DescriptionElement
Deny access = Deny access. Do not send an
alert.
If the primary action fails, the secondary action
is applied. If also the secondary actions fails
an alert is sent describing the failed actions.
Specify the secondary action to take whenSecondary Riskware Action
riskware is detected and the primary action has
failed.
Report and deny access = Deny access. Send
an alert.
Rename = Rename the infected file to .riskware
extension.
Delete = Delete the infected file.
Deny access = Deny access. Do not send an
alert.
If the primary action fails, the secondary action
is applied. If also the secondary actions fails
an alert is sent describing the failed actions.
Riskware that should be excluded from
scanning.
Excluded Riskware
Scheduled Scanning
The following user interface controls appear on the Advanced User Interface ➤ Virus
Protection ➤ Scheduled Scanning page.
DescriptionElement
This table contains scheduled scanning tasksSchedule
defined in a similar manner as in the crontab.
The scanning uses the settings defined in the
Manual Scanning branch.
F-Secure Linux Security | Advanced Web User Interface | 99