05.08.2013 Views

Trend Micro InterScan Gateway Security Appliance M-Series ...

Trend Micro InterScan Gateway Security Appliance M-Series ...

Trend Micro InterScan Gateway Security Appliance M-Series ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

HTML viruses 3-12<br />

HTTP<br />

Anti-pharming<br />

allow access to Web site 6-23<br />

block access to Web site 6-23<br />

configure action 6-23<br />

configure Notification 6-24<br />

configure target 6-22<br />

enable 6-22<br />

Anti-phishing<br />

allow access to Web site 6-26<br />

block access to Web site 6-26<br />

configure action 6-26<br />

configure notification 6-27<br />

configure target 6-25<br />

enable 6-25<br />

Anti-spyware<br />

allow download of spyware 6-17<br />

block files with spyware 6-17<br />

configure Action 6-17<br />

configure Spyware/Grayware Exclusion List<br />

6-15<br />

configure target 6-15<br />

enable 6-15<br />

scan for spyware/grayware 6-16<br />

search online for spyware/grayware 6-15<br />

select Notification recipients 6-18<br />

Antivirus<br />

block infected files 6-12<br />

clean infected files 6-12<br />

configure action 6-12<br />

configure target 6-6<br />

enable 6-2<br />

exclude files from scan 6-7<br />

maximum file size to scan 6-8<br />

pass infected files 6-13<br />

scan all files 6-7<br />

scan specified files by extension 6-7<br />

scan using IntelliScan 6-7<br />

select notification recipients 6-13<br />

specify files to scan 6-7<br />

Content and URL filtering 1-8<br />

File Blocking<br />

block selected file types 6-35<br />

block specified file extensions 6-35<br />

configure target 6-35<br />

enable 6-35<br />

select notification recipients 6-36<br />

scanning support 1-4<br />

URL Filtering<br />

configure notification 6-33<br />

configure proxy settings 6-32<br />

configure settings 6-31<br />

configure work time settings 6-31<br />

enable proxy settings 6-32<br />

URL filtering<br />

filter selected categories 6-28<br />

URL Filtering Rules<br />

configure Approved URL List 6-29<br />

configure Blocked URL List 6-29<br />

enable 6-29<br />

filter during leisure time 6-29<br />

filter during work time 6-29<br />

HTTP - Enable 6-2<br />

HTTP > Anti-pharming - Action 6-23<br />

HTTP > Anti-pharming - Notification 6-24<br />

HTTP > Anti-pharming - Target 6-22<br />

HTTP > Anti-phishing - action 6-26<br />

HTTP > Anti-phishing - Notification 6-27<br />

HTTP > Anti-phishing - Target 6-25<br />

HTTP > Anti-spyware - Action 6-17<br />

HTTP > Anti-spyware - Notification 6-18<br />

HTTP > Anti-spyware - Target 6-15<br />

HTTP > File Blocking - Notification 6-36<br />

HTTP > File Blocking - Target 6-34<br />

HTTP > Scanning - Action 6-12<br />

HTTP > Scanning - Target 6-6<br />

HTTP > URL Filtering - Notification 6-33<br />

HTTP > URL Filtering – Proxy Settings 6-32<br />

HTTP > URL Filtering - Settings 6-31<br />

HTTP > URL Filtering – URL Filtering Rules , top<br />

half of screen 6-28<br />

HTTP Scanning - Notification 6-13<br />

HTTP Services<br />

Figures<br />

fig. 6-01. HTTP - Enable 6-2<br />

fig. 6-02. HTTP > Scanning - Target 6-6<br />

fig. 6-03. Scan Specified Files by Extension<br />

6-7<br />

fig. 6-04. HTTP > Scanning - Action 6-12<br />

I–9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!