Etrust antivirus network appliance filer scanner
Unfortunately, it's not possible to configure individual users or servers to use both virus engines at the same time or on the same machine. For some servers, such as e-mail or file servers, the ability to run both engines would be a plus.
Perhaps CA will add that to a future release. As it is, the company suggests configuring some users to use one engine and other users, the other engine. That way, if a virus manages to evade one engine, then there is a chance that the other engine will catch it as it propagates through the network. Our recommended scheme is to use one for servers and the other for clients, to catch messages being passed back and forth. To be clear, we don't consider the dual engines a good enough reason to deploy eTrust.
If we were paranoid enough to install multiple virus engines, we'd still want them to be provided by different vendors. After all, we don't know how much eTrust code, algorithms, and signatures may be common to both engines — and thus share the same potential weaknesses.
What sways us to recommend Version 7. You can administer individual users remotely from the management station or set policies and enforce them across the network.
The software also quickly and accurately finds machines on the LAN that are running the eTrust Antivirus software. It can also be configured with redundant antivirus policy and signature servers, adding a bit of robustness to the solution.
Based on the results of discovery scans, administrators can assign each machine to a threat group, each with its own policies for signature updates, assigned virus engine, and predetermined course of action when a virus is detected such as automated deletion or file quarantine.
For our test, we configured Windows and Linux servers to be in one threat group and Macintosh and Windows workstations to be in another. On a production network, we would assign mobile users and telecommuters to their own group and assign them more rigorous policies due to their greater likelihood of contamination. The only truly innovative feature in eTrust Antivirus 7.
When connected to the LAN, a laptop can be set to download new signature files from a LAN server; but when connecting remotely, it can be told to use another signature and policy server, perhaps at the enterprise's DMZ.
Antivirus applications will never pick up percent of the viruses, worms, and Trojans that are out there, but administrators can make a big impact by being aware of how and why these malicious programs exist and then taking steps to stem the flow by putting in practical procedures to cope with these nasties.
Or at the very least stripping the attachment from the e-mail and letting the body go through always considering the occasional false positive. The installation is straightforward with two or three basic configuration questions to answer before the package is loaded. The server application can be installed separately from the management console which can be installed on another machine. The right-hand window of the management console has shortcuts to wizards that allow the system administrator to complete the custom configuration of their new application, including adding licences, and information on adding third-party antivirus scanners.
Depending on what level of antivirus security you need, the package can scale without having to buy separate new applications. Administration is via the same management console as the configuation. There is a very comprehensive reporting toolset provided under the main MailSweeper menu as well as excellent support for setting up policies and administrative alerts.
Overall a very neat and simple package with all the necessary custom configuration and administration tools well placed within the one interface. This program is separated into three basic modules: the first is the policy manager which allows the administrator to connect to the various gateways that have been defined and licenced within the organisation, configure and set up the policies, and then publish out to the intended gateway.
The second module is the command centre that allows the administrator to view a snapshot of any or all of the following: Object Information List, Gateway s status, and the System Administration Activities. The third module is the audit viewer which allows the administrator to monitor what is going through the gateway that it is connected to and also filter that traffic report. Overall it is a very scalable solution firmly aimed at larger organisations that have several e-mail gateways needing to be scanned.
This application also fits into the larger Computer Associates eTrust product portfolio by allowing the company to operate in a similar environment for desktop, server, PDA, and groupware antivirus solutions as well as content management filters for gateways, thereby deploying a single vendor antivirus and content filter solution across the whole network.
F-Secure is a total enterprise-wide antivirus application suite. The configuration and monitoring is relatively straightforward for such a comprehensive package, and certainly nothing a relatively experienced administrator could not follow, particularly with the excellent support documentation. The menus are well laid out and the format is very logical making it a breeze to navigate to the desired point of tweaking.
The Download icon launches the F-Secure Infocentre that shows the operator the current status of updates to the definitions and any important monitor information in a graphical or text-based menu system which is also very easy to navigate.
Overall it is an amazingly configurable and customisable application that does not come with all the baggage usually associated with such applications. It is also very easy to install and look after and is certainly one to add to a shortlist, along with Computer Associates and Trend Micro if looking for a one-vendor company-wide antivirus solution across several platforms and operating systems.
After a straightforward installation, the remaining configuration and administration tasks are carried out in the GFI content security configuration window. This is a very comprehensive set of tools set out in a very logical manner allowing the administrator direct access to all the features in the package. Each can be set a priority in order of scanning the data moving through the system. Similar to the other systems with either multiple AV engines or automatic definition downloads, the GFI application allows the automatic download scheduling to be configured down to once every hour.
Also for the administrator is a simple GFI content security monitor which is a separate application that gives the operator the ability to monitor the log files and show the number of items processed, number of quarantined items, and number of blocked viruses.
Below this is the text from the log file, showing date, time, and details of the logged event. The GFI solution with the option for multiple scan engines and their associated definitions is excellent. Certainly an application worthy of short listing for evaluation. The Netbox is a hardware network appliance, not strictly a software application, however the software running on the Netbox is really the feature of the unit. The Netbox operates not only as a standalone mail server with the antivirus scanning as an option , it can also function as a router, firewall, network traffic shaper, name server, and a myriad of other devices.
It is one of the more complete and fully featured appliances a company of up to staff could want. Since the demise of Cobalt and its RAQ series of network appliance servers once consumed by Sun, we are interested to see a decent new appliance vendor on the block, and homegrown too. Following a similar concept to several of the other packages here, the NetBox combines several third-party AV vendors' products into a single machine.
Each package is set to check for new definitions every six hours, however Netbox has a very nifty way of updating its registered NetBoxes in the field with new AV definitions within a few minutes of them being released. Netbox HQ monitors the AV vendors for new releases every three minutes or so and as soon as a new update is released, NetBox downloads the update and pushes it out to all the registered NetBoxes.
That way customers can still host and manage their own mail server in-house on their NetBox without having to go to the expense of having static IP addresses on their ISP connections. Administration is handled via a well-defined, clear and logical Web browser interface. There is a plethora of extra configuration tools and administration options available to the operator, including the ability to manually set name, type, and text blocking rules so even before the scanners come into play most nasties can be fended off.
We were extremely impressed by the NetBox, which is fully designed and assembled in Australia. The design engineers are all Australians and the product is really first class and is set at an affordable price. While not for the truly enormous enterprise, up to users would definitely get a lot of mileage by putting in a machine like this, particularly if IT staff resources are at a premium, this box would take a lot of the weekly burdens away from the IT administrator.
You can also install the Marshal integrated McAfee antivirus. Once the automatic configuration has been completed the administrator can then control the application through the management console. One of the impressive features of this application is its support for antivirus engines -- no fewer than 12 bvendors are supported as well as an option for a -custom" scanner. This is a well-designed application with very good features and it is also very easy to install, configure, and administer.
By default, it is enabled to ensure that earlier operating systems can connect to the NetApp Filer. Also, this parameter change requires that you have a pure Microsoft Windows or above network. General questions, technical, sales, and product-related issues submitted through this form will not be answered. If you need additional help, you may try to contact the support team. Contact Support. For optimal experience, we recommend using Chrome or Firefox.
If you still wish to proceed with IE, please complete setting the following IE Security Configurations and select your region:. This website uses cookies for website functionality and traffic analytics. Our Cookie Notice provides more information and explains how to amend your cookie settings. Sign In with your Trend Micro Account. Sign in to MySupport. Need More Help? However, errors similar to the following occur: The registration appears to be successful on the management console.
Dropping the EICAR test file on the filer does not result to any detection on the part of the scan server. Mon Oct 17 CDT [filer-name: vscan. Running the "vscan" command indicates the ServerProtect for NetApp Scan Server name, but all of the scans indicate failure. Dropping the EICAR test file on the filer also does not result to any detection on the part of the scan server. Mon Oct 17 CDT [filer-name: nbt. Mon Oct 17 CDT [filer-name: cifs. Make sure that the name resolution works both ways.
This would rely on the input parameters done on the ServerProtect for NetApp management console. You can use either "ping" or "nslookup" to test this out. This can be done through the NetApp console via "ping".
0コメント