Scan Items
|
|
Actions
|
For threat detections:
- Primary action
to take when a threat is detected.
- Secondary
action to take if the first action fails.
For unwanted program detections:
- Primary action
to take when an unwanted program is detected.
- Secondary
action to take if the first action fails.
For allowed actions in the prompt dialog box, select the
action.
|
Alerts
|
- Notify another
user when a threatened email message is detected.
- Specify the
message that displays to the user when prompting for action.
|
Reports
|
- Enable
activity logging.
- Specify the
log file name and location.
- Specify the
log file size limit.
- Select the log
file format.
- Specify what
to log besides scanning activity.
|
Notes Scanner
Settings
|
Note: This tab is available only for
On-Delivery Email Scanning.
Configure Lotus Notes specific settings.
- Scan all
server databases.
- Scan server
mailboxes in the specified mailbox root folder.
- Notes
applications to ignore.
|