Damage Cleanup Services cleans computers of file-based and network viruses, and virus and worm remnants (Trojans, registry entries, and viral files). The OfficeScan client triggers DCS before or after virus/malware scanning, depending on the scan type.
- When Manual Scan, Scheduled Scan, or Scan Now runs, the OfficeScan client triggers Damage Cleanup Services first and then proceeds with virus/malware scanning. During virus/malware scanning, the client may trigger Damage Cleanup Services again if cleanup is required.
- During Real-Time Scan, the OfficeScan client first performs virus/malware scanning and then triggers Damage Cleanup Services if cleanup is required.
Choose from the following types of cleanup that Damage Cleanup Services runs:
- Standard cleanup: The OfficeScan client performs any of the following actions during standard cleanup:
- Detects and removes live Trojans
- Kills processes that Trojans create
- Repairs system files that Trojans modify
- Deletes files and applications that Trojans drop
Advanced cleanup: In addition to the standard cleanup actions, the OfficeScan client stops activities by rogue security software, also known as FakeAV. The OfficeScan client also uses advanced cleanup rules to proactively detect and stop applications that exhibit FakeAV behavior.While providing proactive protection, advanced cleanup may result in a high number of false-positives.
DCS does not run cleanup on probable virus/malware unless you select the option Run cleanup when probable virus/malware is detected. You can only select this option if the action on probable virus/malware is not Pass or Deny Access.
To make sure that the action on probable virus/malware is not Pass or Deny Access, do the following:
- For ActiveAction, enable Customize action for probable virus/malware.
- Choose an action that is not Pass or Deny Access.
- If you indicate Use the same action for all virus/malware types, choose a 1st Action and a 2nd Action that does not use Pass or Deny Access.
- If you indicate Use a specific action for each virus/malware type, make sure that the entry for Probable Virus/Malware does not use Pass or Deny Access.