McAfee AVDCDE-AA-AA User Guide - Page 127

Choosing Report options, WEBEMAIL.TXT. You can have the module write its log to this file, or you can

Page 127 highlights

Using the VShield Scanner The module will sound the standard system warning beep or .WAV file you have your computer set to play. 5. Select the Display custom message checkbox to have the module add a custom message to the alert box it displays when it finds an infected file. As with the audible alert, you can change the setting for this option only if you choose Prompt for user action in the Action property page. If you do not choose that item in the Action page, no alert box will appear and you will not see a custom message even if you select this checkbox. 6. Enter the message you want the module to display in the text box provided. You can enter a maximum of 250 characters here. 7. Click the Report tab to choose additional E-Mail Scan module options. To save your changes without closing the E-mail Scan Properties dialog box, click Apply. To save your changes and close the dialog box, click OK. To close the dialog box without saving your changes, click Cancel. Š NOTE: Clicking Cancel will not undo any changes you already saved by clicking Apply. Choosing Report options The E-mail Scan module lists its current settings and summarizes all of the actions it takes during its scanning operations in a log file called WEBEMAIL.TXT. You can have the module write its log to this file, or you can use any text editor to create a text file for it to use. You can then open and print the log file for later review from any text editor. The WEBEMAIL.TXT file can serve as an important management tool for you to track virus activity on your system and to note which settings you used to detect and respond to the infections the module found. You can also use the incident reports recorded in the file to determine which files you need to replace from backup copies, examine in quarantine, or delete from your computer. Use the Report property page to determine which information the module will include in its log file. To set the E-Mail Scan module to record its actions in a log file, follow these steps: 1. Click the Report tab in the E-mail Scan module to display the correct property page (see Figure 4-24 on page 128). User's Guide 127

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344

User
s Guide
127
Using the VShield Scanner
The module will sound the standard system warning beep or .WAV file
you have your computer set to play.
5.
Select the
Display custom message
checkbox to have the module add
a custom message to the alert box it displays when it finds an infected
file.
As with the audible alert, you can change the setting for this option only
if you choose
Prompt for user action
in the Action property page. If you
do not choose that item in the Action page, no alert box will appear and
you will not see a custom message even if you select this checkbox.
6.
Enter the message you want the module to display in the text box
provided. You can enter a maximum of 250 characters here.
7.
Click the Report tab to choose additional E-Mail Scan module options. To
save your changes without closing the E-mail Scan Properties dialog box,
click
Apply
. To save your changes and close the dialog box, click
OK
. To
close the dialog box without saving your changes, click
Cancel
.
NOTE:
Clicking
Cancel
will not undo any changes you already
saved by clicking
Apply
.
Choosing Report options
The E-mail Scan module lists its current settings and summarizes all of the
actions it takes during its scanning operations in a log file called
WEBEMAIL.TXT. You can have the module write its log to this file, or you can
use any text editor to create a text file for it to use. You can then open and print
the log file for later review from any text editor.
The WEBEMAIL.TXT file can serve as an important management tool for you
to track virus activity on your system and to note which settings you used to
detect and respond to the infections the module found. You can also use the
incident reports recorded in the file to determine which files you need to
replace from backup copies, examine in quarantine, or delete from your
computer. Use the Report property page to determine which information the
module will include in its log file.
To set the E-Mail Scan module to record its actions in a log file, follow these
steps:
1.
Click the Report tab in the E-mail Scan module to display the correct
property page (see
Figure 4-24 on page 128
).