
CHAPTER 5
175
3.
Action on malformed message parts:
Drop Message Part
deletes the message.
Report Only
ignores the malformed message part but reports it to
the administrator.
To save the blocked e-mail messages in the end-users’ Outbox folder,
select the
Save blocked e-mails in outbox
check box. The user must
move, delete or modify the blocked message in his/her Outbox to be able
to send more messages.
The following options are available for selecting what to scan:
All Attachments
All attachments will be scanned, regardless of their file extension.
Attachments with These Extensions:
Attachments with specified extensions will be scanned. To specify
files that have no extension, type ‘.’ You can use the wildcard ‘?’
to represent any letter. Enter each file extension separated by a
space.
Scan inside compressed attachments
Select this check box to scan inside compressed ZIP, ARJ, LZH,
RAR, CAB, TAR, BZ2, GZ, JAR and TGZ attachments. Scanning
inside large compressed attachments might use a lot of system
resources and slow down the system.
Enable excluded extensions
You can specify attachments that will not be scanned by entering
the file extensions in the
Excluded extensions
field (See also “
.).
If you want the end user to see a dialog box when large files are being
scanned, select the
Show progress when scanning large files
check box,
and define the time limit in the
Show progress after this time
field.
If you want that a scanning report is displayed to the end user after the
scanning has completed, select the
Show report when infections are
found
check box.
WARNING: The Report Only option is dangerous and should
not be used in normal operation.
Содержание CLIENT SECURITY 7.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Страница 41: ...CHAPTER2 41 Click Next to continue...
Страница 44: ...44 Step 12 Review the changes that setup is about to make Click Start to start the installation...
Страница 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Страница 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Страница 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Страница 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Страница 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Страница 135: ...CHAPTER4 135 Autoregistration Import Rules Figure 4 6 Import Autoregistered Hosts dialog Import Rules tab...
Страница 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Страница 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Страница 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Страница 297: ...297 GLOSSARY...
Страница 310: ...310 Worm A computer program capable of replication by inserting copies of itself in networked computers...
Страница 311: ...311 Technical Support Overview 312 Web Club 312 Advanced Technical Support 312 F Secure Technical Product Training 313...