Remote Monitoring & Management Help

VIPRE Engine - Protection Policies


The General tab specifies the type of device the policy applies to and includes:

End-User Interaction

  • Show Task Bar icon
  • Allow user to run manual scans
  • Allow user to cancel, pause and resume scans
  • Allow user to scan files and folders in Windows Explorer right-click menu


Determines the way in which quarantined items are handled: Delete items from quarantine that are older than X days, along with the ability to disable this option.


How often to check for definition updates, Update threat definitions every X hours, along with the ability to disable this option.

The General section is also used to configured the suppression threshold for the No communication from Managed Antivirus Agent failures.

By default the Managed Antivirus Check will fail where we have not received any communication from the Managed Antivirus Agent after 2 cycles (12.5 minutes of inactivity) with the option to increase or decrease this threshold via the drop-down, including Never fail check due to inactivity of Managed Antivirus Agent.

Laptop Power Save Mode

When the policy Type is set to Laptop the additional Laptop Power Save Mode option becomes available. This is designed to conserve power, where enabled the Managed Antivirus Agent does not perform scans, updates or report in to the Dashboard where the laptop is running on battery.

As the Managed Antivirus Agent does not communicate back to the Dashboard where Laptop Power Save Mode is selected, to prevent the generation of spurious notifications the No communication from Managed Antivirus Agent Alert is disabled where this option is enabled.

clip1368 clip0692


The Scanning tab specifies options common to both quick and deep scan such as whether to scan USB drives upon insertion, whether to exclude low risk threats from detection and what to do if a scheduled scan is missed.


Quick Scan and Deep Scan

The Quick Scan tab and Deep Scan tab specify where to scan (drives and common threat locations etc), what to scan (common file types) and when to run quick scan and deep scan respectively.

Note: Managed Antivirus Scans run based on the local time of the computer the Agent is installed on.

clip0376 clip0377

Active Protection

The Active Protection tab specifies the behavior of the resident in-memory scanner, whether it is enabled*,  if  the end user is alerted when a threat is blocked and when to scan (on execution or when some or all files are touched).

There are three On access type options available for Active Protection

Execution Only

Active Protection scans any file - not just executables - on execution i.e. where the file is accessed (opened, read, copied, moved or executed etc).

This setting is optimal during normal conditions

High Risk Extensions Only

Active Protection will only scan those files with the specified extension (that are considered high risk) when they are executed or touched (e.g. directory listing)

All Touched Files

Active Protection scans all files when they are executed, copied onto the computer or touched.

Use of this setting can result in slower system performance, depending on machine specifications, as well as the number and type of programs running. This setting should only be selected in the event that a malware outbreak is suspected.

*Please be aware that when Active Protection is disabled, Fail check if scan has not run for: X day(s) is applied. This settings fails the Managed Antivirus Check where a Quick Scan or Deep Scan of the device has not taken place within the specified number of days, up to 30.



The Remediation tab specifies what action the Managed Antivirus agent should take when it discovers traces of a threat during a Quick Scan, Deep Scan or Active Protection event.

All threats are categorized and different remediation actions (Allow, Report, Quarantine or Delete) can be set for each category and sub-category.

Remediation Level



the threat is allowed to run on the machine and is not reported on


the threat is allowed to run on the machine and is reported on.


the threat is placed in quarantine.


the threat is completely removed and is unrecoverable.

Please note that the Report and Delete actions apply to scheduled scans only.

Should Active Protection detect a threat in a category with these actions, it will respectively Allow or Quarantine the threat instead.

For a list of all available threat types please refer to Remediation Options


Allowed Threats

The Allowed Threats tab specifies any programs that although listed in threat definitions are not harmful and should be ignored by Managed Antivirus agent (for example: remote control tools).

clip0379 clip0380


The Exceptions tab specifies files and folders that are to be excluded from scanning (Always Allow) in addition to any files or folders that are considered harmful and will be blocked by the Managed Antivirus agent (Always Block).

Always Allow and Always Block may be configured at the File, File with Path and Folder level, in the returned dialog simply enter the name of the target file, path or folder. Click Save once complete to apply.


Enter the name of the file to Always Allow or Always Block.

The relevant action will be performed regardless of where the file is located.

File with Path

Enter a file and its path to Always Allow or Always Block.

Please note, the selected action will only be performed where the file is located in this specific path.

Where the file is moved to a new location or another file with the same name exists elsewhere the Always Allow or Always Block setting will not be applied to that file.


Enter a folder to Always Allow or Always Block

Please note, the selected action will only be performed on the folder and its contents where the folder is located in this specific path.

Where the folder is moved to a new location or another folder with the same name exists elsewhere the Always Allow or Always Block setting will not be applied to that folder or its contents.

Please Note: wildcards are supported for exclusions only (Always Allow) and do not include environment variables.

Always Allow Wildcards


Matches exactly one character, except the directory separator


Matches zero or more characters, except the directory separator

Examples of supported entity types:




Always Allow

Always Block

File Name


Name of the file, wildcards not permitted.

File Name (Pattern)


Name of the file, wildcards permitted

File with Path


Fully specified path to a file, wildcard not permitted

File with Path (Pattern)


Fully specified path to a file, wildcard permitted



Fully specified path to a file, wildcard not permitted.

Folder (Pattern)


Fully specified path to a file, wildcard permitted

Multiple Path Levels


Matches: kernel32.dll, advapi32.dll


Matches: C:\WINDOWS\system32\kernel32.dll, C:\WINDOWS\system32\advapi32.dll, etc


Matches: C:\WINDOWS\system32\kernel32.dll, D:\WINNT\system\advapi32.dll, etc

Notes, when entering the location of a Folder this must terminate with a directory separator.

All folder entities are recursive and thus will match the folder itself and any descendant files and folders. For example, C:\WINDOWS\ matches C:\WINDOWS\, C:\WINDOWS\SYSTEM32\, C:\WINDOWS\notepad.exe, C:\WINDOWS\SYSTEM32\regedit.exe, etc

Warning: care must be taken when configuring the Always Block policy settings to ensure important system files or folders are not quarantined (depending on the remediation action specified for Misc category, Misc General sub-category).


Please be aware that Dashboard 6.3 includes the option to migrate a VIPRE Protection Policy for use by the Bitdefender engine with this covered in Protection Policy Migration - VIPRE to Bitdefender Engine with Protection Policy Migration Behavior covering those VIPRE settings that are transferred over.

What do you want to do?