Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 40

Security > Policy, Web Security > HTTP/HTTPS > Malware, Table 8.

Page 40 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance Note: After you have completed the steps in the Setup Wizard, you can make changes to the Web security settings by selecting Web Security > Policy or Web Security > HTTP/HTTPS > Malware Scan. The Malware Scan screen also lets you specify HTML scanning and notification settings. For more information about these settings, see Configuring Web and Services Protection on page 105. Table 8. Setup Wizard Step 5: Web Security Settings Setting Description (or Subfield and Description) Services to Scan HTTP HTTP scanning is enabled by default on standard service port 80. To disable Hypertext Transfer Protocol (HTTP) scanning, clear the corresponding check box. You can change the standard service port or add another port in the corresponding Ports to Scan field. HTTPS HTTPS scanning is disabled by default. To enable Hypertext Transfer Protocol over Secure Socket Layer (HTTPS) scanning, select the corresponding check box. You can change the standard service port (number 443) or add another port in the corresponding Ports to Scan field. FTP FTP scanning is enabled by default To disable File Transfer Protocol (FTP) scanning, clear the on standard service port 21. corresponding check box. You can change the standard service port or add another port in the corresponding Ports to Scan field. Scan Action HTTP From the HTTP drop-down list, specify one of the following actions to be taken when an infected Web file or object is detected: • Quarantine file. The Web file or object is removed and placed in the malware quarantine for further research. In addition, a malware quarantine log entry is created, and depending on the nature of the malware threat, also a virus log entry or spyware log entry. • Delete file. This is the default setting. The Web file or object is deleted, and a virus log entry or spyware log entry is created. • Log only. Only a virus log entry or spyware log entry is created. The Web file or object is not deleted. Select the Streaming check box to enable streaming of partially downloaded and scanned HTTP file parts to the end user. This method allows the user to experience more transparent Web downloading. Streaming is enabled by default. 40 | Chapter 2. Using the Setup Wizard to Provision the STM in Your Network

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

40
|
Chapter 2.
Using the Setup Wizard to Provision the STM in Your Network
ProSecure Web/Email Security Threat Management (STM) Appliance
Note:
After you have completed the steps in the Setup Wizard, you can
make changes to the Web security settings by selecting
Web
Security > Policy
or
Web Security > HTTP/HTTPS > Malware
Scan
. The Malware Scan screen also lets you specify HTML
scanning and notification settings. For more information about these
settings, see
Configuring Web and Services Protection
on page 105.
Table 8.
Setup Wizard Step 5: Web Security Settings
Setting
Description (or Subfield and Description)
Services to Scan
HTTP
HTTP scanning is enabled by
default on standard service port 80.
To disable Hypertext Transfer Protocol (HTTP) scanning,
clear the corresponding check box. You can change the
standard service port or add another port in the
corresponding
P
orts to Scan field.
HTTPS
HTTPS scanning is disabled by
default.
To enable Hypertext Transfer Protocol over Secure Socket
Layer (HTTPS) scanning, select the corresponding check
box. You can change the standard service port (number 443)
or add another port in the corresponding Ports to Scan field.
FTP
FTP scanning is enabled by default
on standard service port 21.
To disable File Transfer Protocol (FTP) scanning, clear the
corresponding check box. You can change the standard
service port or add another port in the corresponding Ports to
Scan field.
Scan Action
HTTP
From the HTTP drop-down list, specify one of the following actions to be taken when an infected
Web file or object is detected:
Quarantine file
. The Web file or object is removed and placed in the malware quarantine for
further research. In addition, a malware quarantine log entry is created, and depending on the
nature of the malware threat, also a virus log entry or spyware log entry.
Delete file
. This is the default setting. The Web file or object is deleted, and a virus log entry or
spyware log entry is created.
Log only
. Only a virus log entry or spyware log entry is created. The Web file or object is not
deleted.
Select the
Streaming
check box to enable streaming of partially downloaded and scanned HTTP
file parts to the end user. This method allows the user to experience more transparent Web
downloading. Streaming is enabled by default.