Trend Micro™ InterScan™ Gateway Security Appliance M-Series Administrator’s Guide
14
-
14
Best Practices
Handling Compressed Files
Compressed files provide a number of special security concerns. In short, compressed
files can be password-protected or encrypted, they can harbor so-called "zip-of-death"
threats, and they can contain within them numerous layers of compression.
To balance security and performance, Trend Micro recommends that you read the
following before choosing compressed file settings:
Block compressed files if...
Decompressed file count exceeds:
Set the number of files within a compressed archive at which InterScan Gateway
Security Appliance should stop extracting.
For example, have InterScan Gateway Security Appliance abandon the extraction
after 1,000 files.
Whenever the limit is reached, the original archive, and any decompressed files, is
deleted. In addition to benefiting overall scan efficiency, setting an upper limit for
decompression can prevent "zip of death" attacks designed to crash vulnerable virus
scanning programs.
Size of a decompressed file exceeds:
Set the maximum size that files being extracted from a compressed archive are
allowed to reach.
Once the limit is reached, the original archive, and any decompressed files, is
deleted. As with
Number of files
, setting an upper size limit for decompression can
help prevent the “zip of death” attack.
Number of layers of compression exceeds:
Set the maximum number of layers (compressed file within a compressed file) you
want InterScan Gateway Security Appliance to scan down through. The system maxi-
mum is 20.
Summary of Contents for InterScan M Series
Page 1: ...InterScan TM Gateway Security Appliance M Series...
Page 2: ......
Page 16: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide xiv...
Page 60: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 2 22...
Page 82: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 3 22...
Page 100: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 4 18...
Page 135: ...SMTP Services 5 35 SMTP Content Filtering Target FIGURE 5 20 SMTP Content Filtering Target...
Page 140: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 5 40...
Page 180: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 6 40...
Page 196: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 7 16...
Page 250: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 10 12...
Page 258: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 11 8...
Page 267: ...Analyzing Your Protection Using Logs 12 9...
Page 268: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 12 10...
Page 366: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 15 46...
Page 372: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide A 6...
Page 428: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide B 56...
Page 446: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide D 6...
Page 448: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide E 2...
Page 460: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide G 4...
Page 480: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide I 20...