12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Config<br />

AntiVirus<br />

Grayware categories are populated with known executable files. Each time the<br />

<strong>FortiGate</strong> unit receives a virus and attack definitions update, the grayware<br />

categories and contents are updated.<br />

Note: If virtual domains are enabled on the <strong>FortiGate</strong> unit, antivirus features are configured<br />

globally. To access these features, select Global Configuration on the main menu.<br />

To view the grayware list, go to AntiVirus > Config > Grayware.<br />

Figure 279:Sample grayware options<br />

Enabling a grayware category blocks all files listed in the category. The categories<br />

may change or expand when the <strong>FortiGate</strong> unit receives updates. You can choose<br />

to enable the following grayware categories:<br />

Adware<br />

BHO<br />

Dial<br />

Download<br />

Game<br />

HackerTool<br />

Hijacker<br />

Joke<br />

Keylog<br />

Block adware programs. Adware is usually embedded in freeware<br />

programs and causes ads to pop up whenever the program is<br />

opened or used.<br />

Block browser helper objects. BHOs are DLL files that are often<br />

installed as part of a software package so the software can control<br />

the behavior of Internet Explorer 4.x and later. Not all BHOs are<br />

malicious, but the potential exists to track surfing habits and gather<br />

other information.<br />

Block dialer programs. Dialers allow others to use the PC modem<br />

to call premium numbers or make long distance calls.<br />

Block download programs. Download <strong>com</strong>ponents are usually run<br />

at Windows startup and are designed to install or download other<br />

software, especially advertising and dial software.<br />

Block games. Games are usually joke or nuisance games that you<br />

may want to block from network users.<br />

Block hacker tools.<br />

Block browser hijacking programs. Browser hijacking occurs when<br />

a ‘spyware’ type program changes web browser settings, including<br />

favorites or bookmarks, start pages, and menu options.<br />

Block joke programs. Joke programs can include custom cursors<br />

and programs that appear to affect the system.<br />

Block keylogger programs. Keylogger programs can record every<br />

keystroke made on a keyboard including passwords, chat, and<br />

instant messages.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

408 01-30005-0203-20070830

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!