F-SECURE CLIENT SECURITY 9.00 Administrator's Manual page 30

Hide thumbs Also See for CLIENT SECURITY 9.00:
Table of Contents

Advertisement

30 | F-Secure Client Security | Anti-virus mode user interface
Scheduled Scanning
The
Configure scheduled scanning in advanced mode...
interface, where scheduled scanning can be configured.
Manual Boot Sector Scanning
In this section you can:
Turn manual scanning for floppy disk boot sectors on or off.
Select the action to take when an infection is found.
Spyware control
The settings displayed on this page are spyware-specific, and provide additional spyware-specific settings
for real-time and manual scanning.
Applications Excluded from Spyware Scanning
This table displays a list of spyware and riskware that the administrators have allowed to run on the hosts.
Spyware and Riskware Reported by Hosts
This table displays spyware and riskware that the hosts have reported, and spyware and riskware that are
quarantined at the host(s). The table displays the type and the severity for each detected spyware and riskware
application. All spyware and riskware with the
the administrator.
If you want users to be able to decide the spyware and riskware items that are allowed, you can do so with
the
Allow users to define the allowed spyware items
Quarantine management
This page is used to manage malware that has been quarantined on managed hosts.
Quarantine content
This table displays a list of quarantined items on the hosts. Each table row displays the object type, name,
file path and the number of hosts on which the object has been quarantined.
Actions to perform on quarantined objects
This table displays a list of the quarantined objects that have been processed. The quarantined objects are
either released (allowed) or deleted. The action indicated here is distributed to the managed hosts, so whenever
the malware in question is detected on a host, the selected action is applied. When the action is set to Release,
an appropriate exclusion rule needs to be in place on the
depending on the object type, to prevent the object from being quarantined in future.
The applied actions are automatically cleaned from this table once there are no pending actions left for the
corresponding hosts (no hosts report this object as quarantined).
E-mail scanning
This page includes separate settings for incoming and outgoing e-mail scanning. The settings in the
section are common for both.
Incoming E-mail Scanning
In this section you can:
Turn incoming e-mail scanning on or off.
link takes you to the
Potentially active
status were allowed to run on the host by
drop-down list.
Spyware control
Advanced mode
user
or
Real-time scanning
page,
General

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CLIENT SECURITY 9.00 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

This manual is also suitable for:

Client security

Table of Contents