sos5.1.0
medium
This signature detects e-mail attachments that have the
extension .ins and were sent via SMTP. Because .INSs
(Internet Naming Service) files contain configuration
parameters, this may indicate an incoming e-mail virus.
Attackers may include malicious configurations, tricking
users into executing the file and infecting the system.
SMTP:EXT:DOT-INS
sos5.1.0
medium
This signature detects e-mail attachments that have the
extension .isp and were sent via SMTP. Because .ISPs
(Internet Communication Settings) files contain
configuration parameters, this may indicate an incoming
e-mail virus. Attackers may include malicious configurations,
tricking users into executing the file and infecting the system.
SMTP:EXT:DOT-ISP
sos5.1.0
medium
This signature detects e-mail attachments that have the
extension .js and were sent via SMTP. Because .JSs
(JavaScript File) files contain scripts, this may indicate an
incoming e-mail virus. Attackers may create malicious
scripts, tricking users into executing the file and infecting the
system.
SMTP:EXT:DOT-JS
sos5.1.0
medium
This signature detects e-mail attachments that have the
extension .jse and were sent via SMTP. Because .JSEs
(JavaScript Encoded) files contain scripts, this may indicate
an incoming e-mail virus. Attackers may create malicious
scripts, tricking users into executing the file and infecting the
system.
SMTP:EXT:DOT-JSE
sos5.1.0
medium
This signature detects e-mail attachments that have the
extension .lnk and were sent via SMTP. Because .LNKs
(Windows link) files can point to any program, this may
indicate an incoming e-mail virus. Attackers may create a
link pointing to a dangerous program, tricking users into
executing the link and affecting the system.
SMTP:EXT:DOT-LNK
sos5.1.0
low
This signature detects e-mail attachments that have the
extension .mdb and were sent via SMTP. Because .MDBs
(MS Access Application) files can contain scripts, this may
indicate an incoming e-mail virus. Attackers may create
malicious scripts, tricking users into executing the file and
infecting the system.
SMTP:EXT:DOT-MDB
sos5.1.0
medium
This signature detects e-mail attachments that have the
extension .mde and were sent via SMTP. Because .MDEs
(Microsoft Access MDE database) files can contain scripts
and macros, this may indicate an incoming e-mail virus.
Attackers may create malicious scripts, tricking users into
executing the file and infecting the system.
SMTP:EXT:DOT-MDE
sos5.1.0
medium
This signature detects e-mail attachments that have the
extension .msc and were sent via SMTP. Because .MSCs (
Microsoft Common Console Document) files can contain
configuration information, this may indicate an incoming
e-mail virus. Attackers may change the configuration to point
to a dangerous command, tricking users into executing the
files and infecting the system.
SMTP:EXT:DOT-MSC
921
Copyright © 2010, Juniper Networks, Inc.
Appendix E: Log Entries
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.3
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Page 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Page 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Page 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Page 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Page 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Page 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Page 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Page 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Page 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Page 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Page 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Page 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Page 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Page 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Page 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Page 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Page 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...