Scan Items |
|
Actions |
For threat detections:
- Primary action to take when a threat is detected.
- Secondary action to take if the first action fails.
For unwanted program detections:
- Primary action to take when an unwanted program is detected.
- Secondary action to take if the first action fails.
For allowed actions in the prompt dialog box, select the action.
|
Alerts |
- Notify another user when a threatened email message is detected.
- Specify the message that displays to the user when prompting for action.
|
Reports |
- Enable activity logging.
- Specify the log file name and location.
- Specify the log file size limit.
- Select the log file format.
- Specify what to log besides scanning activity.
|
Notes Scanner Settings |
Note: This tab is available only for On-Delivery Email Scanning.
Configure Lotus Notes specific settings.
- Scan all server databases.
- Scan server mailboxes in the specified mailbox root folder.
- Notes applications to ignore.
|