The Antivirus & Anti-spyware engine detects and blocks malware such as viruses, spyware, Trojans, worms, bots, and rootkits. The Web Scanning component prevents your browser from accessing malicious URLs and downloading malicious applications or other malicious files.
You can configure ZoneAlarm 2018 software to best suite your needs:
After you install ZoneAlarm 2018 software, the Antivirus & Anti-spyware engine is on by default.
To turn Antivirus and Anti-Spyware off or on:
By default, On-Access File Scanning is enabled and set to Scan in Smart Mode. It checks each file when you open, save, or execute it. You can change the default settings as necessary.
To customize automated On-Access File Scanning:
By default, the periodic system-wide scan is set to the Quick Scan mode and runs once a week.
To change the periodic system-wide scan schedule:
The Scheduled Tasks window opens.
To see the date of the last scan and the date of the next scheduled scan, click the arrow to expand the scan configuration section of the window.
By default, all on-demand scans run in the Quick Scan mode.
To change the on-demand scan mode:
You can run an on-demand system scan at any time. This does not interfere with the scheduled system scans ("Changing System-wide Scan Schedule" on page 17).
To run an on-demand scan with the scan mode option:
The Antivirus/Anti-spyware Scan window opens and shows the progress of the scan (scan duration and the critical area that is being scanned at the moment) and the results of the completed scan (the total number of scanned files and the total number of detected infections).
To run an on-demand scan in the configured scan mode
The Antivirus/Anti-Spyware Scan window opens, and shows the progress of the scan (scan duration and the critical area that is being scanned at the moment) and the results of the completed scan (the total number of scanned files and the total number of detected infections).
To run an on-demand scan in the configured scan mode ("Customizing On-Demand Scan Settings" on page 18) on a specific file:
In a Windows explorer, right-click the filename, and select ZoneAlarm > Scan with ZoneAlarm Antivirus.
To see the infected files while a scan is in progress:
|Field Name||Field Description|
|File name||Name of the infected file.|
|Virus name||Common name of the detected malware.|
The type of malware:
|Risk||Risk level of the detected malware. All viruses are considered High risk. Other malware that is not a virus can also be Low, or Medium risk.|
Treatment automatically applied to the infected file:
|Path||Full location path of the malware.|
When the ZoneAlarm 2018 software can not treat the infected files, it puts them in quarantine. Files in quarantine are not deleted, or used, but they are harmless.
To view and deal with quarantined files:
Behavioral scanning analyzes object behavior in the system and detects the newest threats that are still not defined in the signatures. A program behaves suspiciously when it does one of these:
Behavioral scanning is on by default, and we recommend to keep it on. However, you can turn it off, if necessary.
To turn behavioral scanning off:
By default, virus definitions are updated automatically every hour. You can change the frequency of automatic virus definition updates, or run an update manually if necessary.
To change the frequency of automatic virus definition updates:
To run a manual update:
These are other ways to run a manual update:
All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice.
Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19.
Refer to the Copyright page http://www.checkpoint.com/copyright.html for a list of our trademarks.
Refer to the Third Party copyright notices http://www.checkpoint.com/3rd_party_copyright.html for a list of relevant copyrights and third-party licenses.