5.6
Configuring E-mail Scanning
5.6.1
E-mail Scanning Configuration Settings
3. In the Rootkit Scanning section, make sure that the Enable rootkit
scanning check box is selected.
4. Select the Show suspicious items after full computer check check
box.
5. Check that the other settings on this page are suitable, and modify
them if necessary.
6. Go to the Operations tab, and click the
Spyware
button. Note, that you have to distribute the policy for the
operation to start.
7. Click
to save the policy data.
8. Click
to distribute the policy.
9. After the scanning operation on the local hosts has finished, you can
view from the Scan Reports on Reports tab whether any rootkits were
detected.
E-mail Scanning can be used to keep both inbound and outbound e-mails
protected against viruses. Enabling it for outbound e-mails also ensures
that you do not accidentally send out infected e-mail attachments. This
section describes the e-mail scanning settings and also presents a
practical configuration example.
E-mail Scanning scans all POP, IMAP and SMTP traffic. If SSL protocol is
used, all attachments received through SSL are also scanned as they are
stored to the local e-mail cache. All files sent out are also scanned by
Real-time Scanning.
To enable the scanning of incoming e-mail messages and attachments
(POP3 traffic), select the Enable incoming e-mail scanning check box.
To enable the scanning of outgoing e-mail messages and attachments
(SMTP traffic), select the Enable outgoing e-mail scanning check box.
CHAPTER 5
Scan for Viruses and
173
Need help?
Do you have a question about the CLIENT SECURITY 7.00 and is the answer not in the manual?
Questions and answers