{"id":4176,"date":"2024-03-27T13:22:39","date_gmt":"2024-03-27T12:22:39","guid":{"rendered":"https:\/\/kb.apptec360.com\/manual\/knowledgebase\/configuration-de-la-securite\/antivirus\/"},"modified":"2024-12-04T05:04:46","modified_gmt":"2024-12-04T04:04:46","slug":"antivirus","status":"publish","type":"knowledgebase","link":"https:\/\/kb.apptec360.com\/manual\/fr\/knowledgebase\/configuration-pc-windows-10\/general-3\/gestion-de-la-securite-3\/configuration-de-la-securite\/antivirus\/","title":{"rendered":"Antivirus"},"content":{"rendered":"\n<table id=\"tablepress-285\" class=\"tablepress tablepress-id-285\">\n<caption style=\"caption-side:bottom;text-align:left;border:none;background:none;margin:0;padding:0;\"><a href=\"https:\/\/kb.apptec360.com\/manual\/wp-admin\/admin.php?page=tablepress&#038;action=edit&#038;table_id=285\" rel=\"nofollow\">\u00c9diter<\/a><\/caption>\n<tbody class=\"row-hover\">\n<tr class=\"row-1 odd\">\n\t<td colspan=\"2\" class=\"column-1\" style=\"text-align: center;\"><br\/>\n        <p><strong>Param\u00e8tres antivirus &#8211; Configuration de l&rsquo;analyse<\/strong><\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-2 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Type d&rsquo;analyse<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Permet de choisir entre une analyse rapide et une analyse compl\u00e8te.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-3 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>D\u00e9finir le d\u00e9but du balayage<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>S\u00e9lectionne l&rsquo;heure de la journ\u00e9e \u00e0 laquelle Windows Defender commencera l&rsquo;analyse.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-4 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Fr\u00e9quence de balayage<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>S\u00e9lectionne le jour o\u00f9 l&rsquo;analyse de Windows Defender doit \u00eatre ex\u00e9cut\u00e9e<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-5 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Fr\u00e9quence de mise \u00e0 jour de la signature<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Sp\u00e9cifie l&rsquo;intervalle en heures qui sera utilis\u00e9 pour v\u00e9rifier les signatures.<\/p><br\/>\n      <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n<div class=\"pagebreak-after\"><\/div>\n\n<table id=\"tablepress-286\" class=\"tablepress tablepress-id-286\">\n<caption style=\"caption-side:bottom;text-align:left;border:none;background:none;margin:0;padding:0;\"><a href=\"https:\/\/kb.apptec360.com\/manual\/wp-admin\/admin.php?page=tablepress&#038;action=edit&#038;table_id=286\" rel=\"nofollow\">\u00c9diter<\/a><\/caption>\n<tbody class=\"row-hover\">\n<tr class=\"row-1 odd\">\n\t<td colspan=\"2\" class=\"column-1\" style=\"text-align: center;\"><br\/>\n        <p><strong>Configurer le type de fichiers \u00e0 scanner<\/strong><\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-2 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Permettre l&rsquo;analyse des fichiers d&rsquo;archives<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Autoriser ou non l&rsquo;analyse des archives (telles que .zip) lors de l&rsquo;acc\u00e8s.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-3 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Autoriser l&rsquo;analyse des scripts<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Permet ou d\u00e9sactive la fonctionnalit\u00e9 d&rsquo;analyse des scripts de Windows Defender.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-4 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Permettre l&rsquo;analyse des courriels<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Autoriser ou interdire l&rsquo;analyse des courriels.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-5 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Autoriser l&rsquo;analyse des fichiers du r\u00e9seau<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Autoriser ou interdire l&rsquo;analyse des fichiers du r\u00e9seau.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-6 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Permettre l&rsquo;analyse compl\u00e8te des lecteurs r\u00e9seau mapp\u00e9s<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Autoriser ou interdire l&rsquo;analyse des lecteurs r\u00e9seau mapp\u00e9s (activ\u00e9 uniquement lorsque l&rsquo;analyse compl\u00e8te est activ\u00e9e).<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-7 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Contr\u00f4le du balayage bidirectionnel<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Contr\u00f4le les ensembles de fichiers \u00e0 surveiller.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-8 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Permettre l&rsquo;analyse compl\u00e8te des disques amovibles<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Autoriser ou interdire l&rsquo;analyse compl\u00e8te des lecteurs amovibles. Uniquement lorsque l&rsquo;analyse compl\u00e8te est lanc\u00e9e. <\/p><br\/>\n      <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n<table id=\"tablepress-287\" class=\"tablepress tablepress-id-287\">\n<caption style=\"caption-side:bottom;text-align:left;border:none;background:none;margin:0;padding:0;\"><a href=\"https:\/\/kb.apptec360.com\/manual\/wp-admin\/admin.php?page=tablepress&#038;action=edit&#038;table_id=287\" rel=\"nofollow\">\u00c9diter<\/a><\/caption>\n<tbody class=\"row-hover\">\n<tr class=\"row-1 odd\">\n\t<td colspan=\"2\" class=\"column-1\" style=\"text-align: center;\"><br\/>\n        <p><strong>Type de fichiers \u00e0 exclure de l&rsquo;analyse<\/strong><\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-2 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Ignorer les types de fichiers \u00e0 num\u00e9riser<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>D\u00e9finissez un ensemble de types d&rsquo;extensions de fichiers. Chaque extension de fichier pour chaque champ. <\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-3 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Ignorer les chemins d&rsquo;acc\u00e8s aux r\u00e9pertoires<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>D\u00e9finissez un ensemble de chemins d&rsquo;acc\u00e8s aux r\u00e9pertoires afin de ne pas les analyser. Un chemin par champ. Exemples : \u00ab\u00a0C:\\NExemple\u00a0\u00bb, \u00ab\u00a0C:\\NWindows\u00a0\u00bb ou \u00ab\u00a0C:\\NUsers\u00a0\u00bb.  <\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-4 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Exclure les processus de l&rsquo;analyse<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Excluez des analyses antivirus de Microsoft Defender les fichiers qui ont \u00e9t\u00e9 ouverts par des processus sp\u00e9cifiques. . Un chemin par champ. Exemples : \u00ab\u00a0C:\\NmyFile.exe\u00a0\u00bb, \u00ab\u00a0C:\\NWindows\\NmyProcess.exe\u00a0\u00bb, \u00ab\u00a0C:\\NmyScript.bat\u00a0\u00bb, \u00ab\u00a0C:\\NMyFile.exe\u00a0\u00bb, \u00ab\u00a0C:\\NWindows\\NProcess.exe\u00a0\u00bb.   <\/p><br\/>\n      <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n<div class=\"pagebreak-after\"><\/div>\n\n<table id=\"tablepress-289\" class=\"tablepress tablepress-id-289\">\n<caption style=\"caption-side:bottom;text-align:left;border:none;background:none;margin:0;padding:0;\"><a href=\"https:\/\/kb.apptec360.com\/manual\/wp-admin\/admin.php?page=tablepress&#038;action=edit&#038;table_id=289\" rel=\"nofollow\">\u00c9diter<\/a><\/caption>\n<tbody class=\"row-hover\">\n<tr class=\"row-1 odd\">\n\t<td colspan=\"3\" class=\"column-1\" style=\"text-align: center;\"><br\/>\n        <p><strong>Param\u00e8tres suppl\u00e9mentaires<\/strong><\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-2 even\">\n\t<td colspan=\"2\" class=\"column-1\"><br\/>\n        <p>Permettre un contr\u00f4le en temps r\u00e9el<\/p><br\/>\n      <\/td><td class=\"column-3\"><br\/>\n        <p>Autoriser ou interdire la fonctionnalit\u00e9 de surveillance en temps r\u00e9el de Windows Defender<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-3 odd\">\n\t<td colspan=\"2\" class=\"column-1\"><br\/>\n        <p>Permettre le suivi des comportements<\/p><br\/>\n      <\/td><td class=\"column-3\"><br\/>\n        <p>Autoriser ou interdire la fonctionnalit\u00e9 de surveillance du comportement de Windows<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-4 even\">\n\t<td colspan=\"2\" class=\"column-1\"><br\/>\n        <p>Permettre la protection du nuage<\/p><br\/>\n      <\/td><td class=\"column-3\"><br\/>\n        <p>Autorisez ou non Windows Defender \u00e0 envoyer des informations \u00e0 Microsoft sur les probl\u00e8mes qu&rsquo;il d\u00e9tecte. Microsoft analysera ces informations, en apprendra davantage sur le probl\u00e8me affectant l&rsquo;appareil et proposera des solutions am\u00e9lior\u00e9es. <\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-5 odd\">\n\t<td class=\"column-1\"><\/td><td colspan=\"2\" class=\"column-2\"><br\/>\n        <p>Comportement lors de l&rsquo;envoi d&rsquo;\u00e9chantillons<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-6 even\">\n\t<td colspan=\"2\" class=\"column-1\"><br\/>\n        <p>Autoriser la protection IOAV de Windows Defender<\/p><br\/>\n      <\/td><td class=\"column-3\"><br\/>\n        <p>Autoriser ou refuser la protection IOAV de Windows Defender<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-7 odd\">\n\t<td colspan=\"3\" class=\"column-1\"><br\/>\n        <p>Autoriser l&rsquo;acc\u00e8s \u00e0 l&rsquo;interface utilisateur de Defenders \u00ab\u00a0Protection de l&rsquo;acc\u00e8s\u00a0\u00bb.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-8 even\">\n\t<td colspan=\"2\" class=\"column-1\"><br\/>\n        <p>Facteur de charge moyen de l&rsquo;unit\u00e9 centrale<\/p><br\/>\n      <\/td><td class=\"column-3\"><br\/>\n        <p>Repr\u00e9sente le facteur de charge moyen du processeur pour l&rsquo;analyse de Windows Defender (en pourcentage).<\/p><br\/>\n      <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n<table id=\"tablepress-288\" class=\"tablepress tablepress-id-288\">\n<caption style=\"caption-side:bottom;text-align:left;border:none;background:none;margin:0;padding:0;\"><a href=\"https:\/\/kb.apptec360.com\/manual\/wp-admin\/admin.php?page=tablepress&#038;action=edit&#038;table_id=288\" rel=\"nofollow\">\u00c9diter<\/a><\/caption>\n<tbody class=\"row-hover\">\n<tr class=\"row-1 odd\">\n\t<td colspan=\"2\" class=\"column-1\" style=\"text-align: center;\"><br\/>\n        <p><strong>Traitement des logiciels malveillants<\/strong><\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-2 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Faible gravit\u00e9<\/p><br\/>\n      <\/td><td rowspan=\"4\" class=\"column-2\"><br\/>\n        <p>Vous pouvez d\u00e9finir, pour chaque niveau de gravit\u00e9, la mani\u00e8re dont l&rsquo;appareil traite les logiciels malveillants.<\/p><br\/>\n        <p>Les options disponibles sont les suivantes :<\/p><br\/>\n        <ul><br\/>\n          <li>Nettoyer<\/li><br\/>\n          <li>Quarantaine<\/li><br\/>\n          <li>Enlever<\/li><br\/>\n          <li>Permettre<\/li><br\/>\n          <li>D\u00e9fini par l&rsquo;utilisateur<\/li><br\/>\n          <li>Bloc<\/li><br\/>\n        <\/ul><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-3 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Gravit\u00e9 mod\u00e9r\u00e9e<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-4 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Gravit\u00e9 \u00e9lev\u00e9e<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-5 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Gravit\u00e9 s\u00e9v\u00e8re<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-6 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Jours de conservation des logiciels malveillants nettoy\u00e9s<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>P\u00e9riode de temps en jours pendant laquelle les fichiers\/\u00e9l\u00e9ments en quarantaine seront stock\u00e9s sur le syst\u00e8me. La valeur par d\u00e9faut est 0, ce qui permet de conserver les \u00e9l\u00e9ments en quarantaine et de ne pas les supprimer automatiquement. La valeur maximale est de 90.  <\/p><br\/>\n      <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n<div class=\"pagebreak-after\"><\/div>\n","protected":false},"parent":4162,"menu_order":0,"template":"","class_list":["post-4176","knowledgebase","type-knowledgebase","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/kb.apptec360.com\/manual\/fr\/wp-json\/wp\/v2\/knowledgebase\/4176","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kb.apptec360.com\/manual\/fr\/wp-json\/wp\/v2\/knowledgebase"}],"about":[{"href":"https:\/\/kb.apptec360.com\/manual\/fr\/wp-json\/wp\/v2\/types\/knowledgebase"}],"version-history":[{"count":2,"href":"https:\/\/kb.apptec360.com\/manual\/fr\/wp-json\/wp\/v2\/knowledgebase\/4176\/revisions"}],"predecessor-version":[{"id":13807,"href":"https:\/\/kb.apptec360.com\/manual\/fr\/wp-json\/wp\/v2\/knowledgebase\/4176\/revisions\/13807"}],"up":[{"embeddable":true,"href":"https:\/\/kb.apptec360.com\/manual\/fr\/wp-json\/wp\/v2\/knowledgebase\/4162"}],"wp:attachment":[{"href":"https:\/\/kb.apptec360.com\/manual\/fr\/wp-json\/wp\/v2\/media?parent=4176"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}