D E F I N I N G S E T T I N G S
40
40
40
40
character
!
is specified in the switch (i.e.
-@!=filename
), upon
completion of the task the
filename
file will be deleted. If this
character is not in the switch (i.e.
-@=filename
), this file will be kept.
$"
To exclude some files from the check:
1. Enter one of the following values in the
ExcludeFil
es
line of
the profile:
•
1
—
excludes file types defined by the
ExcludeMask
parameter (see below);
•
2
— excludes files located in directories defined by the
ExcludeDir
parameter (see below);
•
3
— excludes both the
ExcludeMask
files and the
ExcludeDir
directories.
!"
To exclude no files from the check type
0 in the ExcludeFiles
line of the
profile.
2. In
the
ExcludeMask
line, define file masks to be excluded
from the check and separate them by commas or spaces.
!"
This parameter corresponds to the command line switch
-
XF=filemasks
, where
filemasks
must be substituted with the file masks
to be excluded from the check.
3. In
the
ExcludeDir
line define directories to be excluded from
the check and separate them by commas or spaces.
!"
This parameter corresponds to the command line switch
-XD=directories
, where
directories
must be substituted with the
directories to be excluded from the check. The directories defined in
the
InfectedFolder
,
SuspiciousFolder
and
CorruptedFolder
lines of the
profile (see subchapter 5.4.3) are automatically ignored during the
check.
#"
If you suspect that your computer is infected it’s advisable to type
Yes
for all the objects-to-be-scanned parameters, and
2
in the
FileMask
line. For daily preventative checks type
Yes
in the
Sectors
and
Files
lines and
0
in the
FileMask
line, and disable archives and
packed executables scanning tools
.