This chapter explains how to set up policies for different individuals and groups
in your organization to enforce real-time and scheduled malware and unwanted content
protection. In addition, it provides manual scanning instructions.
This chapter contains the following topics: