Escan/english/mailantivirus and Escan/english/webprotection: Difference between pages

From eScan Wiki
(Difference between pages)
Jump to navigation Jump to search
No edit summary
 
mNo edit summary
 
Line 1: Line 1:
{| class="wikitable" border="0"
'''Web Anti-Virus (Web Traffic Control)''' - Shows the current status of the Web Traffic Control Protection level. The green color right tick mark denotes that the module is “Active” while the red color cross mark displays that the module is “InActive”.
On the Web Anti-Virus (Web Traffic Control) option page in the “Configuration” section, when clicked on the “Settings” option, one can change the Web Anti-Virus (Web Traffic Control) Protection level, whereas clicking on the “Start” and /or “Stop” option (next to Settings) makes the module “Active” and /or “InActive”.
 
The “Block Web Access” option can be found between the “Start” and “Settings”options and enables you to block the web access completely (no internet access at all).
 
 
 
'''Configuration section -'''
 
When clicked on “Settings” the below options are available, through which the eScan software’s real-time Web Traffic Scanning protection can be customized -


{| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;"
'''a. Webpage Filtering:-'''
| style="width:56%; color:#000;" |
{| style="width:280px; border:none; background:none;"
| [[Image:Escan_wikipedia.jpg|left|<!--We add confidence to computing-->]]
|}
|width="1000pt" style="width:11%; font-size:95%;" white-space:nowrap;|
&nbsp;<B><p>&nbsp;&nbsp;General</p></B>
* [[Main Page|<font color="blue">Home</font>]]
* [[Marketing|<font color="blue">Marketing</font>]]
* [[Events|<font color="blue">Events</font>]]
* [[Marketing/Advertisement|<font color="blue">Advertisement</font>]]
* [[Escan/english/Security_Awareness|<font color="blue">Security Awareness</font>]]
|width="1000pt" style="width:11%; font-size:95%; white-space:nowrap;" |
&nbsp;<B><p>&nbsp;&nbsp;Knowledgebase</p></B>
* [[Technical Info|<font color="blue">Technical Information</font>]]
* [[Beta Testing|<font color="blue">Beta Testing</font>]]
* [[Release Candidate|<font color="blue">Release Candidate</font>]]
* [[User Guide|<font color="blue">User Guides</font>]]
* [[Escan/english/Technologies|<font color="blue">Technologies</font>]]
|width="1000pt" style="width:11%; font-size:95%;white-space:nowrap;" |
&nbsp;<B><p>&nbsp;&nbsp;Support</p></B>
* [[EMail|<font color="blue">eMail</font>]]
* [[Online Chat|<font color="blue">Online Chat</font>]]
* [[Telephonic Support|<font color="blue">Telephone</font>]]
* [[Remote Support|<font color="blue">Remote Support</font>]]
* [[Forums|<font color="blue">Forums</font>]]
|}
{| class="wikitable" border="0"
|}


{| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;"
This option helps in controlling and blocking access to the Web as listed below -
| style="width:10%; color:#000;" |
{| style="width:100px; border:none; background:none;"
| [[Image:escan-g.jpg]]
|}
|style="text-align:left;"|'''·''' [[Escan/english/eScan-Articles|<font size=1.5 color="blue" align="left">Articles</font>]]&nbsp;&nbsp;'''·''' [[Escan/english/eScan-FAQ|<font size=1.5 color="blue">FAQ</font>]]&nbsp;&nbsp;'''·''' [[Escan/english/eScan-Troubleshooting|<font size=1.5 color="blue">Troubleshooting</font>]]
|style="text-align:right;"|&nbsp;&nbsp;'''·''' [[Technical Info|<font size=1.5 color="blue">Technical Information - Main Page</font>]]
|}


{| class="wikitable" border="0"
'''i) Filtering options -'''
|}
<h2  id="mp-tfp-h2" style="margin:0; background:#C7E587; font-size:120%; font-weight:bold; border:10 solid #afa3bf; text-align:left; color:#000; padding:0.2em 0.4em">eScan Version 10 Online Help</h2>
{| class="wikitable" border="0"
|-
|width="1000pt"|
|}


<U>'''Mail Anti-Virus (eMail Scanning)'''</U>
This section has pre-defined categories that help to control and block access to the Web -  


This section provides the description and settings of eScan's Mail Anti-Virus for scanning of emails.
1. Pornography -  


This helps to control and block access to the web based on pornographic content. On selection of this category, it displays the words/phrases defined along with the site names that when found to be accessed would result in Blocking of Access or "Access Denied" to the site desired.
The words and phrases and /or sites defined can be added or deleted based on requirements.


__TOC__
2. Gambling –
 
This helps to control and block access to the web based on gambling content. On selection of this category, it displays the words/phrases defined and when found to be accessed would result in Blocking of Access or "Access Denied" to the site desired.
 
The words and phrases defined can be added or deleted based on requirements.
 
3. Ratings_block_category –
 
This helps to control and block access to the web and is kept open for any words/phrases and site names to be added to the words /phrases and to the site name list.
 
4. Websites Allowed –
 
This category contains list of sites that are allowed to be accessed and not blocked. The site names listed within can be customized as per requirements.
 
* All the above four (1-4) categories listed are pre-defined.
 
 
5. Chat –
 
This helps to control and block access to the web based on chat. On selection of this category, it displays the words/phrases defined that when found to be accessed would result in Blocking of Access or "Access Denied" to the site desired.
 
The words and phrases defined can be added or deleted based on requirements.
 
6. Alcohol –
 
This helps to control and block access to the web based on alcohol. On selection of this category, it displays the words/phrases defined that when found to be accessed would result in Blocking of Access or "Access Denied" to the site desired.
 
The words and phrases defined can be added or deleted based on requirements.
 
7. Violence –
 
This helps to control and block access to the web based on violence. On selection of this category, it displays the words/phrases defined that when found to be accessed would result in Blocking of Access or "Access Denied" to the site desired.
 
The words and phrases defined can be added or deleted based on requirements.
 
8. Drugs –
 
This helps to control and block access to the web based on drugs. On selection of this category, it displays the words/phrases defined that when found to be accessed would result in Blocking of Access or "Access Denied" to the site desired.
 
The words and phrases defined can be added or deleted based on requirements.
 
• All the above four (5-8) categories listed are customized.
 
• The sites that are denied access to would automatically be added to the Block category to be filtered.
 
 
'''ii) Scanning options –'''
 
When clicked on, it has many sub- features and functionalities that help to control and block access to the web.
 
There are different options available like "Content Matching Options", "Content Type", "ActiveX Blocking", "Port Setting", "Rating Systems" and "Actions"
 
1. Content Matching Options -
 
this option is helpful in controlling and blocking access to the web based on matching content and which works on different criterias:-
   
   
a. Search in Site Name -
The site name or url typed would be checked if it is listed in the restricted or blocked categories.
b. Search in HTML Tags -


=='''Description'''==
The HTML tags would be checked if they contains any restricted or blocked words/phrases or site names.


Mail Anti-Virus scans all incoming and outgoing mails for viruses, spywares, adware and other malicious objects. By default when you start Mail Anti-virus it will only scan for Incoming emails
c. Search in Title -  


The title would be checked if it contains any restricted or blcoked words/phrases or site names.


=='''Status in main Protection Center Window'''==
d. Search in Page Text -


The <B><font color="Green"> '''green''' </font></B> colored Tick <U><B><font color="Green">(√)</font></B></U> mark indicates the Mail Anti-Virus is active and running.
The web page text would be checked if it contains any restricted or blocked words/phrases.  


The <B><font color="Red"> '''red''' </font></B> colored Cross <U><B><font color="Red">(X)</font></B></U> mark indicates the Mail Anti-Virus is inactive and stopped.
e. Search in Description and Keywords -  


The restricted or blocked words/phrases would be checked in the website's description and keywords.


=='''Configuration section''' ==
f. Reserved Word Threshold Level -


This is a threshold level/limit set within the software that keeps a count of how many times a restricted or blocked word/s appears, if the set word/s have appeared as per the default value or more the access to the web is blocked or restricted and vice versa.


:<U>''Status''</U>


:*Mail Anti-Virus Status – This will display the status of the Mail Anti-virus in Disabled or Running mode.


:*Action – This will display the action to be taken on infected emails in Delete or Disinfect mode.




:''Stop / Start buttons'' – Clicking stop / start button will disable or enable the Mail Anti-Virus.


:''Settings button'' – To configure the Mail Anti-Virus for incoming / outgoing email scanning click on the Settings button.
'''Content Type -'''  


This option is helpful in controlling and blocking access to the web based on the type of content and which works on different criterias:-


'''I. Scan Options:-'''
a. Block Images -  


Images on websites will be blocked from being viewed


:'''a) Block Attachment types '''-  
i) Saving on Internet Bandwidth -  
::This setting contains a list of file extensions, which will be blocked / deleted at the MicroWorld Winsock layer (MWL - gateway level), if found in any email attachment (pop3 account) during scanning by Mail Anti-Virus. MicroWorld has a predefined list of known file extensions mostly propagated by Viruses.
::Additional file extensions to be blocked can be added in this section as per the user’s requirement


::<B><U>Note</U>:</B> We do not recommend deleting the file extensions predefined by MicroWorld.
For example - to view an image that we like, we would click on it and enlarge it as a result eating up internet bandwidth.  


ii) Secure -


::'''More options / Advanced (- - -)'''
The system and data from malwares like spywares, adwares, trojans, etc... - that creep onto the system when surfing and exploit vulnerabilities of the operating system and the applications installed on them.
:::i) Delete all attachments in email if disinfection is not possible ''(default)'' - It would delete those infected attachments in an email, only when the attachment is non-disinfectable.
 
iii) Degradation of the system (performance).
:::ii) Delete entire email if disinfection is not possible ''(default) ''– It would delete the entire email if the attachments in it are non-disinfectable.  
 
 
 
b. Block Applications -
 
Applications on websites will be blocked from being run / executed
 
i) Saving on Internet Bandwidth -
 
For example - to view an image that we like, we would click on it and enlarge it as a result eating up internet bandwidth.
 
ii) Secure -
 
The system and data from malwares like spywares, adwares, trojans, etc... that creep onto the system when surfing and exploit vulnerabilities of the operating system and the applications installed on them.
 
iii) Degradation of the system (performance).
 
 
 
c. Block eMails (RFC 822) -
 
Messages of RFC 822 would be blocked by default.
 
d. Block Audio files -
 
Audio files on websites will be blocked from being run / executed.
 
i) Saving on Internet Bandwidth -
 
for example - listening to a audio available on the website, we would click on it and start listening as a result eating up internet bandwidth.
 
ii) Secure -
 
The system and data from malwares like spywares, adwares, trojans, etc... that creep onto the system when surfing and exploit vulnerabilities of the operating system and the applications installed on them.
 
iii) Degradation of the system (performance).
 
 
 
e. Block Video files -  
 
Video files on websites will be blocked from being run / executed.
 
i) Saving on Internet Bandwidth -  
 
For example - to view and listen to a video available on the website, we would click on it and start viewing and listening as a result eating up internet bandwidth.
 
ii) Secure -
 
The system and data from malwares like spywares, adwares, trojans, etc... that creep onto the system when surfing and exploit vulnerabilities of the operating system and the applications installed on them.
 
iii) Degradation of the system (performance).
 
 
 
 
'''ActiveX Blocking -'''  
 
ActiveX is a technology developed by Microsoft. With an ActiveX-enabled browser, ActiveX controls can be downloaded as part of a Web document to add functionality to the browser (similar to Java applets).
 
a. Java Applets -
 
Java is a programming language from Sun Microsystems and in which an applet is written, it can be included in an HTML page, much in the same way an image is included in a page. When you use a Java technology-enabled browser to view a page that contains an applet, the applet's code is transferred to your system and executed by the browser.
For example - to enhance interactive control, primarily in Web browsers and other network-oriented interactive software applications.
 
b. Scripts (Java and VB) -
 
Is a list of commands that can be executed without user interaction, to automate certain application tasks or to work in a particular computing environment/scenario. So, when any script be it Java or VB (Visual Basic) is found to contain any malicious code, it is blocked.
 
This option is very useful in blocking programs that trigger or execute themselves when a website is being viewed.
 
c. Check for virus -
 
This is the default action set. This option scans and blocks all activities carried out while browsing (reading of data on the website, downloading the files, etc...) if found to contain any malicious code.
 
 
 
'''Port Setting -'''
 
Internet Access (HTTP Port) - 80,8080,3128,6588,4480,88.
 
These are the different ports defined within the software that are monitored for any data transfer that happens through them and if it contains any malicious data, it is blocked. You can add or delete the ports as per your requirements.
 
 
 
 
'''Rating Systems -'''
 
This option is not enabled by default. When enabled, this option allows each user or the administrator to set for each user, of how he/ she should access content on the web. These suggestions (advice) are laid down by World Renowned Organisations that cater to Content Filtering on the Internet, viz. RSACi, ICRA, SafeSurf.
 
a. RSACi -
 
Based on the study and work of Dr.Donal F. Roberts of Stanford University on the effects of media on children for nearly 20 years certain guidelines were laid, based on which "Recreational Software Advisory Council" (RSAC) was formed. Is a rating service of websites for content on the Internet.
 
b. ICRA - "Internet Content Rating Association" (ICRA) -
 
came into existence to protect children from harmful content on the internet. Is a global, cross-cultural filtering and rating service of websites for content on the Internet.
 
c. SAFESURF -
 
Designed with inputs from millions of users (parents) and Net Citizens to empower each family to make informed decisions concerning accessibility of content on the Internet.
 
 
6. Actions -
 
All of the above criteria are checked when enabled and if any violation is found appropriate action is taken.
 
a. Log Violations -
 
All violations are logged for easy administration and for future reference.
 
b. Shutdown program in 30 seconds -
 
If any of the rules/policies that are defined are found to be violated, then the software has a in-built functionality to automatically shutdown the program (browser) in 30 seconds.
 
 
 
iii) Time Restriction -
 
This option is set as per requirement. This option helps to customize the access to the web based on time or as per the day of the week or daily, for example - access to the web should be allowed everyday only during lunch hours and blocked otherwise.  
 
 
 
* Block Web Access:-
 
The “Block Web Access” option can be found between the “Start” and “Settings” options and enables you to block the web access completely (no internet access at all).
 
When enabled, it blocks access to the web completely. If the need arises, access to the web can be given on a conditional basis, for example - access to the web can be given only to certain websites like www.hotmail.com, yahoo.*, gmail.com, etc... and not others.
 
This conditional access is applied through the "Websites_Allowed Category”, for which the site names can be customized to the list as per requirements.
 
 
 
 
 
 
'''b. Popup Filtering:-'''
 
This option enables in blocking popup’s on Websites -
 
i) Notification -
 
This section helps in notifying the user when a popup is blocked on Websites with other options as explained below -
 
It has different options like "Block Popup", "Beep via PC Speaker", "Play Sound", "White List" and "History Logs".
 
1) Block Popup -
 
This option is not enabled by default. This option is very useful in many ways
 
i) Saving on Internet Bandwidth - for example - for a popup to appear on the desktop screen, it would utilize the internet bandwidth, thus eating up the internet bandwidth.
 
ii) Secure the system and data from malwares like spywares, adwares, trojans, etc... that creep onto the system when popups are viewed /opened, exploiting the vulnerabilities of the operating system and the applications installed on them.
 
iii) Degradation of the system (performance).
 
 
2) Beep via PC Speaker -
 
This option is not enabled by default. This option would beep (makes a sound)when a popup is encountered and filtered/blocked.
 
 
3) Play Sound -
 
This option is not enabled by default. This option will play a sound when a popup is encountered and filtered/blocked.
 
4) White List -
 
This is a white list that holds the website addresses where the popup's appear (are not filtered /blocked).
 
 
 
There are different options within:-
 
1. Add -
 
This option enables the user or administrator to add a website to the White List so that the next time when this website is accessed, popup's appear, are visible.
 
2. Delete -
 
This option enables the user or administrator to delete a website from the White List so that the next time when the same website is accessed, it gets filtered /blocked.  


:::iii) Delete entire email if any virus is found – It would delete any email infected with virus.
3. Remove All -
:::iv) Quarantine blocked attachments – It would quarantine the attachments that are listed in the Block Attachment types.  


:::v) Delete entire email if any blocked attachment is found ''(default)'' – It would delete the email which has an attachment listed in the Block Attachment types.
This option enables the user or administrator to remove all listed websites from the White List so that when any of these websites are being accessed and a popup tries to appear, they are filtered /blocked.  
:::vi) Quarantine email if attachments are not scanned – It would quarantine the email in case if the attachment(s) in it is not scanned.  


:::vii) Quarantine attachments if they are not scanned - It would quarantine the attachment in case if it is not scanned.
4. Browse -  


:::viii) Exclude attachments (White list) – Here the users can add the filename or the extensions of those files that should not be blocked and should be delivered to the user’s inbox. For e.g. If *.pif is listed in Block Attachments types and a file by the name e.g. abcd.pif is required to be allowed, then add abcd.pif can be added in the Exclude Attachments (White list) section. Adding *.pif files in this section will allow all *.pif to be delivered. We recommend adding the entire file name like abcd.pif.
This option enables the user to browse any of the listed websites in the White List.  


:::<B><U>'''Note</U>:'''</B> The Exclude attachment list (White List) holds precedence over the Block Attachments types.


:'''b) Action – '''
iii) History Logs:  
::Here the action can be configured to be taken on an infected email.
::* Disinfect – The infected email will be disinfected.
::* Delete – The infected email will be deleted.
::*Quarantine Infected Files - The infected email will be quarantined and the quarantined folder path can be set. The default path is C:\PROGRA~1\eScan\Quarant and this can be set to a different folder as per users requirement by clicking on the select path button <B>(---)</B>.


All activity related to popup's (allowed /blocked) is logged for future reference.


:'''c) Mail Server settings – '''
1. Log Violations -
::This setting is required to be configured for eScan to send an email notification to the user informing about the action taken on an email. This is useful for setting up an outbreak alert /notification /warning messages to the recipient, that are sent by eScan when it detects any violation or breach of security.  


::* SMTP Mail Server settings – Enter the SMTP IP address of the mailserver of your company or you ISP.
All violations that occured are logged for future reference like for which user the popup was blocked along with date & time, website(url) address, reason for blocking and offensive word.  
::* SMTP Port – Enter the SMTP Port of the mailserver of your company or your ISP. By default port is 25. (You can confirm the same with your mailserver administrator or ISP).
::* User Authentication (optional) – Enter the user name if your mailserver requires Authentication for sending email.
::* Authentication Password (optional) - Enter the password if your mailserver requires Authentication for sending email.


2. Add to White List -


:'''d) Port settings for eMail/Web Scan – '''
This is a option that enables the user or administrator to add the violated (blocked) popup website to the White (allowed)list.  
::Here the ports used for incoming and outgoing of email are defined, in-order for the Mail Anti-Virus to scan the emails received / sent on the respective ports.
:::* Outgoing Mail (SMTP) – By default the SMTP port is 25 (check with your mailserver administrator or your ISP).
:::* Incoming Mail (POP3) – By default the POP3 port is 110 (check with your mailserver administrator or your ISP).
:::* Scan Outgoing Mails – When this option is selected, Mail Anti-Virus will also scan outgoing emails.


3 Clear Log -


'''II. Compression / Decompression options:-'''
This option will clear the log file completely (empty).  
::Options in this section help in Internet Bandwidth Management:


:::# Compress outbound attachments – This option when enabled will reduce the size of all outgoing attachments in an email by compressing them in zipped/compressed format. To enable this option, ensure that the Scan Outgoing Mails in the Port Settings for email/Web Scan of the Scan options is checked.
4. Browse -
:::# Create self extracing zip files – This option when enabled creates a self extractable zip file of the attachment, which when clicked on automatically uncompresses itself thereby eliminating the need at the receiver’s end from using any unzipping tool.  This option needs incase the receiving user does not have any tool to uncompress/unzip the attachment.
:::# Uncompress inbound attachments – This option when enabled will automatically open/unpack the compressed file and be scanned and delivered to the user.
:::# Uncompress inbound attachments (Local Domain) – This option when enabled will automatically open/unpack the compressed file and be scanned when sent within the local domain.
:::# Do not compress files with extensions (Exclude following attachments) – This option is helpful in excluding the file types {attachments} that need not be compressed when being sent out.
:::# Compression options –
::::* Compress only if compression % greater than –The default value set is 25%. This will compress all attachments in emails to 25 % or more.
::::* Compress if attachment size is above (KB) –The default value set is 50. This  will compress all attachments that are and above 50 KB in size and not below.
::::* Select the compression ratio – The default value set is to "Max. Speed". This option will utilize the system resources to the best and compress the attachments in emails and send it at much quicker rate. "Max. Compression" mode will try to compress the attachments to the maximum.


This option enables the user to browse the listed websites.


'''III. Vulnerabilities I –'''
5. Refresh Log -
::Internet Explorer (IE) has vulnerabilities and using them as the base, malwares easily transmit themselves on to systems and email clients like Outlook and Outlook Express thus making it easier for malware authors to get their malicious code propagating.
::To overcome this, MicroWorld with it’s proactive security range of solutions is committed to securing your data and system from such vulnerabilities.  


:::# Delete attachments with CLSID extensions - this option is enabled by default. It deletes Class ID file extensions [CLSID - files that are hidden and do not show the actual file extension] to prevent dangerous files from exploiting the vulnerabilities of IE.
This option refreshes the logs and displays the latest status.  
:::# Delete HTML attachments with Scripts - In general, eMails are sent and received in different formats and one of them being HTML, this HTML can have Scripts (similar to a batch file - .bat) with Tags to perform a particular or a set of task/s (embedded). Such emails when encountered are deleted to prevent exploiting the vulnerabilities.
:::# Script and Content check disabled for mails From - this option is useful when you know and want to add a user who is genuine and sends legitimate html email with scripts. Once added, (for example - abc@xyz.net or *@xyz.net) all emails coming from this user or domain would automatically be delivered to the receiver’s inbox/mailbox.
:::# Script and Content check disabled for mails To - this option is useful when you know and want to add a user who is genuine and sends legitimate html email with scripts. Once added, (for example - suzanne@xyz.net or *@xyz.net) all emails being sent from this user or domain would automatically be delivered to the receiver’s inbox/mailbox.  




'''IV. Vulnerabilities II –'''
::1. Select action on mails with Multiple Extension Attachment – Action on attachments with multiple actions will be taken as below:
::::* No Action
::::* Delete Mail
::::* Forward to Admin
::2. Allow Multiple Extension attachment for ZIP file – Compressed files / attachmend for eg.Zipped files with multiple files in it will be allowed to be delivered.
::3. Allow Multiple Extension Attachment for file types- In this section,file extensions can be added for allowing such attachments to be delivered to the users inbox.


At the bottom end of the same page, there are other options available like -


'''V. Archiving –'''
1. Hot Key -  
::# Archive emails - This option is useful to archive or backup all emails that are sent and received via eScan. The folder or the path to this destination is customizable as per one’s requirements.The default path for mail archiving is <U>'''%UserProfile%\Application Data\MicroWorld\eScan\Archive'''</U>
::# Archive attachments - This option is useful to archive or backup all email attachments that are sent and received via eScan. The folder or the path to this destination is customizable as per one’s requirements. The default path for the attachments archiving is <U>'''%UserProfile%\Application Data\MicroWorld\eScan\Archive\Attachments'''</U>
::# Do not archive attachments of type - With this option certain file types can be excluded from being archived, for example - *.vcf, *.htm, *.html, etc...


Allows you to assign a key that when kept pressed temporarily allows popup's on the website being accessed.


2. Test Popup -


=='''Reports section'''==
This option opens up a page on our website where you can test the efficacy and userfulnees of this popup filter (there are five different types of popup's displayed).  
:''Statistics''
::* Total Mails Scanned – This will display the total mails scanned by Mail Anti-Virus on real time basis.
::* Total  Infected Objects – This will display the total virus / malwares detected by Mail Anti-Virus on real time basis.


3. Default -


::'''a. View Archived Mails – '''Clicking on View Archived Mails, will display the backed up / archived emails.
This option resets all the settings to the original (all latest changes made will be lost).
::'''b.  View Report – '''Clicking on View Report, will display a summary report of all the infected emails and action taken on the email.






At the bottom end of this Web Anti-Virus (Web Traffic Control) option page in the “Reports” section, there are different options available like “View Web Anti-Virus Log” and “View Popup Log”.


==<I>'''[http://download1.mwti.net/wiki/index.php/Glossary Glossary]'''</I>==
==<I>'''[http://download1.mwti.net/wiki/index.php/EScan_ver.10 Main Feature Index]'''</I>==






'''Reports section -'''


The  below options are available within -


<br/>
a. View Web Anti-Virus Log -


This displays the web scan activity done on the system in detail like the user, date and time, url, reason, word, etc…on which the violation was found.


b. View Popup Log –


This displays the popup scan activity done on the system in detail like the user, date and time, url, reason, word, etc…on which the violation was found.


<!--{| id="mp-bottombanner" style="width:100%; background:#fcfcfc; margin-top:1em; border:0px solid #ccc;"
Along with the above statistical reports, it also displays the total sites scanned and number of sites blocked and last site scanned.
| style="width:56%; color:#000;" |
{|align="center" width="150px" |
|[[Image:product_logo.JPG|centre]]
|}
-->

Revision as of 11:30, 30 August 2008

Web Anti-Virus (Web Traffic Control) - Shows the current status of the Web Traffic Control Protection level. The green color right tick mark denotes that the module is “Active” while the red color cross mark displays that the module is “InActive”.

On the Web Anti-Virus (Web Traffic Control) option page in the “Configuration” section, when clicked on the “Settings” option, one can change the Web Anti-Virus (Web Traffic Control) Protection level, whereas clicking on the “Start” and /or “Stop” option (next to Settings) makes the module “Active” and /or “InActive”.

The “Block Web Access” option can be found between the “Start” and “Settings”options and enables you to block the web access completely (no internet access at all).


Configuration section -

When clicked on “Settings” the below options are available, through which the eScan software’s real-time Web Traffic Scanning protection can be customized -

a. Webpage Filtering:-

This option helps in controlling and blocking access to the Web as listed below -

i) Filtering options -

This section has pre-defined categories that help to control and block access to the Web -

1. Pornography -

This helps to control and block access to the web based on pornographic content. On selection of this category, it displays the words/phrases defined along with the site names that when found to be accessed would result in Blocking of Access or "Access Denied" to the site desired. The words and phrases and /or sites defined can be added or deleted based on requirements.

2. Gambling –

This helps to control and block access to the web based on gambling content. On selection of this category, it displays the words/phrases defined and when found to be accessed would result in Blocking of Access or "Access Denied" to the site desired.

The words and phrases defined can be added or deleted based on requirements.

3. Ratings_block_category –

This helps to control and block access to the web and is kept open for any words/phrases and site names to be added to the words /phrases and to the site name list.

4. Websites Allowed –

This category contains list of sites that are allowed to be accessed and not blocked. The site names listed within can be customized as per requirements.

  • All the above four (1-4) categories listed are pre-defined.


5. Chat –

This helps to control and block access to the web based on chat. On selection of this category, it displays the words/phrases defined that when found to be accessed would result in Blocking of Access or "Access Denied" to the site desired.

The words and phrases defined can be added or deleted based on requirements.

6. Alcohol –

This helps to control and block access to the web based on alcohol. On selection of this category, it displays the words/phrases defined that when found to be accessed would result in Blocking of Access or "Access Denied" to the site desired.

The words and phrases defined can be added or deleted based on requirements.

7. Violence –

This helps to control and block access to the web based on violence. On selection of this category, it displays the words/phrases defined that when found to be accessed would result in Blocking of Access or "Access Denied" to the site desired.

The words and phrases defined can be added or deleted based on requirements.

8. Drugs –

This helps to control and block access to the web based on drugs. On selection of this category, it displays the words/phrases defined that when found to be accessed would result in Blocking of Access or "Access Denied" to the site desired.

The words and phrases defined can be added or deleted based on requirements.

• All the above four (5-8) categories listed are customized.

• The sites that are denied access to would automatically be added to the Block category to be filtered.


ii) Scanning options –

When clicked on, it has many sub- features and functionalities that help to control and block access to the web.

There are different options available like "Content Matching Options", "Content Type", "ActiveX Blocking", "Port Setting", "Rating Systems" and "Actions"

1. Content Matching Options -

this option is helpful in controlling and blocking access to the web based on matching content and which works on different criterias:-

a. Search in Site Name -

The site name or url typed would be checked if it is listed in the restricted or blocked categories.

b. Search in HTML Tags -

The HTML tags would be checked if they contains any restricted or blocked words/phrases or site names.

c. Search in Title -

The title would be checked if it contains any restricted or blcoked words/phrases or site names.

d. Search in Page Text -

The web page text would be checked if it contains any restricted or blocked words/phrases.

e. Search in Description and Keywords -

The restricted or blocked words/phrases would be checked in the website's description and keywords.

f. Reserved Word Threshold Level -

This is a threshold level/limit set within the software that keeps a count of how many times a restricted or blocked word/s appears, if the set word/s have appeared as per the default value or more the access to the web is blocked or restricted and vice versa.




Content Type -

This option is helpful in controlling and blocking access to the web based on the type of content and which works on different criterias:-

a. Block Images -

Images on websites will be blocked from being viewed

i) Saving on Internet Bandwidth -

For example - to view an image that we like, we would click on it and enlarge it as a result eating up internet bandwidth.

ii) Secure -

The system and data from malwares like spywares, adwares, trojans, etc... - that creep onto the system when surfing and exploit vulnerabilities of the operating system and the applications installed on them.

iii) Degradation of the system (performance).


b. Block Applications -

Applications on websites will be blocked from being run / executed

i) Saving on Internet Bandwidth -

For example - to view an image that we like, we would click on it and enlarge it as a result eating up internet bandwidth.

ii) Secure -

The system and data from malwares like spywares, adwares, trojans, etc... that creep onto the system when surfing and exploit vulnerabilities of the operating system and the applications installed on them.

iii) Degradation of the system (performance).


c. Block eMails (RFC 822) -

Messages of RFC 822 would be blocked by default.

d. Block Audio files -

Audio files on websites will be blocked from being run / executed.

i) Saving on Internet Bandwidth -

for example - listening to a audio available on the website, we would click on it and start listening as a result eating up internet bandwidth.

ii) Secure -

The system and data from malwares like spywares, adwares, trojans, etc... that creep onto the system when surfing and exploit vulnerabilities of the operating system and the applications installed on them.

iii) Degradation of the system (performance).


e. Block Video files -

Video files on websites will be blocked from being run / executed.

i) Saving on Internet Bandwidth -

For example - to view and listen to a video available on the website, we would click on it and start viewing and listening as a result eating up internet bandwidth.

ii) Secure -

The system and data from malwares like spywares, adwares, trojans, etc... that creep onto the system when surfing and exploit vulnerabilities of the operating system and the applications installed on them.

iii) Degradation of the system (performance).



ActiveX Blocking -

ActiveX is a technology developed by Microsoft. With an ActiveX-enabled browser, ActiveX controls can be downloaded as part of a Web document to add functionality to the browser (similar to Java applets).

a. Java Applets -

Java is a programming language from Sun Microsystems and in which an applet is written, it can be included in an HTML page, much in the same way an image is included in a page. When you use a Java technology-enabled browser to view a page that contains an applet, the applet's code is transferred to your system and executed by the browser. For example - to enhance interactive control, primarily in Web browsers and other network-oriented interactive software applications.

b. Scripts (Java and VB) -

Is a list of commands that can be executed without user interaction, to automate certain application tasks or to work in a particular computing environment/scenario. So, when any script be it Java or VB (Visual Basic) is found to contain any malicious code, it is blocked.

This option is very useful in blocking programs that trigger or execute themselves when a website is being viewed.

c. Check for virus -

This is the default action set. This option scans and blocks all activities carried out while browsing (reading of data on the website, downloading the files, etc...) if found to contain any malicious code.


Port Setting -

Internet Access (HTTP Port) - 80,8080,3128,6588,4480,88.

These are the different ports defined within the software that are monitored for any data transfer that happens through them and if it contains any malicious data, it is blocked. You can add or delete the ports as per your requirements.



Rating Systems -

This option is not enabled by default. When enabled, this option allows each user or the administrator to set for each user, of how he/ she should access content on the web. These suggestions (advice) are laid down by World Renowned Organisations that cater to Content Filtering on the Internet, viz. RSACi, ICRA, SafeSurf.

a. RSACi -

Based on the study and work of Dr.Donal F. Roberts of Stanford University on the effects of media on children for nearly 20 years certain guidelines were laid, based on which "Recreational Software Advisory Council" (RSAC) was formed. Is a rating service of websites for content on the Internet.

b. ICRA - "Internet Content Rating Association" (ICRA) -

came into existence to protect children from harmful content on the internet. Is a global, cross-cultural filtering and rating service of websites for content on the Internet.

c. SAFESURF -

Designed with inputs from millions of users (parents) and Net Citizens to empower each family to make informed decisions concerning accessibility of content on the Internet.


6. Actions -

All of the above criteria are checked when enabled and if any violation is found appropriate action is taken.

a. Log Violations -

All violations are logged for easy administration and for future reference.

b. Shutdown program in 30 seconds -

If any of the rules/policies that are defined are found to be violated, then the software has a in-built functionality to automatically shutdown the program (browser) in 30 seconds.


iii) Time Restriction -

This option is set as per requirement. This option helps to customize the access to the web based on time or as per the day of the week or daily, for example - access to the web should be allowed everyday only during lunch hours and blocked otherwise.


  • Block Web Access:-

The “Block Web Access” option can be found between the “Start” and “Settings” options and enables you to block the web access completely (no internet access at all).

When enabled, it blocks access to the web completely. If the need arises, access to the web can be given on a conditional basis, for example - access to the web can be given only to certain websites like www.hotmail.com, yahoo.*, gmail.com, etc... and not others.

This conditional access is applied through the "Websites_Allowed Category”, for which the site names can be customized to the list as per requirements.




b. Popup Filtering:-

This option enables in blocking popup’s on Websites -

i) Notification -

This section helps in notifying the user when a popup is blocked on Websites with other options as explained below -

It has different options like "Block Popup", "Beep via PC Speaker", "Play Sound", "White List" and "History Logs".

1) Block Popup -

This option is not enabled by default. This option is very useful in many ways

i) Saving on Internet Bandwidth - for example - for a popup to appear on the desktop screen, it would utilize the internet bandwidth, thus eating up the internet bandwidth.

ii) Secure the system and data from malwares like spywares, adwares, trojans, etc... that creep onto the system when popups are viewed /opened, exploiting the vulnerabilities of the operating system and the applications installed on them.

iii) Degradation of the system (performance).


2) Beep via PC Speaker -

This option is not enabled by default. This option would beep (makes a sound)when a popup is encountered and filtered/blocked.


3) Play Sound -

This option is not enabled by default. This option will play a sound when a popup is encountered and filtered/blocked.

4) White List -

This is a white list that holds the website addresses where the popup's appear (are not filtered /blocked).


There are different options within:-

1. Add -

This option enables the user or administrator to add a website to the White List so that the next time when this website is accessed, popup's appear, are visible.

2. Delete -

This option enables the user or administrator to delete a website from the White List so that the next time when the same website is accessed, it gets filtered /blocked.

3. Remove All -

This option enables the user or administrator to remove all listed websites from the White List so that when any of these websites are being accessed and a popup tries to appear, they are filtered /blocked.

4. Browse -

This option enables the user to browse any of the listed websites in the White List.


iii) History Logs:

All activity related to popup's (allowed /blocked) is logged for future reference.

1. Log Violations -

All violations that occured are logged for future reference like for which user the popup was blocked along with date & time, website(url) address, reason for blocking and offensive word.

2. Add to White List -

This is a option that enables the user or administrator to add the violated (blocked) popup website to the White (allowed)list.

3 Clear Log -

This option will clear the log file completely (empty).

4. Browse -

This option enables the user to browse the listed websites.

5. Refresh Log -

This option refreshes the logs and displays the latest status.


At the bottom end of the same page, there are other options available like -

1. Hot Key -

Allows you to assign a key that when kept pressed temporarily allows popup's on the website being accessed.

2. Test Popup -

This option opens up a page on our website where you can test the efficacy and userfulnees of this popup filter (there are five different types of popup's displayed).

3. Default -

This option resets all the settings to the original (all latest changes made will be lost).


At the bottom end of this Web Anti-Virus (Web Traffic Control) option page in the “Reports” section, there are different options available like “View Web Anti-Virus Log” and “View Popup Log”.



Reports section -

The below options are available within -

a. View Web Anti-Virus Log -

This displays the web scan activity done on the system in detail like the user, date and time, url, reason, word, etc…on which the violation was found.

b. View Popup Log –

This displays the popup scan activity done on the system in detail like the user, date and time, url, reason, word, etc…on which the violation was found.

Along with the above statistical reports, it also displays the total sites scanned and number of sites blocked and last site scanned.