Basic Features of Dr.Web for UNIX File Servers |
1. Scanning for malicious programs of any kind (various viruses, including those that infect mail files and boot records, trojans, email worms and so on) and unwanted software (adware, joke programs and dialers). For details on threat types, refer to Appendix A. Types of Computer Threats. Threat detection methods: •a signature analysis—a scan method allowing to detect known threats registered in virus databases; •a heuristic analysis—a set of scan methods allowing to detect threats that are not known yet; •cloud-based threat detection technologies using the Dr.Web Cloud service that collects up-to-date information about recent threats detected by various Dr.Web anti-virus products.
When scanning the file system on the user request, it is possible to perform either a full scan of all the file system objects available to the user, or a custom scan of the specified objects only (individual directories or files that meet the specified criteria). In addition, it is possible to perform an individual check of boot records of volumes and executable files which started the processes that are currently active in the system. In the latter case, when a threat is detected, a malicious executable file is not only neutralized, but all processes started by it are forcibly terminated. On systems that implement a mandatory model of file access with a set of different access levels, the scanning of files that are not available at the current access level can be done in special autonomous copy mode. All objects containing threats detected in the file system are registered in a permanent threat registry, except those threats that were detected in autonomous copy mode. The Dr.Web Ctl command-line tool bundled with Dr.Web for UNIX File Servers allows to scan file systems of remote network hosts providing remote terminal access via SSH or Telnet for threats.
2. • Monitors file events and attempts to run executables. This feature allows to detect and neutralize malware at an attempt to infect the server file system. Besides the standard monitoring mode, you can enable the enhanced (Paranoid) mode in which the monitor blocks access to files until their scanning is finished (this allows you to prevent access to an infected file, but a scanning result is available only after an application accesses a file). The enhanced mode increases the security level but slows down access to the files that are not scanned yet.
• Read and write operations of local and remote users of the file server are monitored. This feature allows to detect and neutralize malware instantly at an attempt of copying it to the file storage, which prevents its further distribution over the network. • Write operations of the NSS file storage users are monitored. This feature allows to detect and neutralize malware instantly at an attempt of copying it to the NSS storage, which prevents its further distribution over the network.
4. detected within the server file system in a special storage known as quarantine to prevent any harm to the system. When quarantined, objects are renamed according to special rules and, if necessary, they can be restored to their original location only on user demand. 5. of the scanning engine, virus databases to maintain the high level of protection against malware. 6. on scans and threat events. Logging detected threats. Sending of notifications of detected threats via SNMP to external monitoring systems and a centralized protection server if Dr.Web for UNIX File Servers operates in centralized protection mode, as well as to the Dr.Web Cloud service. 7. (when connected to a centralized protection server such as Dr.Web Enterprise Server or as a part of the Dr.Web AV-Desk service) to implement single security policies adopted within some network which comprises this server. It can be a corporate network, a private network (VPN) or a network of a service provider (for example, an internet service provider). |