SonicWALL 4.5 manual Edit Policy Virus Protection Settings

Models: 4.5

1 212
Download 212 pages 10.59 Kb
Page 192
Image 192
Edit Policy: Virus Protection Settings

Enforced Client Product Guide

User Interface Definitions

A

 

Item

 

Description

 

 

 

 

 

 

 

Check for updates every

 

12 hours: Client computers check for updated detection definition

 

 

 

 

 

 

 

 

(DAT) files and product components every 12 hours.

 

 

 

 

 

 

 

Detect ...

 

Enabled: The following threats are detected during scans:

 

 

 

„ Jokes: Programs designed to be mistaken for a virus. They may

 

 

 

alarm or annoy a user but do not harm files or data. They are

 

 

 

intended to waste time and resources.

 

 

 

„ Remote admin tools: Programs that can be used from a remote

 

 

 

location to access a computer. Some remote administration tools

 

 

 

serve useful purposes, such as allowing users to access their files

 

 

 

from home, but others can be used by unauthorized persons to

 

 

 

monitor user activities and take control of a computer.

 

 

 

„ Spyware: Programs that covertly gather user information

 

 

 

through the user’s Internet connection without the user’s

 

 

 

knowledge. Once installed, spyware monitors user activity on the

 

 

 

Internet and transmits that information in the background to

 

 

 

someone else. Spyware can gather information such as email

 

 

 

addresses, websites visited, passwords, and credit card numbers.

 

 

 

„ Dialers: Programs that hijack a user’s modem and dial

 

 

 

premium-rate phone numbers, such as those required to access

 

 

 

pornographic websites.

 

 

 

„ Password crackers: Programs that find passwords or encryption

 

 

 

keys by trying every possible combination of characters until the

 

 

 

code is broken.

 

 

 

„ Adware: Programs that display unsolicited advertisements.

 

 

 

Adware often includes code that tracks a user's personal

 

 

 

information and transmits it to someone else, without the user's

 

 

 

knowledge.

 

 

 

„ Potentially unwanted applications: Programs that perform

 

 

 

some unauthorized (and often harmful or undesirable) act such as

 

 

 

viruses, worms, and Trojan horses.

 

 

 

„ Key loggers: Programs that record every keystroke a user

 

 

 

makes. They can be used to steal passwords and other

 

 

 

confidential information.

 

 

 

 

 

 

Edit Policy: Virus Protection Settings

Policies are made up of security settings for all of your protection services. These settings define how your services operate on client computers.

Use this page to rename a policy or modify its virus protection settings. Changes do not take effect until you click Save.

„Set basic virus protection options

„Assign a policy to a group

 

Item

 

Description

 

 

 

 

 

 

 

Policy name

 

Type a new name for the policy if you want to rename it.

 

 

 

 

 

 

On-Demand Scan

 

„ Select On to schedule an on-demandscan, then select the time

 

 

 

and frequency.

 

 

 

„ Select Off to schedule no on-demand scans.

 

 

 

Regardless of this setting, on-accessscans occur every time users

 

 

 

run, open, or download files.

 

 

 

 

 

 

194

Page 192
Image 192
SonicWALL 4.5 Edit Policy Virus Protection Settings, „ Set basic virus protection options „ Assign a policy to a group