Scheduled scanning should not be dependent on manual scanning setting

viktik Posts: 62 Active Engager

While doing setting of "scheduled scanning" I came to know that it depends on "manual scanning" setting to tell which types of files to scan. Also the exclusion list is taken from "manual scanning".


Same exclusion list is used for both manual and scheduled scanning. Suppose I don't want to schedule scan D: drive. So I would put it in exclusion list. But if with this setting I try to do manual scan files in D: drive then what will happen is all the files of D: drive will be excluded from manual scan. Or else I have to remove D: drive from exclusion list every time I want to scan files in D: drive. Then again put D: drive in exclusion list so that schedule scan don't  scan D: drive.


This is quite cumbersome . So I request a separate setting for scheduled scan rather than just using manual scan setting.



0 votes

Completed · Last Updated


  • Patte
    Patte Posts: 1 Observer

    Yes, thats just stupid. From day to day i think more that it was no good idea buying F-.Secure for my company. It is a pain to get it working like it should.

  • NikK
    NikK Posts: 903 Forum Champion

    With FSAV you should be able to scan however and whatever you want. Add PsExec(from sysinternals) and it can run as Local System Account like a scheduled scan does .

    FSAV supports multiple paths and takes these parameters:

    /ALL        Do a dumb scan of all files.
    /APPEND     Append to existing report file.
    /ARCHIVE    Scan inside .ZIP, .ARJ and .LZH files.
    /BEEP       Beep when a virus is found.
    /DELETE     Delete infected files.
    /DISINF     Disinfect whenever possible.
    /EXT=       List of file extensions to be used in the scan
    /HARD       Scan the hard disk(s).
    /HELP       Display this list.
    /LIST       List all checked files.
    /NOBOOT     Do not scan boot sectors.
    /POLICY     Read scanning parameters from the policy.
    /QUAR       Quarantine infected files.
    /RENAME     Rename infected COM/EXE files.
    /REPORT=    Send the output to a file.
    /ROOTKIT    Scan system for rootkits.
    /SILENT     No output.
    /SPYWARE    Scan the specified path for spyware
    /SYSTEM     Scan the computer for active viruses
    /USEACCOUNT Always use the command-line scanner's account for scanning.
    /VERSION    Show scanner version information.


    Example here:

  • Jaims
    Jaims Posts: 846 Former F-Secure Employee

    Hi @viktik

    This idea has been implemented and now in production.

    The Idea is now considered completed and closed!

    Thank you for your suggestion.

This discussion has been closed.