AntiVirus
Antivirus CLI configuration
system global optimize
FortiGate Version 3.0 MR4 Administration Guide
01-30004-0203-20070102
Download
Block download programs. Download components are usually run
at Windows startup and are designed to install or download other
software, especially advertising and dial software.
Game
Block games. Games are usually joke or nuisance games that you
may want to block from network users.
HackerTool
Block hacker tools.
Hijacker
Block browser hijacking programs. Browser hijacking occurs when
a 'spyware' type program changes web browser settings, including
favorites or bookmarks, start pages, and menu options.
Joke
Block joke programs. Joke programs can include custom cursors
and programs that appear to affect the system.
Keylog
Block keylogger programs. Keylogger programs can record every
keystroke made on a keyboard including passwords, chat, and
instant messages.
Misc
Block any programs included in the miscellaneous grayware
category.
NMT
Block network management tools. Network management tools can
be installed and used maliciously to change settings and disrupt
network security.
P2P
Block peer to peer communications programs. P2P, while a
legitimate protocol, is synonymous with file sharing programs that
are used to swap music, movies, and other files, often illegally.
Plugin
Block browser plugins. Browser plugins can often be harmless
Internet browsing tools that are installed and operate directly from
the browser window. Some toolbars and plugins can attempt to
control or record and send browsing preferences.
RAT
Block remote administration tools. Remote administration tools
allow outside users to remotely change and monitor a computer on
a network.
Spy
Block spyware programs. Spyware, like adware, is often included
with freeware. Spyware is a tracking and analysis program that can
report your activities, such as web browsing habits, to the
advertiser's web site where it may be recorded and analyzed.
Toolbar
Block custom toolbars. While some toolbars are harmless,
spyware developers can use these toolbars to monitor web habits
and send information back to the developer.
This section describes the CLI commands that extend features available through
the web-based manager. For complete descriptions and examples of how to
enable additional features through CLI commands, see the
Reference.
The optimize feature configures CPU settings to ensure efficient operation of the
FortiGate unit for either antivirus scanning or straight throughput traffic. When
optimize is set to antivirus, the FortiGate unit uses symmetric multiprocessing to
spread the antivirus tasks to several CPUs, making scanning faster.
This feature is available on models numbered 1000 and higher.
For more information, see the
Knowledge Center article.
Antivirus failopen and optimization
Antivirus CLI configuration
FortiGate CLI
Fortinet
347
Need help?
Do you have a question about the Fortigate-5000 series and is the answer not in the manual?