EasyManuals Logo

F-SECURE LINUX SECURITY User Manual

F-SECURE LINUX SECURITY
219 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #101 background imageLoading...
Page #101 background image
DescriptionElement
Specify the secondary action to take when anSecondary action
infection is detected and the primary action has
failed.
Do nothing = Do nothing. (Only show the
infection to the user.)
Report only = Only send an alert.
Disinfect = Attempt to disinfect the file.
Rename = Rename the infected file to .virus
extension.
Delete = Delete the infected file.
Custom = Run a command specified in the
custom primary action field.
Abort scan = Abort further scanning.
If both primary and secondary actions fail an
alert is sent describing the failed actions.
If "Custom" is chosen as the secondary action,Secondary custom action
the custom action must be specified here.
Please note that the custom action will be
executed as the super user of the system so
consider and check carefully the command you
specify.
Custom action script or program receives one
parameter, full pathname of the infected file.
Specify the primary action to take whenPrimary Action on Suspected Files
suspected infection is detected.
Do nothing = Do nothing. (Only show the
infection to the user.)
Report only = Only send an alert.
Rename = Rename the suspected file to
.suspected extension.
Delete = Delete the infected file.
F-Secure Linux Security | Advanced Web User Interface | 101

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the F-SECURE LINUX SECURITY and is the answer not in the manual?

F-SECURE LINUX SECURITY Specifications

General IconGeneral
BrandF-SECURE
ModelLINUX SECURITY
CategorySoftware
LanguageEnglish

Related product manuals