The Suspicious Items page displays a list of items that are hidden from normal file and process listings.
Item Name
|
Displays the name of the file, process or application.
|
Type
|
Displays the type of the item. The item type can be hidden file, hidden process, hidden application or hidden drive.
|
Action to take
|
Displays the currently selected action:
|
|
Automatic - Let Virus and Spy Protection handle the item automatically.
|
|
Rename - Rename the item. Renamed items stay on your computer, but they cannot cause any damage.
|
|
Exclude - Exclude the item from the scan. Excluded items stay on your computer and are not displayed during subsequent scans.
|
|
None - Leaves the item in your computer but does not exclude it from the scan.
|
To open Suspicious Items Properties, right-click the item and select Details.
The Suspicious Items Properties dialog displays the following information:
Suspicious item
|
Displays the name of the file, process or application.
|
File path
|
Displays the path to the suspicious file. Click the path to open it in the Windows Explorer.
|
Type
|
Displays the type of the item. The item type can be hidden file, hidden process, hidden application or hidden drive.
|
Description
|
Displays a short description why the item is suspicious.
|
Action
|
Displays what was done to the suspicious item.
|
Result
|
Displays whether the action succeeded or not.
|
Reason
|
If the action failed, displays the reason why.
|
F-Secure Corporation www.F-Secure.com Product Support |