Version 4.12
System Requirements
Faronics Anti-Virus works with any computers running Windows XP SP3 (32-bit), Windows XP SP2 (64-bit), Windows Vista SP2 (32/64-bit), Windows 7 (32/64-bit), Windows 8.1 (32/64-bit), Windows 10 (32/64-bit), Windows Server 2003 (32/64-bit), Windows Server 2008 (64-bit), Windows Server 2012 (64-bit).
High Performance Technology
- The antivirus engine analyzes malware in real-time, observing its behavior before it can actually infect the computer – ensuring zero-day threat detection
- Advanced anti-rootkit technology finds and disables dangerous hidden processes, modules, services, and files
- High speed file scanning
- Low CPU and memory usage during scans
- Efficient, continuous virus definition updates
- Regular threat-engine updates
- USB devices are automatically scanned upon connecting
- Option to exclude folders and files from scans
Centralized Management & Integration
- Faronics Core provides a secure platform to manage anti-virus protection (definitions and threat-engine updates) across the enterprise
- Configuration and scan scheduling done via “policies” that are centrally applied to workstations
- Virus definition updates are managed and hosted on Faronics Core Server
- Full global or workstation-specific threat reporting available via Faronics Core Console
- Out-of-the-box compatibility with Faronics Deep Freeze and Anti-Executable to provide a solid “layered security” strategy
- Real-time alerts when a virus is found or when antivirus is running older definitions
- Reports on protection status, scan history, quarantined files, firewall network traffic and much more
Advanced Protection
- Built-in firewall can restrict access of specific programs and protocols to certain networks, computers, and IP addresses
- Program Rules define the action taken by the firewall on the network activity to and from the application.
- Network Rules define the action taken by the firewall on the network activity.
- Trusted Zone and Internet (Non-Trusted) can be treated differently by Application and Network Rules.
- Trusted Zones specify computers, networks and IP addresses that are safe.