5.3.3
Forcing all Hosts to Use Real-Time Scanning
1. Select Root in the Policy Domains tab.
2. Go to the Settings tab and select the Real-Time Scanning page.
3. Select the Real-time scanning enabled check box.
4. Select Files with These Extensions from the Files to scan: drop-down
list.
5. Select the action to take when an infected file is found from the File
Scanning: Action on infection drop-down list.
6. Check that the other settings on this page are suitable for your
system, and modify them if necessary. For more information on the
other Real-Time Scanning settings, see
Configuration
Settings", 164
7. Click
to save the policy data.
8. Click
to distribute the policy.
In this example Real-Time Scanning is configured in such a way that the
users cannot disable it. This ensures that all hosts stay protected in any
circumstances.
1. Select the Root in the Policy Domains tab.
2. Go to the Settings tab and select the Real-Time Scanning page.
3. Select the Real-time scanning enabled check box.
4. Select Files with these extensions from the Files to scan: drop-down
list.
5. Select the action to take when an infected file is found from the File
Scanning: Action on infection drop-down list.
6. Check that the other settings on this page are suitable for your
system, and modify them if necessary. For more information on the
other Real-Time Scanning settings, see
Scanning", 164
7. Click
Disallow user changes
real-time scanning on their computers. Now a closed lock symbol is
displayed beside all settings on this page.
CHAPTER 5
"Real-Time Scanning
"Configuring Real-Time
to restrict users from disabling
167
Need help?
Do you have a question about the CLIENT SECURITY 8.00 and is the answer not in the manual?
Questions and answers