
Appendix B
105
3. In
the
Actions on infected objects if they fail to be disinfected
field specify what actions should be taken to the infected file in the
event that it fails to be disinfected. You can select one of the
following options:
•
Skip
– leave the file intact and save the information about it in
the log.
•
Delete
– delete the file.
•
Rename
– save the file under another name.
To specify the actions to be taken to suspicious files, do the following:
1. In
the
Actions on suspicious objects
field select one of the
following options:
Suspicious files are those detected with the Code Analyzer.
•
Skip
– do not apply any actions.
•
Delete
– delete the file.
•
Move to the quarantine
– move the object to the quarantine
directory.
•
Rename
– change the file extension to .vir (or .vi1, .vi2 etc, if a
file with the same name exists).
2. If you have selected to delete the suspicious files you can instruct
the program to save copies of them in the quarantine directory. To
do so check the
Save a backup copy in the quarantine before
deleting
box.
To specify the actions to be taken to a workstation that attempts to
upload an infected file to the server, do the following:
In the
Actions on infected workstation
group check one of the following
boxes:
•
Show warning
– if you wish to send an alert to the workstation.
A message will be sent to the workstation as defined on the
NW-
Notification
or
E-mail notification
tabs (see section B.2.4 on
page 110 and section B.2.5 on page 113).