CHAPTER 3
79
Manual File Scanning
In the
Manual File Scanning
section the following options are available for
selecting what to scan:
All files
All files will be scanned, regardless of their file extension. Forcing
this option is not recommended because it might slow down
system performance considerably.
Files with These Extensions:
Files with specified extensions will be scanned. To specify files
that have no extension, type ‘.’ You can use the wildcard ‘?’ to
represent any letter. Enter each file extension separated by a
space.
Scan inside compressed files
Select this check box to scan inside compressed ZIP, ARJ, LZH,
RAR, CAB, TAR, BZ2, GZ, JAR and TGZ files. Scanning inside
large compressed files might use a lot of system resources and
slow down the system.
Enable excluded extensions
You can specify whether some files will not be scanned, and
enter the extensions that will be excluded from scanning in the
Excluded extensions
field. (See also “
.)
Enable excluded objects
When
Enable excluded objects
is selected, the users can specify
individual files or folders that will not be scanned.
From the
Action on infection
drop-down list, you can select the action
F-Secure Client Security will take when an infected file is detected.
Содержание CLIENT SECURITY 7.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Страница 41: ...CHAPTER2 41 Click Next to continue...
Страница 44: ...44 Step 12 Review the changes that setup is about to make Click Start to start the installation...
Страница 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Страница 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Страница 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Страница 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Страница 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Страница 135: ...CHAPTER4 135 Autoregistration Import Rules Figure 4 6 Import Autoregistered Hosts dialog Import Rules tab...
Страница 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Страница 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Страница 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Страница 297: ...297 GLOSSARY...
Страница 310: ...310 Worm A computer program capable of replication by inserting copies of itself in networked computers...
Страница 311: ...311 Technical Support Overview 312 Web Club 312 Advanced Technical Support 312 F Secure Technical Product Training 313...