User Guide

330
IRONPORT ASYNCOS 6.3 FOR WEB USER GUIDE
Figure 15-1 Access Policy Anti-Malware Settings
8. Configure the anti-malware settings for the policy as necessary. Table 15-4 describes the
anti-malware settings you can configure for Access Policies.
Table 15-4 Anti-Malware Settings for Access Policies
Setting Description
Enable Suspect User Agent
Scanning
Choose whether or not to enable the appliance to scan traffic
based on the user agent field specified in the HTTP request
header.
When you check this setting, you can choose to monitor or block
suspect user agents in the Additional Scanning section at the
bottom of the page.
Enable Webroot Choose whether or not to enable the appliance to use the
Webroot scanning engine when scanning traffic. When you
enable Webroot scanning, you can choose to monitor or block
some additional categories in the Malware categories on this
page.