After configuring the risware scanning settings, configure how alerts and reports are handled in
the Alerts page.
Scanning the Computer Manually
You can scan the computer for viruses manually to make sure that specified files or every possible
file is checked for viruses.
Action on Virus Infection During Manual Scan
Select the primary and secondary action to take when a virus is found during the manual scan.
In the I want to... page in the web user interface, click Modify advanced settings... to view
and configure advanced virus scanning settings.
1. Select the primary action to take when a virus is found. Choose one of the following actions:
• Select Disinfect to disinfect viruses. Note that some viruses cannot be disinfected. If the
virus cannot be disinfected, the access to the infected file is still blocked.
• Select Rename to rename the infected file and remove its execute permissions. Renamed
infected file stays on the computer, but it cannot cause any damage. The renamed file
has .virus extension.
• Select Delete to delete the infected file.
By default, the primary action for infections is Disinfect.
2. Select the secondary action. The secondary action takes place if the primary action cannot
be performed.
By default, the secondary action is Rename.
After configuring the virus infection actions, configure how alerts and reports are handled in the
Alerts page.
Suspected Files Found During the Manual Scan
Select the primary and secondary actions to take when heuristics scanning engine finds a
suspected file during the manual scan.
In the I want to... page in the web user interface, click Modify advanced settings... to view
and configure advanced virus scanning settings.
1. Select the primary action to take when heuristics scanning engine finds a suspected file.
Choose one of the following actions:
• Select Rename to renames the suspected file and remove its execute permissions.
Renamed suspected file stays on the computer, but it cannot cause any damage. The
renamed file has .suspected extension.
• Select Delete to delete the suspected file.
46 | F-Secure Linux Security | Using the Product