Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 84

Content Filtering and Optimizing Scans, About Content Filtering and Scans

Page 84 highlights

4 4. Content Filtering and Optimizing Scans This chapter describes how to apply the content filtering features of the STM and how to optimize scans to protect your network. This chapter contains the following sections: • About Content Filtering and Scans on this page • Configuring Email Protection on page 87 • Configuring Web and Services Protection on page 105 • Configuring Application Control on page 127 • Setting Scanning Exclusions and Web Access Exceptions on page 130 About Content Filtering and Scans The STM provides very extensive Web content and email content filtering options, Web browsing activity reporting, email antivirus and antispam options, and instant alerts via email. You can establish restricted Web access policies that are based on the time of day, Web addresses, and Web address keywords. You can also block Internet access by applications and services, such as instant messaging and peer-to-peer file sharing clients. Note: For information about how to monitor blocked content and malware threats in realtime, see Monitoring Real-Time Traffic, Security, Statistics, and Web Usage on page 184. For information about how to view blocked content and malware threats in the logs, see Querying Logs on page 194. For information about how to view quarantined content, see Viewing and Managing the Quarantine Files on page 208. Chapter 4. Content Filtering and Optimizing Scans | 84

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

Chapter 4.
Content Filtering and Optimizing Scans
|
84
4
4.
Content Filtering and Optimizing Scans
This chapter describes how to apply the content filtering features of the STM and how to
optimize scans to protect your network. This chapter contains the following sections:
About Content Filtering and Scans
on this page
Configuring Email Protection
on page 87
Configuring Web and Services Protection
on page 105
Configuring Application Control
on page 127
Setting Scanning Exclusions and Web Access Exceptions
on page 130
About Content Filtering and Scans
The STM provides very extensive Web content and email content filtering options, Web
browsing activity reporting, email antivirus and antispam options, and instant alerts via email.
You can establish restricted Web access policies that are based on the time of day, Web
addresses, and Web address keywords. You can also block Internet access by applications
and services, such as instant messaging and peer-to-peer file sharing clients.
Note:
For information about how to monitor blocked content and malware
threats in realtime, see
Monitoring Real-Time Traffic, Security,
Statistics, and Web Usage
on page 184. For information about how
to view blocked content and malware threats in the logs, see
Querying Logs
on page 194. For information about how to view
quarantined content, see
Viewing and Managing the Quarantine
Files
on page 208.