You can continue use of existing virus checking utilities that currently execute successfully against the designated file systems on the primary volume. DST is transparent to this operation. Because the only access to the secondary volume is through the primary volume, there is no need for a virus checking operation directly on the secondary volume unless the shadow volume is removed, allowing the volume to act independently again.