CHAPTER 5
173
3.
In the
Rootkit Scanning
section, make sure that the
Enable rootkit
scanning
check box is selected.
4.
Select the
Show suspicious items after full computer check
check
box.
5.
Check that the other settings on this page are suitable, and modify
them if necessary.
6.
Go to the
Operations
tab, and click the
Scan for Viruses and
Spyware
button. Note, that you have to distribute the policy for the
operation to start.
7.
Click
to save the policy data.
8.
Click
to distribute the policy.
9.
After the scanning operation on the local hosts has finished, you can
view from the Scan Reports on
Reports
tab whether any rootkits were
detected.
5.6
Configuring E-mail Scanning
E-mail Scanning can be used to keep both inbound and outbound e-mails
protected against viruses. Enabling it for outbound e-mails also ensures
that you do not accidentally send out infected e-mail attachments. This
section describes the e-mail scanning settings and also presents a
practical configuration example.
E-mail Scanning scans all POP, IMAP and SMTP traffic. If SSL protocol is
used, all attachments received through SSL are also scanned as they are
stored to the local e-mail cache. All files sent out are also scanned by
Real-time Scanning.
5.6.1
E-mail Scanning Configuration Settings
To enable the scanning of incoming e-mail messages and attachments
(POP3 traffic), select the
Enable incoming e-mail scanning
check box.
To enable the scanning of outgoing e-mail messages and attachments
(SMTP traffic), select the
Enable outgoing e-mail scanning
check box.
Содержание CLIENT SECURITY 7.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Страница 41: ...CHAPTER2 41 Click Next to continue...
Страница 44: ...44 Step 12 Review the changes that setup is about to make Click Start to start the installation...
Страница 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Страница 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Страница 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Страница 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Страница 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Страница 135: ...CHAPTER4 135 Autoregistration Import Rules Figure 4 6 Import Autoregistered Hosts dialog Import Rules tab...
Страница 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Страница 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Страница 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Страница 297: ...297 GLOSSARY...
Страница 310: ...310 Worm A computer program capable of replication by inserting copies of itself in networked computers...
Страница 311: ...311 Technical Support Overview 312 Web Club 312 Advanced Technical Support 312 F Secure Technical Product Training 313...