F-SECURE LINUX SECURITY Manual page 101

Table of Contents

Advertisement

Element
Secondary action
Secondary custom action
Primary Action on Suspected Files
F-Secure Linux Security | Advanced Web User Interface | 101
Description
Specify the secondary action to take when an
infection is detected and the primary action has
failed.
Do nothing = Do nothing. (Only show the
infection to the user.)
Report only = Only send an alert.
Disinfect = Attempt to disinfect the file.
Rename = Rename the infected file to .virus
extension.
Delete = Delete the infected file.
Custom = Run a command specified in the
custom primary action field.
Abort scan = Abort further scanning.
If both primary and secondary actions fail an
alert is sent describing the failed actions.
If "Custom" is chosen as the secondary action,
the custom action must be specified here.
Please note that the custom action will be
executed as the super user of the system so
consider and check carefully the command you
specify.
Custom action script or program receives one
parameter, full pathname of the infected file.
Specify the primary action to take when
suspected infection is detected.
Do nothing = Do nothing. (Only show the
infection to the user.)
Report only = Only send an alert.
Rename = Rename the suspected file to
.suspected extension.
Delete = Delete the infected file.

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the LINUX SECURITY and is the answer not in the manual?

Subscribe to Our Youtube Channel

This manual is also suitable for:

Linux security 7.02

Table of Contents