
A P P E N D I X B
fected files when they are copied to the infected folder. If you
type
No
the access attributes will not be changed
.
For example,
the value
640
assigns the following attributes to the file:
Read by
owner
,
Write by owner
,
Read by group
.
The
[ActionWithSuspicion]
section parameters define the actions to be taken
by the program when it detects suspicious objects.
SuspiciousCopy
–
Yes
in this line enables the program to copy suspi-
cious files to a separate folder that must be defined in the
Suspi-
ciousFolder
line.
No
disables this feature.
SuspiciousFolder
– the name of the folder for suspicious copies (valid
only if
SuspiciousCopy=Yes
). The default folder is
suspicious
.
If you prefix the name with the character "
~
", the directory will be
created in your home directory.
If your Kaspersky Anti-Virus for xBSD Mail Server reports a suspi-
cious file or sector it’s advisable that you contact our help desk de-
partment. Send these objects to Kaspersky Lab, so that they can be
studied (you may use the address
).
It is advisable that you copy suspicious objects to a separate folder.
This is useful if you deleted the suspicious object and didn't back it
up.
The
CopyWithPaths
,
ChangeExt
,
NewExtension
,
ChownTo
and
ChModTo
lines in the
[ActionWithSuspicion]
section and their features are similar to
those (with the same names) described for the infected files.
The
[ActionWithCorrupted]
section parameters define the actions to be taken
by the program when it detects corrupted objects.
CorruptedCopy
–
Yes
in this line enables the program to copy cor-
rupted files to a separate folder that must be defined in the
Cor-
ruptedFolde
r
line.
No
disables this feature.
CorruptedFolder
– the name of the folder for corrupted copies (valid
only if
CorruptedCopy=Yes
). The default folder is
corrupted
.
247