sos5.1.0
high
This signature detects e-mail attachments with the
extension .vbe received via POP3. This may indicate an
incoming e-mail virus. .VBEs (VBScript Encoded Script File)
contain scripts. Attackers may create malicious scripts,
tricking the user into executing the file and infecting the
system.
POP3:EXT:DOT-VBE
sos5.1.0
high
This signature detects e-mail attachments with the
extension '.vbs' sent via POP3. This may indicate an incoming
e-mail virus. VBSs (Visual Basic files) contain one or more
executable scripts. Attackers may create malicious VB files,
tricking the user into executing the file and infecting the
system.
POP3:EXT:DOT-VBS
sos5.1.0
medium
This signature detects Metafiles files sent over POP.
Windows Metafiles and Enhanced Metafiles files can exploit
a Windows GDI vulnerability and may be exploited by
malicious users to deposit instructions or arbitrary code on
a target's system. User involvement is required to activate
Metafiles; typically they are attached to a
harmless-appearing e-mail message.
POP3:EXT:DOT-WMF
sos5.1.0
high
This signature detects e-mail attachments with the
extension .wsc received via POP3. This may indicate an
incoming e-mail virus. .WSCs (Windows Script Component)
contain scripts. Attackers may create malicious scripts,
tricking the user into executing the file and infecting the
system.
POP3:EXT:DOT-WSC
sos5.1.0
high
This signature detects e-mail attachments with the
extension .wsf received via POP3. This may indicate an
incoming e-mail virus. .WSFs (Windows Script File) contain
scripts. Attackers may create malicious scripts, tricking the
user into executing the file and infecting the system.
POP3:EXT:DOT-WSF
sos5.1.0
high
This signature detects e-mail attachments with the
extension .wsh received via POP3. This may indicate an
incoming e-mail virus. .WSHs (Windows Script Host Settings
File) contain configuration parameters. Attackers may create
malicious configurations, tricking the user into executing the
file and infecting the system.
POP3:EXT:DOT-WSH
sos5.1.0
low
This signature detects e-mail attachments with the
extension .zip received using POP3. This may indicate an
incoming e-mail virus. Zip files are compressed files that can
contain one or more executables. Attackers may compress
malicious executables within a .zip file, tricking unsuspecting
users into executing the file and infecting the system.
Because Zip files are frequently used for non-malicious
purposes, this signature can generate false positives. As a
general network security precaution, ensure that all users
are aware of the dangers of sending and receiving binary
files in e-mail attachments.
POP3:EXT:DOT-ZIP
911
Copyright © 2010, Juniper Networks, Inc.
Appendix E: Log Entries
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...