Symantec 10490452 Administration Guide - Page 143

Working with Suspect Virus Quarantine, About Suspect Virus Quarantine, Accessing Suspect Virus

Page 143 highlights

6 Chapter Working with Suspect Virus Quarantine This chapter includes the following topics: ■ About Suspect Virus Quarantine ■ Accessing Suspect Virus Quarantine ■ Configuring Suspect Virus Quarantine About Suspect Virus Quarantine The Suspect Virus Quarantine provides short-term storage of messages that are suspected to contain viruses. Messages can be held for examination in the Suspect Virus Quarantine for up to 24 hours. Suspect Virus Quarantine functions are governed in part by specific settings, and in part by defined virus filter policies associated with one or more groups. Quarantined messages and associated databases are stored on the Control Center. To use Suspect Virus Quarantine, configure your system such that one or more groups has an associated filter policy that both enables virus scanning for messages and that delays, or strips and delays messages containing suspicious attachments. For example, you can create a policy called potential_virus that delays messages containing suspicious attachments and set it as the inbound and outbound suspicious attachment message policy for the Default group. Accessing Suspect Virus Quarantine Access Suspect Virus Quarantine by logging into the Control Center. All administrators can work with messages in Suspect Virus Quarantine, but

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258

Chapter
6
Working with Suspect
Virus Quarantine
This chapter includes the following topics:
About Suspect Virus Quarantine
Accessing Suspect Virus Quarantine
Configuring Suspect Virus Quarantine
About Suspect Virus Quarantine
The Suspect Virus Quarantine provides short-term storage of messages that are
suspected to contain viruses. Messages can be held for examination in the
Suspect Virus Quarantine for up to 24 hours.
Suspect Virus Quarantine functions are governed in part by specific settings,
and in part by defined virus filter policies associated with one or more groups.
Quarantined messages and associated databases are stored on the Control
Center.
To use Suspect Virus Quarantine, configure your system such that one or more
groups has an associated filter policy that both enables virus scanning for
messages and that delays, or strips and delays messages containing suspicious
attachments. For example, you can create a policy called potential_virus that
delays messages containing suspicious attachments and set it as the inbound
and outbound suspicious attachment message policy for the Default group.
Accessing Suspect Virus Quarantine
Access Suspect Virus Quarantine by logging into the Control Center. All
administrators can work with messages in Suspect Virus Quarantine, but