EasyManuals Logo

F-SECURE LINUX SECURITY User Manual

F-SECURE LINUX SECURITY
219 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #96 background imageLoading...
Page #96 background image
DescriptionElement
the file, if successful access is allowed.
Rename = Deny access. Rename the infected
file to .virus extension.
Delete = Deny access. Delete the infected file.
Deny access = Deny access. Do not send an
alert.
If both primary and secondary actions fail,
access is denied and a security alert is sent.
Specify the primary action to take whenPrimary Action on Suspected Files
suspected infection is detected.
Report and deny access = Deny access. Send
an alert.
Rename = Rename the suspected file to
.suspected extension.
Delete = Delete the infected file.
Deny access = Deny access. Do not send an
alert.
If the primary action fails, the secondary action
is applied. If also the secondary actions fails
an alert is sent describing the failed actions.
Specify the secondary action to take whenSecondary Action on Suspected Files
suspected infection is detected and the primary
action has failed.
Report and deny access = Deny access. Send
an alert.
Rename = Rename the suspected file to
.suspected extension.
Delete = Delete the infected file.
Deny access = Deny access. Do not send an
alert.
If the primary action fails, the secondary action
96 | F-Secure Linux Security | Advanced Web User Interface

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the F-SECURE LINUX SECURITY and is the answer not in the manual?

F-SECURE LINUX SECURITY Specifications

General IconGeneral
BrandF-SECURE
ModelLINUX SECURITY
CategorySoftware
LanguageEnglish

Related product manuals