Metascan Video: How to Configure Archive Scanning
Our latest Metascan® support video provides easy-to-follow steps for customizing archive scanning settings from the Metascan Management Console. In case you haven't heard about both the challenges and benefits of archive scanning, here's a quick overview.
The two primary methods used for detecting embedded threats within a compressed file are extracted and unextracted archive file scanning. By testing both extracted and unextracted scan results generated by Metascan Online, we found that each of the methods were able to uncover separate threats. Based on these results, we recommend using both methods for scanning compressed files, as they provide unique insights as to whether a file is malicious. If you want to read more information on the benefits of archive scanning, please download the white paper on detecting threats in compressed files.
Now you are ready to review your customization options for archive scanning. By default, archive scanning should already be selected under the "workflow" tab on the Management Console. Once you are there, you can input specific values for the recursion level (how deep Metascan is allowed to go before if stops extracting), the number of files extracted, and the size of the files extracted.
[[nid:1031]] |
Please let us know if you found this video helpful and tweet us @OPSWAT if you have any questions!
For more information, please contact one of our cybersecurity experts.

- Academy 22
- Advanced Threat Prevention 69
- CEO's Blog 25
- Company Announcements 143
- Company Culture 15
- CVEs 285
- Deep CDR 68
- DevSecOps 3
- Email Security 32
- Engineering Blog 3
- File Upload Security 26
- Industrial Cybersecurity 26
- Kiosk & USB Security 38
- Malware Analysis 83
- OACCP Certification 46
- OESIS Framework 131
- Product Announcements 349
- Reports 28
- Secure Access 27
- Secure Data Storage 26
- Technology Partnerships 42
- Vulnerabilities 29
- File Upload Protection – 10 Best Practices for Preventing Cyber Attacks
- Protecting Critical Infrastructure from Advanced Cyberattacks
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure
- How the Energy Industry Can Survive Targeted Attacks
- Smarter Malware Analysis Starts Here
- Research Highlights Significant Challenges for Organizations in Responding to Malware Threats
- MetaDefender Prevents Emotet - The World’s Most Dangerous Malware
- OPSWAT Takes Proactive Steps to Close the Critical Infrastructure Protection Skills Gap
- Can A Video File Contain A Virus?