C O N T E N T S
Handling corrupted objects................................................. 30
Handling suspicious objects............................................... 31
Reviewing performance statistics ............................................ 32
Scanning settings ..................................................................... 34
How to change settings............................................................ 35
Settings for a separate location to be checked....................... 36
Defining the location(s) to be checked............................... 36
Defining objects to be checked .......................................... 38
.................................................................... 38
............................................................................. 38
.................................................................................. 39
...................................................... 41
........................................................................... 42
Mail databases and plain mail files
............................ 43
............................................... 44
Defining anti-virus actions .................................................. 44
Defining the advanced scanning tools to be used ............ 46
Settings for the cumulative location to be checked ................ 49
Cumulative settings............................................................. 49
Defining actions on infected and suspicious objects......... 54
Defining the reporting parameters ..................................... 56
Features of the Daemon program ........................................... 59
Launching the daemon process .............................................. 60
Calling up the process from a client program ......................... 63
3