Enforced Client Product Guide User Interface Definitions
202
A
Add Policy: Virus Protection Settings
Policies are made up of security settings for all of your protection services. These settings define
how your services operate on client computers.
Use this page to create a policy and configure its virus protection settings. Changes do not take
effect until you click Save.
Set basic virus protection options
Assign a policy to a group
Advanced Spyware Protection
Settings
Select potentially unwanted program threats to detect. If no threats
are selected, the virus and spyware protection service does not detect
any potentially unwanted programs.
Jokes: Programs designed to be mistaken for a virus. They may
alarm or annoy users but do not harm files or data. They are
intended to waste time and resources.
Remote admin tools: Programs that can be used from a remote
location to access a computer. Some remote administration tools
serve useful purposes, such as allowing users to access their files
from home, but others can be used by unauthorized persons to
monitor user activities and take control of a computer.
Spyware: Programs that covertly gathers user information
through the user’s Internet connection without the user’s
knowledge. Once installed, spyware monitors user activity on the
Internet and transmits that information in the background to
someone else. Spyware can gather information such as email
addresses, websites visited, passwords, and credit card numbers.
Dialers: Programs that hijack a user’s modem and dial
premium-rate phone numbers, such as those required to access
pornographic websites.
Password crackers: Programs that find passwords or encryption
keys by trying every possible combination of characters until the
code is broken.
Adware: Programs that display unsolicited advertisements.
Adware often includes code that tracks a user's personal
information and transmits it to someone else, without the user's
knowledge.
Potentially unwanted applications: Programs that perform
some unauthorized (and often harmful or undesirable) act such as
viruses, worms, and Trojan horses.
Key loggers: Programs that record every keystroke a user
makes. They can be used to steal passwords and other
confidential information.
Save Click to update the policy and return to the Groups + Policies page.
Cancel Click to return to the Groups + Policies page without changing the
policy.
Reset to Defaults Click to assign the original SonicWALL Default settings to this
policy.
Note: This resets all settings on all tabs. Settings will not take effect
until you click
Save.
Item Description