Basic Features of Dr.Web Gateway Security Suite |
1.Detection and neutralization of threats. Scanning for malicious programs of any kind (various viruses, including those that infect mail files and boot records, trojans, email worms and so on) and unwanted software (adware, joke programs and dialers). For details on threat types, refer to Appendix A. Types of Computer Threats. Threat detection methods: •a signature analysis—a scan method allowing to detect known threats registered in virus databases; •a heuristic analysis—a set of scan methods allowing to detect threats that are not known yet; •cloud-based threat detection technologies using the Dr.Web Cloud service that collects up-to-date information about recent threats detected by various Dr.Web anti-virus products.
When scanning the file system on the user request, it is possible to perform either a full scan of all the file system objects available to the user, or a custom scan of the specified objects only (individual directories or files that meet the specified criteria). In addition, it is possible to perform an individual check of boot records of volumes and executable files which started the processes that are currently active in the system. In the latter case, when a threat is detected, a malicious executable file is not only neutralized, but all processes started by it are forcibly terminated. On systems that implement a mandatory model of file access with a set of different access levels, the scanning of files that are not available at the current access level can be done in special autonomous copy mode. All objects containing threats detected in the file system are registered in a permanent threat registry, except those threats that were detected in autonomous copy mode. The Dr.Web Ctl command-line tool bundled with Dr.Web Gateway Security Suite allows to scan file systems of remote network hosts providing remote terminal access via SSH or Telnet for threats.
2.Analyzing data transmitted to the internet. Not only user requests are monitored (that is, attempts to connect to a web server and upload a file to it), but also data sent by web servers in response to user requests. To analyze requests and return data, Dr.Web Gateway Security Suite connects via ICAP as an external filter to a proxy server processing HTTP connections of local network users. Furthermore, using the SpIDer Gate component, it is possible to utilize barrier functions that prevent receiving and sending infected files by a public web server of the organization (this option is available only on GNU/Linux). To restrict access to unwanted websites, the product uses an automatically updated database of web resources separated into categories, which is bundled with Dr.Web Gateway Security Suite, and white and black lists created by a system administrator manually. The product also makes a request to the Dr.Web Cloud service to check whether an internet resource is marked as malicious by other Dr.Web products. 3.Reliable isolation of infected or suspicious objects detected within the server file system in a special storage known as quarantine to prevent any harm to the system. When quarantined, objects are renamed according to special rules and, if necessary, they can be restored to their original location only on user demand. Threats detected by the Dr.Web ICAPD component in HTTP messages are not quarantined on an internet gateway. Instead their load and transfer to a recipient are blocked, and the user is informed of it with a custom HTML page containing a message about blocking. 4.Automatic update of the scanning engine, virus databases, databases of web resource categories to maintain the high level of protection against malware. 5.Collection of statistics on scans and threat events. Logging detected threats. Sending of notifications of detected threats via SNMP to external monitoring systems and a centralized protection server if Dr.Web Gateway Security Suite operates in centralized protection mode, as well as to the Dr.Web Cloud service. 6.Operation in centralized protection mode to implement single security policies adopted within some network which comprises this server. It can be a corporate network, a private network (VPN) or a network of a service provider (for example, an internet service provider). |