User Guide
User’s Guide v
Table of Contents
Checking task status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .202
Configuring VirusScan application options . . . . . . . . . . . . . . . . . . . . . . . . . .204
Chapter 7. Using Specialized
Scanning Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Scanning Microsoft Exchange and Outlook mail . . . . . . . . . . . . . . . . . . . . .223
When and why you should use the E-Mail Scan extension . . . . . . . . .223
Using the E-Mail Scan extension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .224
Configuring the E-Mail Scan extension . . . . . . . . . . . . . . . . . . . . . . . . .225
Scanning cc:Mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .239
Using the ScreenScan utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .239
Chapter 8. Using VirusScan Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
Understanding the VirusScan control panel . . . . . . . . . . . . . . . . . . . . . . . . .247
Opening the VirusScan control panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .247
Choosing VirusScan control panel options . . . . . . . . . . . . . . . . . . . . . . . . . .248
Using the Alert Manager Client Configuration utility . . . . . . . . . . . . . . . . . .251
VirusScan software as an Alert Manager client . . . . . . . . . . . . . . . . . . . . . . .252
Configuring the Alert Manager client utility . . . . . . . . . . . . . . . . . . . . . . . . . .252
Chapter 9. About Safe & Sound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .257
Using Safe & Sound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .258
Protected Volume Files (The Ultimate Backup Protection) . . . . . . . . .258
Why You Should Make Regular Backups With Safe & Sound . . . . . . .258
How Safe & Sound Creates Automatic Backups . . . . . . . . . . . . . . . . . .259
Defining Your Backup Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .259
Where Will You Store the Backup Set? . . . . . . . . . . . . . . . . . . . . . . . . .260
What Files are Important to You? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .260
How Often Should You or Safe & Sound Make Backups? . . . . . . . . . .261
Chapter 10. About Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .263
Using Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .263
Reporting New Viruses or Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .264
Submitting Virus Information to Anti-Virus Emergency Response Team . .264
Appendix A. Default Vulnerable and Compressed File Extensions . .267