ESET MAIL SECURITY 4 - FOR MICROSOFT EXCHANGE SERVER 2000-2003-2008 Instrukcja Instalacji Strona 66

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 134
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 65
66
Active mode is useful because it examines transferred data as a whole. If it is not enabled, communication of
applications is monitored gradually in batches. This decreases the effectiveness of the data verification process, but
also provides higher compatibility for listed applications. If no problems occur while using it, we recommend that
you enable active checking mode by selecting the checkbox next to the desired application.
4.1.4 On-demand computer scan
If you suspect that your computer is infected (it behaves abnormally), run an On-demand computer scan to
examine your computer for infiltrations. From a security point of view, it is essential that computer scans are not
just run when an infection is suspected, but regularly as part of routine security measures. Regular scanning can
detect infiltrations that were not detected by the real-time scanner when they were saved to the disk. This can
happen if the real-time scanner was disabled at the time of infection, or if the virus signature database is not up-to-
date.
We recommend that you run an On-demand computer scan at least once a month. Scanning can be configured as a
scheduled task from Tools > Scheduler.
Przeglądanie stron 65
1 2 ... 61 62 63 64 65 66 67 68 69 70 71 ... 133 134

Komentarze do niniejszej Instrukcji

Brak uwag