GFI AVG Anti-Virus Updates for GFI MailSecurity, RNW, 50-99u, DEU AVGREN50-99 Manuale Utente
Codici prodotto
AVGREN50-99
Configuring other mail filters
GFI MailSecurity 2011
69
11. In Download/check after the specified number of hours text box, specify how often
you want GFI MailSecurity to check for updates, by typing an hourly interval.
you want GFI MailSecurity to check for updates, by typing an hourly interval.
12. In the Update options area, select Enable email notifications upon successful
updates to send an email notification to the administrator whenever Trojan & Executable
Scanner is updated successfully.
updates to send an email notification to the administrator whenever Trojan & Executable
Scanner is updated successfully.
NOTE: An email notification is always sent when an update fails.
13. To check for and download updates immediately, click Download updates.
14. Click Apply.
6.5 The Email Exploit Engine
6.5.1 Introduction
What is an exploit?
An exploit uses known vulnerabilities in applications or operating systems to compromise the
security of a system. It "exploits" a feature of a program or the operating system for its own
use. For example, execute a program or command, or install a backdoor.
security of a system. It "exploits" a feature of a program or the operating system for its own
use. For example, execute a program or command, or install a backdoor.
What is an e-mail exploit?
An email exploit is an exploit launched via email. An email exploit is essentially an exploit
that can be embe
that can be embe
dded in an email, and executed on the recipient‟s machine either when the
user receives or opens the email.
Difference between Anti-Virus software & Email Exploit Detection
software
software
Anti-virus software is designed to detect malicious code. It does not necessarily analyze the
method used to execute the code, whereas the Email Exploit Detection Engine scans for
methods that
method used to execute the code, whereas the Email Exploit Detection Engine scans for
methods that
execute a program or command on the user‟s system.
The Email Exploit Engine does not check whether the program is malicious or not. Rather, it
assumes a security risk if an email is using an exploit in order to run a program or command,
whether or not the actual program or command is malicious.
assumes a security risk if an email is using an exploit in order to run a program or command,
whether or not the actual program or command is malicious.
6.5.2 Configuring the Email Exploit Engine
To configure the Email Exploit Engine properties:
1. Navigate to GFI MailSecurity
► Scanning & Filtering ► Email Exploit Engine.