Running Scan Now on Selected Targets

You can run a Scan Now from pages where you have selected target endpoints or groups.

Administrators will often use the Endpoints and Groups pages, as they provide useful information such as operating system details and agent information. If an administrator decides to run an antivirus scan on one or more groups or endpoints, the Virus and Malware Scan Wizard can be launched from these pages to run the scan.

Running Scan Now on an Endpoint

You can use the Virus and Malware Scan Wizard to run an antivirus scan on endpoints that are selected on the Endpoints page.

This wizard is similar to the Virus and Malware Scan Wizard available on the Discover menu, except that it does not have a Targets page.

  1. Select Manage > Endpoints.
    The Endpoints page opens.
  2. Select the Antivirus tab.
  3. Select one or more endpoints to be scanned.
  4. Click Scan Now.
  5. If you do not select any endpoints before clicking Scan Now, all the endpoints are selected by default. You will then see the following dialog:

    Click Yes to scan all endpoints, or click No to return to the list and select particular endpoints.

    The Scan Now - Virus and Malware Scan wizard opens to the Scan Name and Scheduling page.

  6. [Optional] Type a new name in the Scan Name field.
  7. By default, new virus scans are named New Virus and Malware Scan, followed by the server's date and time, which is formatted according to your browser's locale setting.

  8. Schedule the scan using one of the following methods:
  9. Method

    Steps

    To schedule an immediate scan:

    Select the Run scan immediately option.

    To schedule a later scan:

    1. Select the Run scan at option.
    2. Type the start date in the Start date field. You can also select the start date by clicking the Calendar icon.
    3. Type the start time in the Start time field using a hh:mm format followed by AM or PM. This field supports both 12- and 24-hour time. Alternatively, you can select the start time by clicking the Clock icon.

    The purpose of the deferred scan feature is to enable you to schedule the scan at a time that will not adversely affect network or endpoint performance.

  10. Click Next.
    The Scan Options page opens.
  11. From the drop-down list, select the action that occurs when a virus is detected.
  12. Setting

    Result

    Perform no action

    Does nothing with the infected file, but sends an alert to the server.

    Attempt to clean then quarantine
    [default setting]

    Attempts to clean the infected file. If this is not possible, the file is quarantined. An alert is sent to the server.

    Attempt to clean then delete

    Attempts to clean the infected file. If this is not possible, the file is deleted. An alert is sent to the server.

    Attempt to clean then quarantine then delete

    Attempts to clean the infected file. If this is not possible, the file is quarantined. If it is not possible to quarantine it, it is deleted. An alert is sent to the server.

    Note:

    • To clean an infected file means to completely remove the malicious code so that the file is safe to use. It is not always possible to remove the malicious code, however. When this happens, you can either delete the file or quarantine it. To quarantine means to move it to a safe place on the endpoint where it can be kept for further examination.

      In certain cases (such as when the malware is a Trojan) the entire file is malicious. Such a file cannot be cleaned, so the only options are to quarantine or delete it.
    • Virus detection actions are not used for memory scans.
  13. From the drop-down list, select the action to be taken when a potentially unwanted application (PUA) is detected:
  14. Setting

    Result

    Perform no action
    [default setting]

    The system ignores the potentially unwanted application.

    Send alert only

    An alert is sent to the server only.

    Alert and action (treat as malware)

    An alert is sent to the server and the file is cleaned, quarantined, or deleted, according to the action you selected in the When a virus is detected drop down.

  15. Set the Scanning options:

  16. Setting

    Result

    Scan boot sectors

    The virus scan will be more thorough if you scan boot sectors in addition to program and data files.

    Note: If malware is detected in a boot sector, the action taken depends on the virus detection option selected:

    • Perform no action - the boot sector is left as it is and an alert is sent to the Virus and Malware Event Alerts page.

    • Clean/Delete/Quarantine - the boot sector is automatically repaired.

    Scan archives

    The virus scan will be more thorough if you scan archive files such as .zip and .cab files.

    Infected .rar files can be quarantined and deleted, but can't be cleaned.

    See Archive Types Supported for Scanning.

    Scan memory

    The virus scan will be more thorough if you scan the memory in addition to the disk(s).

    Note:

    • If the scan detects a virus/malware in memory, it will report the event. It will not clean, delete, or quarantine the virus/ malware.
    • Exclusions are not applied to memory scans.

    Rootkit detection

    A rootkit, similar to a hack tool, enables attackers to gain administrator access to a system. They hide the attacker's presence and give them full control of a server or client endpoint without being noticed.

  17. Set the CPU utilization % threshold to control the level of impact the scan is to have on endpoint performance:
  18. Setting

    Result

    High

    Quicker scanning but may noticeably impact endpoint performance.

    Medium

    Balances scan speed with endpoint performance impact (default option).

    Low

    Slower scanning but has the lowest impact on endpoint performance.

  19. Set the logging options:
  20. As logging information is kept on the endpoint, the option you choose will not affect the loggings sent to the server.

    Setting

    Result

    Do not log scanning results

    No scan log is generated.

    Normal logging level (includes results summary)

    A standard scan log is generated.

    Detailed logging level (includes results summary, name, time and status for each scanned file)

    A detailed scan log is generated.

    Caution: Logging detailed virus scan results typically generates large amounts of data, especially when recurring scans run frequently.

  21. Exclude files or paths, using one of the following methods:
  22. Masks and system variables can be used to exclude files and paths, see Exclusion Rules.

    Method

    Steps

    Manually exclude specific files and folders from the scan.

    1. Click Add.
      A blank entry is added to the exclusions list.
    2. Select an exclusion type from the Type field.
      The types are File and Folder.
    3. Enter the path to the item you want to exclude in the Path field.
    4. Click to add the exclusion to the list.
      Repeat this procedure for all files and folders you want to exclude from the scan.
    5. Click Remove () to remove items from the exclusion list.

    Import an XML file containing a formatted list of file and folder exclusions.

    See Importing File, Folder and Process Exclusions.

  23. When you are satisfied with all settings made on the Virus and Malware Scan Wizard, click Finish.
    The Virus and Malware Scan Wizard closes. After the scan job completes, you can see the results on the Virus and Malware Scan Results page.

Running a Custom Scan Now on an Endpoint Using the Agent Control Panel

An endpoint user can manually initiate an on-demand virus and malware scan that targets specific drives, folders, and files.

Prerequisites:

  • You must be on an endpoint hosting a Ivanti Endpoint Security Agent.
  • No Scan Now or Recurring Virus and Malware Scan in progress.
  • Ensure the endpoint has the latest version of the AntiVirus Engine and Definition file.
  • Connect any removable media you want to scan to the endpoint (for example, a USB drive).

The ability to narrow scan scope enables you to use a custom Scan Now to:

  • Target suspicious sections of media (for example, folders where content is frequently modified and accessed).
  • Discover infected files before you use them.
  • Scan only specific removable media (for example, a USB drive or DVD).
  • Immediately scan files downloaded from the Internet or received by e-mail.

The scan settings used for a custom Scan Now to control performance and manage detected viruses are:

  • Scan boot sectors: Off
  • Scan archives: On
  • Scan memory: Off
  • Rootkit detection: On (supported on endpoints running Windows versions from Vista onwards)
  • CPU utilization %: Resolved by the endpoint's resultant policy (default of "Medium" where no Recurring Virus and Malware Scan Policy is assigned).
  • Virus detection actions: Resolved by the endpoint's resultant policy. Default of “Attempt to clean then quarantine then delete” where no Real-time Monitoring Policy is assigned.
  • Potentially Unwanted Application (PUA) detection action: Resolved by the endpoint's resultant policy. Default of "Alert and action (treat as malware)" where no Real-time Monitoring Policy is assigned.
  • File and Path Exclusions: Off

When you target a drive or folder, all files and folders it contains (including hidden) are scanned and permissions overruled.

You can view the resultant policy assigned to an endpoint on the Endpoints details page.

  1. On the endpoint, select Start > Control Panel
  2. Double-click Agent Control Panel.
    The Agent Control Panel.
  3. From the main menu, click AntiVirus > Scan Now & Events.
    The Scan Now & Events panel displays.
  4. Click Custom Scan.
  5. The Custom Scan button is disabled when a Scan Now or Recurring Virus and Malware Scan is in progress on the endpoint.

    A dialog box that enables you to select files and folders displays.

  6. Select the drives, folders, and files you want to scan, and then click OK.
    A custom Scan Now commences on the endpoint and "Scan In Progress" displays at the top of the panel. Viruses and malware detected during the scan appear on the Virus and Malware Event Alerts page in the Ivanti Endpoint Security Management Console.

After Completing This Task:

On completion of scanning, you can:

  • View the Scan Now log file on the endpoint in <INSTALL_DIR>\LMAgent\logs\AV.
  • Manage detected threats in quarantine.
  • Report threats as false positives to Ivanti.

Running a Full Scan Now on an Endpoint Using The Agent Control Panel

An endpoint user can quickly initiate a thorough local on-demand virus and malware scan that targets all drives, folders, and files without the need to manually configure scan settings.

Prerequisites:

  • You must be on an endpoint hosting a Ivanti Endpoint Security Agent.
  • No Scan Now or Recurring Virus and Malware Scan in progress.
  • Ensure you have the latest version of the AntiVirus Engine and Definition file.
  • Connect any removable media you want to scan to the endpoint (for example, a USB drive).

Use a full Scan Now in the following situations:

  • Odd behavior observed on the endpoint.
  • Virus outbreak in the network.
  • After considerable Internet use and downloading activity.
  • Long duration between scheduled Virus and Malware scans.

Scan settings configure automatically based on the endpoint's resultant policy. The default settings when no Recurring Virus and Malware Scan Policy is assigned are:

  • Scan boot sectors: On
  • Scan archives: On
  • Scan memory: On
  • Rootkit detection: On (supported on endpoints running Windows versions from Vista onwards)
  • CPU utilization %: Medium
  • Virus detection actions: Attempt to clean then quarantine then delete
  • Potentially Unwanted Application (PUA) detection action: Alert and action (treat as malware)
  • File and Path Exclusions: None

All files and folders (including hidden) are scanned and permissions overruled.

You can view the resultant policy assigned to an endpoint on the Endpoints details page.

  1. On the endpoint, select Start > Control Panel
  2. Double-click Agent Control Panel.
    The Agent Control Panel opens.
  3. From the main menu, click AntiVirus > Scan Now & Events.
    The Scan Now & Events panel displays.
  4. Click Full Scan.

The Full Scan button is disabled when a Scan Now or Recurring Virus and Malware Scan is in progress on the endpoint.

A full Scan Now commences on the endpoint and "Scan In Progress" displays at the top of the panel. Viruses and malware detected during the scan appear on the Virus and Malware Event Alerts page in the Ivanti Endpoint Security Management Console.

After Completing This Task:

On completion of scanning, you can:

  • View the Scan Now log file on the endpoint in <INSTALL_DIR>\LMAgent\logs\AV.
  • Manage detected threats in quarantine.
  • Report threats as false positives to Ivanti.

Running Scan Now on a Group

You can use the Virus and Malware Scan Wizard to run a virus scan on groups that have been selected on the Groups page.

This wizard is similar to the Virus and Malware Scan Wizard available on the Discover menu, except that it does not have a Targets page.

  1. Select Manage > Groups.
    The Groups page opens.
  2. Use the Group Browser to select one or more groups to be scanned.
  3. Select Virus and Malware Event Alerts from the View list.
  4. Click Scan Now.
    The Virus and Malware Scan Wizard opens to the Scan Name and Scheduling page.
  5. [Optional] Type a new name in the Scan Name field.
  6. By default, new virus scans are named New virus and malware scan, followed by the server's date and time, which is formatted according to your browser's locale setting.

  7. Schedule the scan using one of the following methods:
  8. Method

    Steps

    To schedule an immediate scan:

    Select the Run scan immediately option.

    To schedule a later scan:

    1. Select the Run scan at option.
    2. Type the start date in the Start date field. You can also select the start date by clicking the Calendar icon.
    3. Type the start time in the Start time field using a hh:mm format followed by AM or PM. This field supports both 12- and 24-hour time. Alternatively, you can select the start time by clicking the Clock icon.

    The purpose of the deferred scan feature is to enable you to schedule the scan at a time that will not adversely affect network or endpoint performance.

  9. Click Next.
    The Scan Options page opens.
  10. Select the scan policy option:
  11. Setting

    Result

    Use the endpoint's virus and malware scan policy

    The scanning, performance, and logging options of the endpoint's policies will be used. You can click Finish to start the scan.

    Override the endpoint virus and malware scan policy with the following:

    Enables the Scanning, CPU utilization %, and Logging level controls.

    Important: Ensure you have a clear understanding of the scan options before overriding the default settings.

  12. From the drop-down list, select the action that occurs when a virus is detected.
  13. Setting

    Result

    Perform no action

    Does nothing with the infected file, but sends an alert to the server.

    Attempt to clean then quarantine
    [default setting]

    Attempts to clean the infected file. If this is not possible, the file is quarantined. An alert is sent to the server.

    Attempt to clean then delete

    Attempts to clean the infected file. If this is not possible, the file is deleted. An alert is sent to the server.

    Attempt to clean then quarantine then delete

    Attempts to clean the infected file. If this is not possible, the file is quarantined. If it is not possible to quarantine it, it is deleted. An alert is sent to the server.

    Note:

    • To clean an infected file means to completely remove the malicious code so that the file is safe to use. It is not always possible to remove the malicious code, however. When this happens, you can either delete the file or quarantine it. To quarantine means to move it to a safe place on the endpoint where it can be kept for further examination.

      In certain cases (such as when the malware is a Trojan) the entire file is malicious. Such a file cannot be cleaned, so the only options are to quarantine or delete it.
    • Virus detection actions are not used for memory scans.
  14. Set the Scanning options:
  15. Setting

    Result

    Scan boot sectors

    The virus scan will be more thorough if you scan boot sectors in addition to program and data files.

    Note: If malware is detected in a boot sector, the action taken depends on the virus detection option selected:

    • Perform no action - the boot sector is left as it is and an alert is sent to the Virus and Malware Event Alerts page.

    • Clean/Delete/Quarantine - the boot sector is automatically repaired.

    Scan archives

    The virus scan will be more thorough if you scan archive files such as .zip and .cab files.

    Infected .rar files can be quarantined and deleted, but can't be cleaned.

    See Archive Types Supported for Scanning.

    Scan memory

    The virus scan will be more thorough if you scan the memory in addition to the disk(s).

    Note:

    • If the scan detects a virus/malware in memory, it will report the event. It will not clean, delete, or quarantine the virus/ malware.
    • Exclusions are not applied to memory scans.

    Rootkit detection

    A rootkit, similar to a hack tool, enables attackers to gain administrator access to a system. They hide the attacker's presence and give them full control of a server or client endpoint without being noticed.

  16. From the drop-down list, select the action to be taken when a potentially unwanted application (PUA) is detected:
  17. Setting

    Result

    Perform no action
    [default setting]

    The system ignores the potentially unwanted application.

    Send alert only

    An alert is sent to the server only.

    Alert and action (treat as malware)

    An alert is sent to the server and the file is cleaned, quarantined, or deleted, according to the action you selected in the When a virus is detected drop down.

  18. Set the CPU utilization % threshold to control the level of impact the scan is to have on endpoint performance:
  19. Setting

    Result

    High

    Quicker scanning but may noticeably impact endpoint performance.

    Medium

    Balances scan speed with endpoint performance impact (default option).

    Low

    Slower scanning but has the lowest impact on endpoint performance.

  20. Set the logging options:
  21. As logging information is kept on the endpoint, the option you choose will not affect the loggings sent to the server.

    Setting

    Result

    Do not log scanning results

    No scan log is generated.

    Normal logging level (includes results summary)

    A standard scan log is generated.

    Detailed logging level (includes results summary, name, time and status for each scanned file)

    A detailed scan log is generated.

    Caution: Logging detailed virus scan results typically generates large amounts of data, especially when recurring scans run frequently.

  22. Exclude files and folders, using one of the following methods:
  23. Masks and system variables can be used to exclude files and paths, see Exclusion Rules.

    Method

    Steps

    Manually exclude specific files and folders from the scan.

    1. Click Add.
      A blank entry is added to the exclusions list.
    2. Select an exclusion type from the Type field.
      The types are File and Folder.
    3. Enter the path to the item you want to exclude in the Path field.
    4. Click to add the exclusion to the list.
      Repeat this procedure for all files and folders you want to exclude from the scan.
    5. Click Remove () to remove items from the exclusion list.

    Import an XML file containing a formatted list of file and folder exclusions.

    See Importing File, Folder and Process Exclusions.

  24. When you are satisfied with all settings made on the Virus and Malware Scan Wizard, click Finish.
    The Virus and Malware Scan Wizard closes. After the scan job completes, you can see the results on the Virus and Malware Scan Results page.