CHAPTER 6
47
Delete
Deletes the infected file when a virus is found.
Custom
Performs the action you define. To define the
custom action, enter the command to the
Primary
or
Secondary custom action
field.
Deny access
Blocks the access to the infected file, but does
not send any alerts or reports.
Abort Scan
Stops the scan.
Suspected files
Select the primary and secondary actions to take when heuristics
scanning engine finds a suspected file. The secondary action takes
place if the primary action cannot be performed.
By default, the primary action for suspected files is
Report only
and
secondary action
Deny access
. Choose one of the following actions:
Report and deny
access
Displays and alerts about the suspected file and
blocks access to it. No other action is taken.
View
Alerts
to check security alerts. For more
information, see “
Rename
Renames the suspected file and removes its
execute permissions. Renamed suspected file
stays on the computer, but it cannot cause any
damage.
The renamed file has
.suspected
extension.
Delete
Deletes the suspected file.
Deny access
Blocks the access to the suspected file, but does
not send any alerts or reports.
What to scan
Scan files
Define files that are scanned during the manual
scan.
All files
- Scans all files in the system.
Summary of Contents for ANTI-VIRUS LINUX CLIENT SECURITY -
Page 1: ...F Secure Anti Virus Linux Server Security Administrator s Guide...
Page 36: ...34 5 USER INTERFACE BASIC MODE Summary 35 Common Tasks 36...
Page 88: ...86 C Riskware Types Riskware Categories and Platforms 87...
Page 91: ...CHAPTERC 89 Riskware Types...
Page 104: ...102 F Man Pages fsav 103 fsavd 137 dbupdate 155 fsfwc 159 fsic 162...
Page 160: ...158 SEE ALSO fsav 1 and fsavd 8 For more information see F Secure home page...
Page 173: ...171 G APPENDIX Config Files fsaua_config 172 fssp conf 177...
Page 206: ...204...
Page 207: ......
Page 208: ...www f secure com...