
4
Kaspersky Anti-Virus 5.5 for Check Point
TM
Firewall-1
®
5.7. Protection without additional configuration ......................................................... 47
5.8. Verifying the application performance ................................................................ 48
5.8.1. Test “virus” EICAR and its modifications ..................................................... 48
5.8.2. Testing the HTTP traffic protection .............................................................. 49
5.8.3. Testing the SMTP traffic protection.............................................................. 49
5.8.4. Testing the FTP traffic protection ................................................................. 50
CHAPTER 6. UPDATING THE ANTI-VIRUS DATABASE.......................................... 51
6.1. Downloading updates from the internet.............................................................. 54
6.2. Installing updates from a network folder ............................................................. 55
6.3. Automatic updates............................................................................................... 56
6.4. Updating the anti-virus database in the manual mode....................................... 57
CHAPTER 7. ANTI-VIRUS PROTECTION .................................................................. 58
7.1. Anti-virus objects processing .............................................................................. 60
7.1.1. Actions performed with objects transferred via HTTP protocol................... 61
7.1.2. Actions performed with objects transferred via FTP protocol ..................... 62
7.1.3. Actions performed with objects transferred via SMTP protocol .................. 62
7.2. Anti-Virus protection level.................................................................................... 63
7.3. Enabling and disabling the anti-virus protection. Selecting the anti-virus
protection level ................................................................................................... 63
7.4. Scanning HTTP traffic ......................................................................................... 65
7.5. Scanning FTP traffic............................................................................................ 70
7.6. Scanning SMTP traffic......................................................................................... 73
7.7. Anti-virus scan efficiency..................................................................................... 75
CHAPTER 8. BACKUP STORAGE .............................................................................. 79
8.1. Viewing the backup storage................................................................................ 80
8.2. Backup storage filter............................................................................................ 81
8.3. Restoring objects from the backup storage........................................................ 84
8.4. Deleting objects from the backup storage .......................................................... 86
8.5. Configuring the backup storage settings ............................................................ 87
CHAPTER 9. REPORTS............................................................................................... 89
9.1. Creating reports................................................................................................... 91
9.2. Creating the report template ............................................................................... 92
9.3. Viewing reports.................................................................................................... 95
CHAPTER 10. APPLICATION EVENT LOG................................................................ 98