Different Detections and Responses
There are different ways to take action on detections depending on which feature detects the threat.
Contents
Related concepts
How actions are taken on detections
Related reference
System access point violations
Buffer overflow detections
Unwanted program detections
On-access scan detections
On-demand scan detections
Email scan detections
Quarantined items