Prestige 662H/HW Series User’s Guide

For maximum protection, you must keep the pattern file up-to-date.

17.2.1 Computer Virus Infection and Prevention

The follow describes a simplistic life cycle of a computer virus.

1A computer gets a copy of a virus from an unknown source (such as the Internet, e-mail, file sharing or any removable storage media). The virus is harmless until the execution of an infected program.

2The virus spreads to other files and programs on the computer.

3The infected files are unintentionally sent to another computer thus starting the spread of the virus.

4Once the virus is spread through the network, the number of infected networked computers can grow exponentially.

5To prevent the spread of viruses, you need to install host-based anti-virus software on a computer or buy an anti-virus system.

17.3Introduction to the Prestige Anti-virus Packet Scan

The Prestige has an integrated signature-based anti-virus packet scan. Set up the Prestige between your local network and the Internet. This way the Prestige can scan incoming traffic to your local network from the Internet. Thus the Prestige helps stop threats at the network edge before they reach the local host computers.

Figure 85 Prestige Anti-virus Application

Your Prestige is able to scan the following network traffic types for viruses:

HTTP (Hyper Text Transfer Protocol)

This is the most common protocol used on the Internet. HTTP is the primary protocol used for web sites and web browsers.

Mail messages (SMPT, POP3)

FTP (File Transfer Protocol)

205

Chapter 17 Anti-Virus Packet Scan