D E F I N I N G S E T T I N G S
54
54
54
54
5.4.3. Defining actions on infected
and suspicious objects
The following three sections allow you to define actions to be taken by the
program when it detects infected, suspicious or corrupted objects:
•
[ActionWithInfected]
section parameters define how to handle the
infected objects.
•
[ActionWithSuspicion]
section parameters define how to handle the
suspicious objects.
•
[ActionWithCorrupted]
section parameters define how to handle
the corrupted objects.
$"
To copy infected files to a separate folder,
in the
[ActionWithInfected]
section of a profile:
•
Type
Yes
in the
InfectedCopy
line.
•
Define a path to the folder for infected files in the
InfectedFolder
line. The default folder is
/infected
.
$"
To copy suspicious files to a separate folder,
in the
[ActionWithSuspicion]
section of a profile:
•
Type
Yes
in the
SuspiciousCopy
line.
•
Define path to the folder for suspicious files in the
SuspiciousFolder
line. The default folder is
/suspicious
.
$"
To copy corrupted files to a separate folder,
in the
[ActionWithCorrupted]
section of a profile:
•
Type
Yes
in the
CorruptedCopy
line.
•
Define path to the folder for corrupted files in the
CorruptedFolder
line. The default folder is
/corrupted
.