F-SECURE CLIENT SECURITY 8.00 Administrator's Manual page 81

Hide thumbs Also See for CLIENT SECURITY 8.00:
Table of Contents

Advertisement

CHAPTER 3
81
Spyware Scanning on File Access
This section contains the same spyware scanning settings as the
Spyware Scanning on File Access section on the Settings > Real-Time
Scanning page. For more information, see
"Spyware Scanning on File
Access", 74.
Manual Spyware Scanning
This section contains the same spyware scanning settings as the Manual
Spyware Scanning section on the Settings > Manual Scanning page. For
more information, see
"Manual Spyware
Scanning", 78.
Applications Excluded from Spyware Scanning
The Applications Excluded from Spyware Scanning table displays a list of
spyware and riskware that the administrators have allowed to run on the
hosts.
Spyware and Riskware Reported by Hosts
The Spyware and Riskware Reported by Hosts table displays spyware
and riskware that the hosts have reported, and spyware and riskware that
are quarantined at the host(s). The table displays the type and the
severity (the TAC score, see Glossary) for each detected spyware and
riskware application. All spyware and riskware with status Potentially
active were allowed to run on the host by the administrator.
The
Change spyware scanning to automatically quarantine all new
spyware
setting is changes real-time and manual spyware scanning
settings so that all spyware that is not explicitly allowed by the
administrator is prevented from running.
For more information about spyware scanning and for configuration
examples, see
"Configuring Spyware
Scanning", 179.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Client security

Table of Contents