GFI AVG Anti-Virus Updates for GFI MailSecurity, RNW, 50-99u, DEU AVGREN50-99 Manual De Usuario
Los códigos de productos
AVGREN50-99
Configuring other mail filters
GFI MailSecurity 2011
65
6.3.3 Enable/disable decompression filters
Screenshot 46 -Disabling Decompression tool filters
To enable or disable decompression filters:
1. Navigate to GFI MailSecurity
► Scanning & Filtering ► Decompression.
2. From the Decompression engine page, select the checkbox of the filters to enable or
disable.
disable.
3. Click Enable Selected or Disable Selected accordingly.
6.4 The Trojan & Executable Scanner
6.4.1 Introduction
GFI MailSecurity includes an advanced Trojan and Executable Scanner that analyzes and
determines the function of an executable file. This scanner can subsequently quarantine any
executables that perform suspicious activities (such as Trojans).
determines the function of an executable file. This scanner can subsequently quarantine any
executables that perform suspicious activities (such as Trojans).
What is a Trojan horse?
In computer technology, a Trojan horse is a covert attack vector that compromises a victim‟s
computer while remaining undetected. This enables the attacker access to the data stored
on that computer. Subsequently, the attacker can compromise the data and can cause
downtime and loss of data to the victim. Hackers typically hide Trojans in applications that
appear to perform a legitimate function.
computer while remaining undetected. This enables the attacker access to the data stored
on that computer. Subsequently, the attacker can compromise the data and can cause
downtime and loss of data to the victim. Hackers typically hide Trojans in applications that
appear to perform a legitimate function.
How does the Trojan & Executable Scanner work?
GFI MailSecurity rates the risk-level of an executable file by decompiling the executable, and
detecting in real-time what the executable might do. Subsequently, it compares capabilities
detecting in real-time what the executable might do. Subsequently, it compares capabilities