Malwarebytes General Settings.
Posted by Samuel Turi on 09 February 2011 04:02 PM

Malwarebytes General Settings.


The settings tab allows you to configure Malwarebytes' Anti-Malware to work just how you want it. These additional options are categorized in three sections: General Settings, Scanner Settings, and Updater Settings.


General Settings:


  • Terminate Internet Explorer During Threat Removal (unchecked by default): Enabling this option allows Malwarebytes' Anti-Malware to terminate Internet Explorer browser automatically before removing detected threats resided within the Temporary Internet Files folder. If this setting is not enabled, a reboot may be required to complete the threat removal process of these types of infections.
  • Anonymously Report Usage Statistics: The option will automatically collect statistical information on malware threats detected on the system and reports to our threat research center. No personally identifiable or personal information is collected. Statistics can be viewed at: http://www.malwarebytes.org/malwarenet.php  
  • Create Right Click Context Menu: A Scan with Malwarebytes' Anti-Malware option is now available when a file or folder is right-clicked, enabling users to quickly scan an individual file/folder.
  • Automatcially Save Log File After Scan Completes: This option automatically create a saved log file each time a scan is performed.
  • Open Log File Immediuately After Saving: This option will automatically open the log file after a scan is completed.
  • Warn If Database Is Outdated By: This option will provide a pop-up notification indicating a database has elapsed the pre-determined number of days without an update.
  • Language: This drop-down menu allows the user to select the preferred language used by Malwarebytes' Anti-Malware.

Scanner Settings:

  • Scan Memory Objects: This scanning option will include a scan of all processes running in memory when a scan is performed to check for actively running infections.
  • Scan StartUp Objects: This scanning option will include a scan of the Windows registry to check for installed threats and malicious alterations of certain Windows settings.
  • Scan Registry Objects: This scanning option will scan files and folders on the system to check for infected files. The number of files and folders scanned and their location varies depending on the type of scan.
  • Scan Filesystem Objects: This scanning option will perform a check of key files, folders and registry locations against our very powerful heuristics database to look for infections not found by the other parts of the scan
  • Scan Additional Items Against Heuristics: This option enables our latest heuristics detection engine to perform a more advanced analysis of the system for new threats not in our detection database, possibly finding threats the other parts of the scan cannot yet find.
  • Enable Advanced Heuristics Engine (Heuristics Shuriken): This option is enabled by default, allowing Advanced Heuristics Engine to add another layer of protection to detect new and unknown malware.
  • Action for Potentially Unwanted Programs (PUP): This option detects known, non-malicious software which may causes undesirable performance or issues for the computer.
  • Action for Potentially Unwanted Modifications (PUM): This option identifies system setting modifications which may have an adverse effect or direct impact of available functionality or resources of the system.
  • Action for Peer-To-Peer Software (P2P): This option detects file sharing software installed on the system.

    Available actions and definition for the above 3 settings:

    • Do not show in results list: Items of this type will not be detected or shown in the scanned results list.
    • Show in results list and check for removal: Items of this type will be detected, shown in the results list and marked for removal.
    • Show in results list and do not check for removal: The detected item is shown in the scan results list but will not be selected for removal. Each item must be checked manually for removal. 

Updater Settings:


  • Download and Install Program Update if available: When this box is checked, new program and database update will be automatically downloaded and installed.
  • Use Proxy Server To Download Updates: When this option is checked, the user may set proxy server settings so that Malwarebytes' Anti-Malware will be able to update via the internet proxy connection. Server address and the port number is required for a successful proxy connection.
  • Use Authentication: When this option is checked, it allows the user to enter the authentication information, working in conjunction with the "Use Proxy Server To Download Updates" option.
(5 vote(s))
Helpful
Not helpful

Comments (0)
Post a new comment
 
 
Full Name:
Email:
Comments:
CAPTCHA Verification 
 
Please enter the text you see in the image into the textbox below (we use this to prevent automated submissions).