AntiVirus
Antivirus CLI configuration
FortiGate Version 4.0 Administration Guide
01-400-89802-20090424
453
•
Antivirus CLI configuration
This section describes the CLI commands that extend features available through the web-
based manager. For complete descriptions and examples of how to enable additional
features through CLI commands, see the
.
system global optimize
The optimize feature configures CPU settings to ensure efficient operation of the FortiGate
unit for either antivirus scanning or straight throughput traffic. When optimize is set to
antivirus, the FortiGate unit uses symmetric multiprocessing to spread the antivirus tasks
to several CPUs, making scanning faster.
This feature is available on models numbered 1000 and higher.
For more information, see the
Antivirus failopen and optimization
Fortinet Knowledge
Center article.
config antivirus heuristic
The FortiGate heuristic antivirus engine performs tests on files to detect virus-like
behavior or known virus indicators. Heuristic scanning is performed last, after file blocking
and virus scanning have found no matches. In this way, heuristic scanning may detect
new viruses, but may also produce some false positive results.
The heuristic engine is disabled by default. You need to enable it to pass suspected files
to the recipient and send a copy to the file quarantine. Once enabled in the CLI, heuristic
scanning is enabled in a protection profile when Virus Scan is enabled.
Game
Block games. Games are usually joke or nuisance games that you may want to block
from network users.
HackerTool
Block hacker tools.
Hijacker
Block browser hijacking programs. Browser hijacking occurs when a ‘spyware’ type
program changes web browser settings, including favorites or bookmarks, start
pages, and menu options.
Joke
Block joke programs. Joke programs can include custom cursors and programs that
appear to affect the system.
Keylog
Block keylogger programs. Keylogger programs can record every keystroke made on
a keyboard including passwords, chat, and instant messages.
Misc
Block any programs included in the miscellaneous grayware category.
NMT
Block network management tools. Network management tools can be installed and
used maliciously to change settings and disrupt network security.
P2P
Block peer to peer communications programs. P2P, while a legitimate protocol, is
synonymous with file sharing programs that are used to swap music, movies, and
other files, often illegally.
Plugin
Block browser plugins. Browser plugins can often be harmless Internet browsing tools
that are installed and operate directly from the browser window. Some toolbars and
plugins can attempt to control or record and send browsing preferences.
RAT
Block remote administration tools. Remote administration tools allow outside users to
remotely change and monitor a computer on a network.
Spy
Block spyware programs. Spyware, like adware, is often included with freeware.
Spyware is a tracking and analysis program that can report your activities, such as
web browsing habits, to the advertiser’s web site where it may be recorded and
analyzed.
Toolbar
Block custom toolbars. While some toolbars are harmless, spyware developers can
use these toolbars to monitor web habits and send information back to the developer.
Summary of Contents for Gate 60D
Page 705: ...www fortinet com...
Page 706: ...www fortinet com...