The settings window for Load Point Analysis provides the
following options:
Load Point Scan Settings This section of the settings
window provides customizations to what is targetted in the
scan:
Scan Load Points, Running processes, and Common
Directories This option is checked by default and targets the
default set of methods for finding files that might execute without
explicit user permission. These methods are based on years of
experience and should always be used when looking for an undetected
threat.
Scan Program File Directories This checkbox option adds
the Program File directories and sub-directories into the targets
finding executable files to add to the analysis.
Scan additional files and directories This checkbox
allows the user to enter file and/or directory paths to focus the
scan on. The 'Add File' button and 'Add Directory' button create
file selection dialogs to aid in the selection of the path.
Network Proxy Settings This section of the settings
window provides options for detecting proxy settings so that
Symantec Power Eraser can successfully reach the internal and
utilize Symantec Insight reputation data as part of the file
examination process.
Use Windows Internet Explorer settings This default
radio button option assumes that Symantec Power Eraser should use
the Windows Internet Explorer proxy settings when attempting to
access the internet
Use Web Proxy Auto Detect This radio button option uses
Symantec Power Eraser technology to detect proxy configuration. If
the internet cannot be accessed with this method then the Windows
Internet Explorer settings are used.
Use automatic configuration script This checkbox allows
the user to specific a configuration script by entering a url. If
the internet cannot be accessed with this method then the Windows
Internet Explorer settings are used.
Use a proxy server for HTTP connections This radio
button option allows the user to enter the address and port of an
HTTP proxy server. If this option is selected and the internet
cannot be reached, no other configuration will be tried.
I use authorization to connect through my firewall or proxy
server This checkbox allows the user to enter a username and
password for authentication to a firewall or proxy server.