Trend Micro™ InterScan™ Gateway Security Appliance M-Series Administrator’s Guide
14
-
14
Best Practices
Handling Compressed Files
Compressed files provide a number of special security concerns. In short, compressed
files can be password-protected or encrypted, they can harbor so-called "zip-of-death"
threats, and they can contain within them numerous layers of compression.
To balance security and performance, Trend Micro recommends that you read the
following before choosing compressed file settings:
Block compressed files if...
Decompressed file count exceeds:
Set the number of files within a compressed archive at which InterScan Gateway
Security Appliance should stop extracting.
For example, have InterScan Gateway Security Appliance abandon the extraction
after 1,000 files.
Whenever the limit is reached, the original archive, and any decompressed files, is
deleted. In addition to benefiting overall scan efficiency, setting an upper limit for
decompression can prevent "zip of death" attacks designed to crash vulnerable virus
scanning programs.
Size of a decompressed file exceeds:
Set the maximum size that files being extracted from a compressed archive are
allowed to reach.
Once the limit is reached, the original archive, and any decompressed files, is
deleted. As with
Number of files
, setting an upper size limit for decompression can
help prevent the “zip of death” attack.
Number of layers of compression exceeds:
Set the maximum number of layers (compressed file within a compressed file) you
want InterScan Gateway Security Appliance to scan down through. The system maxi-
mum is 20.
Содержание InterScan M Series
Страница 1: ...InterScan TM Gateway Security Appliance M Series...
Страница 2: ......
Страница 16: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide xiv...
Страница 60: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 2 22...
Страница 82: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 3 22...
Страница 100: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 4 18...
Страница 135: ...SMTP Services 5 35 SMTP Content Filtering Target FIGURE 5 20 SMTP Content Filtering Target...
Страница 140: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 5 40...
Страница 180: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 6 40...
Страница 196: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 7 16...
Страница 250: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 10 12...
Страница 258: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 11 8...
Страница 267: ...Analyzing Your Protection Using Logs 12 9...
Страница 268: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 12 10...
Страница 366: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 15 46...
Страница 372: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide A 6...
Страница 421: ...Introducing Trend Micro Control Manager B 49 5 Select the report format 6 Click Next to proceed to the Targets tab...
Страница 428: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide B 56...
Страница 446: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide D 6...
Страница 448: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide E 2...
Страница 460: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide G 4...
Страница 480: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide I 20...