F-SECURE LINUX SECURITY Manual page 43

Table of Contents

Advertisement

Suspected Files
Select the primary and secondary actions to take when heuristics scanning engine finds a
suspected file.
In the
I want to...
page in the web user interface, click
and configure advanced virus scanning settings.
1. Select the primary action to take when heuristics scanning engine finds a suspected file.
Choose one of the following actions:
Select
Report and deny access
access to it. No other action is taken. View
Select
Rename
to renames the suspected file and remove its execute permissions.
Renamed suspected file stays on the computer, but it cannot cause any damage. The
renamed file has .suspected extension.
Select
Delete
to delete the suspected file.
Select
Deny access
or reports.
By default, the primary action for suspected files is
2. Select the secondary action. The secondary action takes place if the primary action cannot
be performed.
By default, the secondary action is
After configuring the suspected file settings, configure how alerts and reports are handled in the
Alerts
page.
Select What to Scan
Specify files and directories that you want to scan for malware.
In the
I want to...
page in the web user interface, click
and configure advanced virus scanning settings.
1. Specify
Files and directories excluded from scanning
are excluded from the virus scan. Type each directory on a new line, only one directory per
line.
If scanning a certain directory takes a long time and you know that no user can create or
copy an infected file in it, or you get false alarms during the scan, you can exclude the directory
from the virus scan.
Tip: The list can also contain files if you want to exclude specific files from the scan.
2. If you do not want to scan any other files for viruses except executables, turn
executables
on. Clear the check box to scan all specified files for viruses.
to display and alert about the suspected file and block
Alerts
to block the access to the suspected file without sending any alerts
Deny
access.
F-Secure Linux Security | Using the Product | 43
Modify advanced settings...
to check security alerts.
Report
only.
Modify advanced settings...
to define files and directories which
to view
to view
Scan only

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the LINUX SECURITY and is the answer not in the manual?

This manual is also suitable for:

Linux security 7.02

Table of Contents