Using SmartDefense
You can configure how CIFS worms should be handled.
Table 52: File Print and S
r
In this field…
Do this…
ha ing Fields
Action
Specify wh
y
selecting one of the following:
•
Block.
Block the attack.
•
None.
No action. This is the default.
at action to take when a CIFS worm attack is detected, b
Track
Specif
worm attacks, by selecting one of the
followi
:
•
Log
o
attack.
•
No
D
g the attack. This is the default.
CIFS worm patterns
list
Select the worm patterns to detect.
Patterns are matched against file names (including file
paths but excluding the disk shar
tryin
y whether to log CIFS
ng
.
L g the
ne.
o not lo
e name) that the client is
g to read or write from the server.
250
D-Link NetDefend firewall User Guide