ESET NOD32 ANTIVIRUS - FOR KERIO Installation Manual - Page 6

Browse online or download pdf Installation Manual for Software ESET NOD32 ANTIVIRUS - FOR KERIO. ESET NOD32 ANTIVIRUS - FOR KERIO 7 pages. For lotus domino
Also for ESET NOD32 ANTIVIRUS - FOR KERIO: Installation Manual (6 pages), Installation (4 pages), Datasheet (2 pages), Quick Start Manual (14 pages), User Manual (16 pages), Datasheet (2 pages), Datasheet (2 pages), Datasheet (2 pages), Installation Manual (6 pages), Installation Manual (7 pages), Datasheet (4 pages), Datasheet (4 pages), Quick Start Manual (17 pages), Quick Start Manual (16 pages), Datasheet (2 pages), Setup Manual (8 pages), Datasheet (2 pages), Setup Manual (8 pages), Setup Manual (8 pages), Installation Manual (7 pages), Installation (5 pages), Installation Manual (12 pages), Quick Start Manual (16 pages), (French) Guía De Inicio Rápido (11 pages)

• To contains – filters by addressee
• Subject contains – filters by subject
• Body contains – filters by text in the e-mail body
• Attachments size – filters by the size of at-
tachment
• Action to take – actions applicable to e-mail mess-
ages
– Delete (reject) message – deletes filtered
messages
– Move message to mail review database –
moves messages to the review database
– Log Message to mail review database and
deliver the message – delivers messages to
their addressees and places a copy of the mess-
ages to the review database
– Remove attachments and deliver – deletes
attachments and delivers messages subsequent-
ly
Strings used for filtering email must commence and
end with an asterisk (e.g. *viagra*). Wildcards can also be
used. A question mark (?) substitutes any one character,
while an asterisk (*) substitutes zero or more arbitrary
characters. Use a semicolon (;) to delimit multiple strings,
if necessary.
Example:
To filter out email from the hotmail.com and yahoo.com
domains, enter **@hotmail.com*;**@yahoo.com* to
the „From contains" field.
4. Log, Mail Review and
Quarantine database maintenance
AMFE Log Database
contains a review of all infected e-mails detected. The
database also provides information about the time an in-
cident occurred, the name of the threat as well as the re-
cipient. The information in the database can be sorted by
date or the name of the threats. To enable database lo-
gging, select Make log entry, which is located in the Mail
Filter setup.

Quarantine Database

the Quarantine database keeps track of all infected fi-
les detected. If needed, the files can be recovered. As in
the previous case, items in quarantine can be arranged
by date or name of infiltration. To store infected files in
quarantine, select Place infected file into quarantine da-
tabase, found in the Mail Filter Setup.
Mail Review Database
contains all e-mails that have been filtered. Messa-
ges are divided into 'delivered' and 'undelivered' . E-mail
messages delivered to their respective addressees are in-
dicated by this icon
NOD32 Server edition for Domino
(when displaying all messages).