STM 150-300-600 Reference Manual (PDF)
Page 5
ProSecure Web/Email Security Threat Management (STM) Appliance Setup Wizard Step 10 of 11: Configuration Summary 48 Setup Wizard Step 11 of 11: Restarting the System 49 Verifying Correct Installation 49 Testing Connectivity 49 Testing HTTP Scanning 49 Registering the STM with NETGEAR 50 What to Do Next 51 Chapter 3 Performing Network and System Management Configuring Network Settings 52...
ProSecure Web/Email Security Threat Management (STM) Appliance Setup Wizard Step 10 of 11: Configuration Summary 48 Setup Wizard Step 11 of 11: Restarting the System 49 Verifying Correct Installation 49 Testing Connectivity 49 Testing HTTP Scanning 49 Registering the STM with NETGEAR 50 What to Do Next 51 Chapter 3 Performing Network and System Management Configuring Network Settings 52...
STM 150-300-600 Reference Manual (PDF)
Page 7
ProSecure Web/Email Security Threat Management (STM) Appliance Log Management 199 Viewing, Scheduling, and Generating Reports 200 Report Templates 200 Generating Reports for Downloading 202 Scheduling Automatic Generation and Emailing of Reports 203 Advanced Report Filtering Options 204 Viewing and Managing the Quarantine Files...and Time 228 Using Online Support 228 Enabling Remote Troubleshooting 228 Installing Hot Fixes 229 Sending Suspicious Files to NETGEAR for Analysis 230 Accessing the Knowledge Base and Documentation 231 Appendix A Report Templates Appendix B Default Settings ...
ProSecure Web/Email Security Threat Management (STM) Appliance Log Management 199 Viewing, Scheduling, and Generating Reports 200 Report Templates 200 Generating Reports for Downloading 202 Scheduling Automatic Generation and Emailing of Reports 203 Advanced Report Filtering Options 204 Viewing and Managing the Quarantine Files...and Time 228 Using Online Support 228 Enabling Remote Troubleshooting 228 Installing Hot Fixes 229 Sending Suspicious Files to NETGEAR for Analysis 230 Accessing the Knowledge Base and Documentation 231 Appendix A Report Templates Appendix B Default Settings ...
STM 150-300-600 Reference Manual (PDF)
Page 10
...15 minutes. • Multiple antispam technologies to provide extensive protection against unwanted emails. • Spam and malware quarantine for easy analysis. • Web application control, including access control for instant messaging, media applications, peer-to ...viruses, and other malware threats. • Very frequently updated malware signatures, hourly if required. ProSecure Web/Email Security Threat Management (STM) Appliance - The scan engine continues to latency (for installation and management. • SNMP-manageable. • Dedicated management interface. (This feature ...
...15 minutes. • Multiple antispam technologies to provide extensive protection against unwanted emails. • Spam and malware quarantine for easy analysis. • Web application control, including access control for instant messaging, media applications, peer-to ...viruses, and other malware threats. • Very frequently updated malware signatures, hourly if required. ProSecure Web/Email Security Threat Management (STM) Appliance - The scan engine continues to latency (for installation and management. • SNMP-manageable. • Dedicated management interface. (This feature ...
STM 150-300-600 Reference Manual (PDF)
Page 38
... is created. This is created, and depending on standard service port 143. ProSecure Web/Email Security Threat Management (STM) Appliance Table 7. The email is not blocked, but the attachment is removed and placed in the corresponding Ports to be taken when an infected email is placed in Your Network In addition, a malware quarantine log entry is the default setting.
... is created. This is created, and depending on standard service port 143. ProSecure Web/Email Security Threat Management (STM) Appliance Table 7. The email is not blocked, but the attachment is removed and placed in the corresponding Ports to be taken when an infected email is placed in Your Network In addition, a malware quarantine log entry is the default setting.
STM 150-300-600 Reference Manual (PDF)
Page 40
... end user. You can change the standard service port or add another port in the corresponding Ports to Scan field. ProSecure Web/Email Security Threat Management (STM) Appliance Note: After you have completed the steps in the corresponding Ports to Scan field. You can change the standard service ...Layer (HTTPS) scanning, select the corresponding check box. FTP FTP scanning is removed and placed in Your Network In addition, a malware quarantine log entry is enabled by default To disable File Transfer Protocol (FTP) scanning, clear the on page 105. Streaming is created, ...
... end user. You can change the standard service port or add another port in the corresponding Ports to Scan field. ProSecure Web/Email Security Threat Management (STM) Appliance Note: After you have completed the steps in the corresponding Ports to Scan field. You can change the standard service ...Layer (HTTPS) scanning, select the corresponding check box. FTP FTP scanning is removed and placed in Your Network In addition, a malware quarantine log entry is enabled by default To disable File Transfer Protocol (FTP) scanning, clear the on page 105. Streaming is created, ...
STM 150-300-600 Reference Manual (PDF)
Page 41
...in the malware quarantine for further research. The Web file or object is not scanned but skipped, leaving the end user vulnerable. Using the Setup Wizard to block any attachment larger than 8192 KB. ProSecure Web/Email Security Threat Management (STM) Appliance Table 8. Setup Wizard Step 5: Web Security Settings (Continued... Web file or object exceeds the size that you can specify is 51200 KB. • For the STM150, the default setting is created, and depending on the nature of the malware threat, also a virus log entry or spyware log entry. • Delete file. NETGEAR ...
...in the malware quarantine for further research. The Web file or object is not scanned but skipped, leaving the end user vulnerable. Using the Setup Wizard to block any attachment larger than 8192 KB. ProSecure Web/Email Security Threat Management (STM) Appliance Table 8. Setup Wizard Step 5: Web Security Settings (Continued... Web file or object exceeds the size that you can specify is 51200 KB. • For the STM150, the default setting is created, and depending on the nature of the malware threat, also a virus log entry or spyware log entry. • Delete file. NETGEAR ...
STM 150-300-600 Reference Manual (PDF)
Page 52
... on page 71 • Configuring Date and Time Service on page 74 • Managing Digital Certificates on page 76 • Managing the Quarantine Settings on page 81 • Managing the STM's Performance on page 82 Configuring Network Settings If you have used the Setup... are situations in which you have configured the Web Management Interface and maximum transmission unit (MTU) settings; Performing Network and System Management 3 This chapter describes the network settings, the system management features, and ways to its Web Management Interface. The STM requires a valid IP address...
... on page 71 • Configuring Date and Time Service on page 74 • Managing Digital Certificates on page 76 • Managing the Quarantine Settings on page 81 • Managing the STM's Performance on page 82 Configuring Network Settings If you have used the Setup... are situations in which you have configured the Web Management Interface and maximum transmission unit (MTU) settings; Performing Network and System Management 3 This chapter describes the network settings, the system management features, and ways to its Web Management Interface. The STM requires a valid IP address...
STM 150-300-600 Reference Manual (PDF)
Page 81
... Certificates table, select the certificate. 2. To change the quarantine settings: 1. Performing Network and System Management | 81 To move an untrusted certificate to the Trusted Certificate Authorities table. The Quarantine screen displays: Figure 50. Chapter 3. Click Delete Selected... 1. In general, the default settings work well for quarantined items, and how long these items remain in memory. From the Untrusted Certificates table, select the certificate. 2. ProSecure Web/Email Security Threat Management (STM) Appliance To delete an untrusted certificate: 1. Click Add to ...
... Certificates table, select the certificate. 2. To change the quarantine settings: 1. Performing Network and System Management | 81 To move an untrusted certificate to the Trusted Certificate Authorities table. The Quarantine screen displays: Figure 50. Chapter 3. Click Delete Selected... 1. In general, the default settings work well for quarantined items, and how long these items remain in memory. From the Untrusted Certificates table, select the certificate. 2. ProSecure Web/Email Security Threat Management (STM) Appliance To delete an untrusted certificate: 1. Click Add to ...
STM 150-300-600 Reference Manual (PDF)
Page 82
... items are mentioned in the first place. ProSecure Web/Email Security Threat Management (STM) Appliance 2. By default, this feature is cumulative for new items. Spam Quarantine Area Size Specify the maximum amount of controlling the traffic through the STM so that is 15 days. This limit is disabled; For the STM150 and STM300, the default setting is 100...
... items are mentioned in the first place. ProSecure Web/Email Security Threat Management (STM) Appliance 2. By default, this feature is cumulative for new items. Spam Quarantine Area Size Specify the maximum amount of controlling the traffic through the STM so that is 15 days. This limit is disabled; For the STM150 and STM300, the default setting is 100...
STM 150-300-600 Reference Manual (PDF)
Page 84
... Email Protection on page 87 • Configuring Web and Services Protection on page 105 • Configuring Application Control on page 127 • Setting Scanning Exclusions and Web Access Exceptions on page 184. Content Filtering and Optimizing Scans This chapter describes how to view blocked content and malware threats in realtime, see Viewing and Managing the Quarantine...
... Email Protection on page 87 • Configuring Web and Services Protection on page 105 • Configuring Application Control on page 127 • Setting Scanning Exclusions and Web Access Exceptions on page 184. Content Filtering and Optimizing Scans This chapter describes how to view blocked content and malware threats in realtime, see Viewing and Managing the Quarantine...
STM 150-300-600 Reference Manual (PDF)
Page 89
.... The email is created. • Quarantine infected email. The email is blocked, and a virus log entry or a spyware log entry is placed in view: Figure 52. 2. Select Email Security > Anti-Virus from the drop-down list, specify one of the malware threat, also a virus log entry or a spyware log entry. • Log only. ProSecure Web/Email Security Threat Management (STM) Appliance Action...
.... The email is created. • Quarantine infected email. The email is blocked, and a virus log entry or a spyware log entry is placed in view: Figure 52. 2. Select Email Security > Anti-Virus from the drop-down list, specify one of the malware threat, also a virus log entry or a spyware log entry. • Log only. ProSecure Web/Email Security Threat Management (STM) Appliance Action...
STM 150-300-600 Reference Manual (PDF)
Page 90
... be taken when an infected email is detected: • Quarantine attachment. Content Filtering and Optimizing Scans This is not deleted. The email is not blocked and the attachment is the default setting. Only a virus log entry or a spyware log entry is the default setting. ProSecure Web/Email Security Threat Management (STM) Appliance Table 26. Email Anti-Virus Action Settings (Continued...
... be taken when an infected email is detected: • Quarantine attachment. Content Filtering and Optimizing Scans This is not deleted. The email is not blocked and the attachment is the default setting. Only a virus log entry or a spyware log entry is the default setting. ProSecure Web/Email Security Threat Management (STM) Appliance Table 26. Email Anti-Virus Action Settings (Continued...
STM 150-300-600 Reference Manual (PDF)
Page 97
... (which normally arrives as the ones for the Filter by the NETGEAR Spam Classification Center are either tagged, blocked, or quarantined. Chapter 4. Protecting Against Email Spam The STM integrates multiple antispam technologies to the specified recipients are... STM implements these antispam technologies. Whitelist. Blacklist. Distributed spam analysis. Content Filtering and Optimizing Scans | 97 ProSecure Web/Email Security Threat Management (STM) Appliance Table 29. You can enable all or a combination of these spam prevention technologies in this field, excluding ...
... (which normally arrives as the ones for the Filter by the NETGEAR Spam Classification Center are either tagged, blocked, or quarantined. Chapter 4. Protecting Against Email Spam The STM integrates multiple antispam technologies to the specified recipients are... STM implements these antispam technologies. Whitelist. Blacklist. Distributed spam analysis. Content Filtering and Optimizing Scans | 97 ProSecure Web/Email Security Threat Management (STM) Appliance Table 29. You can enable all or a combination of these spam prevention technologies in this field, excluding ...
STM 150-300-600 Reference Manual (PDF)
Page 102
ProSecure Web/Email Security Threat Management (STM) Appliance To add a blacklist provider to determine the volume of the ...With distributed spam analysis, message patterns are options possible only for both SMTP and POP3), blocked, or quarantined (the latter two are extracted from the real-time blacklist, click the Delete table button next to... reference to the Internet for SMTP and POP3 emails. Configuring Distributed Spam Analysis Spam, phishing, and other scans, you want to configure the spam score because the NETGEAR Spam Classification Center performs the scoring automatically as ...
ProSecure Web/Email Security Threat Management (STM) Appliance To add a blacklist provider to determine the volume of the ...With distributed spam analysis, message patterns are options possible only for both SMTP and POP3), blocked, or quarantined (the latter two are extracted from the real-time blacklist, click the Delete table button next to... reference to the Internet for SMTP and POP3 emails. Configuring Distributed Spam Analysis Spam, phishing, and other scans, you want to configure the spam score because the NETGEAR Spam Classification Center performs the scoring automatically as ...
STM 150-300-600 Reference Manual (PDF)
Page 104
... the default tag to tag spam email. Enable Select this tag. Distributed Spam Analysis Settings (Continued) Setting Action Description (or Subfield and Description) SMTP From the SMTP drop-down list, select the action that the email notification server (see Configuring the Email Notification Server on page 176) is created. ProSecure Web/Email Security Threat Management (STM) Appliance Table 31.
... the default tag to tag spam email. Enable Select this tag. Distributed Spam Analysis Settings (Continued) Setting Action Description (or Subfield and Description) SMTP From the SMTP drop-down list, select the action that the email notification server (see Configuring the Email Notification Server on page 176) is created. ProSecure Web/Email Security Threat Management (STM) Appliance Table 31.
STM 150-300-600 Reference Manual (PDF)
Page 105
... is not often used the Setup Wizard, you to make changes to access their quarantined spam and Port email. The Distributed Spam Analysis section and the Send Quarantine Spam Report section each have their own Apply and Reset buttons to enable you might... the STM. 4. Distributed Spam Analysis Settings (Continued) Setting Description (or Subfield and Description) Set Public The management port of the STM. ProSecure Web/Email Security Threat Management (STM) Appliance Table 31. the (Web) Policy screen allows you specify in the Host/IP field. Complete the Host/IP fields.
... is not often used the Setup Wizard, you to make changes to access their quarantined spam and Port email. The Distributed Spam Analysis section and the Send Quarantine Spam Report section each have their own Apply and Reset buttons to enable you might... the STM. 4. Distributed Spam Analysis Settings (Continued) Setting Description (or Subfield and Description) Set Public The management port of the STM. ProSecure Web/Email Security Threat Management (STM) Appliance Table 31. the (Web) Policy screen allows you specify in the Host/IP field. Complete the Host/IP fields.
STM 150-300-600 Reference Manual (PDF)
Page 108
... file sizes are as explained in the following text: NETGEAR ProSecure Web/Email Security Threat Management Appliance has detected and stopped malicious code embedded in quarantine, a malware quarantine log entry is created, and depending on the nature of a Web page that you can specify is created. Depending on .... • For the STM150, the default setting is to be taken when an infected Web file or object is sufficient to experience more transparent Web downloading. Scan Exceptions From the drop-down list, specify one of the malware threat, a virus log entry ...
... file sizes are as explained in the following text: NETGEAR ProSecure Web/Email Security Threat Management Appliance has detected and stopped malicious code embedded in quarantine, a malware quarantine log entry is created, and depending on the nature of a Web page that you can specify is created. Depending on .... • For the STM150, the default setting is to be taken when an infected Web file or object is sufficient to experience more transparent Web downloading. Scan Exceptions From the drop-down list, specify one of the malware threat, a virus log entry ...
STM 150-300-600 Reference Manual (PDF)
Page 126
... Action From the FTP drop-down lists as explained in quarantine, a malware quarantine log entry is not deleted. 126 | Chapter 4. Complete the fields, select the check boxes, and make your selections from the menu. ProSecure Web/Email Security Threat Management (STM) Appliance To configure the FTP scan settings: 1. Select Web Security > FTP from the drop-down list, specify one...
... Action From the FTP drop-down lists as explained in quarantine, a malware quarantine log entry is not deleted. 126 | Chapter 4. Complete the fields, select the check boxes, and make your selections from the menu. ProSecure Web/Email Security Threat Management (STM) Appliance To configure the FTP scan settings: 1. Select Web Security > FTP from the drop-down list, specify one...
STM 150-300-600 Reference Manual (PDF)
Page 175
...By default, the STM logs content filtering events such as attempts to a specified email address. You can configure the STM to email logs and alerts to access blocked sites and URLs, unwanted email content, spam attempts, and many other types of the STM. In addition, ... and Managing the Quarantine Files on page 208 • Using Diagnostics Utilities on the Web Management Interface or to be configured and email notification needs to save in CSV format. For you configure the email notification server-see Configuring the Email Notification Server on page 176. Note: All email notification...
...By default, the STM logs content filtering events such as attempts to a specified email address. You can configure the STM to email logs and alerts to access blocked sites and URLs, unwanted email content, spam attempts, and many other types of the STM. In addition, ... and Managing the Quarantine Files on page 208 • Using Diagnostics Utilities on the Web Management Interface or to be configured and email notification needs to save in CSV format. For you configure the email notification server-see Configuring the Email Notification Server on page 176. Note: All email notification...
STM 150-300-600 Reference Manual (PDF)
Page 186
... Application Control on page 127. Web Displays the total number of : • Scanned (emails). • Files blocked (see Email Content Filtering on page 94). • Quarantined (see Email Content Filtering on page 94). • Malware detected (see Customizing Email Anti-Virus Settings on page 88...that you enabled application control but the protection license has expired. Active The number of the Dashboard screen: Table 54. ProSecure Web/Email Security Threat Management (STM) Appliance To set the poll interval: 1. Click the Stop button. 2. Click the Set Interval button. ON, OFF, or...
... Application Control on page 127. Web Displays the total number of : • Scanned (emails). • Files blocked (see Email Content Filtering on page 94). • Quarantined (see Email Content Filtering on page 94). • Malware detected (see Customizing Email Anti-Virus Settings on page 88...that you enabled application control but the protection license has expired. Active The number of the Dashboard screen: Table 54. ProSecure Web/Email Security Threat Management (STM) Appliance To set the poll interval: 1. Click the Stop button. 2. Click the Set Interval button. ON, OFF, or...