Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 38

Table 7., Setup Wizard Step 4: Email Security Settings

Page 38 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance Table 7. Setup Wizard Step 4: Email Security Settings Setting Description (or Subfield and Description) Services to Scan SMTP POP3 IMAP SMTP scanning is enabled by default on standard service port 25. POP3 scanning is enabled by default on standard service port 110. IMAP scanning is enabled by default on standard service port 143. To disable any of these services, clear the corresponding check box. You can change the standard service port or add another port in the corresponding Ports to Scan field. Scan Action SMTP From the SMTP drop-down list, specify one of the following actions to be taken when an infected email is detected: • Quarantine attachment. The email is not blocked, but the attachment is removed and placed in the malware quarantine for further research. In addition, a malware quarantine log entry is created, and depending on the nature of the malware threat, also a virus log entry or a spyware log entry. • Delete attachment. The email is not blocked, but the attachment is deleted, and a virus log entry or a spyware log entry is created. • Block infected email. This is the default setting. The email is blocked, and a virus log entry or a spyware log entry is created. • Quarantine infected email. The email is placed in the malware quarantine for further research. In addition, a malware quarantine log entry is created, and depending on the nature of the malware threat, also a virus log entry or a spyware log entry. • Log only. Only a virus log entry or a spyware log entry is created. The email is not blocked and the attachment is not deleted. POP3 From the POP3 drop-down list, specify one of the following actions to be taken when an infected email is detected: • Quarantine attachment. The email is not blocked, but the attachment is removed and placed in the malware quarantine for further research. In addition, a malware quarantine log entry is created, and depending on the nature of the malware threat, also a virus log entry or a spyware log entry. • Delete attachment. This is the default setting. The email is not blocked, but the attachment is deleted, and a virus log entry or a spyware log entry is created. • Log only. Only a virus log entry or a spyware log entry is created. The email is not blocked and the attachment is not deleted. IMAP From the IMAP drop-down list, specify one of the following actions to be taken when an infected email is detected: • Quarantine attachment. The email is not blocked, but the attachment is removed and placed in the malware quarantine for further research. In addition, a malware quarantine log entry is created, and depending on the nature of the malware threat, also a virus log entry or a spyware log entry. • Delete attachment. This is the default setting. The email is not blocked, but the attachment is deleted, and a virus log entry or a spyware log entry is created. • Log only. Only a virus log entry or a spyware log entry is created. The email is not blocked and the attachment is not deleted. 38 | Chapter 2. Using the Setup Wizard to Provision the STM in Your Network

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

38
|
Chapter 2.
Using the Setup Wizard to Provision the STM in Your Network
ProSecure Web/Email Security Threat Management (STM) Appliance
Table 7.
Setup Wizard Step 4: Email Security Settings
Setting
Description (or Subfield and Description)
Services to Scan
SMTP
SMTP scanning is enabled by default on standard
service port 25.
To disable any of these services, clear the
corresponding check box. You can change
the standard service port or add another port
in the corresponding Ports to Scan field.
POP3
POP3 scanning is enabled by default on standard
service port 110.
IMAP
IMAP scanning is enabled by default on standard
service port 143.
Scan Action
SMTP
From the SMTP drop-down list, specify one of the following actions to be taken when an infected
email is detected:
Quarantine attachment
. The email is not blocked, but the attachment is removed and placed in
the malware quarantine for further research. In addition, a malware quarantine log entry is
created, and depending on the nature of the malware threat, also a virus log entry or a spyware
log entry.
Delete attachment
. The email is not blocked, but the attachment is deleted, and a virus log entry
or a spyware log entry is created.
Block infected email
. This is the default setting. The email is blocked, and a virus log entry or
a spyware log entry is created.
Quarantine infected email
. The email is placed in the malware quarantine for further research.
In addition, a malware quarantine log entry is created, and depending on the nature of the
malware threat, also a virus log entry or a spyware log entry.
Log only
. Only a virus log entry or a spyware log entry is created. The email is not blocked and
the attachment is not deleted.
POP3
From the POP3 drop-down list, specify one of the following actions to be taken when an infected
email is detected:
Quarantine attachment
. The email is not blocked, but the attachment is removed and placed in
the malware quarantine for further research. In addition, a malware quarantine log entry is
created, and depending on the nature of the malware threat, also a virus log entry or a spyware
log entry.
Delete attachment
. This is the default setting. The email is not blocked, but the attachment is
deleted, and a virus log entry or a spyware log entry is created.
Log only
. Only a virus log entry or a spyware log entry is created. The email is not blocked and
the attachment is not deleted.
IMAP
From the IMAP drop-down list, specify one of the following actions to be taken when an infected
email is detected:
Quarantine attachment
. The email is not blocked, but the attachment is removed and placed in
the malware quarantine for further research. In addition, a malware quarantine log entry is
created, and depending on the nature of the malware threat, also a virus log entry or a spyware
log entry.
Delete attachment
. This is the default setting. The email is not blocked, but the attachment is
deleted, and a virus log entry or a spyware log entry is created.
Log only
. Only a virus log entry or a spyware log entry is created. The email is not blocked and
the attachment is not deleted.