Table of Contents
ZyWALL ATP Series User’s Guide
16
27.1.3 Before You Begin ............................................................................................................... 507
27.2 Content Filter Profile Screen ...................................................................................................... 507
27.2.1 Apply to a Security Policy ................................................................................................ 508
27.2.2 Content Filter Add Profile Category Service .................................................................. 511
27.2.3 Content Filter Add Filter Profile Custom Service ........................................................... 517
27.3 Content Filter Trusted Web Sites Screen ................................................................................. 520
27.4 Content Filter Forbidden Web Sites Screen ............................................................................ 521
27.5 Content Filter Technical Reference ......................................................................................... 522
Chapter 28
Anti-Malware....................................................................................................................................524
28.1 Overview ..................................................................................................................................... 524
28.1.1 What You Can Do in this Chapter ................................................................................... 524
28.1.2 What You Need to Know ................................................................................................. 525
28.2 Anti-Malware Screen ................................................................................................................. 526
28.2.1 Anti-Malware Black List or White List Add/Edit ............................................................... 529
28.3 Anti-Malware Signature Searching ........................................................................................... 530
28.4 Anti-Malware Technical Reference ......................................................................................... 531
Chapter 29
Botnet Filter.......................................................................................................................................533
29.1 Overview ..................................................................................................................................... 533
29.1.1 What You Can Do in this Chapter ................................................................................... 533
29.2 Botnet Filter Screen ..................................................................................................................... 533
Chapter 30
IDP .....................................................................................................................................................537
30.1 Overview ..................................................................................................................................... 537
30.1.1 What You Can Do in this Chapter ................................................................................... 537
30.1.2 What You Need To Know ................................................................................................. 537
30.1.3 Before You Begin ............................................................................................................... 537
30.2 The IDP Screen ............................................................................................................................ 537
30.2.1 Query Example .................................................................................................................. 542
30.3 IDP Custom Signatures .............................................................................................................. 543
30.3.1 Add / Edit Custom Signatures ......................................................................................... 544
30.3.2 Custom Signature Example ............................................................................................. 548
30.3.3 Applying Custom Signatures ............................................................................................ 550
30.3.4 Verifying Custom Signatures ............................................................................................ 551
30.4 IDP Technical Reference ........................................................................................................... 551
Chapter 31
Sandboxing ......................................................................................................................................554
31.1 Overview ..................................................................................................................................... 554