
Anti-virus protection
61
You can configure notifications about the detection of infected, suspicious,
protected and corrupted objects (see Chapter 12 on page 110). No notification is
made about objects that are not infected.
Before the processing, a copy of the object can be saved in the backup storage
to be restored or deleted later.
The disinfection option is provided only for
infected
objects transferred via HTTP
or FTP protocols. A special processing procedure can be used for
non-
disinfectable
objects.
7.1.1.
Actions performed with objects
transferred via HTTP protocol
The following actions can be performed to disinfect
infected
objects detected
during the scan of data transferred via HTTP protocol.
•
Disinfect
– disinfect and pass the object to the user, once disinfected. If
the object cannot be disinfected, apply the action specified for objects that
cannot be disinfected.
•
Disinfect, save a copy -
disinfect, pass the object to the use once disin-
fected, save a copy of the original object in the backup storage. If the ob-
ject cannot be disinfected, apply the action specified for objects that can-
not be disinfected.
The following actions can be performed to process
infected
,
non-disinfectable
,
suspicious
,
protected
and
corrupted
objects.
•
Skip, make no changes
– pass the object to the user without making
changes to it;
•
Replace with text
– block access to the object, display in the browser win-
dow an informational message generated based on a replacement tem-
plate.
•
Replace with text, save a copy
– block access to the object, display in the
browser window an informational message generated based on a re-
placement template, save a copy of the original object in the backup stor-
age.
Copies of clean and skipped objects can also be saved in the backup storage.