Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual page 943

Table of Contents

Advertisement

POP3:EXT:DOT-JS
POP3:EXT:DOT-JSE
POP3:EXT:DOT-LNK
POP3:EXT:DOT-MDB
POP3:EXT:DOT-MDE
POP3:EXT:DOT-MSC
POP3:EXT:DOT-MSI
POP3:EXT:DOT-MSP
Copyright © 2010, Juniper Networks, Inc.
This signature detects e-mail attachments that have the
extension .ss and were received via POP3. Because .JSs
(JavaScript File) files contain scripts, this may indicate an
incoming e-mail virus. Attackers may create malicious
scripts, tricking users into executing the file and infecting the
system.
This signature detects e-mail attachments that have the
extension .jse and were received via POP3. Because .JSEs
(JavaScript Encoded) files contain scripts, this may indicate
an incoming e-mail virus. Attackers may create malicious
scripts, tricking users into executing the file and infecting the
system.
This signature detects e-mail attachments that have the
extension .lnk and were received via POP3. Because .LNKs
(Windows link) files can point to any program, this may
indicate an incoming e-mail virus. Attackers may create a
link pointing to a dangerous program, tricking users into
executing the link and affecting the system.
This signature detects e-mail attachments that have the
extension .mdb and were received via POP3. Because .MDBs
(MS Access Application) files can contain scripts, this may
indicate an incoming e-mail virus. Attackers may create
malicious scripts, tricking users into executing the file and
infecting the system.
This signature detects e-mail attachments that have the
extension .mde and were received via POP3. Because .MDEs
(Microsoft Access MDE database) files can contain scripts
and macros, this may indicate an incoming e-mail virus.
Attackers may create malicious scripts, tricking users into
executing the file and infecting the system.
This signature detects e-mail attachments that have the
extension .msc and were received via POP3.
This signature detects e-mail attachments with the
extension .msi received via POP3. This may indicate an
incoming e-mail virus. .MSIs (Microsoft Windows Installer
Package) contain executable code. Attackers may create
malicious executables, tricking the user into executing the
file and infecting the system.
This signature detects e-mail attachments with the
extension .msp received via POP3. This may indicate an
incoming e-mail virus. .MSPs (Microsoft Windows Installer
Patch) contain executable code. Attackers may create
malicious executables, tricking the user into executing the
file and infecting the system.
Appendix E: Log Entries
high
sos5.1.0
high
sos5.1.0
medium
sos5.1.0
high
sos5.1.0
high
sos5.1.0
high
sos5.1.0
high
sos5.1.0
medium
sos5.1.0
893

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents