McAfee NAPCKE-AB-AA Configuration Guide - Page 47

Reports tab

Page 47 highlights

Creating and configuring tasks 2 Deselect Inherit. 3 Use the drop-down lists to select the primary action for When a virus is found and the secondary action If the above Action fails. 4 If you select Move infected files to a folder, choose a destination folder. Reports tab Configure logging activity and specify what information to log. 1 Select the Reports tab. Figure 1-26. On-Demand Scan Task - Reports tab 2 Deselect Inherit. 3 Configure these policy options: a Under Log file, choose whether to log virus activity, whether to limit the size of the log file, and the location of the log file. b Under What to log in addition to virus activity, choose what types of information to log. Configuration Guide 47

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54

Configuration Guide
47
Creating and configuring tasks
2
Deselect
Inherit
.
3
Use the drop-down lists to select the primary action for
When a virus is found
and the secondary action
If the above Action fails
.
4
If you select
Move infected files to a folder
, choose a destination folder.
Reports tab
Configure logging activity and specify what information to log.
1
Select the
Reports
tab.
2
Deselect
Inherit
.
3
Configure these policy options:
a
Under
Log file
, choose whether to log virus activity, whether to limit the
size of the log file, and the location of the log file.
b
Under
What to log in addition to virus activity
, choose what types of
information to log.
Figure 1-26. On-Demand Scan Task — Reports tab