Real-time protection tab in Kaspersky Anti-Virus 8.0 for Linux File Server web console
We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.
Accept and close

 

 

Kaspersky Anti-Virus 8.0 for Linux File Servers

 
 
 

Real-time protection tab in Kaspersky Anti-Virus 8.0 for Linux File Server web console

Back to "Remote Administration"
2012 Nov 08 ID: 4317
 
 
 
 

Applies to Kaspersky Anti-Virus 8.0 for Linux File Servers

The tab Real-time protection allows configuring Kaspersky Anti-Virus 8.0 for Linux File Server file monitor. It has several tabs:

1. General

This tab allows starting, stopping and pausing Real-time protection, as well as viewing brief statistics:



    • Objects scanned

    • Threats detected 

    • Infected objects

    • Suspicious objects

      By clicking the link Full statistics you can review the following additional information:

    • Objects disinfected

    • Objects quarantined

    • Objects deleted

    • Objects not disinfected

    • Object processing errors

    • Password-protected objects

    • Corrupted objects



2. Schedule
This tab allows scheduling Real-time protection, i.e. when it should be started, stopped or paused. There is a default rule enabling Real-time protection on Anti-Virus startup.



Click Add new schedule rule to configure a new schedule.
 



Configure the following settings:

    • Rule type (Start, Stop, Pause);

    • Start (at specified time, after databases update, on Anti-Virus startup);

    • Start Periodically (either choose a frequency or set a particular date/day/month/year) or just Once;

    • Check the box Run on schedule and click OK to activate the schedule.

3. Protection areas

This tab allows specifying Real-time protection objects. The default area is “/” (all objects of the file system).



Click Add new area to configure a new protected area:




    • Scan area: navigate to a path or type it into the corresponding field, and choose File system type (local, mounted/shared NFS/SMB, all mounted/shared);

    • Security settings: select a Security Level (Recommended, Low, High), types of compound objects to scan (archives, mail databases, packed objects, plain mail, SFX archives), actions to apply to infected/suspicious objects (an action may also depend on threat type); scan mode (Smart check, when opened, when opened and modified), optional logging settings (log non-infected and/or packed files). You can also enable the heuristic analyzer, set its depth, limit scan scope by file size and/or time.

    • Objects masks: allows configuring black and white lists of scanned files by mask, and exclude objects by threat name;

    • Users and groups: allows limiting the protected area scan to certain user accounts/groups;

4. Exclusion areas
This tab allows specifying objects excluded from Real-time protection:



Click Add new area to configure a new excluded area:



    • Scan area: navigate to a path or type it into the corresponding field, and choose File system type (local, mounted/shared NFS/SMB, all mounted/shared);

    • Objects masks: allows configuring black and white lists of scanned files by mask, and exclude objects by threat name;

    • Users and groups: allows selecting user accounts authorized to run scans;

5. Protection mode



This tab allows setting the protection mode:

    • All operations (both, Samba and file system)

    • File system only

    • Samba only

 
 
 
 
Was this information helpful?
Yes No
Thank you
 

 
 

Feedback on Technical Support Site

Please let us know what you think about the site design, improvements we could add and any errors we need to eliminate

Send My Website Feedback Send My Website Feedback

Thank you!

Thank you for submitting your feedback.
We will review your feedback shortly.

 

How can we improve this article?

We will not be able to contact you if you leave your email address or phone number. To contact technical support, please sign in to your Personal Account.

Submit Submit

Thank you for your feedback!

Your suggestions will help improve this article.

OK