It is recommended that you carry out a complete scan on first time installation. This will ensure that your computer is fully clean and secure and also minimize the scanning process next time.
In Quick Heal, there are various types of scan options to suite your requirements. You can initiate scanning of your entire system, or certain drives, network drives, USB drives, folders or files, locations and drives, memory scan, and boot time scan. Although the default settings for manual scan are usually adequate, you can adjust the options for manual scan as you prefer.
Quick Scan
This feature completes the scanning of your system on faster pace. With Quick Scan, only the predefined locations that can be vulnerable to malicious attacks are scanned.
To initiate a quick scan, follow these steps:
- Open Quick Heal Internet Security Essentials.
- On the left pane, click Status. Click Scan Now or click the spilt button and then select Quick Scan.
The scan starts.
On completion of the scan, you can view the scan report under Reports.
Full System Scan
This feature helps you initiate a complete scan of all boot records, drives, folders, files, and vulnerabilities on your computer (excluding mapped network drives).
Full System Scan is advisable soon after first installation. Our Full System Scan is smart to run a complete scan for the first time. Next time, it scans only new files or those files that have been changed. This differential scanning optimizes scanning time.
To initiate a full system scan, follow these steps:
- Open Quick Heal Internet Security Essentials.
- On the left pane, click Status. Click the spilt button available next to Scan Now and then select Full System Scan.
The scan starts.
On completion of the scan, you can view the scan report under Reports.
Custom Scan
This feature helps you scan specific drives and folders on your system. This is helpful when you want to scan only certain items and not the entire system.
To scan specific folders, follow these steps:
- Open Quick Heal Internet Security Essentials.
- On the left pane, click Status. Click the spilt button available next to Scan Now and then select Custom Scan.
- On the Custom Scan screen, a list of items is displayed in the Scan Item list if you have added any items to scan. If you have not added any item before or you want to scan some new items, click Add to add the scan items.
- On the Browse for Folder list, select the folders that you want to scan.
You can add multiple folders for scanning. All the subfolders in the selected folder will also be scanned. You can exclude subfolder from scanning if required. To exclude the subfolder, select the Exclude Subfolder option and then click OK.
- On the Browse for Folder list, select the folders that you want to scan.
- Select an item from the Scan Item list and then click Start Scan.
The scan begins.
Upon completion of the scanning, you can view the scan report in the Reports menu.
Memory Scan
This feature scans memory of your computer system.
To perform a memory scan, follow these steps:
- Open Quick Heal Internet Security Essentials.
- On the left pane, click Status. Click the spilt button available next to Scan Now and then select Memory Scan.
The scan starts.On completion of the scan, you can view the scan report under Reports.
The following fields are displayed during a scan.
Fields | Description |
---|---|
Files scanned | Displays the total number of files scanned. |
Archive/Packed | Displays the number of archive or packed files scanned. |
Threats detected | Displays the number of threats detected. |
DNAScan warnings | Displays the number of files detected by DNAScan. |
Boot/Partition viruses | Displays the number of Boot/Partition viruses. |
Files repaired | Displays the number of malicious files that have been repaired. |
Files quarantined | Displays the number of malicious files that have been quarantined. |
Files deleted | Displays the number of malicious files that have been deleted. |
Scanning status | Displays the status of the scan being performed. |
Boot Time Scan
This feature helps to clean even highly infected systems. Some viruses tend to be active if the system is running and they cannot be cleaned. Using Boot Time Scan, you can clean such viruses. This scan will be performed on next boot using Windows NT Boot Shell.
To set Boot Time Scan, follow these steps:
- Open Quick Heal Internet Security Essentials.
- On the left pane, click Status. Click the split button available next to Scan Now and then select Boot Time Scan.
Boot Time Scan has the following options:- Quick Scan: Scans only system pre-defined locations that are at high risk to viruses.
- Full System Scan: Scans the entire system. This may be time consuming.
- Click Yes.
- To restart the system for scanning immediately, click Yes. To scan the system later, click No.
Note: In case Boot Time Scan takes time or it has been initiated by mistake, you can stop it by pressing the ESC key.
Vulnerability Scan
Vulnerabilities are the flaws present in the operating system settings and applications that can be misused by hackers. If you identify these vulnerabilities in time, you can fix or patch them to make your system secure.
Vulnerability Scan in the new version of Quick Heal Internet Security Essentials brings to you a comprehensive preventive detection method. It identifies vulnerabilities in the operating system settings and applications so that you can fix or patch the vulnerabilities before your system is compromised.
To run Vulnerability Scan, follow these steps:
- Open Quick Heal Internet Security Essentials.
- On the left pane, click Status. Click the spilt button available next to Scan Now and then select Vulnerability Scan.
Vulnerability Scan checks for vulnerabilities of the following types:
Vulnerable System Settings: Detects vulnerable operating system settings that could lead to security threats.
Vulnerabilities found in Applications: Detects vulnerabilities present in the applications that are installed on your computer.
When the scan is complete, a summary of the scan is displayed. If you want to see the detailed report on the detected vulnerabilities, click a category from Vulnerable System Settings and Vulnerabilities found in Applications.
When scan is complete, a report on vulnerabilities is displayed with following details.
Report types | Description |
---|---|
Vulnerable System Settings | Displays detected vulnerabilities in the operating system settings. To see the report in detail, click Vulnerable System Settings on the Vulnerability Scan screen. All the vulnerabilities detected in the system settings are listed along with their fixes. You can apply fixes to the vulnerabilities by clicking Fix it under Action. |
Vulnerabilities found in Applications | Displays detected vulnerabilities in the applications installed on your computer. To see the report in detail, click Vulnerabilities found in Applications on the Vulnerability Scan screen. All the vulnerabilities are listed along with their links to the patches. To apply the patches, click Yes under Patch Available. You will be redirected to the relevant websites from where you can download the patches and apply them. If no patch is available, you may consider upgrading the application or contact the support of the application vendor. |