NETGEAR STM150EW3-100NAS manual What Can You Do with an STM150?

Page 15

ProSecure Web/Email Security Threat Management Appliance STM150 Reference Manual

What Can You Do with an STM150?

The STM150 combines robust protection against malware with ease-of-use and advanced reporting and notification features to help you deploy and manage the device with minimal effort.

Here are some of the things that you can do with the STM150:

Scan Network Traffic for Malware – Using the patent-pending stream scanning technology, you can configure the STM150 to scan HTTP, SMTP, POP3, HTTPS, IMAP, and FTP protocols. Unlike traditional batch-based scan engines that need to cache the entire file before they can scan, this scan engine checks traffic as it enters the network, ensuring unimpeded network performance.

Protect the Network Instantly – the STM150 is a plug-and-play security solution that can be instantly added to networks without requiring network reconfiguration.

Receive Real-time Alerts and Generate Comprehensive Reports – You can configure the STM150 to send out alerts whenever a malware or an outbreak is detected on the network. Real-time alerts can be sent out via email, allowing you to monitor malware events wherever you are.

By configuring the STM150 to send out malware alerts, you can isolate and clean the infected computer before the malware incident can develop into a full blown outbreak. The STM150 also provides comprehensive reports that you can use to analyze network and malware trends.

SNMP Support – You can enable and configure the STM150’s SNMP settings to receive SNMP traps through a supported MIB browser.

Automated Component Updates – Downloading components regularly is the key to ensuring updated protection against new threats. The STM150 makes this administrative task easier by supporting automatic malware pattern, program and engine updates.

Introduction

1-3

v1.1, March 2009

Image 15
Contents NETGEAR, Inc Bestätigung des Herstellers/Importeurs TrademarksStatement of Conditions EU Regulatory Compliance StatementAdditional Copyrights Voluntary Control Council for Interference Vcci StatementMD5 Zlib Product and Publication DetailsV1.1, March Contents Chapter Performing System Management Tasks Chapter Monitoring System Performance Page Conventions, Formats, and Scope About This Manual Manual Part Publication Version Description Number Date Revision HistoryChapter Introduction About Stream Scanning Key Features and CapabilitiesWhat Can You Do with an STM150? Front Panel Features Service Registration Card with License KeysRear Panel Features Choosing a Location for the STM150 Default IP Address, Login Name, and Password LocationUsing the Rack Mounting Kit V1.1, March Choosing a Deployment Scenario Provisioning Threat Management ServicesGateway Deployment Server Group Segmented LAN Deployment Use the Installation Guide to Perform Initial ConfigurationLogging In to the STM150 V1.1, March Click Register Registering the STM150Web Security Use the Setup Wizard to Complete the ConfigurationSetup Wizard Options Email SecurityWeb Categories Verifying the STM150 InstallationUpdate Settings Email Notification ServerTesting Connectivity Testing Http ScanningWhat to Do Next Modifying System Settings Configuring Network SettingsPerforming System Management Tasks V1.1, March Enabling Session Limits and Timeouts On the menu, click Global Settings Scanning Exclusions Scanning ExclusionsTo enter a scanning exclusion rule Setting the System Time On the menu, click Administration Time ZoneTo set the system time To specify a notification server Specifying the Notification ServerCustomizing Email Alerts Click Save ChangesTo enable system administrator email alerts Configuring Snmp Settings To configure the Snmp settingsOn the menu, click Administration Snmp Supported MIB Browsers Defining Trusted Snmp HostsTo define Snmp Traps Backing Up the STM150 Configuration Backing Up and Restoring ConfigurationsTo Back Up the STM150 Settings Restoring a ConfigurationTo restore the STM150 settings Restarting the STM150 Resetting to Factory DefaultsEnabling Remote Management Configuring Scheduled Updates Administering Software UpdatesTo configure scheduled updates Performing a Manual UpdateOn the menu, go to Administration Software Update Applying a Software Update that Requires a Reboot Administering Admin Login Timeouts and Passwords V1.1, March V1.1, March Chapter Customizing Scans Default Scan SettingsCustomizing Email Scanning Settings End User Email Notification Settings Email Security Anti-Virus Notification Settings on the menuInsert Warning into Email Subject Line Smtp Send Warning Email When Malware Is Found Append Safe Stamp Smtp & POP3Replace Infected Attachment with Warning Message Email Content Filtering Filter by File Type Filter by Password-protected AttachmentsFilter by Subject Keywords File ExtensionProtecting Against Email Spam Setting Up the Whitelist and BlacklistEmail Security Anti-Spam Whitelist and Blacklist To define the sender whitelist. On the menu, go toTo define the recipient whitelist. On the menu, go to Configuring the Real-time BlacklistTo add a new provider Configuring Distributed Spam AnalysisTo configure distributed spam analysis Customizing Web Scanning Settings Configuring Web Malware Scans Configuring Web Content Filtering V1.1, March V1.1, March White List Configuring Web URL FilteringBlacklist Https Scan Settings Http TunnelingHttps Third Party Website Certificate Handling STM150 CA Certificate Show This Message When an SSL Connection Attempt FailsV1.1, March Web Security Https Scan Certificate Management Certificate ManagementTo import a new certificate used for Https scans Trusted Certificate AuthoritiesUntrusted Certificates To add hosts to the Host Access Control List Trusted HostsWeb Security Http and Https Trusted Hosts Configuring FTP Scan To delete hosts from the Host Access Control ListWeb Security FTP V1.1, March Chapter Monitoring System Performance Viewing the System Status Using Statistics and Web Usage Data V1.1, March Monitoring Security Running Diagnostics Using the Network Diagnostic ToolsMonitoring Diagnostics Using the Realtime Traffic Diagnostic Tools Gathering Important Log InformationTo collect information about your STM150 Using Reports to Optimize Protection and Performance Generate Network Statistics ReportWorking with Logs Sending Logs Querying LogsLog Management Using Logs to Identify Infected ClientsWorking with Reports Send Reports by EmailOn the menu, click Logs & Reports Scheduled Report Using Online Support Enabling Remote TroubleshootingSupport Online Support To install a hot fix Working with Hot FixesGo to Support Hot Fixes On the menu, go to Support Malware Analysis Sending Suspicious Files to Netgear for AnalysisTable A-1. STM150 Default Configuration Settings Appendix a Default Settings and Technical SpecificationsSTM150 specifications are listed in the table below Document Link Appendix B Related DocumentsV1.1, March Index N