Fortinet 100A User Manual
Page 298
298
01-28007-0068-20041203
Fortinet Inc.
Grayware options
Antivirus
The categories may change or expand when the FortiGate unit receives updates. In
the example above you can choose to enable the following grayware categories.
Enabling a grayware category blocks all files listed in the category.
Adware
Select enable to block adware programs. Adware is usually embedded
in freeware programs and causes ads to pop up whenever the program
is opened or used.
Dial
Select enable to block dialer programs. Dialers allow others to use the
PC modem to call premium numbers or make long distance calls.
Game
Select enable to block games. Games are usually joke or nuisance
games that you may want to block from network users.
Joke
Select enable to block joke programs. Joke programs can include
custom cursors and programs that appear to affect the system.
P2P
Select enable to block peer to peer communications programs. P2P,
while a legitimate protocol, is synonymous with file sharing programs
that are used to swap music, movies, and other files, often illegally.
Spy
Select enable to block spyware programs. Spyware, like adware, is
often included with freeware. Spyware is a tracking and analysis
program that can report your activities, such as web browsing habits, to
the advertiser’s web site where it may be recorded and analyzed.
Keylog
Select enable to block keylogger programs. Keylogger programs can
record every keystroke made on a keyboard including passwords, chat,
and instant messages.
Hijacker
Select enable to block browser hijacking programs. Browser hijacking
occurs when a ‘spyware’ type program changes web browser settings,
including favorites or bookmarks, start pages, and menu options.
Plugin
Select enable to block browser plugins. Browser plugins can often be
harmless Internet browsing tools that are installed and operate directly
from the browser window. Some toolbars and plugins can attempt to
control or record and send browsing preferences.
NMT
Select enable to block network management tools. Network
management tools can be installed and used maliciously to change
settings and disrupt network security.
RAT
Select enable to block remote administration tools. Remote
administration tools allow outside users to remotely change and monitor
a computer on a network.
Misc
Select enable to block any programs included in the miscellaneous
grayware category.
BHO
Select enable to block browser helper objects. BHOs are DLL files that
are often installed as part of a software package so the software can
control the behavior of Internet Explorer 4.x and higher. Not all BHOs
are malicious, but the potential exists to track surfing habits and gather
other information.
Toolbar
Select enable block custom toolbars. While some toolbars are
harmless, spyware developers can use these toolbars to monitor web
habits and send information back to the developer.
Download
Select enable to block download programs. Download components are
usually run at Windows startup and are designed to install or download
other software, especially advertising and dial software.