Primary actions for On-Access scan include:
- Replace item with an alert: To replace a detected item, such as an attachment, with an
alert message.
- Delete embedded item: To delete the detected item. For example, to delete
an attachment that triggers a detection rule.
- Delete message: To delete the email message.
- Allow through: To allow the item to continue to the next scanning phase or on to its final destination.
Primary actions for On-Demand (Default), On-Demand (Find Viruses), On-Demand (Remove Viruses), On-Demand (Find Banned Content), On-Demand (Remove Banned Content), On-Demand (Full Scan), and Gateway scan include:
- Replace item with an alert: To replace a detected item, such as an attachment, with an
alert message.
- Delete message: To delete the email message.
- Allow through: To allow the item to continue to the next scanning phase or on to its final destination.
Secondary actions for On-Access and On-Demand (Default) scan include:
- Log: To record the detection in a log.
- Quarantine: To take a copy of the item and store it in the quarantine database.
- Notify administrator: To send an alert message to the email administrator.
- Notify sender: To send an alert message to the sender, when the original email message does not originate in the same domain as the server.
- Notify recipient: To send an alert message to the recipient, when the recipient is not in the same domain as the server.
Secondary actions for On-Demand (Find Viruses), On-Demand (Remove Viruses), On-Demand (Find Banned Content), On-Demand (Remove Banned Content), On-Demand (Full Scan), and Gateway scan include:
- Log: To record the detection in a log.
- Quarantine: To take a copy of the item and store it in the quarantine database.
- Notify administrator: To send an alert message to the email administrator.