sos5.1.0
medium
This signature detects e-mail attachments with the
extension .msi sent via SMTP. This may indicate an incoming
e-mail virus. .MSIs (Microsoft Windows Installer Package)
contain executable code. Attackers may create malicious
executables, tricking the user into executing the file and
infecting the system.
SMTP:EXT:DOT-MSI
sos5.1.0
medium
This signature detects e-mail attachments with the
extension .msp sent via SMTP. This may indicate an incoming
e-mail virus. .MSPs (Microsoft Windows Installer Patch)
contain executable code. Attackers may create malicious
executables, tricking the user into executing the file and
infecting the system.
SMTP:EXT:DOT-MSP
sos5.1.0
medium
This signature detects e-mail attachments that have the
extension .ocx and were sent via SMTP. Because .OCXs
(Object Control Extension) files can contain multiple scripts,
this may indicate an incoming e-mail virus. Attackers may
create malicious executables, tricking users into executing
the file and infecting the system.
SMTP:EXT:DOT-OCX
sos5.1.0
medium
This signature detects e-mail attachments that have the
extension .pcd and were sent via SMTP. Because .PCDs
(Photo CD MS Compiled Script) files can contain scripts,
this may indicate an incoming e-mail virus. Attackers may
create malicious scripts, tricking users into executing the file
and infecting the system.
SMTP:EXT:DOT-PCD
sos5.1.0
medium
This signature detects e-mail attachments with the
extension '.pif' sent via SMTP. This may indicate an incoming
e-mail virus. PIFs (Program Information Files) are standard
Microsoft Windows files that contain start up properties for
DOS applications. Attackers may hide malicious executables
within a PIF file, tricking users into executing the file and
infecting the system.
SMTP:EXT:DOT-PIF
sos5.1.0
medium
This signature detects e-mail attachments that have the
extension .reg and were sent via SMTP. Because .REGs
(Registry Entries) files contain entries for the Registry, this
may indicate an incoming e-mail virus. Attackers may create
malicious entries, tricking users into executing the file and
infecting the system.
SMTP:EXT:DOT-REG
sos5.1.0
medium
This signature detects e-mail attachments with the
extension '.scr' sent via SMTP. This may indicate an incoming
e-mail virus. SCRs (ScreenSaver files) are renamed '.exe'
files containing executable code. Attackers may disguise
malicious executables to appear as harmless screensaver
files, tricking the user into executing the file and infecting the
system.
SMTP:EXT:DOT-SCR
sos5.1.0
medium
This signature detects e-mail attachments with the
extension .sct sent via SMTP. This may indicate an incoming
e-mail virus. .SCTs (Windows Script Component) contain
scripts. Attackers may create malicious scripts, tricking the
user into executing the file and infecting the system.
SMTP:EXT:DOT-SCT
Copyright © 2010, Juniper Networks, Inc.
922
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...