Symantec 11281411 Administration Guide - Page 100

on Under File cache, select one of the following

Page 100 highlights

100 Scanning for viruses and other threats Configuring Auto-Protect scans 3 Under Changes requiring Auto-Protect reload, select one of the following: Wait until system Stop and reload Auto-Protect when the computer restarts. restart Stop and reload Stop and reload Auto-Protect immediately. Auto-Protect 4 Under Scan files when, set Auto-Protect file monitoring options. See "Auto-Protect file system protection options" on page 103. See "How to bypass Auto-Protect for files that are being backed up" on page 103. 5 Under Scan files when, do the following: For Leave Alone (Log Enable this option if you want the Scan on Modify and Scan on only), delete infected Access and Modify file monitoring options to delete a newly files on creation created infected file when you configure Leave alone (log only) as the action. For an existing infected file, Scan on Access and Modify detects the infected file and the Leave alone action applies. The file is denied access and logged, but it is not deleted. When you disable this option, Symantec AntiVirus permits the infected file to be created. Preserve file times Enable this option if you do not want the file system to change the last access time. Preserving the last access time prevents backup software from backing up unchanged files. 6 Under File cache, select one of the following: Disable file cache Disable the file cache; for example, you may use this option during troubleshooting. Use default file cache size Use the default file cache size setting for desktop computers and use as close to the maximum setting as possible for servers. The default file cache size is based on the computer's operating system and the amount of available disk space. File caching decreases Auto-Protect's memory usage and can help you to track problems. Symantec AntiVirus adds a 16-byte entry to the cache index, which remains until Symantec AntiVirus detects a change to the file.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216

100
Scanning for viruses and other threats
Configuring Auto-Protect scans
3
Under Changes requiring Auto-Protect reload, select one of the following:
4
Under Scan files when, set Auto-Protect file monitoring options.
See
“Auto-Protect file system protection options”
on page 103.
See
“How to bypass Auto-Protect for files that are being backed up”
on
page 103.
5
Under Scan files when, do the following:
6
Under File cache, select one of the following:
Wait until system
restart
Stop and reload Auto-Protect when the computer restarts.
Stop and reload
Auto-Protect
Stop and reload Auto-Protect immediately.
For Leave Alone (Log
only), delete infected
files on creation
Enable this option if you want the Scan on Modify and Scan on
Access and Modify file monitoring options to delete a newly
created infected file when you configure Leave alone (log only)
as the action. For an existing infected file, Scan on Access and
Modify detects the infected file and the Leave alone action
applies.
The file is denied access and logged, but it is not deleted.
When you disable this option, Symantec AntiVirus permits
the infected file to be created.
Preserve file times
Enable this option if you do not want the file system to change
the last access time.
Preserving the last access time prevents backup software from
backing up unchanged files.
Disable file cache
Disable the file cache; for example, you may use this option
during troubleshooting.
Use default file
cache size
Use the default file cache size setting for desktop computers and
use as close to the maximum setting as possible for servers.
The default file cache size is based on the computer's operating
system and the amount of available disk space.
File caching decreases Auto-Protect’s memory usage and can help
you to track problems. Symantec AntiVirus adds a 16-byte entry
to the cache index, which remains until Symantec AntiVirus
detects a change to the file.