Grayware options

Antivirus

 

 

The categories may change or expand when the FortiGate unit receives updates. In the example above you can choose to enable the following grayware categories. Enabling a grayware category blocks all files listed in the category.

Adware

Select enable to block adware programs. Adware is usually embedded

 

in freeware programs and causes ads to pop up whenever the program

 

is opened or used.

Dial

Select enable to block dialer programs. Dialers allow others to use the

 

PC modem to call premium numbers or make long distance calls.

Game

Select enable to block games. Games are usually joke or nuisance

 

games that you may want to block from network users.

Joke

Select enable to block joke programs. Joke programs can include

 

custom cursors and programs that appear to affect the system.

P2P

Select enable to block peer to peer communications programs. P2P,

 

while a legitimate protocol, is synonymous with file sharing programs

 

that are used to swap music, movies, and other files, often illegally.

Spy

Select enable to block spyware programs. Spyware, like adware, is

 

often included with freeware. Spyware is a tracking and analysis

 

program that can report your activities, such as web browsing habits, to

 

the advertiser’s web site where it may be recorded and analyzed.

Keylog

Select enable to block keylogger programs. Keylogger programs can

 

record every keystroke made on a keyboard including passwords, chat,

 

and instant messages.

Hijacker

Select enable to block browser hijacking programs. Browser hijacking

 

occurs when a ‘spyware’ type program changes web browser settings,

 

including favorites or bookmarks, start pages, and menu options.

Plugin

Select enable to block browser plugins. Browser plugins can often be

 

harmless Internet browsing tools that are installed and operate directly

 

from the browser window. Some toolbars and plugins can attempt to

 

control or record and send browsing preferences.

NMT

Select enable to block network management tools. Network

 

management tools can be installed and used maliciously to change

 

settings and disrupt network security.

RAT

Select enable to block remote administration tools. Remote

 

administration tools allow outside users to remotely change and monitor

 

a computer on a network.

Misc

Select enable to block any programs included in the miscellaneous

 

grayware category.

BHO

Select enable to block browser helper objects. BHOs are DLL files that

 

are often installed as part of a software package so the software can

 

control the behavior of Internet Explorer 4.x and higher. Not all BHOs

 

are malicious, but the potential exists to track surfing habits and gather

 

other information.

Toolbar

Select enable block custom toolbars. While some toolbars are

 

harmless, spyware developers can use these toolbars to monitor web

 

habits and send information back to the developer.

Download

Select enable to block download programs. Download components are

 

usually run at Windows startup and are designed to install or download

 

other software, especially advertising and dial software.

298

01-28007-0068-20041203

Fortinet Inc.

Page 298
Image 298
Fortinet 100A manual 298

100A specifications

Fortinet 100A is a versatile network security device designed to provide comprehensive protection against various cyber threats while ensuring optimal network performance. As part of the FortiGate series, the 100A combines advanced security features with powerful hardware capabilities, making it suitable for small to medium-sized businesses.

One of the key features of the Fortinet 100A is its deep packet inspection technology. This capability allows the firewall to analyze both the header and payload of packets traversing the network, enabling it to detect and block malicious content effectively. The 100A can identify and mitigate a wide range of threats, including malware, intrusions, and application-layer attacks.

The FortiOS operating system powers the Fortinet 100A, offering a robust and user-friendly interface for configuration and management. With its unified security management console, administrators can efficiently monitor network traffic and enforce security policies across the organization. The system provides centralized logging and reporting features, enabling users to gain valuable insights into their security posture and respond swiftly to incidents.

The 100A supports multiple deployment modes, including transparent, NAT, and route modes. This flexibility allows organizations to integrate the device into their existing network architecture with ease. The firewall's high throughput capabilities ensure that network performance remains unaffected, even under heavy load from multiple users and devices.

Another notable aspect of the Fortinet 100A is its support for various VPN technologies, including IPsec and SSL VPN. This feature facilitates secure remote access for employees, enabling them to connect to the corporate network safely, regardless of their location. As remote work continues to be a norm in many sectors, this capability is critical for maintaining productivity and security.

In addition to these features, the Fortinet 100A provides comprehensive web filtering capabilities, protecting users from harmful websites and inappropriate content. This protection is essential for organizations looking to maintain a secure and productive environment.

With its combination of powerful security features, flexible deployment options, and robust performance, the Fortinet 100A stands out as an ideal solution for organizations seeking to bolster their cybersecurity measures while ensuring seamless connectivity for users. As cyber threats continue to evolve, investing in a capable device like the FortiGate 100A is crucial for maintaining a secure network infrastructure.