
136
McAfee
®
GroupShield
™
7.0 User Guide Policy Manager
Scanners and filters
10
Primary and secondary filtering actions for corrupt content
Primary actions for
On-Access scan include:
Replace detected item with an alert — to replace the detected item with an alert
message.
Delete embedded item — to delete the detected item. For example, to delete an
attachment that triggers a detection rule.
Delete message — to delete the email message item.
Allow through — to allow the item to continue to the next scanning phase or on to its
final destination.
Primary actions for On-Demand (Default), and On-Demand (Full Scan) scan include:
Replace detected item with an alert — to replace the detected item with an alert
message.
Delete message — to delete the email message item.
Allow through — to allow the item to continue to the next scanning phase or on to its
final destination.
Secondary actions for
On-Access and On-Demand (Full Scan) scan include:
Log — to record the detection in a log.
Quarantine — to take a copy of the item and store it in the quarantine database.
Notify administrator — to send an alert message to the email administrator.
Secondary actions for
On-Demand (Default) scan include:
Log — to record the detection in a log.
Quarantine — to take a copy of the item and store it in the quarantine database.
Notify administrator — to send an alert message to the email administrator.
Notify sender — to send an alert message to the sender, when the original email
message does not originate in the same domain as Microsoft
®
Exchange Server
2003/2007.
Comentarios a estos manuales