Cisco Cisco Web Security Appliance S690 User Guide

Page of 582
330
I R O N P O R T   A S Y N C O S   6 . 3   F O R   W E B   U S E R   G U I D E  
Figure 15-1 Access Policy Anti-Malware Settings
8. Configure the anti-malware settings for the policy as necessary. Table 15-4 describes the 
anti-malware settings you can configure for Access Policies. 
Table 15-4 Anti-Malware Settings for Access Policies
Setting
Description
Enable Suspect User Agent 
Scanning
Choose whether or not to enable the appliance to scan traffic 
based on the user agent field specified in the HTTP request 
header.
When you check this setting, you can choose to monitor or block 
suspect user agents in the Additional Scanning section at the 
bottom of the page. 
Enable Webroot
Choose whether or not to enable the appliance to use the 
Webroot scanning engine when scanning traffic. When you 
enable Webroot scanning, you can choose to monitor or block 
some additional categories in the Malware categories on this 
page.