Reference Guide
Security Management Server v10.2.10 AdminHelp
217
Exclusions String
String - Comma-separated list of parameters
Specify files, folders, and drives to exclude from
scanning.
Comma separated list of parameters:
<ExclusionType>,<ExclusionData>,<
ExcludeSubfolders
(only applies to FileOrFolder type)>
Possible values: <FileOrFolder|FileType|ModifiedAge|
AccessedAge|CreatedAge>,<PathToFileOrFolder|
FileType|Age>,<true|false>
Examples:
FileOrFolder,C:\Users,false
FileType,xml,false
FileType,mp?,false
ModifiedAge,120,true
AccessedAge,150,false
CreatedAge,300,true
Threat First
Response
Clean file
Clean file
Delete file
Continue scanning
Specifies the first action for the scanner to take when a
threat is detected.
Clean files
- Removes the threat from the detected file,
if poss
ible.
Delete files
- Deletes files with potential threats.
Continue scanning
-
Continues scanning files when a threat
is detected. The scanner does not move items to the
qu
arantine.
Threat First
Response Fails
Delete file
Clean file
Delete file
Continue scanning
Specifies the action
for the scanner to take when a
threat
is detecte
d if the first action fails.
Clean files
- Removes the threat from the detected file,
if possib
le.
Delete files
- Deletes files with potential threats.
Continue scanning
- Continues scanning files when a thre
at
is detected. The scanner do
es not move items to the
quaran
tine.
Exploit First
Response
Clean file
Clean file
Delete file
Continue scanning
Specifies the first action for the scanner to take when a
potential exploit is detected.
Clean files
- Removes the threat from the detected file,
if poss
ible.
De
lete files - Deletes files with potential threats.
Continue scanning
- Continues scanning files
when a threat
is detected. The scanner does not move items to the
quarantine.