Trend Micro™ Network VirusWall™ Enforcer 2500 Administrator’s Guide
2
-
10
iii. Drop packets—
drops the packet.
2.
Instant messaging detection
—Use this feature to assess instant messenger
software activity.
a.
Select the
Instant messaging detection
check box.
b.
Select the instant messaging software to detect by selecting from the
following:
i.
MSN
—you can select to scan
File transfer
activity or
All activity
.
ii.
Yahoo
—you can select to scan
File transfer
activity or
All activity
.
iii. ICQ/AIM
—you can select to scan
File transfer
activity or
All activity
.
iv. IRC
—the device can only scan all activity.
c.
Specify an Endpoint Action by selecting one of the following:
i.
Monitor endpoints
—allow traffic to continue to destination.
ii.
Reject packets—
rejects the packet.
iii. Drop packets—
drops the packet.
3.
File transfer detection
—Use this feature to assess file transfer activity. Ensure
that combinations such as specifying *.* for
Files to assess
and selecting
HTTP
file transfer
are not specified. This type of combination may prevent access to
the Internet.
a.
Select the
File Transfer Detection
check box.
b.
Select from
Windows file transfer
,
HTTP file transfer
,
FTP file transfer
to assess.
c.
Type the files to quarantine next to
Files to assess
and the files to allow next
to
Exception
.
d.
Specify an Endpoint Action by selecting one of the following:
i.
Monitor endpoints—
rejects the packet.
ii.
Reject packets—
drops the packet.
4.
Select
Allow Control Manager to modify Network Application Policy
settings when an outbreak occurs
if you use a Control Manager server to
manage your products. The policy temporarily changes to the Control Manager
specified policy and reverts to the original policy on this page after an Outbreak.
5.
Select
Log policy violations
to record log entries in the Endpoint History log.