Datasheet
INTC-7816-01 02/2008 Page 13 of 18
2.3.6 Antivirus
The terms and conditions set forth in this section entitled “Antivirus” will apply only to Customers who
have contracted for the MSS for UTM Content package.
Antivirus support is designed to minimize the risk of malicious code within the network data stream.
Antivirus gateways can be configured to scan Web, e-mail, and file-transfer traffic, and are designed to
block the transmission of files which contain any of a number of designated threats. Most antivirus
scanners will also block common forms of spyware, as well as many types of network worms.
Enabling antivirus functionality may require additional licensing for the Agent, which shall be the sole
responsibility of the Customer.
Configuration
In order for antivirus implementations to be effective, the Agent must be placed in a location where user
and inbound traffic passes through the device(s) prior to reaching its intended destination. This allows
the Agent to compare monitored traffic against known virus signatures and/or behavior.
During the initial setup and deployment process, IBM will work with the Customer to create a policy that is
customized to the organization’s specific needs.
3. Customer Responsibilities
While IBM will work with the Customer to deploy and implement the Agent, and IBM will manage the
Agent, the Customer will be required to work with IBM in good faith and assist IBM in certain situations as
requested by IBM.
3.1 Deployment and Initiation
During deployment, the Customer will work with IBM to deploy a new Agent or begin management of an
existing Agent, as applicable.
The Customer will participate in a scheduled kickoff call to introduce team members, set expectations and
begin the assessment process.
The Customer will be required to complete a form to provide detailed information about the network
configuration (including applications and services for the Hosts on the protected network) and must work
with IBM in good faith to accurately assess the Customer’s network and environment. The Customer
must provide contacts within the organization, and specify an escalation path through the organization in
the event that IBM must contact the Customer.
The Customer must ensure that any existing Agent meets IBM specifications, and must work to meet
recommendations concerning the Customer’s network and network access requirements, if changes are
required to ensure workable protection strategies.
If IBM will be taking over management of an existing Agent, IBM may require the Agent software or
Security Content to be upgraded to the most current versions in order to provide the service. Other
required criteria may include the addition or removal of applications and user accounts. Such upgrades,
additions, or removals will be the sole responsibility of the Customer.
While IBM will provide support and guidance, the Customer is responsible for the physical installation and
cabling of all Agents, unless such service is provided as an IBM PSS consulting project. If the Customer
chooses to deploy the client VPN functionality of the Proventia MX, the Customer is responsible for the
actual installation and some testing of the client VPN software, with IBM support. The Customer is
responsible for procuring any client VPN software directly from a vendor, although IBM may make
recommendations and guide the Customer to an appropriate vendor contact.
3.2 Ongoing Management and Support
3.2.1 Policy Management
The Customer acknowledges that IBM is the sole party responsible for and possessing authority to
change the Agent’s policy and/or configuration.
While IBM may assist, the Customer is ultimately responsible for its own network security strategy,
including incident response procedures such as forensics and mitigation of intrusions..
3.2.2 Device Management
If the Customer wishes to enable the HA feature of MSS for UTM, the Customer agrees to purchase a
second Agent and pay for the ongoing management of such Agent.