Kaspersky anti virus for lotus notes




















Outgoing replications are not scanned. The following objects are scanned for threats: Field contents in Rich Text format Field contents in MIME format Files attached to a document OLE objects embedded in documents Scans of databases on the protected Lotus Domino server are performed by schedule or on demand.

The following objects are scanned for threats: Field contents in Rich Text format Field contents in MIME format Files attached to a document OLE objects embedded in documents Objects are filtered by size and name mask when scanning email messages, replications and databases. Filtered objects are processed according to rules set by the administrator. The application processes infected, protected and not scanned objects detected while scanning email messages, replicated documents and database documents.

Senders and recipients of messages, as well as administrators, are notified about infected, protected, and not scanned objects that have been detected in messages and the actions taken on them. Your feedback will be used for content improvement purposes only.

If you need assistance, please contact technical support. Latest update: May 14, ID: What is this status? License agreement License agreement. Download KAVInstaller. Feedback on Technical Support Site Please let us know what you think about the site design, improvements we could add and any errors we need to eliminate.

Kaspersky Anti-Virus for Lotus Domino offers cost-effective, world-class anti-malware protection for IBM Lotus Domino servers in large, complex corporate networks with heavy loads. A virus entering via a simple email can easily lead to the loss of business-critical data. Messages, attachments including packed and archived attachments and OLE objects are scanned for viruses and other types of malware.

Any documents in the database can also be scanned on-demand by an administrator. Kaspersky Anti-Virus 8. If several events of the same type are detected during a defined time period, the administrator is notified about the potential threat of a malware outbreak and has the option to temporarily stop the sending and receiving of emails. Copies of infected, damaged and suspicious objects are placed in backup storage, allowing important information to be restored in the event of an object being corrupted.

A wide choice of search parameters makes it simple to search for an object in backup storage. You download the software straight from our website. Simply complete your purchase and the download link will appear on the order confirmation page. The same download link will also be sent to you in an order confirmation email.

Please note, you will need your activation code to use your security application. This code will be displayed on your order confirmation page, as well as emailed to you. When purchasing your license, simply select how many Windows PCs you want to protect. During your license period, you can protect any number of Windows up to the total number that your license covers. For example, you could select a 3-PC license to protect up to three different desktops or laptops used in your family.



0コメント

  • 1000 / 1000