Reference Guide

Security Management Server Virtual v10.2.11 AdminHelp
Exclusions String
String - Comma-separated list of parameters
Specify files, folders, and drives to exclude from
scanning.
Comma separated list of parameters:
<ExclusionType>,<Exc
lusionData>,<ExcludeSubfolders
(only applies to FileOrFolder type)>
Possible values: <FileOrFolder|FileType|ModifiedAge|
AccessedAge|CreatedAge>,<PathToFileOrFolder|
FileType|Age>,<true|false>
Examples:
FileOrFolder,C:\Users,false
FileType,xml,false
FileType,mp?,false
ModifiedAge,120,true
AccessedAge,150,false
CreatedAge,300,true
Threat First
Response
Clean file
Clean file
Delete file
Continue scanning
Specifies the first action for the scanner to take when a
threat is detected.
Clean files
- Removes the threat from the detected file,
if possible.
Delete files
- Deletes files with potential threats.
Continue scanning
-
Continues scanning files when a threat
is detected. The scanner does not move items to the
quarantine.
Threat First
Response Fails
Delete file
Clean file
Delete file
Continue scanning
Specifies the action for the scanner to take when a threat
is detected if the first action fails.
Clean files
- Removes the threat from the detected file,
if possible.
Delete files
- Deletes files with potential threats.
Continue scanning
-
Continues scanning files when a threat
is detected. The scanner does not move items to the
quarantine.
Exploit First
Response
Clean file
Clean file
Delete file
Continue scanning
Specifies the first action for the scanner to t
ake when a
potential exploit is detected.
Clean files
- Removes the threat from the detected file,
if possible.
Delete files
- Deletes files with potential threats.
Continue scanning
-
Continues scanning files when a threat
is detected. The scanner does no
t move items to the
quarantine.
215