Enforced Client Product Guide

Using the Virus and Spyware Protection Service

 

Managing detections

4

Manage quarantined files

When the virus and spyware protection service detects a threat on a client computer, it attempts to clean the item where the threat is detected. The item might be a file, cookie, or registry key.

„If it cannot clean the item, it deletes the original item and places an encrypted copy in a quarantine folder.

„If it can clean the item, it places an encrypted copy of the original detected item in a quarantine folder. This copy serves as a backup.

Once quarantined, these items pose no threat to client computers. It is not necessary to view or delete them, but you might occasionally want to do so. In these situations, you must view the files on the client computer using the Quarantine Viewer.

Files are placed into the Quarantine Viewer in a format that is no longer a threat to the client computer. After 30 days, these files are deleted. Only users with administrator rights can access

the Quarantine Viewer.

To check quarantined files:

1On the client computer, hold down the Ctrl and Shift keys and click in the system tray.

2Select Scan Tasks Quarantine Viewer.

The Quarantine Viewer lists all the items in the quarantine folder and their status.

3Select one or more items, then click an action:

Rescan

Scan each selected item again. This option is useful when new detection definition

 

(DAT) files include a method of cleaning a detection that could not be cleaned

 

previously. In this case, rescanning the file cleans it and allows you to restore it for

 

normal use.

Restore

Place each selected item back in its original location on the computer. The restored

 

item will overwrite any other items with the same name in that location.

 

Note: The virus and spyware protection service detected this item because it

 

considers the item to be a threat. Do not restore the item unless you are sure it is safe.

Delete

Remove each selected item from the quarantine folder, along with all associated

 

registry keys and cookies. No copy will remain on the computer.

108

Page 108
Image 108
SonicWALL 4.5 manual Manage quarantined files, 108

4.5 specifications

SonicWALL 4.5 is a robust network security solution designed to address the evolving challenges in threat protection and data security. This release brings a suite of advanced features, cutting-edge technologies, and characteristics tailored to enhance system performance and resilience against cyber threats.

One of the highlight features of SonicWALL 4.5 is its Integrated Intrusion Prevention System (IPS). This system provides real-time threat detection and response by monitoring network traffic for potential vulnerabilities and malicious activities. With continuously updated signature-based detection, it ensures that organizations are protected against the latest exploits and attack vectors.

Another key component is the Next-Generation Firewall (NGFW) capabilities, which combine traditional firewall functions with advanced features such as application awareness, user identity control, and content filtering. The NGFW allows organizations to enforce detailed policies based on user roles, thereby enhancing the security posture while maintaining user productivity.

SonicWALL 4.5 also incorporates advanced malware protection through its Capture Advanced Threat Protection (ATP) service. This multi-engine sandboxing technology analyzes suspicious files and URLs in a secure environment, providing organizations with in-depth insights into potential threats before they reach the network.

Furthermore, the solution includes enhancements to Secure Mobile Access, enabling secure remote connections while ensuring that sensitive data remains protected. With features like SSL VPN, SonicWALL 4.5 allows users to securely access private networks from anywhere while maintaining compliance with data protection regulations.

In terms of management, SonicWALL 4.5 introduces an intuitive interface for centralized management, enabling IT administrators to configure and monitor multiple devices effortlessly. The reporting and logging capabilities are enhanced, providing detailed insights into network activity, which is crucial for compliance and forensic analysis.

SonicWALL 4.5 also prioritizes user experience and performance with its optimized hardware, ensuring faster processing speeds and reduced latency. Features like high availability and load balancing further enhance system reliability.

In summary, SonicWALL 4.5 stands out with its integrated IPS, NGFW capabilities, advanced malware protection through Capture ATP, secure mobile access, intuitive management interface, and optimized performance. This comprehensive suite of features positions SonicWALL 4.5 as a formidable player in the realm of network security, making it an appealing choice for organizations seeking robust protection against an ever-evolving threat landscape.