Scheduled Scanning - F-SECURE LINUX SECURITY Manual

Table of Contents

Advertisement

Element
Secondary Riskware Action
Excluded Riskware

Scheduled Scanning

The following user interface controls appear on the
Protection
Scheduled Scanning
Element
Schedule
F-Secure Linux Security | Advanced Web User Interface | 99
Description
Deny access = Deny access. Do not send an
alert.
If the primary action fails, the secondary action
is applied. If also the secondary actions fails
an alert is sent describing the failed actions.
Specify the secondary action to take when
riskware is detected and the primary action has
failed.
Report and deny access = Deny access. Send
an alert.
Rename = Rename the infected file to .riskware
extension.
Delete = Delete the infected file.
Deny access = Deny access. Do not send an
alert.
If the primary action fails, the secondary action
is applied. If also the secondary actions fails
an alert is sent describing the failed actions.
Riskware that should be excluded from
scanning.
Advanced User Interface
page.
Description
This table contains scheduled scanning tasks
defined in a similar manner as in the crontab.
The scanning uses the settings defined in the
Manual Scanning branch.
Virus

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Linux security 7.02

Table of Contents