Specifications
Contents
v
Security Risk Notifications for Administrators ................................... 5-45
Security Risk Notifications for Client Users ........................................ 5-46
Security Risk Logs ......................................................................................... 5-48
Virus/Malware Logs ................................................................................ 5-48
Spyware/Grayware Logs ........................................................................ 5-54
Spyware/Grayware Restore Logs .......................................................... 5-56
Outbreak Protection ..................................................................................... 5-57
Outbreak Criteria and Notifications ..................................................... 5-57
Outbreak Prevention ............................................................................... 5-60
Outbreak Prevention Policies ................................................................ 5-61
Limit/Deny Access to Shared Folders ............................................ 5-61
Block Ports ........................................................................................... 5-62
Deny Write Access to Files and Folders ......................................... 5-63
Disabling Outbreak Prevention ............................................................. 5-64
Device Control .............................................................................................. 5-65
Device Control Logs ............................................................................... 5-67
Chapter 6: Protecting Computers from Web-based Threats
About Web Threats ........................................................................................ 6-2
Web Reputation .............................................................................................. 6-2
Location Awareness ....................................................................................... 6-3
Web Reputation Policies ................................................................................ 6-3
Approved URLs .............................................................................................. 6-5
Proxy for Web Reputation ............................................................................ 6-5
Web Threat Notifications for Client Users ................................................. 6-6
Web Reputation Logs ..................................................................................... 6-7










