File Shield

This Article Applies to:

  • Business Hub
  • Avast Business On-Premise Console

File Shield is the main layer of active protection in Avast Business Antivirus. It scans programs and files saved on devices for malicious threats in real-time before allowing them to be opened, run, modified, or saved. If malware is detected, File Shield prevents the program or file from infecting devices.

We strongly recommend you always keep this shield turned on and only make configuration changes if you have an advanced understanding of malware protection principles.

Business Hub and Cloud Console: Windows and MacOS X configuration options are mixed together in the policy settings for the various components.

On-Premise Console: For Windows configuration options, see below. For MacOS X configuration options, click here: MacOS X (On-Premise Console).

Scan Behavior Tab

Business Hub and Avast Business Cloud Console

Avast Business On-Premise Console

Scan when executing: select whether to scan programs, scripts, and/or libraries when the files or programs are executed

Scan when opening: select whether to scan documents, documents with custom extensions (you input), and/or all files when the documents or files are opened

Scan when attaching: select whether to scan auto-run items and/or diskette boot sectors when removable media is attached

Scan when writing: select whether to scan files when writing (default extensions, custom extensions, or all files), and also whether or not to scan files on remote shares or removable media when the files are created or modified

Policy: (Business Hub and Cloud Console) for MacOS X systems; select whether to report potentially unwanted programs (PUPs), and move infected files to chest or not.

Exclusions Tab (On-Premise Console only)

Configure the list of locations that are not scanned by File Shield, when they are Read, Written, and/or Executed.

This tab does not exist in the Business Hub, as exclusions are added exclusively in the Exclusions page of the policy.

For more information on configuring exclusions for File Shield, see File Shield Exclusions.

Exclusions that you specify on this screen only apply to File Shield and do not affect any other scans or Shields. To exclude a location from all Avast Business Antivirus scans, see Configuring Standard Antivirus Exclusions.

Actions Tab

Business Hub and Avast Business Cloud Console

Avast Business On-Premise Console

Control what actions are taken by Avast when a virus, potentially unwanted program (PUP), or suspicious file is detected.

Main Action /First action to try : select the first action your Antivirus will take between Fix Automatically, Move to chest, Repair, Ask, Delete, or No Action.

If, for whatever reason, Avast cannot complete the main action, it will attempt the action selected under If the action fails, use.

Notification Options: choose whether to show notifications when File Shield takes action against a detected threat, and/or to perform the selected action upon restart.

Processing of infected archives: choose whether to only remove the packed file from the archive (and if that fails, do nothing), remove the packed file from the archive (and if that fails, remove the entire archive), or to remove the entire archive.

Packers Tab

Business Hub and Avast Business Cloud Console

Avast Business On-Premise Console

Configure which archive (packer) files Avast Business Antivirus should try to unpack during the scanning process. Unpacked files can be better analyzed for malware by File Shield. Unpacking a file is the same as extracting a file from an archive. Original archives, including the files contained within, remain intact when being processed by your Shield.

You can select All packers, or specific packer files from the extensive list by checking the boxes.

Sensitivity Tab

Business Hub and Avast Business Cloud Console

Avast Business On-Premise Console

Adjust the sensitivity of the Avast Business Antivirus scan for File Shield.

Heuristics Sensitivity: Heuristics enable Antivirus to detect unknown malware by analyzing code for commands that may indicate malicious intent. The default setting is Normal. With higher sensitivity, Antivirus is more likely to detect malware, but also more likely to make false-positive detections that incorrectly identify files as malware. Code emulations unpack and test suspected malware in an emulated environment where the file cannot cause damage to devices. Use code emulation is enabled by default

Sensitivity: choose to test whole files, which will cause the scan to be slower but more extensive

PUP and suspicious files: choose whether or not to scan for Potentially Unwanted Programs (PUPs)

Report File

Business Hub and Avast Business Cloud Console

Avast Business On-Premise Console

Customize the content of the Shield-specific scan report file, such as which items are included, the file name, and file type. The report is saved in one of the following locations:

  • Windows 10, Windows 8.1, Windows 8, Windows 7, or Windows Vista: C:\ProgramData\Avast Software\Avast\report
  • Windows XP: C:\Documents and Settings\All Users\Application Data\Avast Software\Avast\report

MacOS X (On-Premise Console)

Settings: controls whether infected files are moved to virus chest, PUPs are reported, and allows you to configure exclusions.

For more information on configuring exclusions for File Shield, see File Shield Exclusions.

Exclusions that you specify on this screen only apply to File Shield and do not affect any other scans or Shields. To exclude a location from all Avast Business Antivirus scans, see Configuring Standard Antivirus Exclusions.

Anti-Exploit Shield

The Anti-Exploit Shield is part of File Shield, but is not manageable via Policies and only visible on the end device. The shield scans and protects against known exploits in popular software. For example, the newly discovered "Hafnium Exchange" exploit is protected by the exploit protection.

As long as Rootkit detection is enabled in Core Shield settings on the end device, the Anti-exploit Shield will be active. For more information, see Core Shield Settings.