McAfee MAP-3300-SWG Product Guide - Page 126
About file filtering, Email, Email Policies, Scanning Policies, Compliance
UPC - 731944547008
View all McAfee MAP-3300-SWG manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 126 highlights
Overview of Email features Email Policies About file filtering Use this topic to gain a better understanding of file filtering. Email | Email Policies | Scanning Policies | Compliance | File Filtering When creating file filtering rules, you can detect files in many ways: You can configure the appliance to restrict the use of certain file types: • By file name - For example, some graphic file formats such as bitmap (.BMP) use large amounts of computer memory and can affect network speed when transferred. You might prefer that users work with other more compact formats such as GIF, PNG or JPEG. If your organization produces computer software, you might see executable (.exe) files moving around the network. Within another organization, those files might be games or illegal copies of software. Similarly, unless your organization regularly handles movie files (MPEG or MPG), they are probably for entertainment only. A file filtering rule that examines the file extension name can restrict the movement of these files. Financial information might have file names like Year2008.xls or 2008Results. A file filter that matches the text 2008 can detect the movement of these files. • By file format - For example, much of your organization's most valuable information - such as designs and lists of customers - is in databases or other special files, so it is important to control the movement of these files. The appliance examines files based on their true content. Any file can be made to masquerade as another. A person with malicious intent might rename an important database file called CUSTOMERS.MDB to NOTES.TXT and attempt to transfer that file, believing that it cannot be detected. Fortunately, you can configure the appliance to examine each file based on its content or file format, and not on its file name extension alone. • By file size - For example, although you might allow graphic files to moved around the network, you can restrict their size to prevent the service running too slowly for other users. When you create settings to control the use of any file, remember that some departments within your organization might need fewer constraints. For example, a marketing department might need large graphic files for advertising. This feature is not available to the POP3 protocol. 126 McAfee Email and Web Security Appliances 5.6.0 Product Guide