主权项 |
1. A computer implemented method for optimizing malicious code scanning for updated definitions, the method comprising the steps of:
determining, by a computer, a set of at least one threat of a computer system for which at least one file is to be scanned; determining, by the computer, which of a plurality of scan engines are required to scan the at least one file using definitions for the first set of at least one threat; utilizing, by the computer, only first required scan engines to scan the at least one file for the set of at least one threat; receiving, by the computer, at least one malicious code update comprising definitions of a second set of at least one threats that differs from definitions of the first set of at least one threats; responsive receiving to the updated definitions, loading a second set of scan engines corresponding to the updated definitions for the second set of threats, the second set of scan engines corresponding to the updated definitions and differing from the first set of scan engines corresponding to definitions of the first set of at least one threats; and utilizing, by the computer, only the second required scan engines to rescan the at least one file for the second set of at least one threat. |