NETGEAR STM150EW3-100NAS Append Safe Stamp Smtp & POP3, Send Warning Email When Malware Is Found

Page 54

ProSecure Web/Email Security Threat Management Appliance STM150 Reference Manual

Select the Insert Warning into Email Subject SMTP check box, and then type a message for Malware found and No malware found. The default messages are:

Malware found: [Malware Infected]

No malware found: [Malware Free]

Append Safe Stamp (SMTP & POP3)

When there is no malware detected in the mail, you have an option to append a safe stamp at the end of a message. The safe stamp insertion serves as a security confirmation to the mail recipient. The message is customizable.

Append warning if attachment exceeds size limit and is not scanned (SMTP and POP3)

When an attachment exceeds the scan size limit and is not scanned by the STM150, a warning message will be appended to the original email. Check the box and save your changes to enable.

Replace Infected Attachment with Warning Message

If the attachment in the mail is infected, the STM150 will intercept it according to the setting you configured in Email Security > Anti-Virus > Action.

You may insert a warning message to inform the mail recipient about the malware, as well as the scan actions that the STM150 has taken. The message is customizable; make sure to keep the %VIRUSINFO% tag as this is the place where the STM150 inserts malware information.

The following is an example of a warning message that the STM150 can insert:

This attachment contains malware: File 1.exe contains malware EICAR.

Action: Delete

Send Warning Email When Malware Is Found

In addition to inserting an alert to the message, the STM150 may send out an email either to the sender, recipient, or both as notification. The subject and message body are customizable. Make sure to keep the %VIRUSINFO% tag so that the malware information will be inserted automatically.

4-4

Customizing Scans

v1.1, March 2009

Image 54
Contents NETGEAR, Inc EU Regulatory Compliance Statement TrademarksStatement of Conditions Bestätigung des Herstellers/ImporteursVoluntary Control Council for Interference Vcci Statement Additional CopyrightsMD5 Product and Publication Details ZlibV1.1, March Contents Chapter Performing System Management Tasks Chapter Monitoring System Performance Page About This Manual Conventions, Formats, and ScopeRevision History Manual Part Publication Version Description Number DateChapter Introduction Key Features and Capabilities About Stream ScanningWhat Can You Do with an STM150? Service Registration Card with License Keys Front Panel FeaturesRear Panel Features Default IP Address, Login Name, and Password Location Choosing a Location for the STM150Using the Rack Mounting Kit V1.1, March Provisioning Threat Management Services Choosing a Deployment ScenarioGateway Deployment Server Group Use the Installation Guide to Perform Initial Configuration Segmented LAN DeploymentLogging In to the STM150 V1.1, March Registering the STM150 Click RegisterEmail Security Use the Setup Wizard to Complete the ConfigurationSetup Wizard Options Web SecurityEmail Notification Server Verifying the STM150 InstallationUpdate Settings Web CategoriesTesting Connectivity Testing Http ScanningWhat to Do Next Modifying System Settings Configuring Network SettingsPerforming System Management Tasks V1.1, March Enabling Session Limits and Timeouts On the menu, click Global Settings Scanning Exclusions Scanning ExclusionsTo enter a scanning exclusion rule Setting the System Time On the menu, click Administration Time ZoneTo set the system time Specifying the Notification Server To specify a notification serverClick Save Changes Customizing Email AlertsTo enable system administrator email alerts Configuring Snmp Settings To configure the Snmp settingsOn the menu, click Administration Snmp Supported MIB Browsers Defining Trusted Snmp HostsTo define Snmp Traps Backing Up and Restoring Configurations Backing Up the STM150 ConfigurationTo Back Up the STM150 Settings Restoring a ConfigurationTo restore the STM150 settings Resetting to Factory Defaults Restarting the STM150Enabling Remote Management Administering Software Updates Configuring Scheduled UpdatesTo configure scheduled updates Performing a Manual UpdateOn the menu, go to Administration Software Update Applying a Software Update that Requires a Reboot Administering Admin Login Timeouts and Passwords V1.1, March V1.1, March Default Scan Settings Chapter Customizing ScansCustomizing Email Scanning Settings End User Email Notification Settings Email Security Anti-Virus Notification Settings on the menuInsert Warning into Email Subject Line Smtp Send Warning Email When Malware Is Found Append Safe Stamp Smtp & POP3Replace Infected Attachment with Warning Message Email Content Filtering File Extension Filter by Password-protected AttachmentsFilter by Subject Keywords Filter by File TypeSetting Up the Whitelist and Blacklist Protecting Against Email SpamTo define the sender whitelist. On the menu, go to Email Security Anti-Spam Whitelist and BlacklistConfiguring the Real-time Blacklist To define the recipient whitelist. On the menu, go toConfiguring Distributed Spam Analysis To add a new providerTo configure distributed spam analysis Customizing Web Scanning Settings Configuring Web Malware Scans Configuring Web Content Filtering V1.1, March V1.1, March Configuring Web URL Filtering White ListBlacklist Https Scan Settings Http TunnelingHttps Third Party Website Certificate Handling Show This Message When an SSL Connection Attempt Fails STM150 CA CertificateV1.1, March Certificate Management Web Security Https Scan Certificate ManagementTo import a new certificate used for Https scans Trusted Certificate AuthoritiesUntrusted Certificates To add hosts to the Host Access Control List Trusted HostsWeb Security Http and Https Trusted Hosts Configuring FTP Scan To delete hosts from the Host Access Control ListWeb Security FTP V1.1, March Chapter Monitoring System Performance Viewing the System Status Using Statistics and Web Usage Data V1.1, March Monitoring Security Running Diagnostics Using the Network Diagnostic ToolsMonitoring Diagnostics Using the Realtime Traffic Diagnostic Tools Gathering Important Log InformationTo collect information about your STM150 Using Reports to Optimize Protection and Performance Generate Network Statistics ReportWorking with Logs Querying Logs Sending LogsUsing Logs to Identify Infected Clients Log ManagementWorking with Reports Send Reports by EmailOn the menu, click Logs & Reports Scheduled Report Using Online Support Enabling Remote TroubleshootingSupport Online Support To install a hot fix Working with Hot FixesGo to Support Hot Fixes Sending Suspicious Files to Netgear for Analysis On the menu, go to Support Malware AnalysisAppendix a Default Settings and Technical Specifications Table A-1. STM150 Default Configuration SettingsSTM150 specifications are listed in the table below Appendix B Related Documents Document LinkV1.1, March Index N