Jump to content

djsmbam

Members
  • Posts

    3
  • Joined

  • Last visited

Posts posted by djsmbam

  1. I guess I should qualify my question. I understand that it would be able to remove threats from say documents the user owns, but what about from folders the user does not have permissions to? Maybe a threat introduced by someone who does have admin having used the machine?

    I guess I'm trying to understand what the implied scope of "scan and removal" efforts is for each user type?

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.