Description
Element
Specify the secondary action to take when an
Secondary action
infection is detected and the primary action has
failed.
Do nothing = Do nothing. (Only show the
infection to the user.)
Report only = Only send an alert.
Disinfect = Attempt to disinfect the file.
Rename = Rename the infected file to .virus
extension.
Delete = Delete the infected file.
Custom = Run a command specified in the
custom primary action field.
Abort scan = Abort further scanning.
If both primary and secondary actions fail an
alert is sent describing the failed actions.
If "Custom" is chosen as the secondary action,
Secondary custom action
the custom action must be specified here.
Please note that the custom action will be
executed as the super user of the system so
consider and check carefully the command you
specify.
Custom action script or program receives one
parameter, full pathname of the infected file.
Specify the primary action to take when
Primary Action on Suspected Files
suspected infection is detected.
Do nothing = Do nothing. (Only show the
infection to the user.)
Report only = Only send an alert.
Rename = Rename the suspected file to
.suspected extension.
Delete = Delete the infected file.
F-Secure Linux Security | Advanced Web User Interface |
101
Summary of Contents for LINUX SECURITY
Page 1: ...F Secure Linux Security...
Page 2: ......
Page 14: ......
Page 28: ......
Page 32: ......
Page 84: ...Note Press ctrl C to cancel your changes 84 F Secure Linux Security Command Line Tools...
Page 150: ...CHAPTERG G 31 For more information see F Secure home page...
Page 166: ...CHAPTERG G 47 dbupdate 8 fsav 1 For more information see F Secure home page...
Page 170: ...CHAPTERG G 51 fsav 1 and fsavd 8 For more information see F Secure home page...
Page 188: ...H 69 H Config Files fsaua_config 70 fssp conf 75...