parameters to always scan runtime packers, or enabling advanced heuristics in the real-time file system protection module could result in a system slow-down (normally, only newly-created files are scanned using these methods). Therefore, we recommend that you leave the default ThreatSense parameters unchanged for all modules except Computer scan.