When the scan is completed, Scanner informs you about detected threats and recommends that you neutralize them.
Figure 62. Selecting an action after a scan
The table with scan results contains the following information:
Neutralizing all the threats in the table
An action is specified for each threat according to the . To neutralize all the threats by applying actions that are specified in the table, click .
To change the action for the threat specified in the table
1.Select an object or a group of objects.
2.In the column, select a necessary action from the drop-down list.
3.Click . Scanner starts neutralizing all the threats listed in the table.
Neutralizing selected threats
You can also neutralize selected threats separately. To do so:
1.Select an object, several objects (by pressing the CTRL key) or a group of objects.
2.Open a shortcut menu and select a necessary action. Scanner starts neutralizing the selected threat (threats).
Restrictions on neutralizing threats
There are the following limitations:
•For suspicious objects, curing is impossible.
•For objects which are not files (boot sectors) moving and deletion is impossible.
•For files inside archives, installation packages, or attachments, no actions are possible. The action applies to the whole file.
The detailed report on component operation is stored in the dwscanner.log file that is located in %USERPROFILE%\Doctor Web folder.