
48
Kaspersky Anti-Virus
®
for Lotus Notes/Domino
•
Granting access to infected database objects (similar to method
described in section 5.5.4 on page 50).
When editing the check-up objects processing parameters keep in mind
that they are simultaneously set in the kernel response window for both
the mail message objects and the database objects! (see Figure 19) For
example, you cannot set the program to delete infected mail message
objects and disinfect objects in the databases.
5.5.1.
Sending infected objects to the
quarantine
In some cases, you may need to block sending and receiving of mail messages
containing infected objects and deny access to infected objects in the databases.
When the program works in this mode, all objects infected with viruses are
redirected to the quarantine (see sections 8.2.1 - 8.2.2 on pages 59-61), where
the user can work with them.
Quarantining infected objects of the mail message means that only the infected
part of the message (e.g. the attachment or the message body) is redirected to
the quarantine database. The message itself is sent to the recipient with the
check-up mark and the message attribute.
In order to enable the quarantine mode for all infected objects, make
the following settings:
1. In
the
Kernel options
section of the
Scan of mail
window (see
Figure 17) select
No
for the
Disinfect
parameter, if it was
checked. Repeat this procedure for the
Scan of bases
window.
2. In
the
Kernel/Reply list
window (see Figure 20) select the
Infected object
status in the table and using the
Open
hyperlink
open the
Kernel/Return code/Status
window (see Figure 19).
3. To set the processing method for the infected objects select
Quarantine
.
As a result, all objects with the Infected object status will be placed in the
quarantine database for subsequent processing. In the quarantine database,
they will be grouped by the type of the document they were detected in, namely,
database objects quarantine and mail message objects quarantine.
In addition, the user can enable the following modes:
•
Notification of the recipients, the senders, and other users about blocked
infected objects (for more details please refer to section 5.4.3 on
page 43).