
CHAPTER 9
237
4.
To set the scanning schedule, select either
Daily
,
Weekly
or
Monthly
under
Scan performed
.
Select
Daily
to perform the scan every day at the scheduled time.
The weekdays on the right are all selected and greyed out.
Select
Weekly
to perform the scan every week at the scheduled
weekday and time. You can select as many weekdays from the
right as you like, and the scan is performed on each of the
selected days.
Select
Monthly
to perform the scan every month at the scheduled
date and time. You can select up to three days of the month on
which the scan is performed.
5.
Select the start time of the scan from the
Start time
drop-down list. If
you want to start the scan only when the computer is not used, select
the
After computer is not used for
check box and select the idle time
from the drop-down list.
For instructions on how to configure scheduled scanning from the Policy
manage Advanced Mode user interface, see “
9.5
Logging and Log File Locations on Local Hosts
From the F-Secure Client Security local user interface you can access
several log files that provide you with data about the network traffic.
9.5.1
LogFile.log
LogFile.log
contains all alerts that F-Secure Client Security has generated
since its installation. The file has a maximum size to which it can grow.
Logfile.log
is maintained by F-Secure Management Agent, and it can be
found on all hosts running F-Secure Management Agent.
Logfile.log
is located in
%Program Files%/F-Secure/Common
directory,
and it can be viewed with any text editor, for example Windows Notepad.
You can also access the
LogFile.log
from the local user interface:
Содержание CLIENT SECURITY 7.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Страница 41: ...CHAPTER2 41 Click Next to continue...
Страница 44: ...44 Step 12 Review the changes that setup is about to make Click Start to start the installation...
Страница 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Страница 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Страница 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Страница 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Страница 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Страница 135: ...CHAPTER4 135 Autoregistration Import Rules Figure 4 6 Import Autoregistered Hosts dialog Import Rules tab...
Страница 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Страница 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Страница 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Страница 297: ...297 GLOSSARY...
Страница 310: ...310 Worm A computer program capable of replication by inserting copies of itself in networked computers...
Страница 311: ...311 Technical Support Overview 312 Web Club 312 Advanced Technical Support 312 F Secure Technical Product Training 313...