Scanning

Top  Previous  Next

The scanning process is adjusted in the Scanning section. Changes in this section affect the types of checked objects and therefore they determine the protection level. However note that increasing the number of object to scan types leads to server performance decrease.

To adjust scanning settings

1.Click Scanning for the necessary profile in console tree. The Scanning section will open (see Figure 6).

scanning_zoom50

Figure 6. Scanning section

2.By default, the heuristic analyzer and scanning of archives and containers are enabled. This gives a high level of protection at the expense of the server performance. To disable these features, clear the Enable heuristic analysis, Check archives and Check containers options at the top of the Scanning pane.

warning_grey

You are not recommended to disable the heuristic analyzer and scanning of archives in attachments as it considerably decreases the protection level of the server.

The Timeout field allows to specify the timeout for scanning of a single file. If this timeout is exceeded during the scanning, the file is considered as bad object. By default, the timeout is set to 1200 sec. If necessary, you can change this value.

The Treat archives protected with password as damaged option defines whether encrypted archives should be ignored by the scanner or treated as infected (see Selecting Types of Damaged Objects).

3.In the Malware group box below, select the types of objects to check messages for.

4.In the Actions section below, use the drop-down lists to choose the actions for infected and suspicious objects. You can choose from the following:

Move to quarantine – means that the object will be sent to the quarantine (see Working with Quarantine).

Delete – means that the object will be deleted.

Ignore – means that such objects will be passed on to the recipient (available only for suspicious objects).

warning_grey

By default, the Move to quarantine action is set for all the types of objects.

5.In the Parameters of added attachments group box, you can change the name suffix for the text file, which will be attached to an infected email message after the assigned action is performed over it. In the Text field below, you can edit the text of the attached text file template, if necessary. You can add macros from the Macro list while editing the text.

6.When you finish configuring scanning process, click Save.