EasyManuals Logo

F-SECURE LINUX SECURITY User Manual

F-SECURE LINUX SECURITY
219 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #46 background imageLoading...
Page #46 background image
After configuring the risware scanning settings, configure how alerts and reports are handled in
the Alerts page.
Scanning the Computer Manually
You can scan the computer for viruses manually to make sure that specified files or every possible
file is checked for viruses.
Action on Virus Infection During Manual Scan
Select the primary and secondary action to take when a virus is found during the manual scan.
In the I want to... page in the web user interface, click Modify advanced settings... to view
and configure advanced virus scanning settings.
1. Select the primary action to take when a virus is found. Choose one of the following actions:
Select Disinfect to disinfect viruses. Note that some viruses cannot be disinfected. If the
virus cannot be disinfected, the access to the infected file is still blocked.
Select Rename to rename the infected file and remove its execute permissions. Renamed
infected file stays on the computer, but it cannot cause any damage. The renamed file
has .virus extension.
Select Delete to delete the infected file.
By default, the primary action for infections is Disinfect.
2. Select the secondary action. The secondary action takes place if the primary action cannot
be performed.
By default, the secondary action is Rename.
After configuring the virus infection actions, configure how alerts and reports are handled in the
Alerts page.
Suspected Files Found During the Manual Scan
Select the primary and secondary actions to take when heuristics scanning engine finds a
suspected file during the manual scan.
In the I want to... page in the web user interface, click Modify advanced settings... to view
and configure advanced virus scanning settings.
1. Select the primary action to take when heuristics scanning engine finds a suspected file.
Choose one of the following actions:
Select Rename to renames the suspected file and remove its execute permissions.
Renamed suspected file stays on the computer, but it cannot cause any damage. The
renamed file has .suspected extension.
Select Delete to delete the suspected file.
46 | F-Secure Linux Security | Using the Product

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the F-SECURE LINUX SECURITY and is the answer not in the manual?

F-SECURE LINUX SECURITY Specifications

General IconGeneral
BrandF-SECURE
ModelLINUX SECURITY
CategorySoftware
LanguageEnglish

Related product manuals