178
5.7
Configuring Web Traffic (HTTP) Scanning
Web Traffic Scanning can be used to protect the computer against viruses
in HTTP traffic. When enabled, it scans HTML files, image files,
downloaded applications or executable files and other types of
downloaded files. It removes viruses automatically from the downloads.
You can also enable a notification flyer that is shown to the end-user
every time Web Traffic Scanning has blocked viruses in web traffic and
downloads.
This section describes the Web Traffic Scanning settings and also
presents some practical configuration examples.
5.7.1
HTTP Scanning Configuration Settings
To enable HTTP scanning, select the
Enable HTTP scanning
check box.
From the
Action on infection
drop-down list you can select what to do
when an infection is found in HTTP traffic. The actions available are:
Block
blocks access to the infected file.
Report Only
ignores the infection but reports it to the
administrator.
From the
Action on scanning failure
drop-down list you can select what to
do if a file in HTTP traffic cannot be scanned. This setting is used, for
example, when handling password-protected archives. The actions
available are:
Block
blocks the file that could not be scanned.
Report Only
ignores the file but reports it to the administrator.
Select the
Scan inside compressed files
check box to scan inside
compressed ZIP, ARJ, LZH, RAR, CAB, TAR, BZ2, GZ, JAR and TGZ
files.
You can specify a list of trusted servers in the Trusted HTTP Sites table.
The content of the trusted sites will not be scanned for viruses.
Содержание CLIENT SECURITY 7.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Страница 41: ...CHAPTER2 41 Click Next to continue...
Страница 44: ...44 Step 12 Review the changes that setup is about to make Click Start to start the installation...
Страница 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Страница 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Страница 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Страница 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Страница 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Страница 135: ...CHAPTER4 135 Autoregistration Import Rules Figure 4 6 Import Autoregistered Hosts dialog Import Rules tab...
Страница 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Страница 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Страница 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Страница 297: ...297 GLOSSARY...
Страница 310: ...310 Worm A computer program capable of replication by inserting copies of itself in networked computers...
Страница 311: ...311 Technical Support Overview 312 Web Club 312 Advanced Technical Support 312 F Secure Technical Product Training 313...