42
The renamed file has
.suspected
extension.
Delete
Deletes the suspected file.
Deny access
Blocks the access to the suspected file, but does
not send any alerts or reports.
What to scan
Directories excluded
from the scan
Define directories which are excluded from the
virus scan. Type each directory on a new line,
only one directory per line.
If scanning a certain directory takes a long time
and you know that no user can create or copy an
infected file in it, or you get false alarms during
the scan, you can exclude the directory from the
virus scan.
The list can also contain files if you want to exclude
specific files from the scan.
Scan only
executables
Select whether only executables in scanned
directories are scanned for viruses. Clear the
check box to scan all files for viruses.
Whitelisted
executables
Define executables which may access any files.
The real-time virus scan does not block any file
accesses from whitelisted executables.
Whitelisted
executables must
match baseline
Select whether whitelisted executables must be
unmodified in the known files list. If this setting is
enabled and the executable cannot be found in
the integrity checking baseline, is not
whitelisted.
Scan when opening a
file
Select whether files are scanned every time they
are opened.
Scan when closing a
file
Select whether files are scanned every time they
are closed.
Summary of Contents for ANTI-VIRUS LINUX CLIENT SECURITY -
Page 1: ...F Secure Anti Virus Linux Server Security Administrator s Guide...
Page 36: ...34 5 USER INTERFACE BASIC MODE Summary 35 Common Tasks 36...
Page 88: ...86 C Riskware Types Riskware Categories and Platforms 87...
Page 91: ...CHAPTERC 89 Riskware Types...
Page 104: ...102 F Man Pages fsav 103 fsavd 137 dbupdate 155 fsfwc 159 fsic 162...
Page 160: ...158 SEE ALSO fsav 1 and fsavd 8 For more information see F Secure home page...
Page 173: ...171 G APPENDIX Config Files fsaua_config 172 fssp conf 177...
Page 206: ...204...
Page 207: ......
Page 208: ...www f secure com...