...
Feature | Enabled | Disabled (Default setting) | ||
---|---|---|---|---|
Handling of the infected file |
Rationale: While we can delete the infected attachment, we are unable to determine where the attachment is being used. It could be a macro or rendered image on another page in another space. Thus, we decided to place a placeholder so that people can identify it easily. When the newer uninfected version is being uploaded, it will be able to render the content without requiring the users to update the Confluence page content. | The infected file would not be removed automatically. | ||
Notification by Comment |
| |||
A comment to inform user that an infected file has been detected and replaced with a placeholder | A comment to inform the user to delete the infected file | |||
Page Content | When the user tries to open the infected file, it would be replaced with placeholder looking like this, |
...
The paths would call a script, which calls the scanner's exe file.
You could create a command file (e.g. scanner.cmd) containing this script with options e.g.
Code Block |
---|
@echo off echo executing scan for %1 c:\progra~1\window~1\MpCmdRun.exe -Scan -ScanType -File "%1" echo "returning errorLevel = " %ERRORLEVEL% EXIT /B %ERRORLEVEL% |
As the script above contains some shorthand directory, you can retrieve shorthand commands through: dir /x