Note:
If
Scan on open
and
Scan on execute
are turned off, nothing is scanned even
if
Scan only executables
is enabled.
3.
Define
Whitelisted executables
which may access any files. The virus scan does not block
any file accesses from whitelisted executables.
Note:
Be sure that you can trust the executable file that you add as a whitelisted
application. It is recommended to limit the file access for whitelisted applications.
Whitelisting an application is always a potential security risk and should be used with
caution.
4.
If you want to use the whitelist setting with
Integrity Checking
, turn on
Whitelisted
executables must match baseline
to require that whitelisted executables are unmodified
in the
known files list
. If this setting is enabled and the executable cannot be found in the
integrity checking baseline, it is not whitelisted.
Note:
If you have defined whitelisted applications, it is highly recommended to turn on
this option.
5.
If you want to scan files every time they are opened, turn on
Scan when opening a file
.
6.
If you want to scan files every time they are closed, turn on
Scan when closing a file
.
7.
If you want to scan files every time when they are run, turn on
Scan when running an
executable
.
Note:
Only regular files on mounted filesystems can be scanned. Special files, such as
CD-ROM or DAT devices (/dev/st0, /dev/hda and such), cannot be scanned unless they are
mounted as filesystems, or files are extracted on a filesystem from the tape first.
Archive Scanning
The archive scanning can scan files inside compressed
ZIP
,
ARJ
,
LZH
,
RAR
,
CAB
,
TAR
,
BZ2
,
GZ
,
JAR
and
TGZ
archives.
In the
I want to...
page in the Web User Interface, click
Modify advanced settings...
to view
and configure advanced virus scanning settings.
1.
Turn on
Scan inside archives
if you want to scan files inside archives.
Note:
When the archive scanning is enabled, some e-mail clients may stop processing
further e-mails when an infected e-mail is opened.
2.
In
Maximum number of nested archives
, set the number of levels in nested archives the
product scans. Nested archives are archives inside other archives.
44
| F-Secure Linux Security | Using the Product
Summary of Contents for LINUX SECURITY
Page 1: ...F Secure Linux Security...
Page 2: ......
Page 14: ......
Page 28: ......
Page 32: ......
Page 84: ...Note Press ctrl C to cancel your changes 84 F Secure Linux Security Command Line Tools...
Page 150: ...CHAPTERG G 31 For more information see F Secure home page...
Page 166: ...CHAPTERG G 47 dbupdate 8 fsav 1 For more information see F Secure home page...
Page 170: ...CHAPTERG G 51 fsav 1 and fsavd 8 For more information see F Secure home page...
Page 188: ...H 69 H Config Files fsaua_config 70 fssp conf 75...