Procedure
- In the Target section,
configure the required settings.
- Under User activity, select from the
following:
-
Created, modified, retrieved, or executed: Scans all files created, modified, opened, or executed on the endpoint
-
Created, modified, or executed: Scans all files created, modified, or executed on the endpoint
-
Retrieved or executed: Scans all files opened or executed on the endpoint
-
Created or modified: Scans all files created or modified on the endpoint
-
- Select Scan compressed files.
- Under User activity, select from the
following:
- Select the type of action that the Security Agent takes
after detecting a security threat.
-
ActiveAction: Select to use a set of pre-configured scan actions for viruses/malwareFor more information, see ActiveAction.
-
Customized actions: Specify the action that the Security Agent takes on all malware threats
-