Configuring Scan Options and Riskware Categories Updated May 02, 2021 20:39 To configure scan options and riskware categories: Click in the ANTIVIRUS & FIREWALL panel of the ZoneAlarm software client. Click Settings in the Antivirus/Anti-Spyware section. Click Advanced Settings.The Antivirus/Anti-spyware Settings window opens. From the navigation tree, select Scan Options. Select options from the Scan Options list: Skip if the object is greater than [size] MB Specify the size in Megabytes. The default is 8. Most virus files are smaller than 8MB. Therefore, not scanning larger files improves the scan time. Viruses in larger files can be detected through on-access scanning Enable cpChecker Creates scanning rules based on the data scanned before, and optimizes scanning based on those rules. Works on limited file sizes and formats. Most efficient when cpSwift is enabled. Enable cpSwift Creates scanning rules based on the data scanned before, and optimizes scanning based on those rules. Works on all file types, sizes, and formats. Most efficient when cpChecker is enabled. Enable heuristics scanning Scans files for common behaviors and attributes associated with malware. Adds another layer of security by detecting viruses or spyware not yet known to virus signature databases. Enable automatic treatment Automatically attempts to treat files that contain viruses. If a file cannot be treated, it is placed in Quarantine so that it cannot harm your computer. Also scan archives Scan unopened archives to detect malware hidden inside. This options is enabled by default. Click the arrow to expand the Riskware Categories section. Select additional options from the Riskware Categories list: Enable adware scanning Scan for software that automatically shows unwanted advertisements. Enable auto-dialer scanning Scan for software with pornographic content. Enable other riskware scanning Other programs that can be detected as riskware include remote administration programs, FTP servers, proxy servers, password recovery tools, monitoring programs, telnet servers, Web servers, computer tools, network tools, peer-to-peer client programs, SMTP clients, Web toolbars, and known fraudulent programs. Of these categories of programs, only those with known associated security vulnerabilities are considered to be riskware, and therefore detected.