Enable and configure anti-malware
To use anti-malware, perform these basic steps:
- Turn on the anti-malware module.
- Select the types of scans to perform.
- Configure scan exclusions
- Ensure that Deep Security can keep up to date on the latest threats.
When you have completed these steps, review Configure malware scans and exclusions and refine the anti-malware scan behavior.
For an overview of the anti-malware feature, see About Anti-Malware.
Turn on the anti-malware module
- Go to Policies.
- Double-click the policy for which you want to enable anti-malware.
- Go to Anti-Malware > General.
- From Anti-Malware State, select On.
- Click Save.
Select the types of scans to perform
When anti-malware is turned on, Deep Security needs to know what type of scans it should perform (see Types of malware scans).
- Go to Policies.
- Double-click the policy to configure.
- Click Anti-Malware > General.
- Enable or disable each type of scan:
- To perform the scan using default settings, select Default.
- To perform the scan using a malware scan configuration that you can customize, select a malware scan configuration.
- To disable the scan, for the malware scan configuration select No Configuration.
- Click Save.
Configure scan exclusions
To reduce scanning time and minimize the use of computing resources, you can configure Deep Security malware scans to exclude specific folders, files, and file types from all types of scans. You can also exclude process image files from real-time malware scans that are run on Windows servers.
All of these exclusions are specified by selecting exclusion lists on the Exclusions tab of the Malware Scan Configuration editor. See Specify the files to scan.
If any performance-related issues are experienced when Deep Security anti-malware protection is enabled, you can use exclusions to help troubleshoot these issues by excluding specific folders or files from scanning.
Ensure that Deep Security can keep up to date on the latest threats
To remain effective against new viruses and exploits, Deep Security Agents need to be able to download the latest software and security update packages from Trend Micro or indirectly, from your own Relay. These packages contain threat definitions and patterns. Relay-enabled agents, organized into relay groups (also managed and configured by the Deep Security Manager) retrieve security updates from Trend Micro, and then distribute them to other agents and appliances.
- Go to Administration > System Settings > Updates.
- Configure Deep Security's ability to retrieve security updates from Trend Micro. Make sure you have at least one relay-enabled agent, and it is assigned to the appropriate agents and appliances.
To determine if a Deep Security Agent is a relay, next to a computer, click Preview. - Go to Administration > Scheduled Tasks.
- Verify that there is a scheduled task to regularly download available updates for both security and software updates.