AntiVirus Antivirus CLI configuration
FortiGate Version 3.0 MR4 Administration Guide
01-30004-0203-20070102 347
Antivirus CLI configuration
This section describes the CLI commands that extend features available through
the web-based manager. For complete descriptions and examples of how to
enable additional features through CLI commands, see the FortiGate CLI
Reference.
system global optimize
The optimize feature configures CPU settings to ensure efficient operation of the
FortiGate unit for either antivirus scanning or straight throughput traffic. When
optimize is set to antivirus, the FortiGate unit uses symmetric multiprocessing to
spread the antivirus tasks to several CPUs, making scanning faster.
This feature is available on models numbered 1000 and higher.
For more information, see the Antivirus failopen and optimization Fortinet
Knowledge Center article.
Download Block download programs. Download components are usually run
at Windows startup and are designed to install or download other
software, especially advertising and dial software.
Game Block games. Games are usually joke or nuisance games that you
may want to block from network users.
HackerTool Block hacker tools.
Hijacker Block browser hijacking programs. Browser hijacking occurs when
a ‘spyware’ type program changes web browser settings, including
favorites or bookmarks, start pages, and menu options.
Joke Block joke programs. Joke programs can include custom cursors
and programs that appear to affect the system.
Keylog Block keylogger programs. Keylogger programs can record every
keystroke made on a keyboard including passwords, chat, and
instant messages.
Misc Block any programs included in the miscellaneous grayware
category.
NMT Block network management tools. Network management tools can
be installed and used maliciously to change settings and disrupt
network security.
P2P Block peer to peer communications programs. P2P, while a
legitimate protocol, is synonymous with file sharing programs that
are used to swap music, movies, and other files, often illegally.
Plugin Block browser plugins. Browser plugins can often be harmless
Internet browsing tools that are installed and operate directly from
the browser window. Some toolbars and plugins can attempt to
control or record and send browsing preferences.
RAT Block remote administration tools. Remote administration tools
allow outside users to remotely change and monitor a computer on
a network.
Spy Block spyware programs. Spyware, like adware, is often included
with freeware. Spyware is a tracking and analysis program that can
report your activities, such as web browsing habits, to the
advertiser’s web site where it may be recorded and analyzed.
Toolbar Block custom toolbars. While some toolbars are harmless,
spyware developers can use these toolbars to monitor web habits
and send information back to the developer.