Configuring the Scan Preferences of Trend Micro Security
- Solution ID:1104994
- Last Updated:Sep. 26, 2018 5:17 AM (PST)
- Applies to:Antivirus+ Security - 2016;2017;2018;2019;Internet Security - 2016;Internet Security - 2017;Internet Security - 2018;Internet Security - 2019;Maximum Security - 2016;Maximum Security - 2017;Maximum Security - 2018;Maximum Security - 2019;Premium Security - 2016;Premium Security - 2017;Premium Security - 2018;Premium Security - 2019;
- Configuring Scan Preferences | Trend Micro Security
This article provides information about the Scan Preferences of your Trend Micro Security software and shows you how you can configure it.
Your security software can search for threats in files and settings as well as check for suspicious behavior on your computer. The Trend Micro Security software attempts to remove the threat from the infected file. If unable to remove the threat, it deletes the infected file along with the threat.
The table below lists the settings that you can configure:
|Enable real-time scanning for compressed files (like ZIP files)||Checks files reduced in size through data compression techniques. Such files commonly end with the ZIP or RAR extension and require a specific program to "unpack," "unzip," or "decompress" the contents.|
|Check if programs try to make unauthorized changes to system settings that could threaten your security||Blocks suspicious changes to the computer. Such changes can result in web browser hijackings, unwanted, but unremovable, web browser toolbars, or reduced computer performance, among other problems.|
|Prevent programs on portable drives from launching automatically||Blocks programs that try to start running without your permission when you plug a USB drive into the computer. Flash memory or other portable USB drives rarely include certain kinds of programs that launch automatically, so they usually represent a threat if found.|
|Immediately close programs that have been exploited by Hackers||Closes software that can be used to take advantage of a flaw in a computer system, typically for malicious purposes such as installing malware|
|Protect documents against unauthorized encryption or modification||Block suspicious change on files that may result in encryption and modification such a way that you cannot use the document|
|Back up files encrypted or modified by suspicious program||Make a backup copy of a file that was encrypted or modified due to possible malware activity on the computer|
|Protection Level||Normal – detects and stops security threats based on clearly risky behavior.
Hypersensitive – Aggressively eliminates programs that may only pose a small risk of bad behavior.
Switch protection level automatically – Increase the protection level only when you need it.
|Automatically delete files that show any signs of a threat||Gets rid of any file that might cause trouble. This aggressive response could remove some harmless files along with the unsafe ones, so consider using this protection only when receiving files or installing programs that seem risky.|
|Automatically delete joke programs||Gets rid of joke programs that are considered relatively harmless but are often annoying, or may cause unnecessary panic.|
|Display a warning after detecting viruses, spyware, or suspicious behavior||Provides a notification when a threat is detected, quarantined, or removed, or when programs on the computer behave in a suspicious manner.|
|Automatically delete potentially unwanted applications||Gets rid of Potentially Unwanted Applications (PUAs), classified as grayware, refer to programs installed in a computer that may pose high risk or have untoward impact on user's security and privacy.
To manually uninstall potentially unwanted applications, you may refer to this knowledge base article: Uninstalling Potentially Unwanted Application (PUA)
- Double-click on the Trend Micro desktop icon to open the main console.
- Click on the Device tab.
- Click Configure.
- Click Security & Tuneup Controls, then click on Scan Preferences.