C O N T E N T S
3
33
3
4.1.
Starting Scanner....................................................................... 25
4.2.
Searching for viruses and deleting them................................. 27
4.2.1.
Loading anti-virus scanner ................................................. 27
4.2.2.
Handling infected objects ................................................... 28
4.2.3.
Handling corrupted objects................................................. 30
4.2.4.
Handling suspicious objects............................................... 31
4.3.
Reviewing performance statistics ............................................ 32
5.
ANTI-VIRUS SCANNER AND DAEMON PROCESS: USING
SWITCHES AND PROFILES............................................................. 34
5.1.
Scanning settings ..................................................................... 34
5.2.
How to change settings............................................................ 35
5.3.
Settings for a separate location to be checked....................... 36
5.3.1.
Defining the location(s) to be checked............................... 36
5.3.2.
Defining objects to be checked .......................................... 38
5.3.2.1.
Object types
.................................................................... 38
5.3.2.2.
Sectors
............................................................................. 38
5.3.2.3.
Files
.................................................................................. 39
5.3.2.4.
Packed executables
...................................................... 41
5.3.2.5.
Archives
........................................................................... 42
5.3.2.6.
Mail databases and plain mail files
............................ 43
5.3.2.7.
Embedded OLE objects
............................................... 44
5.3.3.
Defining anti-virus actions .................................................. 44
5.3.4.
Defining the advanced scanning tools to be used ............ 46
5.4.
Settings for the cumulative location to be checked ................ 49
5.4.1.
Cumulative settings ............................................................ 49
5.4.2.
Defining scanning and performance settings: Scanner and
Daemon............................................................................... 50
5.4.3.
Defining actions on infected and suspicious objects ........ 54
5.4.4.
Defining the reporting parameters ..................................... 56
6.
DAEMON PROCESS: INTEGRATING ANTI-VIRUS PROTECTION
IN CLIENTS ......................................................................................... 59
6.1.
Features of the Daemon program ........................................... 59