01.01.2013 Views

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6<br />

<strong>Web</strong> filtering<br />

Virus and malware filtering<br />

Enable GTI file reputation queries — When selected, information on the reputation of files retrieved<br />

from the Global Threat Intelligence system is included in the scanning result that the Anti-Malware<br />

module provides<br />

Advanced Settings for <strong>McAfee</strong> <strong>Gateway</strong> Anti-Malware<br />

Settings applying only to the <strong>McAfee</strong> <strong>Gateway</strong> Anti-Malware submodule<br />

Note: The following options are by default selected. It is generally recommended not to change these<br />

settings.<br />

(General Settings)<br />

Settings for some general scanning methods<br />

Enable Artemis queries — When selected, queries regarding infected objects are also performed on<br />

an Artemis database<br />

Enable heuristic scanning — When selected, heuristic methods are used in scanning web objects<br />

Enable detection for potentially unwanted programs — When selected, web objects are also<br />

scanned for potentially unwanted programs<br />

Enable mobile code scanning — When selected, mobile code is scanned in general<br />

Note: Individual settings can be configured under Scan the following mobile code types.<br />

Scan the Following Mobile Code Types<br />

Settings for including different types of mobile code in the scanning<br />

Windows executables — When selected, these are scanned<br />

Once downloaded from the web or received by email, these executables can become a threat when<br />

launched because they run with all the privileges of the current user.<br />

JavaScript — When selected, this is scanned<br />

JavaScript code can be embedded virtually anywhere, from web pages and PDF documents to video and<br />

HTML files.<br />

Flash ActionScript — When selected, this is scanned<br />

ActionScript code can be embedded in flash videos and animations and has access to the flash player<br />

and the browser with all their functions.<br />

Java applets — When selected, these are scanned<br />

Java applets can be embedded in web pages. Once activated, they can run at different permission<br />

levels, based on a digital certificate and the user’s choice.<br />

Java applications — When selected, these are scanned<br />

Java applications run stand-alone with all privileges of the current user.<br />

ActiveX controls — When selected, these are scanned<br />

ActiveX controls can be embedded in web pages and office documents. Once activated, they run with all<br />

privileges of the current user.<br />

Windows libraries — When selected, these are scanned<br />

These libraries usually come along with an executable in a setup package or are downloaded from the<br />

web by a running executable or by malicious code.<br />

Visual Basic script — When selected, this is scanned<br />

Visual Basic script code can be embedded in web pages or in emails.<br />

Visual Basic for applications — When selected, this is scanned<br />

Visual Basic macros can be embedded in office documents created with Word, Excel, or PowerPoint.<br />

184 <strong>McAfee</strong> <strong>Web</strong> <strong>Gateway</strong> <strong>7.1.5</strong> <strong>Product</strong> <strong>Guide</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!