Within a particular type of communication, however, attributes and criteria such as the following may be used to decide where a communication is scanned: size of the communication or portion of the communication to be scanned; whether the communication is encrypted; which version of a scanning module is installed on a node or the firewall; the source or destination of the communication (e.g., whic