How InterScan Gateway Security Appliance Works
3
-
17
When InterScan Gateway Security Appliance denies access to a Web site, it sends a
notification message to the user's browser informing them that it has denied access to
the site based on company policy. InterScan Gateway Security Appliance also sends
a notification to the administrator, if he or she has enabled that feature, whenever a
user requests access to a prohibited site.
Note:
If the rating server does not return a rating result in time, the default action is to
allow access to the URL.
Unless the administrator has disabled this feature in the Log Settings screen,
InterScan Gateway Security Appliance logs requests to access prohibited sites to the
URL filtering log. You can export the contents of the log for inclusion in reports.
The URL filtering function in InterScan Gateway Security Appliance uses the
following components when checking a URL:
•
Trend Micro URL rating database
•
Category filter list
•
Blocked and Approved URL lists
InterScan Gateway Security Appliance applies the URL filtering rules according to
the order shown in the URL Filtering > Target screen.
File Blocking
One of the ways that malware can arrive on your desktop or network is through files
that an HTTP server has sent by streaming or downloading them when a client com-
puter accesses a Web site or an FTP site (FTP over HTTP). It is important to protect
your network from this security risk. InterScan Gateway Security Appliance can scan
for and block certain file types that originate from HTTP and FTP servers, thereby
protecting your network and computers. The appliance can block both predefined and
administrator-specified file types.
File Blocking checks the file type (true file type and file extensions) of both inbound
and outbound HTTP and FTP files. The File Blocking feature blocks files according
to the settings defined by the administrator in the File Blocking screen of the Web
console.
Summary of Contents for InterScan M Series
Page 1: ...InterScan TM Gateway Security Appliance M Series...
Page 2: ......
Page 16: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide xiv...
Page 60: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 2 22...
Page 82: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 3 22...
Page 100: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 4 18...
Page 135: ...SMTP Services 5 35 SMTP Content Filtering Target FIGURE 5 20 SMTP Content Filtering Target...
Page 140: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 5 40...
Page 180: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 6 40...
Page 196: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 7 16...
Page 250: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 10 12...
Page 258: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 11 8...
Page 267: ...Analyzing Your Protection Using Logs 12 9...
Page 268: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 12 10...
Page 366: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 15 46...
Page 372: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide A 6...
Page 428: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide B 56...
Page 446: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide D 6...
Page 448: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide E 2...
Page 460: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide G 4...
Page 480: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide I 20...