Virus Scan

Dr.Web for Kerio Control detects infected email attachments and infected objects transmitted via HTTP and FTP protocols.

Dr.Web for Kerio Control scans the network traffic for the following types of malicious objects and malware:

infected archives;

bomb viruses in files or archives;

adware;

hacktools;

dialers;

jokes;

riskware;

Dr.Web for Kerio Control uses various threat detection methods during the scanning.

By configuring the anti-virus application via the admin console Kerio Control firewall you can determine the types of the detected malicious objects and actions applied to them. You can also select protocols for Dr.Web for Kerio Control to scan.

Scanning settings are configured on the ConfigurationAnti-virus section tabs using the admin console of the Kerio Control firewall:

Tab

Description

HTTP, FTP scanning

If a virus is detected in the traffic sent via the HTTP and FTP protocols, its transmission is blocked and the firewall performs the actions specified on this tab by administrator. Using this tab administrator can also specify the actions of firewall in case the transferred file cannot be scanned for viruses and the scanning rules determining which types of objects would be scanned by Dr.Web for Kerio Control.

Email scanning

On this tab, the settings of the anti-virus scan of SMTP and POP3 protocols can be specified as well as the actions in case a virus is detected in the attached files or anti-virus scan fails (due to corruption or encryption of the file).

If Dr.Web for Kerio Control plug-in detects a threat, the administrator can de notified about it by email or SMS. Besides, information on all detected threats is recorded in the alert log of the Kerio Control firewall.

warning_green

The anti-virus scan of large files (larger than 50 MB) may take considerable time. As a result, in some cases the data transferred via Kerio Control is not delivered to the recipients. This should be taken into consideration when configuring the timeout for data delivery for the corresponding applications and the scanned file size limits for Kerio Control.

For detailed information on configuring network traffic and actions that the firewall applies to detected malicious objects, see the administrator manual of Kerio Control firewall.