
8
Kaspersky Anti-Virus 5.5 for Check Point
TM
Firewall-1
®
•
Automatic dialers
(Pornware) - programs that establish modem
connection with various pay-per-visit internet (as a rule, pornographic)
websites.
•
Hacking tools
- tools used by hackers to obtain access to the user's
computer. This type of software includes various illegal vulnerability
scanners, password hacking programs and other types of software used
to hack network resources or to obtain unauthorized access to the system
under attack.
Although malicious programs are distributed mainly via email and the Internet, a
floppy disk or a CD can also be a source of infection. Therefore, the task of
comprehensive protection against potential threats now extends far beyond
simple regular scans for viruses, and includes the more complex task of real-time
anti-virus protection.
Henceforth in the text of this Guide the term "virus" will be used to refer
to viruses, Trojan Horses and worms. A particular type of malware will
be mentioned only when it is required.
1.2.
Purpose, main functions and
structure of Kaspersky Anti-
Virus
Kaspersky Anti-Virus
®
for Check Point
TM
Firewall-1
®
(hereinafter referred to
as
Kaspersky Anti-Virus
) is a system that provides anti-virus monitoring of files
transmitted over HTTP, FTP and SMTP protocols via Check Point
TM
Firewall-1
®
firewall that ensures high quality protection of corporate networks against
malware.
Kaspersky Anti-Virus is controlled using special user interface incorporated into
Microsoft Management Console (hereinafter -
MMC
).
The application performs the following functions:
•
performs anti-virus scan and processing of data streams transmitted via
HTTP and FTP protocols. Depending on the settings, the application will
skip or attempt to disinfect a malicious object, block access to it and notify
about detection of such objects.
•
passes over disinfected files to the client that requested this HTTP or FTP
stream.
•
scans incoming and outgoing e-mail messages transmitted via SMTP pro-
tocol and all attached files for the presence of malicious code in the real-
time format. Depending on the settings selected, the application will pass
infected messages, delete them or attach to them a warning message.