Trend Micro™ InterScan™ Gateway Security Appliance M-Series Administrator’s Guide
3
-
12
F
IGURE
3-2.
How the Standard Reputation and Dynamic Reputation
databases work
Antivirus
Since viruses are still among the most numerous and serious threats on the Internet,
virus scanning is a critical and integral part of the set of security services in InterScan
Gateway Security Appliance. During a scan, the Trend Micro scan engine works
together with the virus pattern file to perform the first level of detection, using a pro-
cess called pattern matching. Since each virus contains a unique “pattern” or string of
telltale characters that distinguish it from any other code, the virus experts at
TrendLabs capture inert snippets of this code in the pattern file. The engine then com-
pares certain parts of each scanned file to the pattern in the virus pattern file, looking
for a match. When the scan engine detects a file containing a virus or other malware,
it executes an action such as clean, delete, or replace with text/file. You can customize
these actions when you set up your scanning tasks.
InterScan Gateway Security Appliance protects you from a wide range of viruses,
including:
•
HTML viruses
•
Macro viruses
•
ActiveX malicious code
•
COM and EXE file infectors
Sam’s
SMTP server
The appliance
John’s
SMTP server
Standard
Reputation
Database
Dynamic
Reputation
Database
Standard:
The appliance
queries the Standard
Reputation database
only.
Advanced:
The
appliance first queries
the Standard Reputation
database and then, if no
problem is detected,
queries the Dynamic
Reputation database.
Summary of Contents for InterScan M Series
Page 1: ...InterScan TM Gateway Security Appliance M Series...
Page 2: ......
Page 16: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide xiv...
Page 60: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 2 22...
Page 82: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 3 22...
Page 100: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 4 18...
Page 135: ...SMTP Services 5 35 SMTP Content Filtering Target FIGURE 5 20 SMTP Content Filtering Target...
Page 140: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 5 40...
Page 180: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 6 40...
Page 196: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 7 16...
Page 250: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 10 12...
Page 258: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 11 8...
Page 267: ...Analyzing Your Protection Using Logs 12 9...
Page 268: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 12 10...
Page 366: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 15 46...
Page 372: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide A 6...
Page 428: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide B 56...
Page 446: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide D 6...
Page 448: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide E 2...
Page 460: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide G 4...
Page 480: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide I 20...