Enforced Client Product Guide

Using the Virus and Spyware Protection Service

 

Scanning client computers

To view results of a manual scan:

In the Scan Completed dialog box, click Report to display the Scan Statistics report.

What is in a Scan Statistics report?

The Scan Statistics report opens in the default browser and displays the following information: „ Date and time the scan was started.

„ Elapsed time for the scan.

„ Version of the scanning engine software and DAT file. „ Date of the last update.

„ Completion status of the scan. „ Location of the scanned items.

„ Status for scanned files, registry keys, and cookies:

Scanned

Number of items scanned.

Detected

The item is still a threat and still resides on the system. For files, they are most

 

likely contained within a compressed archive (for example, a .ZIP archive) or on

 

write-protected media. For registry keys and cookies, the file it is associated

 

with has a status of Detected.

Cleaned

The item was cleaned of the threat. An encrypted backup copy of the original

 

item was saved in a quarantine folder, where it can be accessed only with the

 

Quarantine Viewer (see Manage quarantined files on page 109).

Deleted

The item could not be cleaned; it was deleted instead. An encrypted copy was

 

saved in a quarantine folder, where it can be accessed only with the Quarantine

 

Viewer (see Manage quarantined files on page 109).

4

How detections are handled

The type of threat and the policy settings determine how the virus and spyware protection service handles a detection:

Items with detections

How the service handles the detections

 

 

Files and programs

Virus detections: The virus and spyware protection service attempts to

 

clean the file. If it can be cleaned, the user is not interrupted with an

 

alert. If it cannot be cleaned, an alert appears, and the detected file is

 

deleted. A copy is placed in the quarantine folder.

 

Potentially unwanted program detections: If the virus and spyware

 

protection service is set to Protect mode, detections are cleaned or

 

deleted. If set to Prompt mode, users must select the response. See

 

Select a spyware protection mode on page 100 for details.

 

In all cases, an encrypted backup copy of the original item is saved in a

 

quarantine folder (see Manage quarantined files on page 109). Data for

 

all activity is uploaded to the SecurityCenter for use in reports.

 

 

Registry keys and cookies

Detections initially appear as Detected. See Scan for spyware on

 

page 93 for instructions on cleaning the detections. Cleaning detected

 

files also cleans their associated registry keys and cookies. Their status

 

is then reported as Cleaned.

 

 

91

Page 91
Image 91
SonicWALL 4.5 manual How detections are handled, Scanned, Detected, Cleaned, Deleted

4.5 specifications

SonicWALL 4.5 is a robust network security solution designed to address the evolving challenges in threat protection and data security. This release brings a suite of advanced features, cutting-edge technologies, and characteristics tailored to enhance system performance and resilience against cyber threats.

One of the highlight features of SonicWALL 4.5 is its Integrated Intrusion Prevention System (IPS). This system provides real-time threat detection and response by monitoring network traffic for potential vulnerabilities and malicious activities. With continuously updated signature-based detection, it ensures that organizations are protected against the latest exploits and attack vectors.

Another key component is the Next-Generation Firewall (NGFW) capabilities, which combine traditional firewall functions with advanced features such as application awareness, user identity control, and content filtering. The NGFW allows organizations to enforce detailed policies based on user roles, thereby enhancing the security posture while maintaining user productivity.

SonicWALL 4.5 also incorporates advanced malware protection through its Capture Advanced Threat Protection (ATP) service. This multi-engine sandboxing technology analyzes suspicious files and URLs in a secure environment, providing organizations with in-depth insights into potential threats before they reach the network.

Furthermore, the solution includes enhancements to Secure Mobile Access, enabling secure remote connections while ensuring that sensitive data remains protected. With features like SSL VPN, SonicWALL 4.5 allows users to securely access private networks from anywhere while maintaining compliance with data protection regulations.

In terms of management, SonicWALL 4.5 introduces an intuitive interface for centralized management, enabling IT administrators to configure and monitor multiple devices effortlessly. The reporting and logging capabilities are enhanced, providing detailed insights into network activity, which is crucial for compliance and forensic analysis.

SonicWALL 4.5 also prioritizes user experience and performance with its optimized hardware, ensuring faster processing speeds and reduced latency. Features like high availability and load balancing further enhance system reliability.

In summary, SonicWALL 4.5 stands out with its integrated IPS, NGFW capabilities, advanced malware protection through Capture ATP, secure mobile access, intuitive management interface, and optimized performance. This comprehensive suite of features positions SonicWALL 4.5 as a formidable player in the realm of network security, making it an appealing choice for organizations seeking robust protection against an ever-evolving threat landscape.