Trend Micro™ InterScan™ Gateway Security Appliance M-Series Administrator’s Guide
3
-
18
The predefined list of file types that the appliance can block includes:
•
Audio/Video
•
Compressed
•
Executable
•
Java
•
Microsoft documents
Note:
See “Appendix C: File Blocking - File Formats” for a complete listing of files that
can be blocked by InterScan Gateway Security Appliance.
When InterScan Gateway Security Appliance blocks a file, a notification message
will appear on the user's browser informing them that InterScan Gateway Security
Appliance has blocked the file. InterScan Gateway Security Appliance will send a
notification to the administrator, if enabled, whenever it blocks a file.
When InterScan Gateway Security Appliance blocks a file, it will write the incident
to the File blocking log. You can export the File blocking log for inclusion in reports.
True File Type and IntelliScan
Virus originators can easily rename a file to disguise its actual type. Programs such as
Microsoft Word are “extension independent”; that is, they recognize and open “their”
documents regardless of the file name. This security hole poses a danger, for example,
if a Word document containing a macro virus has a name such as
benefits_form.pdf.
Word opens the file, but InterScan Gateway Security
Appliance may not have scanned it if the appliance is not checking the true file type.
Rather than relying on the file name alone to decide if it should scan a file, InterScan
Gateway Security Appliance uses IntelliScan to identify a file's true type.
True file-type detection—IntelliScan first examines the header of the file using true
file-type identification and checks if the file is an executable, compressed, or other
type of file that may be a threat. IntelliScan examines all files to be sure that the file
has not been renamed—the extension must conform to the file's internally registered
data type.
Summary of Contents for InterScan M Series
Page 1: ...InterScan TM Gateway Security Appliance M Series...
Page 2: ......
Page 16: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide xiv...
Page 60: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 2 22...
Page 82: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 3 22...
Page 100: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 4 18...
Page 135: ...SMTP Services 5 35 SMTP Content Filtering Target FIGURE 5 20 SMTP Content Filtering Target...
Page 140: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 5 40...
Page 180: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 6 40...
Page 196: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 7 16...
Page 250: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 10 12...
Page 258: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 11 8...
Page 267: ...Analyzing Your Protection Using Logs 12 9...
Page 268: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 12 10...
Page 366: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 15 46...
Page 372: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide A 6...
Page 428: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide B 56...
Page 446: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide D 6...
Page 448: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide E 2...
Page 460: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide G 4...
Page 480: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide I 20...