EasyManua.ls Logo

Check Point UTM-1 Edge - Page 432

Check Point UTM-1 Edge
707 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
SmartDefense Categories
418 Check Point UTM-1 Edge User Guide
Table 92: File Print and Sharing Fields
In this field… Do this…
Action Specify what action to take when a CIFS worm attack is detected, by
selecting one of the following:
Block. Block the attack.
None. No action. This is the default.
Track Specify whether to log CIFS worm attacks, by selecting one of the
following:
Log. Log the attack.
None. Do not log the attack. This is the default.
CIFS worm patterns
list
Select the worm patterns to detect.
Patterns are matched against file names (including file paths but
excluding the disk share name) that the client is trying to read or
write from the server.

Table of Contents