This Wiki article explains how to create and manage configuration profiles in the Antivirus Pro Portal.
Last adaptation to the version: 2.4 (07.2019)
Overview of the Configuration Profiles
All existing configuration profiles are displayed in this menu. Here, configuration profiles can be edited, created or deleted.
Any number of configuration profiles can be created. This allows different areas, locations or departments to be mapped and differentiated.
Creating a Configuration Profile
|Name||for the configuration profile.|
|Owner|| , which is to have access to the profile can be selected as the owner.|
The assignment of the owner to a company determines who can use this configuration profile. When a configuration profile is created for a reseller (at the top of the group hierarchy), only that reseller has access to that profile. If a profile is created for a customer, this customer and the reseller can access the profile and define recipients for notifications.
|System protection||Real-time monitoring of the entire system|
|Email Protection||Scans emails for malware & viruses|
|Spam protection||Checks emails for spam|
|Automatic Updates||Automatic verification and installation of new software updates and virus database updates|
|Update following installation||One-time virus database and software update after installation|
|Autoscan||This option can be used to configure an automatic scan.|
|Daily Scan||The scan is performed daily|
|Weekly Scan||The scan is performed once a week on that day.|
|Monthly Scan||The scan is performed once a month on that day.|
|checks the Windows installation directory. |
Most computer malware on a Windows system is located in this directory.
|checks the drive or partition on which the operating system is located. |
This checks all archives, directories, folders, and files on the system partition.
|checks all drives of the local PC, including plugged in USB drives.|
|Scan time||Time at which the scan is to be performed (17:00 if not specified)|
|Proxy IP address|
|Proxy Port||The port number must be between 1 and 65535.|
|Proxy Athentification||If activated, the MSI user name and password will be requested during the download.|
Accept the settings with
The following exclusions can be configured:
|File & Folder Exclusion||File & folder path e.g.: C:\example_folder or C:\example_folder\exclusion_01.exe|
|Process exclusion||Process name e.g: Exclusion.exe|
|Theses Actions are available:|
|Deletes this exclusion|
|Setting the password||The password is entered when transferring the configuration. |
We recommend that passwords be stored in a password store, as we do not store passwords.
|Outdated after||Number of days after which a device is to be reported as outdated. The value must be an integer!|
|Time of examination||Time at which the status 'outdated' is checked.|
|Recipient||An existing user or an e-mail address can be defined for notifications.|
|Security status Client insufficient|
|Client not up to date|
|Actions||Deletes the notifications for this recipient.|