IntroductionThis section includes the following topics:About malware scanningAbout dynamic scanAbout file hash search with malware hashLimitations