F-SECURE LINUX SECURITY Manual page 41

Table of Contents

Advertisement

The product can scan specified files and directories, any removable media (such as portable
drives) and downloaded content automatically. The product guards the computer for any changes
that may indicate malware.
How Does Real-time Scanning Protect Your Computer?
Real-time scanning protects the computer by scanning files when they are accessed and blocking
access to files that contain malware.
Real-time scanning works as follows:
1. The computer tries to access a file.
2. The file is immediately scanned for malware before the computer is allowed access to the
file.
3. If malware is found in the file, real-time scanning blocks access to the file so the malware
cannot harm the computer.
4. Based on the real-time scanning settings, real-time scanning either renames, deletes or tries
to disinfect the infected file.
Does Real-Time Scanning Affect the System Performance?
The amount of time and system resources that real-time scanning takes depends on the contents,
location and type of the file.
Files that take a longer time to scan:
Compressed files, such as .zip archives. Note that these files are not scanned by default.
Files on network file systems.
Large files.
Real-time scanning may slow down your computer when a lot of files are accessed at the same
time.
Scanning The Computer Manually
You can scan the whole computer for malware manually with the Web User Interface.
When the product scans files, it must have at least read access to them. If you want the product
to disinfect infected files, the product must have write access to the files.
Check and edit the manual scanning settings before you start the manual scan.
1. To start the full computer scan, select
2. Click
Scan the computer for
F-Secure Linux Security | Using the Product | 41
I want to...
in the basic user interface mode.
malware.

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the LINUX SECURITY and is the answer not in the manual?

This manual is also suitable for:

Linux security 7.02

Table of Contents