Creating the task scan scope

The scan scope refers to the location and type of files (for example, all hard drives, startup objects, and email databases) that the application scans when performing a scan task. You can expand or restrict the scan scope by adding or removing objects for scanning, or by changing the type of files to be scanned.

It is not recommended to change the scan scope of the full scan task or the critical areas scan task.

To create the scan scope in local interface:

  1. On the protected virtual machine, open the main application window.
  2. Select the Protection and Control tab.
  3. Open the Manage tasks section.
  4. Click the line with the name of the relevant scan task (Full Scan, Critical Areas Scan or Custom Scan).

    If some of the scan tasks do not appear in the section, this means that the policy prohibits configuration of the settings of these scan tasks for all protected virtual machines in the administration group.

    A menu with scan task actions opens.

  5. Select the Scan scope menu item.

    The Scan scope window opens.

  6. In the Scan scope window, do one of the following:
    • To add a new object to the list of objects to be scanned, click the Add button.

      The Select object window opens.

    • If you want to change the path to an object, select one from the list of objects and click the Edit button.

      The Select object window opens.

    • If you want to remove an object from the scan scope, select one from the list of objects and click the Delete button.

      A window for confirming deletion opens.

      You cannot remove or edit objects that are included in the default scan scope.

  7. Do one of the following:
    • If you want to add a new object, select one in the Select object window and click the Add button.

      All objects that are selected in the Select object window are displayed in the list of objects in the Scan scope window.

      Click OK.

    • To change the path to an object in the list of objects, enter a different path to the object in the Object field of the Select object window and click OK.
    • If you want to remove an object, click the Yes button in the window for confirming removal.
  8. If necessary, repeat steps 6 and 7 to add objects, change the path to objects, or remove objects from the scan scope.
  9. If you want to exclude an object from the scan scope, clear the check box next to the object in the Scan scope list. The object remains on the list of objects to be scanned, but it is not scanned when the scan task runs.
  10. In the Scan scope window, click OK.
  11. To save changes, click the Save button.

To select the type of scanned objects in local interface:

  1. On the protected virtual machine, open the application settings window.
  2. In the left part of the window, in the Scheduled tasks section, select the subsection with the name of the relevant scan task (Full Scan, Critical Areas Scan or Custom Scan).

    If some of the scan tasks do not appear in the section, this means that the policy prohibits configuration of the settings of these scan tasks for all protected virtual machines in the administration group.

    In the right part of the window, the settings of the selected scan task are displayed.

  3. In the Security level section, click the Settings button.

    A window with the name of the selected scan task opens.

  4. In the window with the name of the selected scan task on the Scope tab in the File types section, specify the types of files that must be scanned by the application when running the selected scan task:
    • If you want to scan all files, select All files.
    • If you want to scan files of formats, which are the most vulnerable to infection, select Files scanned by format.
    • If you want to scan files with extensions that are the most vulnerable to infection, select Files scanned by extension.

    When selecting the type of files to scan, remember the following information:

    • There are some file formats (such as .txt) for which the probability of intrusion of malicious code and its subsequent activation is quite low. At the same time, there are file formats that contain or may contain executable code (such as .exe, .dll, and .doc). The risk of intrusion and activation of malicious code in such files is quite high.
    • An intruder can send a virus or other malware to your virtual machine in an executable file that has had its extension changed to .txt. If you select scanning of files by extension, such a file is skipped by the scan. If scanning of files by format is selected, then regardless of the extension, Kaspersky Security application analyzes the file header. This analysis may reveal that the file is in .exe format. Such a file is thoroughly scanned for viruses and other malware.
  5. In the window with the scan task name, click OK.
  6. To save changes, click the Save button.
Page top