314
01-28006-0092-20041105
Fortinet Inc.
CLI configuration
Antivirus
CLI configuration
heuristic
The FortiGate heuristic antivirus engine performs tests on files to detect virus-like
behavior or known virus indicators. Heuristic scanning is performed last, after file
blocking and virus scanning have found no matches. In this way, heuristic scanning
may detect new viruses, but may also produce some false positive results.
The heuristic engine is enabled by default to pass suspected files to the recipient and
send a copy to quarantine. Once configured in the CLI, heuristic is enabled in a
protection profile when Virus Scan is enabled.
P2P
Select enable to block peer to peer communications programs. P2P,
while a legitimate protocol, is synonymous with file sharing programs
that are used to swap music, movies, and other files, often illegally.
Spy
Select enable to block spyware programs. Spyware, like adware, is
often included with freeware. Spyware is a tracking and analysis
program that can report your activities, such as web browsing habits, to
the advertiser’s web site where it may be recorded and analyzed.
Keylog
Select enable to block keylogger programs. Keylogger programs can
record every keystroke made on a keyboard including passwords, chat,
and instant messages.
Hijacker
Select enable to block browser hijacking programs. Browser hijacking
occurs when a ‘spyware’ type program changes web browser settings,
including favorites or bookmarks, start pages, and menu options.
Plugin
Select enable to block browser plugins. Browser plugins can often be
harmless Internet browsing tools that are installed and operate directly
from the browser window. Some toolbars and plugins can attempt to
control or record and send browsing preferences.
NMT
Select enable to block network management tools. Network
management tools can be installed and used maliciously to change
settings and disrupt network security.
RAT
Select enable to block remote administration tools. Remote
administration tools allow outside users to remotely change and monitor
a computer on a network.
Misc
Select enable to block any programs included in the miscellaneous
grayware category.
BHO
Select enable to block browser helper objects. BHOs are DLL files that
are often installed as part of a software package so the software can
control the behavior of Internet Explorer 4.x and higher. Not all BHOs
are malicious, but the potential exists to track surfing habits and gather
other information.
Toolbar
Select enable block custom toolbars. While some toolbars are
harmless, spyware developers can use these toolbars to monitor web
habits and send information back to the developer.
Download
Select enable to block download programs. Download components are
usually run at Windows startup and are designed to install or download
other software, especially advertising and dial software.
Note:
This guide only covers Command Line Interface (CLI) commands that are not
represented in the web-based manager. For complete descriptions and examples of how to use
CLI commands see the
FortiGate CLI Reference Guide
.
Содержание FortiGate FortiGate-300A
Страница 46: ...46 01 28006 0092 20041105 Fortinet Inc Changing the FortiGate firmware System status ...
Страница 72: ...72 01 28006 0092 20041105 Fortinet Inc FortiGate IPv6 support System network ...
Страница 80: ...80 01 28006 0092 20041105 Fortinet Inc Dynamic IP System DHCP ...
Страница 110: ...110 01 28006 0092 20041105 Fortinet Inc FortiManager System config ...
Страница 116: ...116 01 28006 0092 20041105 Fortinet Inc Access profiles System administration ...
Страница 246: ...246 01 28006 0092 20041105 Fortinet Inc CLI configuration Users and authentication ...
Страница 322: ...322 01 28006 0092 20041105 Fortinet Inc CLI configuration Antivirus ...
Страница 370: ...370 01 28006 0092 20041105 Fortinet Inc CLI configuration Log Report ...
Страница 384: ...384 01 28006 0092 20041105 Fortinet Inc Glossary ...
Страница 392: ...392 01 28006 0092 20041105 Fortinet Inc Index ...