
170
5.
Select the action to take when an infected file is found from the
File
Scanning: Action on infection
drop-down list.
6.
Check that the other settings on this page are suitable for your
system, and modify them if necessary. For more information on the
other Real-Time Scanning settings, see “
7.
Click
Disallow user changes
to restrict users from disabling
real-time scanning on their computers. Now a closed lock symbol is
displayed beside all settings on this page.
8.
Click
to save the policy data.
9.
Click
to distribute the policy.
5.3.4
Excluding Microsoft Outlooks's .pst File from Real-Time
Scanning
If you have set real-time scanning to scan all files, you might want to
exclude Microsoft Outlook’s .PST file from the scanning in order not to
slow down the system unnecessarily, as PST files are typically very large
and take a long time to scan. The .PST file is excluded from scanning for
the whole domain as follows:
1.
Select the
Root
in the
Policy Domains
tab.
2.
Go to the
Settings
tab and select the
Real-Time Scanning
page.
3.
Select the
Enable excluded extensions
check box.
4.
Add the extension PST in the
Excluded extensions
text box. Note that
the extension should be added without the preceding ‘.’(dot).
5.
If you want to restrict users from changing the settings, click the lock
symbol beside the settings.
6.
Click
to save the policy data.
7.
Click
to distribute the policy.
Содержание CLIENT SECURITY 7.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Страница 41: ...CHAPTER2 41 Click Next to continue...
Страница 44: ...44 Step 12 Review the changes that setup is about to make Click Start to start the installation...
Страница 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Страница 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Страница 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Страница 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Страница 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Страница 135: ...CHAPTER4 135 Autoregistration Import Rules Figure 4 6 Import Autoregistered Hosts dialog Import Rules tab...
Страница 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Страница 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Страница 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Страница 297: ...297 GLOSSARY...
Страница 310: ...310 Worm A computer program capable of replication by inserting copies of itself in networked computers...
Страница 311: ...311 Technical Support Overview 312 Web Club 312 Advanced Technical Support 312 F Secure Technical Product Training 313...