05.08.2013 Views

Trend Micro InterScan Gateway Security Appliance M-Series ...

Trend Micro InterScan Gateway Security Appliance M-Series ...

Trend Micro InterScan Gateway Security Appliance M-Series ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

How <strong>InterScan</strong> <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> Works<br />

When <strong>InterScan</strong> <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> detects spyware or grayware in a<br />

specific protocol, it will take the action that the administrator has defined for that<br />

protocol. <strong>InterScan</strong> <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> will then send a notification email<br />

to all persons specified in the Notification section for the specific protocol.<br />

<strong>InterScan</strong> <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> writes spyware and grayware detections to<br />

the anti-spyware/grayware log. You can export the contents of the spyware/grayware<br />

log for inclusion in reports.<br />

<strong>InterScan</strong> <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> uses the following components when<br />

scanning for spyware:<br />

• <strong>Trend</strong> <strong>Micro</strong> Spyware scan engine and pattern file<br />

• Spyware/Grayware Exclusion List<br />

Anti-Phishing<br />

Because the Internet fraud known as phishing has become an increasing problem on<br />

the Internet, <strong>Trend</strong> <strong>Micro</strong> designed the anti-phishing function in <strong>InterScan</strong> <strong>Gateway</strong><br />

<strong>Security</strong> <strong>Appliance</strong> to protect LAN users from inadvertently giving away sensitive<br />

information as part of a phishing attack. Anti-phishing monitors:<br />

• Outbound client URL requests<br />

• Email messages that contain links to phishing sites.<br />

<strong>InterScan</strong> <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> writes phishing events to the phishing log.<br />

You can export the log for inclusion in reports.<br />

<strong>InterScan</strong> <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> uses the following components to check for<br />

phishing:<br />

• <strong>Trend</strong> <strong>Micro</strong> Anti-Spam Engine<br />

• URL rating database<br />

Because the incidence of phishing fraud is growing rapidly and the format continues<br />

to evolve, it is especially important to keep the spam pattern file up to date. <strong>Trend</strong><br />

<strong>Micro</strong> recommends that you schedule frequent updates and set email notifications to<br />

let you know the status of scheduled updates. Check the version of the spam pattern<br />

file you are running and time of last update on the Summary screen.<br />

3-15

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!