F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 8.00 - Administrator's Manual - page 171
CHAPTER 5
171
5.5.1
Rootkit Scanning Configuration Settings
Select Enable rootkit scanning to enable scanning for files and drives
hidden by rootkits. This option also enables users to run local quick scans
for rootkits and other hidden items.
Select Include rootkit scanning in full computer check to scan for items
hidden by rootkits when a full computer check is started from the local
host, or when a manual scanning operation is launched from Policy
Manager Console.
Select Show suspicious items after full computer check to specify that
detected suspicious items are shown in the disinfection wizard and in the
scanning report after a full computer check. When this option is selected,
you can see from the scanning reports whether any items hidden by
rootkits have been detected on the managed hosts.
5.5.2
Launching a Rootkit Scan for the Whole Domain
In this example a rootkit scan is launched for the whole domain.
1. Select Root in the Policy Domains tab.
2. Go to the Settings tab and select the Manual Scanning page.
3. In the Rootkit Scanning section, make sure that the Enable rootkit
scanning check box is selected.
4. Select the Show suspicious items after full computer check check
box.
5. Check that the other settings on this page are suitable, and modify
them if necessary.
6. Go to the Operations tab, and click the
Scan for Viruses and
Spyware
button. Note, that you have to distribute the policy for the
operation to start.
7. Click
to save the policy data.
8. Click
to distribute the policy.