F-SECURE LINUX SECURITY Manual page 96

Table of Contents

Advertisement

96 | F-Secure Linux Security | Advanced Web User Interface
Element
Primary Action on Suspected Files
Secondary Action on Suspected Files
Description
the file, if successful access is allowed.
Rename = Deny access. Rename the infected
file to .virus extension.
Delete = Deny access. Delete the infected file.
Deny access = Deny access. Do not send an
alert.
If both primary and secondary actions fail,
access is denied and a security alert is sent.
Specify the primary action to take when
suspected infection is detected.
Report and deny access = Deny access. Send
an alert.
Rename = Rename the suspected file to
.suspected extension.
Delete = Delete the infected file.
Deny access = Deny access. Do not send an
alert.
If the primary action fails, the secondary action
is applied. If also the secondary actions fails
an alert is sent describing the failed actions.
Specify the secondary action to take when
suspected infection is detected and the primary
action has failed.
Report and deny access = Deny access. Send
an alert.
Rename = Rename the suspected file to
.suspected extension.
Delete = Delete the infected file.
Deny access = Deny access. Do not send an
alert.
If the primary action fails, the secondary action

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the LINUX SECURITY and is the answer not in the manual?

Subscribe to Our Youtube Channel

This manual is also suitable for:

Linux security 7.02

Table of Contents