Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 130

Setting Scanning Exclusions and Web Access Exceptions, Setting Scanning Exclusions

Page 130 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance For reference, you can specify access control for the following applications: • Instant Messaging: - Google Talk - ICQ - mIRC - MSN Messenger - QQ - Yahoo Messenger • Media Applications: - iTunes (Music Store, update) - Quicktime (Update) - Real Player (Guide) - Rhapsody (Guide, Music Store) - Winamp (Internet Radio/TV) • Peer to Peer: - BitTorrent - eDonkey - Gnutella • Tools - Alexa Toolbar - GoToMyPC - Weatherbug - Yahoo Toolbar Setting Scanning Exclusions and Web Access Exceptions After you have specified which IP addresses and ports the STM scans for malware threats, you can set scanning exclusion rules for certain IP addresses and ports. Similarly, after you have specified which content the STM filters, you can set exception rules for users and members of a group. Setting Scanning Exclusions To save resources, you can configure scanning exclusions for IP addresses and ports that you know are secure. For example, if your network includes a Web server that hosts Web pages that are accessible by anyone on the Internet, the files that are hosted by your Web server do not need to be scanned. To prevent the STM from scanning these files, you can configure up to 127 scanning exclusion rules for your Web server. 130 | Chapter 4. Content Filtering and Optimizing Scans

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

130
|
Chapter 4.
Content Filtering and Optimizing Scans
ProSecure Web/Email Security Threat Management (STM) Appliance
For reference, you can specify access control for the following applications:
Instant Messaging:
-
Google Talk
-
ICQ
-
mIRC
-
MSN Messenger
-
QQ
-
Yahoo Messenger
Media Applications:
-
iTunes (Music Store, update)
-
Quicktime (Update)
-
Real Player (Guide)
-
Rhapsody (Guide, Music Store)
-
Winamp (Internet Radio/TV)
Peer to Peer:
-
BitTorrent
-
eDonkey
-
Gnutella
Tools
-
Alexa Toolbar
-
GoToMyPC
-
Weatherbug
-
Yahoo Toolbar
Setting Scanning Exclusions and Web Access Exceptions
After you have specified which IP addresses and ports the STM scans for malware threats,
you can set scanning exclusion rules for certain IP addresses and ports. Similarly, after you
have specified which content the STM filters, you can set exception rules for users and
members of a group.
Setting Scanning Exclusions
To save resources, you can configure scanning exclusions for IP addresses and ports that
you know are secure. For example, if your network includes a Web server that hosts Web
pages that are accessible by anyone on the Internet, the files that are hosted by your Web
server do not need to be scanned. To prevent the STM from scanning these files, you can
configure up to 127 scanning exclusion rules for your Web server.