Prestige 662H/HW Series User’s Guide
For maximum protection, you must keep the pattern file
17.2.1 Computer Virus Infection and Prevention
The follow describes a simplistic life cycle of a computer virus.
1A computer gets a copy of a virus from an unknown source (such as the Internet,
2The virus spreads to other files and programs on the computer.
3The infected files are unintentionally sent to another computer thus starting the spread of the virus.
4Once the virus is spread through the network, the number of infected networked computers can grow exponentially.
5To prevent the spread of viruses, you need to install
17.3Introduction to the Prestige Anti-virus Packet Scan
The Prestige has an integrated
Figure 85 Prestige
Your Prestige is able to scan the following network traffic types for viruses:
•HTTP (Hyper Text Transfer Protocol)
This is the most common protocol used on the Internet. HTTP is the primary protocol used for web sites and web browsers.
•Mail messages (SMPT, POP3)
•FTP (File Transfer Protocol)
205 | Chapter 17 |