The table describes all available values and the default values of all the container and image scan settings.
Container scan task settings
Setting |
Description |
Values |
|
---|---|---|---|
|
Enables or disables scan of containers defined by masks. You can specify masks using the |
|
|
|
Specifies a name or a name mask that defines a container to scan. Masks are specified in command shell format. You can use ? and * characters. Before specifying this setting, make sure that the |
Default value:
|
|
|
Enables or disables scan of images defined by masks. You can specify masks using the |
|
|
|
Specifies a name or a name mask that define images to scan. Before specifying this setting, make sure that the Masks are specified in command shell format. If you want to specify several masks, each mask must be specified on a new line with a new index ( |
Default value: All images are scanned.
|
|
|
Enables or disables scanning of all layers of images and running containers. |
|
|
|
Action to be performed on a container when an infected object is detected. Actions on an infected object inside the container are described below. |
|
|
|
Specifies the action to be performed on an image when an infected object is detected. Actions on an infected object inside the image are described below. |
All dependencies will also be deleted. Running containers will be stopped, and then deleted. |
The settings described below are applied to the objects inside containers and images.
Container scan task settings
Setting |
Description |
Values |
|
---|---|---|---|
|
Enables scanning of archives (including SFX self-extracting archives). The application scans the following archives: .zip; .7z*; .7-z; .rar; .iso; .cab; .jar; .bz; .bz2; .tbz; .tbz2; .gz; .tgz; .arj. The list of supported archive formats depends on the application databases being used. |
|
|
|
Enables scanning of self-extracting archives only (archives that contain an executable extraction module). |
|
|
|
Enables scanning email databases of Microsoft Outlook, Outlook Express, The Bat, and other mail clients. |
|
|
|
Enables scanning of plain text email messages. |
|
|
|
Task priority. Task priority is a parameter that combines a number of internal Kaspersky Industrial CyberSecurity for Linux Nodes settings and process start settings. By using this parameter, you can specify the way the application consumes system resources for running tasks. |
|
|
|
Maximum object scan duration (in seconds). The application stops scanning the object if it takes longer than the time specified by this parameter. |
The default value is |
|
|
Maximum size of an object to be scanned (in megabytes). If the object to be scanned is larger than the specified value, the application skips this object. |
The default value is |
|
|
Selection of the first action to be performed by Kaspersky Industrial CyberSecurity for Linux Nodes on the infected objects. If an infected object is detected in a file referenced to by a symbolic link that is included in the scan scope (while the file referenced by this symbolic link is not included in the scan scope), the specified action will be performed to the target file. For example, if you specify the |
Default value: |
|
|
Selection of the second action to be performed by Kaspersky Industrial CyberSecurity for Linux Nodes on infected objects. The application performs the second action if the first action fails. |
The possible values of the If Default value: |
|
|
Enables exclusion of the objects specified by the |
|
|
|
Excludes objects from being scanned by name or mask. You can use this setting to exclude an individual file from the specified scan scope by name or exclude several files at once using masks in the shell format. |
The default value is not defined.
|
|
|
Enables exclusion of objects containing the threats specified by the |
|
|
|
Excludes objects from scans by the name of the threats detected in them. Before specifying a value for this setting, make sure that the In order to exclude a single object from scans, specify the full name of the threat detected in this object – the string containing the application's decision that the object is infected. For example, you may be using a utility to collect information about your network. To keep the application from blocking it, add the full name of the threat contained in it to the list of threats excluded from scans. You can find the full name of the threat detected in the object in the application log. You can also find the full name of the threat on the Virus Encyclopedia website. To find the name of a threat, enter the application name in the Search field. |
The setting value is case-sensitive. The default value is not defined.
|
|
|
Enables logging of information about scanned objects that the application reports as not being infected. You can enable this setting, for example, to make sure that a particular object was scanned by the application. |
|
|
|
Enables logging of information about scanned objects that are part of compound objects. You can enable this setting, for example, to make sure that an object within an archive has been scanned by the application. |
|
|
|
Enables logging of information about objects that have not been processed for some reason. |
|
|
|
Enables heuristic analysis. Heuristic analysis helps the application to detect threats even before they become known to virus analysts. |
|
|
|
Specifies the heuristic analysis level. You can specify the heuristic analysis level. The heuristic analysis level sets the balance between the thoroughness of searches for threats, the load on the operating system's resources, and the scan duration. The higher the heuristic analysis level, the more resources and time are required for scanning. |
|
|
|
Enables usage of the iChecker technology. |
|