Quick Reference Guide

Chapter 4. Content Filtering and Optimizing Scans | 84
4
4. Content Filtering and Optimizing Scans
This chapter describes how to apply the content filtering features of the STM and how to
optimize scans to protect your network. This chapter contains the following sections:
About Content Filtering and Scans on this page
Configuring Email Protection on page 87
Configuring Web and Services Protection on page 105
Configuring Application Control on page 127
Setting Scanning Exclusions and Web Access Exceptions on page 130
About Content Filtering and Scans
The STM provides very extensive Web content and email content filtering options, Web
browsing activity reporting, email antivirus and antispam options, and instant alerts via email.
You can establish restricted Web access policies that are based on the time of day, Web
addresses, and Web address keywords. You can also block Internet access by applications
and services, such as instant messaging and peer-to-peer file sharing clients.
Note: For information about how to monitor blocked content and malware
threats in realtime, see Monitoring Real-Time Traffic, Security,
Statistics, and Web Usage on page 184. For information about how
to view blocked content and malware threats in the logs, see
Querying Logs on page 194. For information about how to view
quarantined content, see Viewing and Managing the Quarantine
Files on page 208.