Listing all detected threats 
 | 
Unrestricted. No special permission required. 
 | 
Output of container contents (an archive, email file, and so on) 
(display only corrupted or malicious elements) 
 | 
Unrestricted. No special permission required. 
 | 
Moving to quarantine 
 | 
Unrestricted. The user can quarantine all infected files regardless of read or write permissions on them. 
 | 
Deleting threats 
 | 
The user needs to have write permissions for the file that is being deleted. 
  
 | 
If a threat is detected in a file inside a container (an archive, an email message and so on), the container is quarantined and not deleted. 
 | 
 
 
 
 | 
Curing 
 | 
Unrestricted. The access permissions and owner of a cured file remain the same after curing. 
  
 | 
The file can be removed if deletion can cure the detected threat. 
 | 
 
 
 
 | 
Restoring a file from quarantine 
 | 
The user should have permissions to read the file and to write to the restore directory. 
 | 
Deleting a file from quarantine 
 | 
The user must possess write permissions to the file that was moved to quarantine. 
 |