ServerProtect allows you to
configure the type of action that the software takes on infected files. In addition
to the
antivirus protection offered by previous versions, a Spyware pattern is now available
in ServerProtect 5.8, forming a virus
category of its own. You can choose a specific course of actions to handle certain
types of
viruses at will. The Damage Cleanup Engine is made more powerful by including the
feature of
Generic Clean.
There are five possible actions that ServerProtect can take on an infected file:
-
Bypass/Ignore: For a manual scan, ServerProtect skips the file without taking any corrective action. However, detection of the virus is still recorded in the program’s log entries. For Real-time Scan, ServerProtect treats the file as "deny-write," protecting it from duplication or modification. See Defining Actions Against Viruses for more information.
-
Delete: The infected file is deleted.
-
Rename: The infected file extension is renamed to .vir. This prevents the file from being executed or opened. If a file of that name with the .vir extension already exists, the file will be renamed to .v01, .v02, and so on, until .v99.
-
Quarantine: The infected file is moved to a folder of your choice. You can also change the file extension of the moved file to prevent it from being inadvertently opened or executed.
-
Clean: Attempt to clean the virus code from the file. Because the cleaning process sometimes corrupts the file and makes it unusable, you can back up the file before cleaning.
All virus events and associated courses of action are recorded in the log file. For
more
information, refer to the
Viewing the infection logstopic in the online help and Defining Actions Against Viruses.
NoteIf you select Clean as the virus action, you can specify a secondary
action if the cleaning process is unsuccessful.
|
NoteOn a 64-bit operating system, ServerProtect detects both 32-bit viruses and 64-bit viruses.
|
NoteServerProtect 5.8 does not support
clean action against spyware infected files. When using ActiveAction, the actual effect
of
an action applied to a spyware infected file will be equivalent to that of the
Bypass action.
|