Suspicious Items

The Suspicious Items page displays a list of items that are hidden from normal file and process listings.

Item Name
Displays the name of the file, process or application.
Type
Displays the type of the item. The item type can be hidden file, hidden process, hidden application or hidden drive.
Action to take
Displays the currently selected action:
 
Automatic - Let Virus and Spy Protection handle the item automatically.
 
Rename - Rename the item. Renamed items stay on your computer, but they cannot cause any damage.
 
Exclude - Exclude the item from the scan. Excluded items stay on your computer and are not displayed during subsequent scans.
 
None - Leaves the item in your computer but does not exclude it from the scan.

Suspicious Items Properties

To open Suspicious Items Properties, right-click the item and select Details.

The Suspicious Items Properties dialog displays the following information:

Suspicious item
Displays the name of the file, process or application.
File path
Displays the path to the suspicious file. Click the path to open it in the Windows Explorer.
Type
Displays the type of the item. The item type can be hidden file, hidden process, hidden application or hidden drive.
Description
Displays a short description why the item is suspicious.
Action
Displays what was done to the suspicious item.
Result
Displays whether the action succeeded or not.
Reason
If the action failed, displays the reason why.


F-Secure Corporation
www.F-Secure.com
Product Support