Escan/english/fileantivirus and Escan/english/mailantivirus: Difference between pages

From eScan Wiki
(Difference between pages)
Jump to navigation Jump to search
No edit summary
 
mNo edit summary
 
Line 1: Line 1:
== '''File Anti-Virus (Virus & Malware protection)''' ==
'''Mail Anti-Virus (eMail Scanning)''' - Shows the current status of the eMail Scanning Protection level. The green color right tick mark denotes that the module is “Active” while the red color cross mark displays that the module is “InActive”.
                                                       


On the Mail Anti-Virus (eMail Scanning) option page in the “Configuration” section, when clicked on the “Settings” option, one can change the Mail Anti-Virus (eMail Scanning) Protection level, whereas clicking on the “Start” and /or “Stop” option (next to Settings) makes the module “Active” and /or “InActive”.


'''Description'''


File Anti-Virus monitors and safeguards your system on real time basis against viruses, spyware, adware and other malicious objects as and when file(s) are accessed / executed or running in the memory.


'''Configuration section'''
When clicked on “Settings” the below options are available, through which the eScan software’s real-time eMail Scanning protection can be customized -
'''a. Scan Options:-'''
i) Block Attachment types -
This option holds a list of different file types, for example - *.exe, *.pif,* .scr, etc... which when encountered during an email download (pop) would be deleted by default (automatically). This option is set to ensure that emails having these types of known attachments (used by worms, spywares, spammers, etc...to propage themselves) would not be downloaded (as they cannot be disinfected /cleaned) but deleted at MWL (MicroWorld Winsock Layer – Gateway Level).
This option can be customized based on requirements, for example - if you wish to receive the file type (*.pif), there are two options available within to set it. Firstly, delete it from the list and Secondly you can add the file type to the Exclude Attachments list (Whitelist), point no.8 explained below.
The other available options are:-
1. Delete all attachments in email if disinfection is not possible - this option is enabled by default. It would delete all attachments listed in the Block Attachments types section as they are the files that cannot be disinfected/ cleaned.
2. Delete entire email if disinfection is not possible - this option is also enabled by default. It would delete the entire email if the files within the email cannot be disinfected/cleaned.
3. Delete entire email if any virus is found - this option when enabled would delete the entire email if any virus is found in it.
4. Quarantine blocked sttachments - this option when enabled would quarant the attachments blocked.
5. Delete entire email if any blocked attachment is found - this option when enabled would delete the entire email if any blocked attachment is found in it.
6. Quarantine email if attachments are not scanned - this option when enabled would quarant emails if the attachments within are not scanned.
7. Quarantine attachments if they are not scanned - this option when enabled would quarant attachments when not scanned.
8. Exclude attachments (White list) - this option is useful in case a file type listed in the block attachment types section needs to be delivered into the user's mailbox/ inbox and should not be deleted. This option holds precedence over the Block Attachment types.
ii) Action –
This option is set on the right hand side of the Block Attachments types, this section is useful in setting up the action to be taken when an infection is found, the default value set is to "Disinfect" while the other is "Delete".
The options that can be set up here are of quaranting infected files and emails. If eScan is installed in the below path by default then the path would be C:\PROGRA~1\eScan\INFECTED for infected files and C:\PROGRA~1\eScan\Quarant for emails and can be easily changed as per requirements.


'''Status displayed in the main Protection Window'''
The green colored Tick mark indicates the File Anti-Virus is active and running.


The red colored Cross mark indicates the File Anti-Virus is inactive and stopped.
iii) Mail Server settings –


This option is useful for setting up an outbreak alert /notification /warning messages that are sent by eScan when it detects any violation or breach of security.


'''Configuration section '''
There are two sections to this port configuration settings -


''Status''
1. SMTP Mail Server settings -


File Anti-Virus Status – This will display the status of File Anti-Virus either in running or disabled mode.
The mail server ip address and port details needs to be defined along with credentials of a valid username and password (though optional) in case the mail server requires Authentication,  using which eScan automatically sends the notification alerts.  


Proactive Scan Status This will display the status of Proactive Scan either in enabled or disabled mode. (For detail please check below in the section '''II.Options''')
2. Port settings for eMail/Web Scan –  


Action – This will show the action in case of virus detection.
The ports that are used for sending (smtp,25) and receiving (pop3,110) emails are defined along with options of, if outgoing or incoming emails need to be scanned or not. The same can be customized as per requirements.  




''Stop / Start buttons'' – Clicking stop / start button will disable or enable the File Anti-Virus.
'''b. Compression / Decompression options:-'''


''Settings button ''– To configure the File Anti-Virus for real time monitoring click on the Settings button.  
This option helps in Internet Bandwidth Management.  


There are two options available within:-


'''I. Objects''' - This option helps in configuring the various file(s) / drive(s) on the system that should be included during real time monitoring and scanning by the File-Anti-Virus and accordingly take the required action.  
1. Compress outbound attachments –


This option when enabled will decrease the size of all attachments that are sent in emails.


''On the left hand side:- ''
2. Create self extracing zip files –  
'''A. Objects to be scanned''' This section lists the drives, removable and non-removable including the network drives, installed or mapped with the system that will be monitored and scanned.


This option when enabled overrides the above point no.1 and creates a self extractable zip file which when clicked on automatically uncompresses itself thereby eliminating the need at the receiver's end from using any unzipping tool.


''On the right hand side:- ''
3. Uncompress inbound attachments –  
'''a. Action in case of virus detection -''' The default action is set to first disinfect (clean) and when disinfection is not possible then delete the object. It is recommended to keep the default settings.
* Report Only – When selected, File Anti-Virus will only display an attention message informing about the entry / attack by a virus / malware.
* Disinfect – This is the default action taken by File Anti-Virus on any virus / malware detected.
[Make backup before disinfection option On selecting this option a backup of the infected file will be saved, in a non-executable format, before being disinfected].
* If disinfection is impossible: This is an alternate action in case if disinfection of the virus/malware is not possible.The below are the actions that can be selected:
** Report Only
** Quaratnine Object
** Delete Object


This option when enabled will automatically open/unpack the compressed file and be scanned.


'''B. Scan local removable disk drives -''' This option selected will scan all local removable disk drives attached onto the system like the floppy, cd, usb, etc...  
4. Uncompress inbound attachments (Local Domain) –


This option when enabled will automatically open/unpack the compressed file and be scanned when sent within the local domain.


'''C. Scan local hard disk drives -''' This option selected will scan all the local hard disk drives.  
5. Do not compress files with extensions (Exclude following attachments) –


This option is helpful in excluding the file types {attachments} that need not be compressed when being sent out.


'''D. Scan network drives -''' This option selected will scan for the network drives (mapped network folders or drives to the local drive) on to this system.  
6. Compression options -                                                                                              
a) Compress only if compression % greater than –The default value set is 25, this option will compress all attachments in emails to 25 % or more.  


b) Compress if attachment size is above (KB) –The default value set is 50, this option will compress all attachments that are and above 50 KB in size and not below.


'''E. Scan files of following types -''' This option selected will scan files of types listed in the category. Below are the categorised options:
c) Select the compression ratio – The default value set is to “Max. Speed”, this option will utilize the system resources to the best and compress the attachments in emails and send it out too much quicker.  
* All Infectable - This option when selected will scan only those objects that are pre-defined in the list of eScan infectable files/objects and as per the eScan anti-virus signature database.
* All - This option selected will scan all the files/objects in the system.
* By Mask - This option scans for all file types (objects) that are listed in this section. As well, can be customised like adding or deleting a file or a particular file extensions by double clicking on Add / Delete option.  




'''F. Exclude by mask –''' This option when selected, File Anti-Virus monitor will exclude all those objects from real time monitoring / scanning that has been listed. As well, can be customised like adding or deleting a file or a particular file extensions by double clicking on Add / Delete option.
'''c. IE – Vulnerabilities I –'''


Internet Explorer (IE) has vulnerabilities and using them as the base, malwares easily transmit themselves on to systems and email clients like Outlook and Outlook Express thus making it easier for malware authors to get their malicious code propagating.


'''G. Not a virus list –''' eScan File Anti-Virus has the capability to detect Riskware objects, a software which actually was not programmed and intended as malware, but can be a risk to security critical functions. A potentially dangerous software.
To overcome them, MicroWorld with it's proactive security range of solutions is committed to securing your data and system from such vulnerabilities.  
This option selected will exclude those softwares from File Anti-Virus taking any type of action on those objects considered as RISKWARE.  As well, can be customised like adding a  particular software name by double clicking on Add / Delete option.
For example - remote admin softwares like Vnc, RaAdmin, etc...  


i) Delete attachments with CLSID extensions - this option is enabled by default. It deletes Class ID file extensions [CLSID - files that are hidden and do not show the actual file extension] to prevent dangerous files from exploiting the vulnerabilities of IE.


'''H. Exclude folders -''' This option when selected will exclude all the liste folders and sub-folders from being monitored/scanned by File Anti-Virus. As well, can be customised like adding or deleting a folder by double clicking on Add / Delete option.  
ii) Delete HTML attachments with Scripts - this option is not enabled by default. In general, eMails are sent and received in different formats and one of them being HTML, this HTML can have Scripts {similar to a batch file - .bat) with Tags to perform a particular or a set of task/s (embedded), such emails when encountered are deleted to prevent exploiting the vulnerabilities.  


iii) Script & Content check disabled for mails From - this option is useful when you know and want to add a user who is genuine and sends legitimate html email with scripts. Once added, (for example - abc@xyz.net or *@xyz.net) all emails coming from this user or domain would automatically be delivered to the receiver's inbox/mailbox.


'''I. Scan compound objects -''' This option enables to scan files that are archived and packed.  
iv) Script & Content check disabled for mails To - this option is useful when you know and want to add a user who is genuine and sends legitimate html email with scripts. Once added, (for example - suzanne@xyz.net or *@xyz.net) all emails being sent from this user or domain would automatically be delivered to the receiver's inbox/mailbox.  




'''J. Enable code analyzer -''' This option scans for suspicious objects or unknown activity happening on the infected system using the heuristic analyzer i.e. it scans using the traditional method of detecting an object as infected based on the definitions /updates (cure) available within the software, but in addition, also checks for the behavioral activity happening on the system.
'''d. IE – Vulnerabilities II –'''


i) Select action on mails with Multiple Extension Attachment - the default option set is to "No Action", the other is "Delete mail", this option is very useful to prevent malware like worms from propagating itself using multiple (double or triple) extensions via email attachments, for example -nimda, sircam, etc...


'''II. Options –''' Here the basic settings of File Anti-Virus, like destination path of logs, destination path for Quarantined objects and can be configure is helpful in defining the path of the report file (log), folder to be used in case of an infection, size limit of files for real time monitoring.
ii) Allow Multiple Extension attachment for ZIP file - the default option set is to "Yes" or "Allowed", this option is very useful and helps in transmitting multiple extensions attachments in email, for example - compressed files like .zip, .pdf that have multiple extensions can be allowed.  
'''i. Save report file -''' This option enables you to set the destination path of the File Anti-Virus report file (log). This logs information of the files scanned and the act.
* Show pack info in the report – When selected will add the information in the log for the packed files (like zip, rar etc…)
* Show clean object info in the report - When selected will add the information in the log for clean files as well (this is for debugging purpose).
* Limit size to (kb) – This option will set the size of the log file.
'''ii. For quarantine of infected objects –''' Here the destination path of Quarantined object can be set. By default the quarantined path will be "C:\Progra~1\eScan\Infected" .


'''iii. Limit file size to (KB) -''' This option enables you to set a limit size of the object / file  for real time scanning. The default value is set to 1024 Kb.


'''iv. Enable Proactive Scan – '''This option when enabled, will check for any suspicious file that is being executed in the system. A pop-up will be displayed whether to allow the application to be executed or to be blocked.
'''e. Archival –'''


'''v. Use sound effects for the following events –''' This option when enabled, this will play a sound on  detection of any viruses / malwares (the system speakers need to be switched ON) along with a pop-up.  
i) Archive emails - this option is not enabled by default. This option is useful to archive or backup all emails that are sent and received via eScan. The folder or the path to this destination is customizable as per one's requirements.  


'''vi. Display attention messages -''' This option when enabled would display an attention / warning (alert) displaying the path and name of the infected object and the action taken.
ii) Archive attachments - this option is not enabled by default. This option is useful to archive or backup all email attachments that are sent and received via eScan. The folder or the path to this destination is customizable as per one's requirements.
iii) Do not archive attachments of type - With this option certain file types can be excluded from being archived, for example - *.vcf, *.htm, *.html, etc...  


At the bottom end of this Mail Anti-Virus (eMail Scanning) option page in the “Reports” section, there are different options available like “View eMail Log” and “View Archived Mails”.


'''Reports section '''


''' '''''Statistics''
* Total Files Scanned – Total files scanned on real time basis.
* Dangerous Objects Detected – Total virus / malwares detected on real time basis.
* Last File Scanned – Name of the last file scanned on real time basis.
'''a. View Statistics''' – Clicking on View Statistics will display the latest activity report of the real-time monitor like -
* The current details of the system date and time along with the details if the eScan Anti-Virus monitor is loaded (running) or not.
* The number of viruses being detected
* The scanning details like, last Objects scanned, name of the virus detected etc…


'''b. View Quarantined Objects –''' Clicking on View Quarantined Objects will display the the files that are quarantined and backup files.
'''Reports section -'''  
* Quarantine - This option displays the files that are quarantined. The quarantined objects can be Restored / Deleted by right clicking on the object.
* Backup - This option displays the files that are backed up before disinfection. The backed up objects can be Restored / Deleted by right clicking on the object.


'''c. View Log –''' Clicking on View Log will display the eScan File Anti-Virus report.
The below options are available within -


a. View eMail log -


This displays the email scan activity done on the system in details like the infection found name of the infection, status of the action taken, etc..


b. View Archived Mails –


*'''[http://download1.mwti.net/wiki/index.php/EScan_ver.10 Main Feature Index]'''
This displays the emails that are archived, using the “Archival” option explained above (point no. e).
*'''[http://download1.mwti.net/wiki/index.php/Glossary Glossary]'''
Along with the above statistical reports, it also displays the total mails scanned and total infected objects.

Revision as of 11:31, 30 August 2008

Mail Anti-Virus (eMail Scanning) - Shows the current status of the eMail Scanning Protection level. The green color right tick mark denotes that the module is “Active” while the red color cross mark displays that the module is “InActive”.

On the Mail Anti-Virus (eMail Scanning) option page in the “Configuration” section, when clicked on the “Settings” option, one can change the Mail Anti-Virus (eMail Scanning) Protection level, whereas clicking on the “Start” and /or “Stop” option (next to Settings) makes the module “Active” and /or “InActive”.


Configuration section

When clicked on “Settings” the below options are available, through which the eScan software’s real-time eMail Scanning protection can be customized -

a. Scan Options:-

i) Block Attachment types -

This option holds a list of different file types, for example - *.exe, *.pif,* .scr, etc... which when encountered during an email download (pop) would be deleted by default (automatically). This option is set to ensure that emails having these types of known attachments (used by worms, spywares, spammers, etc...to propage themselves) would not be downloaded (as they cannot be disinfected /cleaned) but deleted at MWL (MicroWorld Winsock Layer – Gateway Level).

This option can be customized based on requirements, for example - if you wish to receive the file type (*.pif), there are two options available within to set it. Firstly, delete it from the list and Secondly you can add the file type to the Exclude Attachments list (Whitelist), point no.8 explained below.

The other available options are:-

1. Delete all attachments in email if disinfection is not possible - this option is enabled by default. It would delete all attachments listed in the Block Attachments types section as they are the files that cannot be disinfected/ cleaned.

2. Delete entire email if disinfection is not possible - this option is also enabled by default. It would delete the entire email if the files within the email cannot be disinfected/cleaned.

3. Delete entire email if any virus is found - this option when enabled would delete the entire email if any virus is found in it.

4. Quarantine blocked sttachments - this option when enabled would quarant the attachments blocked.

5. Delete entire email if any blocked attachment is found - this option when enabled would delete the entire email if any blocked attachment is found in it.

6. Quarantine email if attachments are not scanned - this option when enabled would quarant emails if the attachments within are not scanned.

7. Quarantine attachments if they are not scanned - this option when enabled would quarant attachments when not scanned.

8. Exclude attachments (White list) - this option is useful in case a file type listed in the block attachment types section needs to be delivered into the user's mailbox/ inbox and should not be deleted. This option holds precedence over the Block Attachment types.


ii) Action –

This option is set on the right hand side of the Block Attachments types, this section is useful in setting up the action to be taken when an infection is found, the default value set is to "Disinfect" while the other is "Delete".

The options that can be set up here are of quaranting infected files and emails. If eScan is installed in the below path by default then the path would be C:\PROGRA~1\eScan\INFECTED for infected files and C:\PROGRA~1\eScan\Quarant for emails and can be easily changed as per requirements.


iii) Mail Server settings –

This option is useful for setting up an outbreak alert /notification /warning messages that are sent by eScan when it detects any violation or breach of security.

There are two sections to this port configuration settings -

1. SMTP Mail Server settings -

The mail server ip address and port details needs to be defined along with credentials of a valid username and password (though optional) in case the mail server requires Authentication, using which eScan automatically sends the notification alerts.

2. Port settings for eMail/Web Scan –

The ports that are used for sending (smtp,25) and receiving (pop3,110) emails are defined along with options of, if outgoing or incoming emails need to be scanned or not. The same can be customized as per requirements.


b. Compression / Decompression options:-

This option helps in Internet Bandwidth Management.

There are two options available within:-

1. Compress outbound attachments –

This option when enabled will decrease the size of all attachments that are sent in emails.

2. Create self extracing zip files –

This option when enabled overrides the above point no.1 and creates a self extractable zip file which when clicked on automatically uncompresses itself thereby eliminating the need at the receiver's end from using any unzipping tool.

3. Uncompress inbound attachments –

This option when enabled will automatically open/unpack the compressed file and be scanned.

4. Uncompress inbound attachments (Local Domain) –

This option when enabled will automatically open/unpack the compressed file and be scanned when sent within the local domain.

5. Do not compress files with extensions (Exclude following attachments) –

This option is helpful in excluding the file types {attachments} that need not be compressed when being sent out.

6. Compression options - a) Compress only if compression % greater than –The default value set is 25, this option will compress all attachments in emails to 25 % or more.

b) Compress if attachment size is above (KB) –The default value set is 50, this option will compress all attachments that are and above 50 KB in size and not below.

c) Select the compression ratio – The default value set is to “Max. Speed”, this option will utilize the system resources to the best and compress the attachments in emails and send it out too much quicker.


c. IE – Vulnerabilities I –

Internet Explorer (IE) has vulnerabilities and using them as the base, malwares easily transmit themselves on to systems and email clients like Outlook and Outlook Express thus making it easier for malware authors to get their malicious code propagating.

To overcome them, MicroWorld with it's proactive security range of solutions is committed to securing your data and system from such vulnerabilities.

i) Delete attachments with CLSID extensions - this option is enabled by default. It deletes Class ID file extensions [CLSID - files that are hidden and do not show the actual file extension] to prevent dangerous files from exploiting the vulnerabilities of IE.

ii) Delete HTML attachments with Scripts - this option is not enabled by default. In general, eMails are sent and received in different formats and one of them being HTML, this HTML can have Scripts {similar to a batch file - .bat) with Tags to perform a particular or a set of task/s (embedded), such emails when encountered are deleted to prevent exploiting the vulnerabilities.

iii) Script & Content check disabled for mails From - this option is useful when you know and want to add a user who is genuine and sends legitimate html email with scripts. Once added, (for example - abc@xyz.net or *@xyz.net) all emails coming from this user or domain would automatically be delivered to the receiver's inbox/mailbox.

iv) Script & Content check disabled for mails To - this option is useful when you know and want to add a user who is genuine and sends legitimate html email with scripts. Once added, (for example - suzanne@xyz.net or *@xyz.net) all emails being sent from this user or domain would automatically be delivered to the receiver's inbox/mailbox.


d. IE – Vulnerabilities II –

i) Select action on mails with Multiple Extension Attachment - the default option set is to "No Action", the other is "Delete mail", this option is very useful to prevent malware like worms from propagating itself using multiple (double or triple) extensions via email attachments, for example -nimda, sircam, etc...

ii) Allow Multiple Extension attachment for ZIP file - the default option set is to "Yes" or "Allowed", this option is very useful and helps in transmitting multiple extensions attachments in email, for example - compressed files like .zip, .pdf that have multiple extensions can be allowed.


e. Archival –

i) Archive emails - this option is not enabled by default. This option is useful to archive or backup all emails that are sent and received via eScan. The folder or the path to this destination is customizable as per one's requirements.

ii) Archive attachments - this option is not enabled by default. This option is useful to archive or backup all email attachments that are sent and received via eScan. The folder or the path to this destination is customizable as per one's requirements. iii) Do not archive attachments of type - With this option certain file types can be excluded from being archived, for example - *.vcf, *.htm, *.html, etc...

At the bottom end of this Mail Anti-Virus (eMail Scanning) option page in the “Reports” section, there are different options available like “View eMail Log” and “View Archived Mails”.


Reports section -

The below options are available within -

a. View eMail log -

This displays the email scan activity done on the system in details like the infection found name of the infection, status of the action taken, etc..

b. View Archived Mails –

This displays the emails that are archived, using the “Archival” option explained above (point no. e).

Along with the above statistical reports, it also displays the total mails scanned and total infected objects.