This section lets you configure other miscellaneous ThreatSense scanning engine parameters.
Log all objects
the impact of this option varies depending on the scanner type (real-time scanner, on-demand scanner). If you activate logging in the on-demand scanner, the program will log all scanned object, including clean files. In real-time file system protection this option provides that if an infiltration is found within archive, the scan log will include all files contained in the archive, with the inclusion of files marked as clean.
The Other section provides you also with the following additional features:
Scan alternate data streams (ADS)
Alternate data streams (ADS) used by the NTFS file system are file and folder associations which are invisible from ordinary scanning techniques. Many infiltrations try to avoid detection by disguising themsleves as alternative data streams.
Run background scans with low priority
Each scanning sequence consumes a certain amount of system resources. If you work with programs that place a high load on system resources, you can activate low priority background scanning and save resources for your applications.
Preserve last access timestamp
Check this option to keep the original access time of scanned files instead of updating it (e.g. for use with data backup systems).
This option allows you to enable/disable log scrolling. If selected, information scrolls upwards within the display window.
Display notification about scan completion in a separate window
Opens a standalone window containing information about scan results.