beautypg.com

Fortinet 100A User Manual

Page 298

background image

298

01-28007-0068-20041203

Fortinet Inc.

Grayware options

Antivirus

The categories may change or expand when the FortiGate unit receives updates. In
the example above you can choose to enable the following grayware categories.
Enabling a grayware category blocks all files listed in the category.

Adware

Select enable to block adware programs. Adware is usually embedded

in freeware programs and causes ads to pop up whenever the program

is opened or used.

Dial

Select enable to block dialer programs. Dialers allow others to use the

PC modem to call premium numbers or make long distance calls.

Game

Select enable to block games. Games are usually joke or nuisance

games that you may want to block from network users.

Joke

Select enable to block joke programs. Joke programs can include

custom cursors and programs that appear to affect the system.

P2P

Select enable to block peer to peer communications programs. P2P,

while a legitimate protocol, is synonymous with file sharing programs

that are used to swap music, movies, and other files, often illegally.

Spy

Select enable to block spyware programs. Spyware, like adware, is

often included with freeware. Spyware is a tracking and analysis

program that can report your activities, such as web browsing habits, to

the advertiser’s web site where it may be recorded and analyzed.

Keylog

Select enable to block keylogger programs. Keylogger programs can

record every keystroke made on a keyboard including passwords, chat,

and instant messages.

Hijacker

Select enable to block browser hijacking programs. Browser hijacking

occurs when a ‘spyware’ type program changes web browser settings,

including favorites or bookmarks, start pages, and menu options.

Plugin

Select enable to block browser plugins. Browser plugins can often be

harmless Internet browsing tools that are installed and operate directly

from the browser window. Some toolbars and plugins can attempt to

control or record and send browsing preferences.

NMT

Select enable to block network management tools. Network

management tools can be installed and used maliciously to change

settings and disrupt network security.

RAT

Select enable to block remote administration tools. Remote

administration tools allow outside users to remotely change and monitor

a computer on a network.

Misc

Select enable to block any programs included in the miscellaneous

grayware category.

BHO

Select enable to block browser helper objects. BHOs are DLL files that

are often installed as part of a software package so the software can

control the behavior of Internet Explorer 4.x and higher. Not all BHOs

are malicious, but the potential exists to track surfing habits and gather

other information.

Toolbar

Select enable block custom toolbars. While some toolbars are

harmless, spyware developers can use these toolbars to monitor web

habits and send information back to the developer.

Download

Select enable to block download programs. Download components are

usually run at Windows startup and are designed to install or download

other software, especially advertising and dial software.