F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 8.00 - Administrator's Manual - page 159
CHAPTER 5
159
When a virus is found on a computer, one of the following actions will be
taken:
the infected file is disinfected
the infected file is renamed
the infected file is deleted
the infected file is quarantined
the user is prompted to decide what action to take with the
infected file
the infected file or attachment (in e-mail scanning) is reported
only
the infected attachment (in e-mail scanning) is either disinfected,
removed or blocked.
These actions are described in “
Real-Time Scanning Configuration
Settings
”, 164 and “
E-mail Scanning Configuration Settings
”, 172.
5.2
Configuring Automatic Updates
This section explains the different configuration settings available for
Automatic Updates in F-Secure Policy Manager, and gives some practical
configuration examples for hosts with different protection needs. By
following these instructions you can always keep the virus and spyware
definitions on hosts up-to-date, and choose the best update source based
on user needs.