![Fortinet FortiGate 60R Installation And Configuration Manual Download Page 229](http://html1.mh-extra.com/html/fortinet/fortigate-60r/fortigate-60r_installation-and-configuration-manual_2321841229.webp)
FortiGate-60R Installation and Configuration Guide Version 2.50 MR2
FortiGate-60R Installation and Configuration Guide
229
Antivirus protection
Antivirus protection is enabled in firewall policies. When you enable antivirus
protection for a firewall policy, you select a content profile that controls how the
antivirus protection behaves. Content profiles control the type of traffic protected
(HTTP, FTP, IMAP, POP3, SMTP), the type of antivirus protection and the treatment of
fragmented email and oversized files or email.
This chapter describes:
•
General configuration steps
•
Antivirus scanning
•
File blocking
•
Blocking oversized files and emails
•
Exempting fragmented email from blocking
•
Viewing the virus list
General configuration steps
Configuring antivirus protection involves the following general steps.
1
Select antivirus protection options in a new or existing content profile. See
“Adding a
content profile” on page 168
.
2
Select the Anti-Virus & Web filter option in firewall policies that allow web (HTTP),
FTP, and email (IMAP, POP3, and SMTP) connections through the FortiGate unit.
Select a content profile that provides the antivirus protection options that you want to
apply to a policy. See
“Adding a content profile to a policy” on page 169
.
3
Configure antivirus protection settings to control how the FortiGate unit applies
antivirus protection to the web, FTP, and email traffic allowed by policies. See:
•
“Antivirus scanning” on page 230
,
•
“File blocking” on page 231
,
•
“Blocking oversized files and emails” on page 232
,
•
“Exempting fragmented email from blocking” on page 232
.
4
Configure the messages that users receive when the FortiGate unit blocks or deletes
an infected file. See
“Customizing replacement messages” on page 134
.
5
Configure the FortiGate unit to send an alert email when it blocks or deletes an
infected file. See “Configuring alert email” in the
Logging and Message Reference
Guide.
Note:
To receive virus log messages, see “Configuring logging”, and for information about log
message content and format, see “Virus log messages” in the
Logging Configuration and
Reference Guide
Summary of Contents for FortiGate 60R
Page 12: ...Contents 12 Fortinet Inc...
Page 26: ...26 Fortinet Inc Customer service and technical support Introduction...
Page 42: ...42 Fortinet Inc Next steps Getting started...
Page 138: ...138 Fortinet Inc Customizing replacement messages System configuration...
Page 228: ...228 Fortinet Inc Logging attacks Network Intrusion Detection System NIDS...
Page 242: ...242 Fortinet Inc Exempt URL list Web filtering...
Page 256: ...256 Fortinet Inc Configuring alert email Logging and reporting...
Page 260: ...260 Fortinet Inc Glossary...
Page 270: ...270 Fortinet Inc Index...