Print Download PDF Send Feedback

Previous

Next

Using Traditional Anti-Virus

Managing Traditional Anti-Virus

Traditional Anti-Virus inspection uses these detection modes:

The POP3 and FTP protocols work only in Proactive mode. You can configure the SMTP and HTTP protocols to work in Proactive or Stream mode. Anti-Virus scanning is applied only to accepted traffic that was allowed by the security policy.

Use the instructions in this section to configure Traditional Anti-Virus in your system.

Database Updates

The following kinds of database updates are available:

Download updates from a Check Point server prior to downloading signature updates. First verify that:

The following signature update methods are available (the default update interval is 120 minutes for all methods):

Understanding Traditional Anti-Virus Scanning Options

Definitions

Scan by File Direction and Scan by IPs are two file scanning methods used by Content Inspection. Traditional Anti-Virus scanning is performed only on traffic that is allowed by the Security Rule Base.

Scan By File Direction

Scan by File Direction scans all files passing in one direction, either to or from the external, internal and/or DMZ networks. Using this method (the default) is fairly intuitive and does not require the specification of hosts or networks. This method also enables you to define exceptions, for example, locations to or from which files are not scanned.

Scan By IP Address

Scan by IPs lets you define the traffic to be scanned. For example, if all incoming traffic from external networks reaches the DMZ using Scan by IPs, you can configure Traditional Anti-Virus to scan only traffic to the FTP, SMTP, HTTP and POP3 servers. Conversely, Scan by File Direction scans all traffic to the DMZ.

When using Scan by IPs, use a Rule Base to specify the source and destination of the data to be scanned. For FTP, for each rule, you can scan either the GET or the PUT methods, or both. For HTTP, for each rule, you can scan either the HTTP Request, the HTTP Response or both.

Comparing Scan by File Direction and by IPs

Scan by File Direction enables you to set file scanning according to the file's (and not necessarily the connection's) origin and destination.

Scan by IPs enables you to set file scanning according to the connection they are sent through and the protocol phase/command (where applicable).

If you want most or all files in a given direction to be scanned, select Scan by File Direction.

If you want a connection or part of a connection's source or destination to be scanned, select Scan by IPs.

Scanning by File Direction: Selecting Data to Scan

When using Scan by File Direction, you must select the direction of the data to scan, which depends on whether you want to scan files to or from the internal networks and the DMZ.

What is a DMZ?

The DMZ (demilitarized zone) is an internal network with an intermediate level of security. Its security level lies between trusted internal networks, such as a corporate LAN, and non-trusted external networks, such as the Internet.

Typically, the DMZ contains devices accessible to Internet traffic, for example, Web (HTTP), FTP, SMTP (email), DNS and POP3 servers.

Scan By File Direction enables you to define a level of Traditional Anti-Virus scanning that is specific to the DMZ. For example, you can decide not to scan traffic passing from external networks to the DMZ, but to still scan traffic passing from the DMZ to internal networks and from the external to internal networks.

Understanding Proactive and Stream Mode Detection

Traditional Anti-Virus scanning can be enabled in either the proactive or stream detection mode.

In newly installed systems, stream mode is activated by default.

In upgraded systems, the detection mode that is activated by default is dependent upon whether the Traditional Anti-Virus feature was previously activated or not.

You can configure which detection mode to use from SmartConsole for the SMTP and HTTP protocols.

Continuous Download

The Traditional Anti-Virus engine acts as a proxy which caches the scanned file before delivering it to the client for files that need to be scanned.

When scanning large files, if the whole file is scanned before being made available, the user may experience a long delay before the file is delivered. A similar problem may arise when using client applications with short timeout periods (for example, certain FTP clients) to download large files. If the whole file is cached and scanned before being delivered, the client applications may time out while waiting.

To address this problem, Continuous Download starts sending information to the client while Traditional Anti-Virus scanning is still taking place. If a virus is found during the scan, file delivery to the client is terminated.

Note - Continuous Download is only relevant if you have selected to use the Activate proactive detection option.

You can specify the file types for which you do not want Continuous Download to occur. Some file types (for example, Adobe Acrobat PDF and Microsoft Power Point files) can open on a client computer before the whole file has been downloaded. If Continuous Download is allowed for those file types, and a virus is present in the opened part of the file, it could infect the client computer.

Note - The SMTP and POP3 protocols support Continuous Download for the entire email message.

File Type Recognition

IPS has a built-in File Type recognition engine, which identifies the types of files passed as part of the connection and enables you to define a per-type policy for handling files of a given type.

You can specify safe file types that are allowed to pass through IPS without being scanned for viruses. It is also possible to configure file types to be scanned or blocked.

The following file types can be configured:

File types are considered to be safe if they are not known to contain viruses, for example, some picture and video files are considered safe. Other formats are considered to be safe because they are relatively hard to tamper with. What is considered to be safe changes according to published threats and depends on how the administrator balances security versus performance considerations.

IPS reliably identifies binary file types by examining the file type signatures (magic numbers). IPS does not rely on the file extension (such as *.GIF), which can be spoofed. It also does not use the MIME headers (such as image/gif) in HTTP and mail protocols, which can also be spoofed.

Configuring Traditional Anti-Virus

For detailed explanations regarding the options described in the procedures in this section, see Understanding Traditional Anti-Virus Scanning Options.

Configuring Mail Traditional Anti-Virus

The Mail Traditional Anti-Virus policy prevents email from being used as a virus delivery mechanism.

  1. In the Traditional Anti-Virus tab, click Traditional Anti-Virus > Security Gateway > Mail Protocols > Mail Traditional Anti-Virus.
  2. Set the slider to Block.
  3. Select tracking options for all POP3 and SMTP mail, or just blocked mail. Tracking options include:
    • None (no logging)
    • Log
    • Popup alert
    • Mail alert
    • SNMP trap alert
    • Three custom user-defined scripts

Configuring Zero Hour Malware

By proactively scanning the Internet, the Data Center identifies massive virus outbreaks as soon as they occur. This Zero-Hour solution provides protection during the critical time it takes to discover a new virus outbreak and assign it a signature.

  1. In the Traditional Anti-Virus tab, click Traditional Anti-Virus > Security Gateway > Mail Protocols > Zero Hour Malware Protection.
  2. With the slider, select a Zero hour malware protection level:
    • Off
    • Monitor Only
    • Block
  3. Select tracking options for blocked, SMTP and POP3 mail. Tracking options include:
    • None (no logging)
    • Log
    • Popup alert
    • Mail alert
    • SNMP trap alert
    • Three custom user-defined scripts

Configuring SMTP, POP3, FTP and HTTP

SMTP and POP3 traffic can be scanned according to direction or by IPs.

  1. In the Traditional Anti-Virus tab, click Traditional Anti-Virus > Security Gateway > Mail Protocols > SMTP, POP3, FTP or HTTP.
  2. With the slider, select a protection level:
    • Off
    • Monitor Only - SMTP and HTTP are the only protocols that support this protection level
    • Block
  3. For a scan by File Direction, select a scanning direction for:
    • Incoming files
    • Outgoing files
    • Internal files through the gateway
  4. For a scan by IPs, create rules for the Rule Base to set the source and destination of the data to be scanned.
  5. For SMTP and HTTP, select Activate Proactive Detection (impacts performance) to enable file-based Traditional Anti-Virus detection. Clear the checkbox to enable stream mode detection. See Understanding Proactive and Stream Mode Detection for further information. FTP and POP3 are set to Proactive Detection mode automatically.
  6. If Proactive Detection was configured, select Activate Continuous Download to prevent client time-outs when large files are scanned.

    See Continuous Download for further information.

Configuring File Types

You can set an action to take place when a file of a specified type passes through the gateway, so that it is not scanned for viruses. For example, picture and video files are normally considered safe. Other formats can be considered safe because they are relatively hard to tamper with. Update the list as necessary.

In this window, you can also configure Continuous Download options. Continuous Download options are only relevant if the scan is set to Proactive Detection. See Continuous Download for more information.

Configuring Security Gateway Settings

In Traditional Anti-Virus tab, click Traditional Anti-Virus > Security Gateway > Mail Protocols > Settings. You can configure Scan Failure settings and Proactive Scan Settings (File Handling and Archive File Handling).

Scan Failure

These scan failure options are available:

File Handling

The following file handling options are available:

Archive File Handling

These file handling archiving options are available:

Logging and Monitoring

Traditional Anti-Virus logging and monitoring options are available in the Logs & Monitor tab in SmartConsole.

Logs derived from Traditional Anti-Virus scanning are sent to Security Management Server, and show in the Logs & Monitor > Logs tab. In the Logs & Monitor tab, you can see detailed views and reports of the Traditional Anti-Virus activity, customize these views and reports, or generate new ones.

UTM-1 Edge Traditional Anti-Virus

You can now enable Traditional Anti-Virus protection within UTM-1 Edge. When you select the Enable Traditional Anti-Virus option, the Traditional Anti-Virus protection is installed and updates are sent to the specified gateway.

With UTM-1 Edge Traditional Anti-Virus, you can define the maximum archive file sizes for UTM-1 Edge machines that are scanned, and configure procedures for when these limits are exceeded and/or the scan fails.

The UTM-1 Edge Traditional Anti-Virus feature enables you to automatically or manually update virus signatures for UTM-1 Edge machines and provides you with the tools to configure how UTM-1 Edge traffic is scanned.

Note - It is important to configure a valid DNS server address on your management and gateway in order for the signature update to work.

The UTM-1 Edge Traditional Anti-Virus scanning policy enables you to select the service(s) to and from which a source or destination is scanned. Files set for scanning are defined in the classic Rule Base, which defines the source and destination of the connection to be scanned.

Best Practice - use this method if you want to define exactly which traffic to scan. For example, if all incoming traffic from external networks reaches the DMZ, you can specify that only traffic to the Traditional Anti-Virus servers is scanned.

To enable and configure Traditional Anti-Virus protection:

  1. From the General Properties tab of the UTM-1 Edge gateway, select the Other > More Settings > Enable Traditional Anti-Virus.
  2. In the Edge Traditional Anti-Virus section of the Traditional Anti-Virus tab, configure Traditional Anti-Virus to work on UTM-1 Edge gateways. All of the Traditional Anti-Virus settings in the Traditional Anti-Virus tab do not work for UTM-1 Edge machines. The Edge Traditional Anti-Virus settings in the Traditional Anti-Virus tab only work for UTM-1 Edge machines.