v
4.5.2 Installation Instructions .................................................................................154
4.6 Installing on an Infected Host...................................................................................155
4.7 How to Check That the Management Connections Work ........................................156
Chapter 5 Configuring Virus and Spyware Protection 157
5.1 Overview: What can Virus and Spyware Protection be Used for? ...........................158
5.2 Configuring Automatic Updates ...............................................................................159
5.2.1 How do Automatic Updates Work?...............................................................160
5.2.2 Automatic Updates Configuration Settings...................................................160
5.2.3 Configuring Automatic Updates from Policy Manager Server ......................161
5.2.4 Configuring Policy Manager Proxy ...............................................................162
5.2.5 Configuring Clients to Download Updates from Each Other ........................163
5.3 Configuring Real-Time Scanning .............................................................................164
5.3.1 Real-Time Scanning Configuration Settings.................................................164
5.3.2 Enabling Real-Time Scanning for the Whole Domain ..................................166
5.3.3 Forcing all Hosts to Use Real-Time Scanning..............................................167
5.3.4 Excluding Microsoft Outlooks's .pst File from Real-Time Scanning .............168
5.4 Configuring System Control .....................................................................................169
5.4.1 System Control Configuration Settings.........................................................169
5.4.2 System Control Server Queries (DeepGuard 2.0)........................................170
5.5 Configuring Rootkit Scanning (Blacklight)................................................................170
5.5.1 Rootkit Scanning Configuration Settings ......................................................171
5.5.2 Launching a Rootkit Scan for the Whole Domain.........................................171
5.6 Configuring E-mail Scanning....................................................................................172
5.6.1 E-mail Scanning Configuration Settings .......................................................172
5.6.2 Enabling E-mail Scanning for Incoming and Outgoing E-mails ....................174
5.7 Configuring Web Traffic (HTTP) Scanning...............................................................176
5.7.1 HTTP Scanning Configuration Settings........................................................176
5.7.2 Enabling Web Traffic Scanning for the Whole Domain ................................177
5.7.3 Excluding a Web Site from HTTP Scanning.................................................177
5.8 Configuring Spyware Scanning................................................................................179
5.8.1 Spyware Control Settings .............................................................................179
5.8.2 Setting up Spyware Control for the Whole Domain ......................................183
5.8.3 Launching Spyware Scanning in the Whole Domain....................................185
5.8.4 Allowing the Use of a Spyware or Riskware Component .............................186