Cisco Cisco Web Security Appliance S690 User Guide
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
330
I R O N P O R T A S Y N C O S 6 . 3 F O R W E B U S E R G U I D E
Figure 15-1 Access Policy Anti-Malware Settings
8. Configure the anti-malware settings for the policy as necessary. Table 15-4 describes the
anti-malware settings you can configure for Access Policies.
Table 15-4 Anti-Malware Settings for Access Policies
Setting
Description
Enable Suspect User Agent
Scanning
Scanning
Choose whether or not to enable the appliance to scan traffic
based on the user agent field specified in the HTTP request
header.
When you check this setting, you can choose to monitor or block
suspect user agents in the Additional Scanning section at the
bottom of the page.
based on the user agent field specified in the HTTP request
header.
When you check this setting, you can choose to monitor or block
suspect user agents in the Additional Scanning section at the
bottom of the page.
Enable Webroot
Choose whether or not to enable the appliance to use the
Webroot scanning engine when scanning traffic. When you
enable Webroot scanning, you can choose to monitor or block
some additional categories in the Malware categories on this
page.
Webroot scanning engine when scanning traffic. When you
enable Webroot scanning, you can choose to monitor or block
some additional categories in the Malware categories on this
page.