CHAPTER 6
203
6.3
Configuring Network Quarantine
Network Quarantine is an Internet Shield feature that makes it possible to
restrict the network access of hosts that have very old virus definitions
and/or that have Real-time Scanning disabled. Their normal access rights
are automatically restored once the virus definitions are updated and/or
Real-time Scanning is enabled again.
This section describes the Network Quarantine settings and contains an
example on how to enable the Network Quarantine feature in the
managed domain. There is also a short description of how to configure
the Network Quarantine security level by adding new firewall rules (see
“
Fine-Tuning Network Quarantine
6.3.1
Network Quarantine Settings
The network Quarantine Settings are located on the
Firewall Security
Levels
page. In the Network Quarantine section you can:
Enable or disable network quarantine.
Specify the virus definitions age that activates Network
Quarantine.
Specify whether disabling Real-Time Scanning on a host
activates Network Quarantine.
6.3.2
Enabling Network Quarantine in the Whole Domain
You can enable the Network Quarantine for the whole domain as follows:
1.
Select Root in the
Policy Domains
tab.
2.
Go to the
Settings
tab and select the
Firewall Security Levels
page.
3.
Select Enable network quarantine.
4.
Specify the
Virus definitions age to activate network quarantine
.
5.
If you want to restrict the host from accessing the network when
Real-Time Scanning is disabled, select
Activate network quarantine
on host when real-time scanning is disabled.
Summary of Contents for CLIENT SECURITY 7.00
Page 1: ...F Secure Client Security Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Page 41: ...CHAPTER2 41 Click Next to continue...
Page 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Page 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Page 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Page 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Page 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Page 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Page 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Page 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Page 297: ...297 GLOSSARY...