Export (0) Print
Expand All
0 out of 1 rated this helpful - Rate this topic

Configuring real-time protection

Published: December 16, 2009

Applies To: Forefront Client Security

A Client Security policy can enforce real-time scanning for viruses and spyware. When this feature is enabled, Client Security scans files for malware when the files are accessed. It also scans processes and services when they start.

When you edit or create a policy, use the Protection tab to configure whether the policy enforces real-time scanning.

By default, a new policy enforces real-time scanning.

To enable real-time scanning

  1. In the Client Security console, create or edit a policy. For information about how to create or edit a policy, see Creating, editing, copying, and deleting policies.

  2. In the New Policy or Edit Policy dialog box, click the Protection tab.

  3. If you want to enable real-time scanning, under Malware scanning, select the Use real-time protection (scan programs and services when they are accessed) check box.

    This check box is available only if under Malware protection, either the Virus protection or the Spyware protection list is set to On.

  4. After you finish creating or editing the policy, click OK.

  5. To apply the policy to client computers, you must deploy the policy. For information about deploying a policy, see Deploying and undeploying policies.

To disable real-time scanning

  1. In the Client Security console, create or edit a policy. For information about how to create or edit a policy, see Creating, editing, copying, and deleting policies.

  2. In the New Policy or Edit Policy dialog box, click the Protection tab.

  3. If you want to disable real-time scanning, under Malware scanning, clear the Use real-time protection (scan programs and services when they are accessed) check box.

  4. After you finish creating or editing the policy, click OK.

  5. To apply the policy to client computers, you must deploy the policy. For information about deploying a policy, see Deploying and undeploying policies.

 
Did you find this helpful?
(1500 characters remaining)
Thank you for your feedback
Show:
© 2014 Microsoft. All rights reserved.