Views:
The following table lists the actions that ActiveAction takes:
Malware Type
Action
Clean. If a virus cannot be cleaned, it is deleted (Windows) or quarantined (Linux or Solaris). There is an exception to this behavior: On a Linux or Solaris agent, if a virus of type 'Test Virus' is found, access is denied to the infected file.
CVE Exploit
Aggressive Detection Rule
Pass (This setting detects more issues but may also result in more false positives, so the default action is to raise an event.)
Delete (Does not apply to real-time scans)
If a threat cannot be cleaned, it is handled as follows:
Also, on a Linux or Solaris agent, if a virus of type 'Joke' is found, it is quarantined immediately. No attempt is made to clean it.
Pass
For more information about CVE Exploit and Aggressive Detection Rule, see Configure Anti-Malware Monitoring Level.
Note
Note
When the agent downloads virus pattern updates from an ActiveUpdate server or relay, it may change its ActiveAction scan actions.
The following is a list of anti-malware remedial actions and their descriptions.
  • Pass: Allows full access to the infected file without doing anything to the file. (An Anti-Malware Event is still recorded.)
    WARNING
    WARNING
    The remedial action Pass should never be used for a possible virus.
  • Clean: Cleans an infected file before allowing full access to it. If the file can't be cleaned, it is quarantined.
  • Delete: On Linux, the infected file is deleted without a backup.
    On Windows, the infected file is backed up and then deleted. Windows backup files can be viewed and restored in Events & Reports Events Anti-Malware Events Identified Files.
  • Deny Access: This scan action can only be performed during Real-time scans. When Server & Workload Protection detects an attempt to open or execute an infected file, it immediately blocks the operation. The infected file is left unchanged. When the Access Denied action is triggered, the infected files stay in their original location.
    Important
    Important
    Do not use the remedial action Deny Access when Real-Time Scan is set to During Write. When During Write is selected, files are scanned when they are written and the action Deny Access has no effect.
  • Quarantine: Moves the infected file to the quarantine directory on the computer or Virtual Appliance. The quarantined file can be viewed and restored in Events & Reports Events Anti-Malware Events Identified Files.
    Note
    Note
    Malware marked as Quarantined on Linux might be marked as Deleted on Windows, despite the malware being identical on both operating systems. In either case, the file can be viewed and restored in Events & Reports Events Anti-Malware Events Identified Files.
    Note
    Note
    On Windows, infected non-compressed files (for example, .txt files) are quarantined, while infected compressed files (for example, .zip files) are deleted. On Windows, both quarantined or deleted files have a backup that can be viewed and restored in Events & Reports Events Anti-Malware Events Identified Files. On Linux, all infected files (compressed or non-compressed) are quarantined, and can be viewed and restored in Events & Reports Events Anti-Malware Events Identified Files.