Antivirus Protection; General Configuration Steps - Fortinet FortiGate 50A Installation And Configuration Manual

Fortinet fortigate installation and configuration guide
Hide thumbs Also See for FortiGate 50A:
Table of Contents

Advertisement

FortiGate-50A Installation and Configuration Guide Version 2.50

Antivirus protection

General configuration steps

FortiGate-50A Installation and Configuration Guide
You can enable antivirus protection in firewall policies. You can select a content profile
that controls how the antivirus protection behaves. Content profiles control the type of
traffic protected (HTTP, FTP, IMAP, POP3, SMTP), the type of antivirus protection and
the treatment of fragmented email and oversized files or email.
This chapter describes:
General configuration steps
Antivirus scanning
File blocking
Blocking oversized files and emails
Exempting fragmented email from blocking
Viewing the virus list
Configuring antivirus protection involves the following general steps.
1
Select antivirus protection options in a new or existing content profile. See
content profiles" on page
2
Select the Anti-Virus & Web filter option in firewall policies that allow web (HTTP),
FTP, and email (IMAP, POP3, and SMTP) connections through the FortiGate unit.
Select a content profile that provides the antivirus protection options that you want to
apply to a policy. See
3
Configure antivirus protection settings to control how the FortiGate unit applies
antivirus protection to the web, FTP, and email traffic allowed by policies. See:
"Antivirus scanning" on page
"File blocking" on page
"Blocking oversized files and emails" on page
"Exempting fragmented email from blocking" on page
4
Configure the messages that users receive when the FortiGate unit blocks or deletes
an infected file. See
5
Configure the FortiGate unit to send an alert email when it blocks or deletes an
infected file. See "Configuring alert email" in the Logging and Message Reference
Guide.
Note: For information about receiving virus log messages, see "Configuring logging", and for
information about log message content and format, see "Virus log messages" in the Logging
Configuration and Reference Guide
167.
"Adding content profiles to policies" on page
226,
227,
"Replacement messages" on page
169.
228,
228.
133.
"Adding
225

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents

Save PDF