Solved

CA eTrust Threat Management Quarantine Password

Posted on 2009-04-06
2
1,396 Views
Last Modified: 2013-11-22
We are using CA eTrust Anti-Virus.
I have configured the real time policy to quarantine anything that can't be cured.
I can't find how quarantine works.
In some pc's there is a locked zip file which I can't find the password and 2 .dat files.
Some other pc's have only the two .dat files.
How quarantine works?
If the zip file is quarantine, which is the pass?
Thank you
0
Comment
Question by:Pesmerga
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 7

Accepted Solution

by:
C-Shadows earned 500 total points
ID: 24240975
Is this an Server - Agent configuration ?

If that is the case, open the agent window (Right click in the tray icon of Etrust)

Then click on Etrust Antivirus in the left tab,

Then go to advanced tab,

There you have an option to view the quarantined items,

If it is your server, then the admin console user name and password should be your windows  
admin login user name and password with domain name in the front of the user name if in case if the server is in a domain.


0
 

Author Closing Comment

by:Pesmerga
ID: 31566983
Although we didn't find the quarantine pass, the quarantined items in the advanced tab was helpful...Thank you
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

PREFACE The purpose of this guide is to explain what the SEPC Status Utility is and how it works. I have written the utility using AutoIt and have included the source code for your review. You are welcome to modify the code to your liking, but I wi…
Have you ever tried to find someone you know on Facebook and searched to find more than one result with the same picture? Perhaps someone you know has told you that they have a 'facebook stalker' or someone who is 'posing as them' online and ta…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question