Select the scan actions:
-
ActiveAction: Select to use a set of pre-configured scan actions for viruses/malwareFor details, see ActiveAction.
-
Customize action for probable virus/malware: Select and specify the action that the Security Agent takes on probable malware threats
-
-
Customized actions: Specify the action that the Security Agent takes on specific security threats
Note
-
If the first action is unsuccessful, the Security Agent performs the following second action depending on the first action.
-
If the first action is
Quarantine
, the second action isDelete
. -
If the first action is
Rename
,Delete
orClean
, the second action isQuarantine
.
-
-
If the first action is
Pass
orAccess Denied
, the Security Agent does not perform a second action.
Custom Scan Actions
ActionDescriptionDeleteDeletes the infected file.QuarantineRenames and then moves the infected file to a temporary quarantine directory on the endpoint.The Security Agent then sends quarantined files to the designated quarantine directory.The Security Agent encrypts quarantined files sent to this directory.CleanCleans the infected file before allowing full access to the file.This action can be performed on all types of security threats except probable virus/malware.Note
Some files are uncleanable. For details, see Uncleanable Files.RenameChanges the infected file's name tofilename_<random_string>.vir
. For example,eicar.txt
is changed toeicar_3df0.vir
. Users cannot open the renamed file initially, but can do so if they associate the file with a certain application.The virus/malware may execute when opening the renamed infected file.PassPerforms no action on detected threats but records the detection in the logs. -