Home
Change View
Print
Responding to Detections
There are different ways to take action on detections depending on which feature detects the threat.
Contents
How actions are taken on detections
System access point violations
Buffer overflow detections
Unwanted program detections
On-access scan detections
On-demand scan detections
Email scan detections
Quarantined items
English-to-Russian translation