Element
Secondary Riskware Action
Excluded Riskware
Scheduled Scanning
The following user interface controls appear on the
Protection
Scheduled Scanning
Element
Schedule
F-Secure Linux Security | Advanced Web User Interface | 99
Description
Deny access = Deny access. Do not send an
alert.
If the primary action fails, the secondary action
is applied. If also the secondary actions fails
an alert is sent describing the failed actions.
Specify the secondary action to take when
riskware is detected and the primary action has
failed.
Report and deny access = Deny access. Send
an alert.
Rename = Rename the infected file to .riskware
extension.
Delete = Delete the infected file.
Deny access = Deny access. Do not send an
alert.
If the primary action fails, the secondary action
is applied. If also the secondary actions fails
an alert is sent describing the failed actions.
Riskware that should be excluded from
scanning.
Advanced User Interface
page.
Description
This table contains scheduled scanning tasks
defined in a similar manner as in the crontab.
The scanning uses the settings defined in the
Manual Scanning branch.
Virus