Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 94

Email Content Filtering, Apply, Keyword blocking, Password-protected attachments

Page 94 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance Table 28. Email Anti-Virus Notification Settings (Continued) Setting Description Subject The default subject line for the notification email is "Malware detected!" You can change this subject line. Message The warning message informs the sender, the recipient, or both about the name of the malware threat. You can change the default message to include more information. Make sure that you keep the %VIRUSINFO% metaword in a message to enable the STM to insert the correct malware threat information. In addition to the %VIRUSINFO% metaword, you can insert the following metawords in your customized message: %TIME%, %PROTOCOL%, %FROM%, %TO%, %SUBJECT%, %FILENAME%, %ACTION%, %VIRUSNAME%. 4. Click Apply to save your settings. Email Content Filtering The STM provides several options to filter unwanted content from emails. You can filter content from emails based on keywords in the subject line, file type of the attachment, and file name of the attachment. You can also set an action to perform on emails with password-protected attachments. Several types of email blocking are available: • Keyword blocking. You can specify words that, should they appear in the email subject line, cause that email to be blocked by the STM. • Password-protected attachments. You can block emails based on password-protected attachments such as .zip or .rar attachments. • File extension blocking. You can block emails based on the extensions of attached files. Such files can include executable files, audio and video files, and compressed files. • File name blocking. You can block emails based on the names of attached files. Such names can include, for example, names of known malware threats such as the Netsky worm (which normally arrives as netsky.exe). 94 | Chapter 4. Content Filtering and Optimizing Scans

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

94
|
Chapter 4.
Content Filtering and Optimizing Scans
ProSecure Web/Email Security Threat Management (STM) Appliance
4.
Click
Apply
to save your settings.
Email Content Filtering
The STM provides several options to filter unwanted content from emails. You can filter
content from emails based on keywords in the subject line, file type of the attachment, and file
name of the attachment. You can also set an action to perform on emails with
password-protected attachments.
Several types of email blocking are available:
Keyword blocking
. You can specify words that, should they appear in the email subject
line, cause that email to be blocked by the STM.
Password-protected attachments
. You can block emails based on password-protected
attachments such as .zip or .rar attachments.
File extension blocking
. You can block emails based on the extensions of attached files.
Such files can include executable files, audio and video files, and compressed files.
File name blocking
. You can block emails based on the names of attached files. Such
names can include, for example, names of known malware threats such as the Netsky
worm (which normally arrives as netsky.exe).
Subject
The default subject line for the notification email is “Malware detected!” You can
change this subject line.
Message
The warning message informs the sender, the recipient, or both about the name of
the malware threat. You can change the default message to include more
information.
Make sure that you keep the %VIRUSINFO% metaword in a message to enable
the STM to insert the correct malware threat information. In addition to the
%VIRUSINFO% metaword, you can insert the following metawords in your
customized message: %TIME%, %PROTOCOL%, %FROM%, %TO%,
%SUBJECT%, %FILENAME%, %ACTION%, %VIRUSNAME%.
Table 28.
Email Anti-Virus Notification Settings (Continued)
Setting
Description