Book Image

Untangle Network Security

By : Abd El Monem A Mohamed El Bawab
Book Image

Untangle Network Security

By: Abd El Monem A Mohamed El Bawab

Overview of this book

Table of Contents (21 chapters)
Untangle Network Security
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Protect your network from viruses


Thanks to its position at the network edge, Untangle Virus Blocker scans the incoming HTTP, FTP, and SMTP traffic to protect your network against viruses, worms, and Trojan horses before they reach the end users' PCs. Untangle offers two versions of Virus Blocker: a paid version based on the Commtouch engine and a free version based on Clam AV.

This section will cover how antivirus programs work, the technical details of the Untangle Virus Blocker, how to configure the Virus Blocker, how to review the Scan history, and finally, the common issues with Virus Blocker.

How the antivirus programs work

Antivirus programs have many methods to detect viruses; the most common method is signature-based detection, which is used by Untangle NGFW Virus Blocker.

Each virus has its unique signature (that is, programming code), the antivirus programs maintain a database of these signatures. The antivirus programs scan each file against this database and if any match is found...