05.08.2013 Views

Trend Micro InterScan Gateway Security Appliance M-Series ...

Trend Micro InterScan Gateway Security Appliance M-Series ...

Trend Micro InterScan Gateway Security Appliance M-Series ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

How <strong>InterScan</strong> <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> Works<br />

Email Notification<br />

Users and administrators need feedback when <strong>InterScan</strong> <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong><br />

intervenes to stop viruses, spyware, phishing attempts, access to blocked URLs, and<br />

so on. To that end, <strong>InterScan</strong> <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> can send email notifications<br />

about any action that it takes on SMTP, POP3, HTTP, and FTP traffic. The<br />

appliance can insert inline notification stamps into all scanned message before sending<br />

them, and senders, recipients, and administrators can receive standard or customized<br />

messages when the appliance performs a particular action. The appliance can<br />

also notify <strong>Trend</strong>Labs of potential threats—for example, a phishing URL—thereby<br />

enabling <strong>Trend</strong> <strong>Micro</strong> to verify the accuracy of the potential threat, classify it within<br />

the <strong>Trend</strong>Labs databases, and if need be, take systematic action against the threat.<br />

Logs<br />

Administrators need a way to monitor scanning and detection activity of the appliance<br />

over time. Monitoring these activities provides a historical view and enables you to<br />

analyze those settings that you may need to modify to optimize security. <strong>InterScan</strong><br />

<strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> assists the administrator in these tasks by tracking all<br />

scanning and detection activity that it performs and writing this information to various<br />

logs. A log query feature allows you to create reports that show detection activity<br />

for the different protocols for the various types of scanning tasks that <strong>InterScan</strong> <strong>Gateway</strong><br />

<strong>Security</strong> <strong>Appliance</strong> performs. A log maintenance feature allows you to perform<br />

log maintenance either manually or according to a schedule. You can also view the<br />

event log.<br />

Quarantine<br />

Sometimes the best strategy for dealing with malware that arrives through<br />

email—messages that contain viruses, spyware, or bots—is to quarantine the message<br />

and its enclosures for further examination. The <strong>InterScan</strong> <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong><br />

allows you to quarantine messages, files, or enclosed objects suspected of being<br />

malicious in a quarantine folder. The appliance can also quarantine email that has<br />

triggered the content filtering rules.<br />

<strong>InterScan</strong> <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> allows you to query the quarantine folder by<br />

time, sender, recipient, and subject. You can also perform basic maintenance on the<br />

quarantine folder such as manually deleting email messages or setting a schedule to<br />

delete email messages; and you can export a query of a set of quarantined files.<br />

3-21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!