Understanding Trend Micro™ Network VirusWall™ Enforcer 2500
1
-
63
It is important to keep the authentication policies at a higher priority than policies
that do not use the authentication feature. Once a host matches a trigger for a policy,
the device does not apply any other policies to that host. This means that if two
identical policies are in the list, and the higher priority policy does not use the
authentication feature whereas the lower priority policy does, no hosts will match the
second policy.
Network
Virus Policy
Settings
•
Network Virus Scan
Action
:
Quarantine endpoint
Remedy
: Start Damage Cleanup
•
Log policy violations and notify endpoints about policy
violations
Network
Application
Settings
•
File Transfer Detection
Action
:
Reject packet
Details
: Windows file transfer, FTP file transfer
•
Log policy violations and notify endpoints about policy
violations
Settings
Details
T
ABLE
1-13.
Priority 3: Sample Distribution Switch and Access Switch Policy
Scenario