Views:
ServerProtect allows you to configure the type of action that the software takes on infected files. In addition to the antivirus protection offered by previous versions, a Spyware pattern is now available in ServerProtect 5.8, forming a virus category of its own. You can choose a specific course of actions to handle certain types of viruses at will. The Damage Cleanup Engine is made more powerful by including the feature of Generic Clean.
There are five possible actions that ServerProtect can take on an infected file:
  • Bypass/Ignore: For a manual scan, ServerProtect skips the file without taking any corrective action. However, detection of the virus is still recorded in the program’s log entries. For Real-time Scan, ServerProtect treats the file as "deny-write," protecting it from duplication or modification. See Defining Actions Against Viruses for more information.
  • Delete: The infected file is deleted.
  • Rename: The infected file extension is renamed to .vir. This prevents the file from being executed or opened. If a file of that name with the .vir extension already exists, the file will be renamed to .v01, .v02, and so on, until .v99.
  • Quarantine: The infected file is moved to a folder of your choice. You can also change the file extension of the moved file to prevent it from being inadvertently opened or executed.
  • Clean: Attempt to clean the virus code from the file. Because the cleaning process sometimes corrupts the file and makes it unusable, you can back up the file before cleaning.
All virus events and associated courses of action are recorded in the log file. For more information, refer to the Viewing the infection logs topic in the online help and Defining Actions Against Viruses.
Note
Note
If you select Clean as the virus action, you can specify a secondary action if the cleaning process is unsuccessful.
Note
Note
On a 64-bit operating system, ServerProtect detects both 32-bit viruses and 64-bit viruses.
Note
Note
ServerProtect 5.8 does not support clean action against spyware infected files. When using ActiveAction, the actual effect of an action applied to a spyware infected file will be equivalent to that of the Bypass action.