McAfee AVDCDE-BA-CA User Guide - Page 107

Continue access, Move infected files automatically

Page 107 highlights

Using the VShield Scanner - Move file. This option tells the module to move the infected file to a quarantine folder. The GUI version of the alert message will display a Move file to button that allows you to locate a quarantine folder to use. - Stop access. This option tells the module to prevent you or anyone else who tried to modify this file from working with it in any way at all. - Exclude file. This option tells the module to skip the file during this and later scan sessions. - Continue access. This option leaves the file intact and in its original location on your computer and does not prevent you from opening, copying, renaming, or otherwise modifying the file in the future. Use this option only when you know positively that the file the System Scan module flagged is not infected. To preserve files as virus samples, McAfee recommends moving infected files to a quarantine folder instead. Š NOTE: The option is available only on computers that run Windows 95 or Windows 98 and only when you choose the BIOS prompt mode. • Move infected files automatically. Choose this response to have the module move infected files to a quarantine folder as soon as it finds them. By default, the module moves these files to a folder named \infected located in the VirusScan program directory. You can enter a different name in the text box provided, or click Browse to locate a suitable folder on your hard disk. • Clean infected files automatically. Choose this response to tell the module to remove the virus code from the infected file as soon as it finds it. If the module cannot remove the virus, it will deny access to the file and note the incident in its log file. See "Choosing Report options" on page 110 for details. • Delete infected files automatically. Choose this option to have the module delete every infected file it finds immediately. Be sure to enable the reporting feature so that you have a record of which files the module deleted. You will need to restore deleted files from backup copies. If the module cannot delete an infected file, it will note the incident in its log file. User's Guide 107

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344

User
s Guide
107
Using the VShield Scanner
Move file
. This option tells the module to move the infected file
to a quarantine folder. The GUI version of the alert message
will display a
Move file to
button that allows you to locate a
quarantine folder to use.
Stop access
. This option tells the module to prevent you or
anyone else who tried to modify this file from working with it
in any way at all.
Exclude file
. This option tells the module to skip the file
during this and later scan sessions.
Continue access
. This option leaves the file intact and in its
original location on your computer and does not prevent you
from opening, copying, renaming, or otherwise modifying the
file in the future. Use this option only when you know
positively that the file the System Scan module flagged is not
infected. To preserve files as virus samples, McAfee
recommends moving infected files to a quarantine folder
instead.
NOTE:
The option is available only on computers that run
Windows 95 or Windows 98 and only when you choose
the
BIOS
prompt mode.
Move infected files automatically
. Choose this response to have
the module move infected files to a quarantine folder as soon as it
finds them.
By default, the module moves these files to a folder named \infected
located in the VirusScan program directory. You can enter a
different name in the text box provided, or click
Browse
to locate a
suitable folder on your hard disk.
Clean infected files automatically.
Choose this response to tell the
module to remove the virus code from the infected file as soon as it
finds it. If the module cannot remove the virus, it will deny access to
the file and note the incident in its log file. See
Choosing Report
options
on page 110
for details.
Delete infected files automatically.
Choose this option to have the
module delete every infected file it finds immediately. Be sure to
enable the reporting feature so that you have a record of which files
the module deleted. You will need to restore deleted files from
backup copies. If the module cannot delete an infected file, it will
note the incident in its log file.