12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

AntiVirus<br />

Antivirus CLI configuration<br />

Misc<br />

NMT<br />

P2P<br />

Plugin<br />

RAT<br />

Spy<br />

Toolbar<br />

Block any programs included in the miscellaneous grayware<br />

category.<br />

Block network management tools. Network management tools can<br />

be installed and used maliciously to change settings and disrupt<br />

network security.<br />

Block peer to peer <strong>com</strong>munications programs. P2P, while a<br />

legitimate protocol, is synonymous with file sharing programs that<br />

are used to swap music, movies, and other files, often illegally.<br />

Block browser plugins. Browser plugins can often be harmless<br />

Internet browsing tools that are installed and operate directly from<br />

the browser window. Some toolbars and plugins can attempt to<br />

control or record and send browsing preferences.<br />

Block remote administration tools. Remote administration tools<br />

allow outside users to remotely change and monitor a <strong>com</strong>puter on<br />

a network.<br />

Block spyware programs. Spyware, like adware, is often included<br />

with freeware. Spyware is a tracking and analysis program that can<br />

report your activities, such as web browsing habits, to the<br />

advertiser’s web site where it may be recorded and analyzed.<br />

Block custom toolbars. While some toolbars are harmless,<br />

spyware developers can use these toolbars to monitor web habits<br />

and send information back to the developer.<br />

Antivirus CLI configuration<br />

system global optimize<br />

config antivirus heuristic<br />

This section describes the CLI <strong>com</strong>mands that extend features available through<br />

the web-based manager. For <strong>com</strong>plete descriptions and examples of how to<br />

enable additional features through CLI <strong>com</strong>mands, see the <strong>FortiGate</strong> CLI<br />

Reference.<br />

The optimize feature configures CPU settings to ensure efficient operation of the<br />

<strong>FortiGate</strong> unit for either antivirus scanning or straight throughput traffic. When<br />

optimize is set to antivirus, the <strong>FortiGate</strong> unit uses symmetric multiprocessing to<br />

spread the antivirus tasks to several CPUs, making scanning faster.<br />

This feature is available on models numbered 1000 and higher.<br />

For more information, see the Antivirus failopen and optimization Fortinet<br />

Knowledge Center article.<br />

The <strong>FortiGate</strong> heuristic antivirus engine performs tests on files to detect virus-like<br />

behavior or known virus indicators. Heuristic scanning is performed last, after file<br />

blocking and virus scanning have found no matches. In this way, heuristic<br />

scanning may detect new viruses, but may also produce some false positive<br />

results.<br />

The heuristic engine is enabled by default to pass suspected files to the recipient<br />

and send a copy to quarantine. Once configured in the CLI, heuristic scanning is<br />

enabled in a protection profile when Virus Scan is enabled.<br />

Use the heuristic <strong>com</strong>mand to change the heuristic scanning mode.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

01-30005-0203-20070830 409

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!