Reference Guide
Security Management Server Virtual v10.2.10 AdminHelp
215
Exclusions String
String - Comma-separated list of parameters
Specify files, folders, and drives to exclude from
scanning.
Comma separated list of parameters:
<ExclusionType>,<ExclusionData>,<Exc
ludeSubfolders
(only applies to FileOrFolder type)>
Possible values: <FileOrFolder|FileType|ModifiedAge|
AccessedAge|CreatedAge>,<PathToFileOrFolder|
FileType|Age>,<true|false>
Examples:
FileOrFolder,C:\Users,false
FileType,xml,false
FileType,mp?,false
ModifiedAge,120,true
AccessedAge,150,false
CreatedAge,300,true
Threat First
Response
Clean file
Clean file
Delete file
Continue scanning
Specifies the first action for the scanner to ta
ke when a
threat is detected.
Clean files
- Removes the threat from the detected file,
if possible.
Delete files
- Deletes files with potential threats.
Continue scanning
-
Continues scanning files when a threat
is detected. The scanner does not move items
to the
quarantine.
Threat First
Response Fails
Delete file
Clean file
D
elete file
Continue scanning
Specifies the action for the scanner to tak
e when a
threat
is detected if the first action fails.
Clean files
- Removes the threat from the detected file,
if possible.
Delete files
- Deletes files with potential threats.
Contin
ue scanning -
Continues scanning files when a threat
is detected. The sc
anner does not move items to the
quarantine.
Exploit First
Response
Clean file
Clean file
Delete file
Continue
scanning
Specifies the first action for the scanner to take when a
poten
tial exploit is detected.
Clean files
- Removes the threat from the detected file,
if possible.
Delete files
- Deletes files with potential threats.
Continue scanning
- Continues scan
ning files when a threat
is detected. The scanner does not move items to
the
quarantine.