Specifications include, but are not limited to: Real Time Scanning On Demand Scanning Heuristic Driven Software Number of scanning engines Ability to run continuous background scanning Ability to scan all types of files ( not limited by file extension) Ability to block Scripts Ability to scan email attachments Ability to scan compressed files Ability to detect Trojans Ability to detect malicious Active X controls Ability to detect Java Applets Ability to protect against and remove RootKits Ability to roll back changes made by malicious software Low Client Resource Impact during full system scans Low Client Resource Impact with real-time scanner Ability to create custom security polices for laptops at large (outside the network) Ability to provide Network Access Controls (e.g. limit access based on client antivirus status) Ability to block malicious actions using HIPS or behavior based functionality Ability to scan all drives, including removable drives such as flash or USB