Real Time Cloud Protection is a new advanced antivirus/anti-spyware feature, introduced in ZoneAlarm 2014. It provides real-time verification of file signatures against up-to-date cloud-based Kaspersky databases. This enhances the performance of protection components, speeds up response time to new malware threats, and reduces the risk of false-positive detections.
To protect your computer even better, and to optimize its performance, you can customize some of the Advanced Antivirus & Anti-spyware options:
To configure scan options and riskware categories:
|Skip if the object is greater than [size] MB||Specify the size in Megabytes. The default is 8. Most virus files are smaller than 8MB. Therefore, not scanning larger files improves the scan time. Viruses in larger files can be detected through on-access scanning|
|Enable cpChecker||Creates scanning rules based on the data scanned before, and optimizes scanning based on those rules. Works on limited file sizes and formats. Most efficient when cpSwift is enabled.|
|Enable cpSwift||Creates scanning rules based on the data scanned before, and optimizes scanning based on those rules. Works on all file types, sizes, and formats. Most efficient when cpChecker is enabled.|
|Enable heuristics scanning||Scans files for common behaviors and attributes associated with malware. Adds another layer of security by detecting viruses or spyware not yet known to virus signature databases.|
|Enable automatic treatment||Automatically attempts to treat files that contain viruses. If a file cannot be treated, it is placed in Quarantine so that it cannot harm your computer.|
|Also scan archives||Scan unopened archives to detect malware hidden inside. This options is enabled by default.|
|Enable adware scanning||Scan for software that automatically shows unwanted advertisements.|
|Enable auto-dialer scanning||Scan for software with pornographic content.|
|Enable other riskware scanning||Other programs that can be detected as riskware include remote administration programs, FTP servers, proxy servers, password recovery tools, monitoring programs, telnet servers, Web servers, computer tools, network tools, peer-to-peer client programs, SMTP clients, Web toolbars, and known fraudulent programs. Of these categories of programs, only those with known associated security vulnerabilities are considered to be riskware, and therefore detected.|
To configure scan targets for on-demand scans:
You can specify directories, files, and folders that you want the virus scanner to ignore. Beware that this can lower your computer's protection level.
To configure scan exceptions:
If you later remove an item from the list of exceptions, it will be scanned during the next scan.
All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice.
Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19.
Refer to the Copyright page http://www.checkpoint.com/copyright.html for a list of our trademarks.
Refer to the Third Party copyright notices http://www.checkpoint.com/3rd_party_copyright.html for a list of relevant copyrights and third-party licenses.