checksfor the infections that have processes running
inmemory. It also checks for the infections that the
start-upfiles and folders refer.
Ifthat does not work, read the information on the
SecurityHistory - Advanced Details window to
identifythe types of files that cannot be repaired. You
cantake one of the following actions, depending on the
filetype:
Youcan view the file type of
thedetected risk. This
informationhelps you to
decidethe action that can be
takendepending on the file
type.
Forexample, you can view the
infectedfiles with the
followingfile name
extensions(any file can be
infected):
1.exe
1.doc
1.dot
1.xls
Infectedfiles
Replaceusingyour operating
systemdisks.
Harddisk master boot record,
bootrecord, or system files
(suchas IO.SYS or
MSDOS.SYS)and floppy disk
bootrecord and system files
217Respondingto security issues
Whatto do if a security risk is found