162
When a virus is found on a computer, one of the following actions will be
taken:
the infected file is disinfected
the infected file is renamed
the infected file is deleted
the infected file is quarantined
the user is prompted to decide what action to take with the
infected file
the infected file or attachment (in e-mail scanning) is reported
only
the infected attachment (in e-mail scanning) is either disinfected,
removed or blocked.
These actions are described in “
Real-Time Scanning Configuration
E-mail Scanning Configuration Settings
.
5.2
Configuring Automatic Updates
This section explains the different configuration settings available for
Automatic Updates in F-Secure Policy Manager, and gives some practical
configuration examples for hosts with different protection needs. By
following these instructions you can always keep the virus and spyware
definitions on hosts up-to-date, and choose the best update source based
on user needs.
F-Secure Client Security 5.5x uses different Automatic Updates
settings, that you can access by clicking the
Configure Automatic
Updates for F-Secure Client Security 5.5x
link.
Содержание CLIENT SECURITY 7.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Страница 41: ...CHAPTER2 41 Click Next to continue...
Страница 44: ...44 Step 12 Review the changes that setup is about to make Click Start to start the installation...
Страница 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Страница 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Страница 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Страница 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Страница 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Страница 135: ...CHAPTER4 135 Autoregistration Import Rules Figure 4 6 Import Autoregistered Hosts dialog Import Rules tab...
Страница 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Страница 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Страница 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Страница 297: ...297 GLOSSARY...
Страница 310: ...310 Worm A computer program capable of replication by inserting copies of itself in networked computers...
Страница 311: ...311 Technical Support Overview 312 Web Club 312 Advanced Technical Support 312 F Secure Technical Product Training 313...