摘要 |
In a data management system, examination of first data for malicious content by a malicious content scanner is initiated in response to a request to write first data to a data storage device. In response to the examination revealing no malicious content in the first data, the first data, a first signature representative of a version of the malicious content scanner at a time of the examination of the first data, and second data linking the first signature to the first data as read-only data are written to the data storage device. |