For example, you could allow a file that triggers a false positive when scanned by IntelligentAV.ĭenies the transaction (HTTP), drops the connection (FTP), or removes the attachment from the email before it is delivered to the recipient (SMTP/POP3/IMAP). Use this action for files that you always want to allow. File Exception Actionsįor each file exception, you can select one of these actions:Īllows the file to be downloaded or the email attachment to be delivered to the recipient. If the file matches an entry in the list, the Firebox skips the relevant scans and either allows or drops the file, based on the selected action. When the Firebox examines a file, it checks the MD5 hash of the file against the Files Exceptions list. You can use the File Exceptions list to specify files that you do not want to scan with these security services: For example, if the Firebox incorrectly identifies a PDF document as a threat based on your security service settings, you might want to bypass future scans of the file and allow your users to download or open it. ![]() In some cases, you might not want the Firebox to scan specific files. ![]() When you enable security services that scan content, the Firebox examines traffic and looks for suspicious files that contain threats such as viruses and malware.
0 Comments
Leave a Reply. |