Scanning |
The scanning process is adjusted in the section. Changes in this section affect the types of checked objects and therefore they determine the protection level. However note that increasing the number of object to scan types leads to server performance decrease. To adjust scanning settings 1.Click for the necessary profile in console tree. The section will open (see Figure 6). Figure 6. Scanning section 2.By default, the heuristic analyzer and scanning of archives and containers are enabled. This gives a high level of protection at the expense of the server performance. To disable these features, clear the , and options at the top of the pane.
The Timeout field allows to specify the timeout for scanning of a single file. If this timeout is exceeded during the scanning, the file is considered as bad object. By default, the timeout is set to 1200 sec. If necessary, you can change this value. The option defines whether encrypted archives should be ignored by the scanner or treated as infected (see Selecting Types of Damaged Objects). 3.In the group box below, select the types of objects to check messages for. 4.In the Actions section below, use the drop-down lists to choose the actions for infected and suspicious objects. You can choose from the following: ▪ – means that the object will be sent to the quarantine (see Working with Quarantine). ▪– means that the object will be deleted. ▪ – means that such objects will be passed on to the recipient (available only for suspicious objects).
5.In the group box, you can change the name suffix for the text file, which will be attached to an infected email message after the assigned action is performed over it. In the field below, you can edit the text of the attached text file template, if necessary. You can add macros from the list while editing the text. 6.When you finish configuring scanning process, click . |