Faronics Anti-Virus Product Specs

Version 4.12

System Requirements
Faronics Anti-Virus works with any computers running Windows XP SP3 (32-bit), Windows XP SP2 (64-bit), Windows Vista SP2 (32/64-bit), Windows 7 (32/64-bit), Windows 8.1 (32/64-bit), Windows 10 (32/64-bit), Windows Server 2003 (32/64-bit), Windows Server 2008 (64-bit), Windows Server 2012 (64-bit).


High Performance Technology

  • The antivirus engine analyzes malware in real-time, observing its behavior before it can actually infect the computer – ensuring zero-day threat detection
  • Advanced anti-rootkit technology finds and disables dangerous hidden processes, modules, services, and files
  • High speed file scanning
  • Low CPU and memory usage during scans
  • Efficient, continuous virus definition updates
  • Regular threat-engine updates
  • USB devices are automatically scanned upon connecting
  • Option to exclude folders and files from scans

Centralized Management & Integration

  • Faronics Core provides a secure platform to manage anti-virus protection (definitions and threat-engine updates) across the enterprise
  • Configuration and scan scheduling done via “policies” that are centrally applied to workstations
  • Virus definition updates are managed and hosted on Faronics Core Server
  • Full global or workstation-specific threat reporting available via Faronics Core Console
  • Out-of-the-box compatibility with Faronics Deep Freeze and Anti-Executable to provide a solid “layered security” strategy
  • Real-time alerts when a virus is found or when antivirus is running older definitions
  • Reports on protection status, scan history, quarantined files, firewall network traffic and much more

Advanced Protection

  • Built-in firewall can restrict access of specific programs and protocols to certain networks, computers, and IP addresses
  • Program Rules define the action taken by the firewall on the network activity to and from the application.
  • Network Rules define the action taken by the firewall on the network activity.
  • Trusted Zone and Internet (Non-Trusted) can be treated differently by Application and Network Rules.
  • Trusted Zones specify computers, networks and IP addresses that are safe.

Awards and Achievements