Symantec Scan Engine Implementation Guide
Symantec Scan Engine Implementation Guide
Legal Notice
Copyright 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party (Third Party Programs). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this Symantec product for more information on the Third Party Programs. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.
Technical Support
Symantec Technical Support maintains support centers globally. Technical Supports primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates. Symantecs support offerings include the following:
A range of support options that give you the flexibility to select the right amount of service for any size organization Telephone and/or Web-based support that provides rapid response and up-to-the-minute information Upgrade assurance that delivers software upgrades Global support purchased on a regional business hours or 24 hours a day, 7 days a week basis Premium service offerings that include Account Management Services
For information about Symantecs support offerings, you can visit our Web site at the following URL: www.symantec.com/business/support/ All support services will be delivered in accordance with your support agreement and the then-current enterprise technical support policy.
Hardware information Available memory, disk space, and NIC information Operating system Version and patch level Network topology Router, gateway, and IP address information Problem description:
Error messages and log files Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes
Customer service
Customer service information is available at the following URL: www.symantec.com/business/support/ Customer Service is available to assist with non-technical questions, such as the following types of issues:
Questions regarding product licensing or serialization Product registration updates, such as address or name changes General product information (features, language availability, local dealers) Latest information about product updates and upgrades Information about upgrade assurance and support contracts Information about the Symantec Buying Programs Advice about Symantec's technical support options Nontechnical presales questions Issues that are related to CD-ROMs or manuals
Contents
Chapter 2
Contents
Migrating to version 5.2.10 ............................................................ 66 About migrating from version 4.3x ............................................ 67 Uninstalling Symantec Scan Engine ................................................ 69
Chapter 3
Chapter 4
Chapter 5
Contents
Configuring Symantec Scan Engine to block unscannable container files ................................................................ Configuring file name filtering ................................................ Configuring file size filtering .................................................. Configuring subject line content filtering .................................. Configuring message origin filtering ........................................ Customizing user notifications ..................................................... Notifying RPC-client users that a threat was found .....................
Chapter 6
Chapter 7
Chapter 8
163 163 163 165 168 169 170 170 171 172
10
Contents
Enabling statistics reporting ................................................... 173 Configuring logging to the Windows Application Event Log ................ 174 Configuring Symantec Scan Engine to log events to SSIM .................. 175 About configuring alerts .............................................................. 176 Activating SMTP alerts .......................................................... 176 Activating SNMP alerts ......................................................... 177 Configuring outbreak alerts .................................................... 179 About reports ............................................................................ 180 Viewing the local log data ...................................................... 181 Exporting local log data to a file .............................................. 182 Viewing statistics log data ...................................................... 182
Chapter 9
185 185 185 186 188 188 189 190 190 190 193 194 195 196 197 197
Appendix A
Contents
11
Appendix B
Appendix C
12
Contents
Appendix D
Chapter
About Symantec Scan Engine What's new Components of Symantec Scan Engine How Symantec Scan Engine works What you can do with Symantec Scan Engine Where to get more information
Symantec Scan Engine native protocol The Internet Content Adaptation Protocol (ICAP), version 1.0, as presented in RFC 3507 (April 2003) A proprietary implementation of remote procedure call (RPC)
14
Use the Symantec Scan Engine software development kit (SDK) to integrate Symantec Scan Engine with your application. The SDK supports version 1.0 of ICAP, as presented in RFC3507 (April 2003). Symantec also has developed connector code for some third-party applications to seamlessly integrate with Symantec Scan Engine.
What's new
Table 1-1 describes the new features in Symantec Scan Engine. Table 1-1 Feature
Enhanced URL Filtering
Support for additional A client application can have up to 80 scan engine addresses to scan engines which a scan request can be sent. When one or more scan engines are not functional, requests are sent to another scan engine in the list of available scan engines. See About automatic load balancing on page 22. ICAP client address is For each event in which activity about an ICAP client is recorded, included in event data Symantec Scan Engine records the IP address of the ICAP client. This information helps you troubleshoot issues on the ICAP client by identifying exactly which client generated the event. The ICAP client IP address information is recorded to the following logging destinations:
Local log Windows Application Event Log SNMP alerts SMTP alerts
15
Notification to the ICAP client when the queued requests threshold is reached
Logs the event to the specified logging destinations Rejects the scan request Notifies the client that the server has reached the queued request threshold
The client can then adjust the load balancing, which prevents the server from being overloaded with scan requests. See Allocating resources for Symantec Scan Engine on page 61. The notification feature is enabled by default, but you can disable this feature. When you disable the feature, Symantec Scan Engine continues to accept scan requests when the queue reaches the threshold. See Disabling the ICAP threshold client notification on page 228. Support for non-viral threat detection for the RPC protocol. If your client uses the RPC protocol, you can configure Symantec Scan Engine to detect non-viral threats. See Enabling security risk detection on page 106.
Resource consumption You can monitor from the console the resources that Symantec report Scan Engine uses. The resource consumption report provides a summary of the key scanning resources and logging resources used. The report lets you gauge scanning performance. You can use the resource consumption report to monitor and troubleshoot scanning issues and logging issues. The resource consumption report includes information about the following items:
You can also view the scanning threads and load statistics consumption information for each RPC client if you use the RPC protocol. See Monitoring Symantec Scan Engine resources on page 125.
16
If your client uses the ICAP protocol or the RPC protocol, Symantec Scan Engine provides a self-test scanning feature. Checks are continually performed to ensure that Symantec Scan Engine is responsive and able to scan files. This feature is enabled by default. See Disabling automatic self-test scanning on page 235.
You can configure Symantec Scan Engine to obtain uncertified definition updates with Rapid Release. You can configure Symantec Scan Engine to retrieve Rapid Release definitions from every 5 minutes to every 120 minutes. Rapid Release definitions are created when a new threat is discovered. Rapid Release definitions undergo basic quality assurance tests by Symantec Security Response. However, they do not undergo the intense testing that a LiveUpdate release requires. Symantec updates Rapid Release definitions as needed to respond to high-level outbreaks. Rapid Release definitions are made available before the LiveUpdate definitions quality assurance process is complete. Rapid Release definitions provide a quick response to new threats and security risks. You can update Rapid Release definitions later on by more robust detection capabilities in certified definitions. See About Rapid Release on page 195.
17
Symantec Scan Engine can log events to the Symantec Security Information Manager (SSIM) for event management and correlation. Symantec Security Information Manager integrates multiple Symantec Enterprise Security products and third-party products to provide a central security control point within an organization. See Configuring Symantec Scan Engine to log events to SSIM on page 175.
Support for a Java API If your environment has Java, you can use the Java API plug-in and a .NET API (SymJavaAPI.jar) to integrate with Symantec Scan Engine. The Java API provides client antivirus scanning and repair services using the ICAP protocol. The Java API supports the FILEMOD and RESPMOD scanning modes, and it provides the ability to stream files. If your environment has the .NET Framework, you can use the .NET API plug-in (symcsmsnetapi.dll) to integrate with Scan Engine. The .NET API provides client antivirus scanning and repair services using the ICAP protocol. The .NET API supports the FILEMOD and RESPMOD scanning modes, and it provides the ability to stream files. For more information, see the Symantec Scan Engine Software Developer's Guide.
18
The software that you install Scan_Engine\ to protect your network from threats (such as viruses), security risks (such as adware and spyware), and unwanted content. The files that you can use to Scan_Engine\Silent_ perform a silent installation Install\ or upgrade. Also includes response files for Red Hat and Solaris. The software that acts as a client to Symantec Scan Engine through the Symantec Scan Engine application programming interface (API). The command-line scanner lets you send files to Symantec Scan Engine to be scanned. Command-Line_Scanner\
Silent installation
Command-line scanner
The tools and information Scan_Engine_SDK\ that you can use to create the customized integrations that use ICAP. The tool that you use to Tools\Central_Quarantine\ quarantine infected files that cannot be repaired when you use the ICAP protocol or RPC protocol. Symantec Central Quarantine server lets you isolate unrepairable files so that threats cannot spread.
19
LiveUpdate Administration The utility that you use to Tools\LiveUpdate_Admin\ Utility configure one or more intranet FTP, HTTP, or LAN servers to act as internal LiveUpdate servers. LiveUpdate lets Symantec products download program and definition file updates either directly from Symantec or from a LiveUpdate server. For more information, see the LiveUpdate Administrator's Guide on the product CD.
20
You can integrate Symantec Tools/MOM_Management_ Scan Engine events with Pack/ Microsoft Operations Manager 2005. Microsoft Operations Manager is a central repository that can receive critical events, errors, warnings, and other information from your Symantec Scan Engine servers. Preconfigured Rule Groups and Child Rule Groups are automatically created when you import the management pack. These rules monitor specific Symantec Scan Engine events in the Windows Event Log. When a rule is triggered, the Microsoft Operations Manager agent collects data about the event and forwards it to the Microsoft Operations Manager. For more information, see the Symantec Scan Engine Management Pack Integration Guide on the Symantec Scan Engine product CD.
The software that is required Tools\Java\ to access the Symantec Scan Engine console.
21
Symantec pcAnywhere (host A software solution that lets Technical_Support\Win32 only version) Symantec Technical Support access your computer remotely. This restricted version of pcAnywhere should only be installed when requested by Symantec support. Symantec pcAnywhere host version is for Windows platforms only.
Adobe Acrobat Reader is required to view the reports that are generated in .pdf format. You can download Adobe Acrobat Reader from http://www.adobe.com/.
Client-side antivirus application program interface (API) C library If you plan to integrate content scanning, you can use the antivirus API. HTTP content filtering and security risk scanning are not available with the antivirus API. Standard ICAP, based on the specification that is presented in RFC 3507 (April 2003)
For more information, see the Symantec Scan Engine Software Developer's Guide. You can configure client applications to pass files to Symantec Scan Engine through one of the supported communication protocols. You can configure Symantec Scan Engine to scan only the files that it receives from the client application. The client application must decide which files to scan and what to do with the results. The Symantec Scan Engine Software Developers Guide provides information about how to create customized integrations with ICAP. Symantec also provides a number of connectors for Symantec Scan Engine to make the integration with some third-party applications easier. Other software companies have developed
22
connectors for Symantec Scan Engine to provide content scanning for their products. If you have purchased Symantec Scan Engine with a connector, you might need to configure Symantec Scan Engine to work with the connector. You might also need to configure the third-party application to add threat, security risk, and URL scanning. Consult any documentation that is included with the connector in addition to this guide.
23
exceeds its threshold, Symantec Scan Engine rejects the scan request. It notifies the client that the server has reached the queued request threshold. The client can then adjust the load balancing, which prevents the server from being overloaded with scan requests. This feature lets the client applications that pass files to Symantec Scan Engine benefit from load-balanced scanning without any additional effort. See Allocating resources for Symantec Scan Engine on page 61. See Disabling the ICAP threshold client notification on page 228. The API keeps trying to contact Symantec Scan Engine unless one of the following events occur:
Five or more engines are not functioning It appears that a file that was scanned might have caused more than one Symantec Scan Engine to fail
If you use Symantec Scan Engine as a plug-in with RPC or ICAP, you might be able to configure the load balancing across multiple Symantec Scan Engines. This reconfiguration depends on the implementation. For more information, see the documentation for the plug-in.
24
Remote procedure call (RPC) is a client/server infrastructure that increases the interoperability and portability of an application. RPC lets the application be distributed over multiple platforms. The use of RPC frees the developer from having to be familiar with various operating systems and network interfaces. RPC simplifies the development of applications that span multiple operating systems and network protocols. The semantics of the remote procedure call remain the same whether or not the client and server are on the same computer. Symantec Scan Engine uses a proprietary scanning protocol with the MS-RPC protocol to interface with client applications. This protocol is supported only on Windows 2000 Server/Windows 2003 Server/Windows 2008 Server. Any appropriate client can use RPC to communicate with Symantec Scan Engine to request the scanning and repairing of files. See Working with the RPC protocol on page 90.
Introducing Symantec Scan Engine What you can do with Symantec Scan Engine
25
After you select a protocol, you must provide protocol-specific configuration information. The configuration options differ depending on the protocol that you select. See About the communication protocols on page 77. Detect threats You can configure Symantec Scan Engine to scan files and email messages for threats, such as viruses and Trojan horses. You can establish policies to process the documents that contain threats. You can also quarantine the infected files that cannot be repaired. See Enabling threat detection on page 103. See Quarantining infected files that cannot be repaired on page 105. Prevent potential threats You can filter files and email messages to further protect your network. See Configuring file size filtering on page 113. See Configuring file name filtering on page 111. See Configuring subject line content filtering on page 114. See Configuring message origin filtering on page 116. Symantec Scan Engine can also block certain types of the container files that might contain threats or malicious code. See Configuring Symantec Scan Engine to block unscannable container files on page 109.
26
Introducing Symantec Scan Engine What you can do with Symantec Scan Engine
Symantec Scan Engine protects your network from the file attachments that can overload the system and cause denial-of-service attacks. Denial-of-service attacks can include any of the following types of container files:
Files that contain large numbers of embedded, compressed files Files that are designed to maliciously use resources and degrade performance. To reduce your exposure to denial-of-service threats, you can impose limits to control how Symantec Scan Engine handles container files. See Setting container file limits on page 135. Specify the files to scan You can conserve bandwidth and time if you limit the files and messages that are scanned. See Specifying which files to scan on page 131. See Specifying the maximum file or message size to scan on page 134. Filter HTTP requests for unwanted content If your client uses ICAP, you can apply Uniform Resource Locator (URL) filtering to block access to sites that contain unwanted content. Symantec Scan Engine uses Symantec URL categories and Child Abuse Image Content (CAIC) URL categories to scan and block the unwanted URLs. See About categories on page 140.
Introducing Symantec Scan Engine What you can do with Symantec Scan Engine
27
Log events and review Symantec Scan Engine can send events to several logging event data and destinations. You can activate logging to each available destination statistics when you select the logging level that you want for that destination. You can then choose the logging levels for which Symantec Scan Engine generates log messages. Use the Symantec Scan Engine reporting functionality to view your log data and statistics. See About logging data on page 163. Issue alerts Symantec Scan Engine can send alerts through Simple Mail Transfer Protocol (SMTP) and Simple Network Management Protocol (SNMP). You also can activate outbreak alerts. Symantec Scan Engine can issue alerts when a certain number of the same types of threat or violations occur in a given time interval. Outbreak alerts provide an early warning of a potential outbreak so that you can take the necessary precautions to protect your network. See About configuring alerts on page 176. Monitor Symantec Scan Engine performance You can monitor Symantec Scan Engine to ensure that it operates at an optimal level for your environment. Continual monitoring ensures that you can make the necessary adjustments as soon as you detect a degradation in performance. See How to monitor Symantec Scan Engine performance on page 121. Keep your protection up-to-date You can update your content for Symantec Scan Engine. Content updates ensure that your network is up-to-date with the most current risk and URL definitions. You also can update Symantec Scan Engine with the latest definitions without any interruption to scanning or filtering operations. See About content updates on page 185.
28
Perform tasks from the The command-line scanner acts as a client to Symantec Scan command-line scanner Engine through the Symantec Scan Engine API. Use the command-line scanner to send files to Symantec Scan Engine to be scanned for threats. The command-line scanner also lets you take the following actions:
Repair infected files and delete those files that are unrepairable
Recursively descend into the subdirectories to scan multiple files Provide output information about the command-line scanner and scan engine operation. See About the Symantec Scan Engine command-line scanner on page 207.
Provides information about registration, www.symantec.com/licensing/els/help/ frequently asked questions, how to respond to en/help.html error messages, and how to contact Symantec License Administration Provides product news and updates www.enterprisesecurity.symantec.com
Provides access to the Virus Encyclopedia, www.symantec.com/security_response/ which contains information about all known index.jsp threats, information about hoaxes, and access to white papers about threats
Chapter
Before you install System requirements About installing Symantec Scan Engine Post-installation tasks Migrating to version 5.2.10 Uninstalling Symantec Scan Engine
Install Java 2SE Runtime Environment (JRE) 5.0 (update 13 or later) or JRE 6.0 on the server. The most current version of JRE 5.0 and JRE 6.0 at the time of product ship is provided on the product CD in the following folder: \Tools\Java\operating system platform
30
Disable any third-party antivirus products that are running on the server on which you plan to install Symantec Scan Engine. After installation is complete, you can re-enable antivirus protection. Note: Run another Symantec antivirus product on the server that runs Symantec Scan Engine to protect the server from threats. See About running other antivirus products on the Symantec Scan Engine server on page 30. Review the deployment considerations and recommendations. These recommendations could enhance your overall performance. See Deployment considerations and recommendations on page 128.
After you complete the installation, perform the post-installation tasks. See Post-installation tasks on page 47.
About running other antivirus products on the Symantec Scan Engine server
Symantec Scan Engine scans the files that client applications pass to Symantec Scan Engine. Symantec Scan Engine does not protect the computer on which it runs. Since Symantec Scan Engine processes files that might contain threats, the server on which it runs is vulnerable if it has no real-time protection. Use an antivirus program to protect the server on which Symantec Scan Engine runs, such as Symantec AntiVirus Corporate Edition. To prevent scanning conflicts, configure the antivirus program not to scan the temporary directory that Symantec Scan Engine uses for scanning. See Allocating resources for Symantec Scan Engine on page 61.
System requirements
Before you install Symantec Scan Engine, verify that your server meets the minimum system requirements. See Windows system requirements on page 31. See Solaris system requirements on page 31. See Linux system requirements on page 32.
31
Windows 2000 Server with the latest service pack Windows Server 2003 (32-bit) Windows Server 2003 Japanese (32-bit) Windows Server 2003 R2 (32-bit and 64-bit) Windows Server 2008 (32-bit and 64-bit) Windows Server 2008 R2 (64-bit)
Pentium 4 processor 3.4 GHz or higher 2 GB of RAM or higher 2 GB of hard disk space 10 GB of hard disk space for using URL Filtering feature
Hardware
1 network interface card (NIC) running TCP/IP with a static IP address Internet connection to update definitions
Software
J2SE Runtime Environment (JRE) 5.0 (update 13 or later) or JRE 6.0 The most current version of JRE 5.0 and JRE 6.0 at the time of product ship is provided on the product CD in the following folder: \Tools\Java\Win32 One of the following Web browsers to access the Symantec Scan Engine console Microsoft Internet Explorer 6 (SP1) or later Use Microsoft Internet Explorer to access the Symantec Scan Engine console from a Windows client computer. Mozilla Firefox 1.5 or later Use Mozilla Firefox to access the Symantec Scan Engine console from a Solaris or Linux client computer.
The Web browser is only required for Web-based administration. You must install the Web browser on a computer from which you want to access the Symantec Scan Engine console. The computer must have access to the server on which Symantec Scan Engine runs.
32
Operating system
Solaris 9 and 10 Ensure that your operating system has the latest service patches that are available.
SPARC 3.4 GHz or higher 2 GB of RAM or higher 2 GB of hard disk space 10 GB of hard disk space for using URL Filtering feature
Hardware
1 network interface card (NIC) running TCP/IP with a static IP address Internet connection to update definitions
Software
J2SE Runtime Environment (JRE) 5.0 (update 13 or later) or JRE 6.0 The most current version of JRE 5.0 and JRE 6.0 at the time of product ship is provided on the product CD in the following folder: \Tools\Java\Solaris If you install the self-extracting JRE, ensure that you note the installation location. You must provide the location of the JRE if the installer is unable to detect it. One of the following Web browsers to access the Symantec Scan Engine console: Mozilla Firefox 1.5 or later Use Mozilla Firefox to access the Symantec Scan Engine console from a Solaris or Linux client computer. Microsoft Internet Explorer 6 (SP1) or later Use Microsoft Internet Explorer to access the Symantec Scan Engine console from a Windows client computer.
The Web browser is only required for Web-based administration. You must install the Web browser on a computer from which you want to access the Symantec Scan Engine console. The computer must have access to the server on which Symantec Scan Engine runs.
33
Operating system
Red Hat Linux Enterprise Server 3 and 4 Red Hat Linux Advanced Server 3 and 4 Red Hat Enterprise Linux 5 (32-bit and 64-bit) SUSE Linux Enterprise Server 9 (32-bit) SUSE Linux Enterprise Server 10 and 11 (32-bit and 64-bit)
Pentium 4 processor 3.4 GHz or higher 2 GB of RAM or higher 2 GB of hard disk space 10 GB of hard disk space for using URL Filtering feature
Hardware
1 network interface card (NIC) running TCP/IP with a static IP address Internet connection to update definitions
34
Software
Ensure that the following packages are installed: GNU sharutils-4.6.1-2 or later Use this package to expand the Rapid Release packages. ncompress-4.2.4-44 or later Use this package to expand the Rapid Release packages. GNU C Library (glibc)
initscripts This package is required for Red Hat Linux only. aaa_base package This package is required for SUSE only. J2SE Runtime Environment (JRE) 5.0 (update 13 or later) or JRE 6.0 The most current version of JRE 5.0 and JRE 6.0 at the time of product ship is provided on the product CD in the following folder: \Tools\Java\RedHat Install the JRE using Red Hat Package Manager (RPM). Ensure that you note the installation location. You must provide the location of the JRE if the installer is unable to detect it. One of the following Web browsers to access the Symantec Scan Engine console: Mozilla Firefox 1.5 or later Use Mozilla Firefox to access the Symantec Scan Engine console from a Solaris or Linux client computer. Microsoft Internet Explorer 6 (SP1) or later Use Microsoft Internet Explorer to access the Symantec Scan Engine console from a Windows client computer. The Web browser is only required for Web-based administration. You must install the Web browser on a computer from which you want to access the Symantec Scan Engine console. The computer must have access to the server on which Symantec Scan Engine runs.
35
Symantec Scan Engine supports upgrades from version 5.2, 5.1, and 4.3x. You can select whether to upgrade the product and preserve your existing settings or to perform a clean installation. If you choose to do a clean installation, the installer removes the previous installation, and then installs the new version as a full installation. See Migrating to version 5.2.10 on page 66.
Version 5.0
Symantec Scan Engine does not support upgrades from version 5.0. If you are using version 5.0, uninstall version 5.0 and then install version 5.2.10.
Note: Symantec Scan Engine cannot be installed in high-ASCII and DBCS directories. During installation, Symantec Scan Engine installs a virtual administrative account. You are recommended to remember the password for this account as it is the only account used to manage Symantec Scan Engine. If you want to change the password in the console, you must have the old password. See Accessing the console on page 51. After you install Symantec Scan Engine, activate all applicable licenses. If you upgrade from a previous version that has valid licenses, when the installation is complete, Symantec Scan Engine automatically recognizes these licenses. See About licensing on page 71. Symantec Scan Engine is shipped with the minimum set of URL definitions. If you want to use URL filtering feature, ensure that you run LiveUpdate and get the latest URL definitions before you start URL scanning. See About filtering URLs on page 139. If Symantec Scan Engine fails to start before it can initiate standard logging, information about the failure is written to the abort log file (ScanEngineAbortLog.txt). This file is located in the installation directory. If you need to install or upgrade multiple Symantec Scan Engines on your network, you can use the silent installation or upgrade feature to facilitate the process. See About silent installation and upgrade on page 199.
36
(The service is stopped when the installer detects an upgrade.) When the installation is complete, Symantec Scan Engine is installed as a Windows 2000/2003/2008 service. It is listed as Symantec Scan Engine in the Services Console. The Symantec Scan Engine service starts automatically when the installation is complete. Any significant installation activities are recorded in the Windows Application Event Log. Before you begin the installation process, ensure that your computer meets the minimum system requirements. See System requirements on page 30. Select one of the following procedures for the type of installation or upgrade that you want to perform:
First time product installation See To install Symantec Scan Engine on Windows on page 36. Upgrade from a previous version and retain existing settings See To upgrade Symantec Scan Engine on Windows on page 37. Perform a clean upgrade Uninstalls your current version of Symantec Scan Engine and installs version 5.2.10 See To upgrade Symantec Scan Engine on Windows on page 37. See To configure clean upgrade installation options on Windows on page 39.
1 2 3 4
Log on to the computer on which you plan to install Symantec Scan Engine as administrator or as a user with administrator rights. On the Symantec Scan Engine installation CD, run ScanEngine.exe. In the Welcome panel, click Next. In the License Agreement panel, after you read the agreement, indicate that you agree with the terms of the Symantec Software License Agreement, and then click Next. The default setting is that you do not agree with the terms of the Symantec Software License Agreement. If you do not indicate that you agree, the installation is canceled.
In the Destination Folder panel, select the location to install Symantec Scan Engine, and then click Next. The default location is C:\Program Files\Symantec\Scan Engine for 32-bit Windows platform, and C:\Program Files (x86)\Symantec\Scan Engine for 64-bit Windows platform.
37
7 8
Click Next. In the URL filtering panel, select the provided option to enable URL filtering feature and downloading of URL definitions. You can also change the setting after installation. Go to Policies > Filtering > URL to enable this option.
10 Click Finish.
To upgrade Symantec Scan Engine on Windows
1 2 3
Log on to the computer on which you plan to install Symantec Scan Engine as administrator or as a user with administrator rights. On the Symantec Scan Engine installation CD, run ScanEngine.exe. In the Welcome panel, click Next.
38
In the License Agreement panel, after you read the agreement, indicate that you agree with the terms of the Symantec Software License Agreement, and then click Next. The default value is that you do not agree with the terms of the Symantec Software License Agreement. If you do not indicate that you agree, the installation is canceled.
In the Upgrade the Scan Engine panel, select one of the following upgrade options:
Preserve existing settings Do all of the following steps:
Click Upgrade and preserve existing settings, (upgrades your version configuration and data. of Symantec Scan Click Next. Engine while Click Install. preserving your When the installer is complete, click Finish. existing settings)
Clean upgrade
(uninstalls your Click Clean upgrade. Do not preserve any existing version of Symantec settings, configuration or data. Scan Engine and Click Next. installs version 5.2.10) Configure the clean upgrade configuration options. See To configure clean upgrade installation options on Windows on page 39.
39
In the Destination Folder panel, select the location to install Symantec Scan Engine, and then click Next. The default location is C:\Program Files\Symantec\Scan Engine for 32-bit Windows platform, and C:\Program Files (x86)\Symantec\Scan Engine for 64-bit Windows platform.
3 4
Click Next. In the URL filtering panel, select the provided option to enable URL filtering feature and downloading of URL definitions. You can also change the setting after installation. Go to Policies > Filtering > URL to enable this option.
5 6
In the Ready to Install the Program panel, click Install. Click Finish.
40
First time product installation See To initiate the installer for Linux on page 40. See To install Symantec Scan Engine on Linux on page 41. Upgrade from a previous version and retain existing settings See To initiate the installer for Linux on page 40. See To upgrade Symantec Scan Engine on Linux on page 42. Perform a clean upgrade Uninstalls your current version of Symantec Scan Engine and installs version 5.2.10 See To initiate the installer for Linux on page 40. See To upgrade Symantec Scan Engine on Linux on page 42. See To configure clean upgrade installation options on Linux on page 43.
1 2
Login to the computer on which you want to install Symantec Scan Engine as root. Change directories to the location where the ScanEngine.sh file is located on the product CD. <drive>:\Scan_Engine\RedHat\
41
Indicate the location where JRE 5.0 (update 13 or later) or JRE 6.0 is located. You only need to provide this information if the installer does not find the appropriate version. If you need to install the most current version of JRE 5.0 or JRE 6.0, it is included on the product CD in the following location: \Tools\Java\RedHat JRE 5.0 (update 13 or later) or JRE 6.0 must be installed to continue the product installation.
After you review with the Symantec license agreement, press Y to indicate that you agree with the terms of the agreement. If you indicate No, the installation is canceled.
Select the location to install Symantec Scan Engine, and then press Enter. The default location is /opt/SYMCScan.
When you are prompted whether you want Symantec Scan Engine to run as root, select one of the following settings:
Yes No Symantec Scan Engine is installed to run as root. Symantec Scan Engine is installed not to run as root. Default setting.
If you selected not to run Symantec Scan Engine as root, type the user account that you want to use. The user account must already exist.
Select the port number on which the Web-based console listens. The default port number is 8004. If you change the port number, use a number that is greater than 1024 that is not in use by any other program or service. You can disable the console by typing 0. If you disable the console, you can configure Symantec Scan Engine by editing the configuration data XML file. See Editing the Symantec Scan Engine configuration files on page 221.
Specify the Secure Socket Layer (SSL) port number on which encrypted files are transmitted for increased security. The default SSL port number is (8005). If this port is already in use, specify a SSL port that is not in use by any other program or service. Use a port number that is greater than 1024.
42
8 9
Type a password for the virtual administrative account, and then confirm the password by typing it again. Press Y to specify if you want to enable URL filtering and download URL definitions. You can also change the setting after installation. Go to Policies > Filtering > URL to enable this option. The installer proceeds from this point with the installation. See Post-installation tasks on page 47.
Indicate the location where JRE 5.0 (update 13 or later) or JRE 6.0 is located. You only need to provide this information if the installer does not find the appropriate version. If you need to install the most current version of JRE 5.0 or JRE 6.0, it is included on the product CD in the following location: \Tools\Java\RedHat JRE 5.0 (update 13 or later) or JRE 6.0 must be installed to continue the product installation.
After you review with the Symantec license agreement, press Y to indicate that you agree with the terms of the agreement. If you indicate No, the installation is canceled.
43
Select the location to install Symantec Scan Engine, and then press Enter. The default location is /opt/SYMCScan.
When you are prompted whether you want Symantec Scan Engine to run as root, select one of the following settings:
Yes No Symantec Scan Engine is installed to run as root. Symantec Scan Engine is installed not to run as root. Default setting.
If you selected not to run Symantec Scan Engine as root, type the user account that you want to use. The user account must already exist.
Specify the port number on which the Web-based console listens. The default port number is 8004. If you change the port number, use a number that is greater than 1024 that is not in use by any other program or service. You can disable the console by typing 0. If you disable the console, you can configure Symantec Scan Engine by editing the configuration data XML file. See Editing the Symantec Scan Engine configuration files on page 221.
Specify the Secure Socket Layer (SSL) port number on which encrypted files are transmitted for increased security. The default SSL port number is (8005). If this port is already in use, specify a SSL port that is not in use by any other program or service. Use a port number that is greater than 1024.
6 7
Type a password for the virtual administrator, and then confirm the password by typing it again. Press Y to specify if you want to enable URL filtering and download URL definitions. You can also change the setting after installation. Go to Policies > Filtering > URL to enable this option. The installer proceeds from this point with the installation. See Post-installation tasks on page 47.
44
First time product installation See To initiate the installer for Solaris on page 44. See To install Symantec Scan Engine on Solaris on page 45. Upgrade from a previous version and retain existing settings See To initiate the installer for Solaris on page 44. See To upgrade Symantec Scan Engine on Solaris on page 46. Perform a clean upgrade Uninstalls your current version of Symantec Scan Engine and installs version 5.2.10 See To initiate the installer for Solaris on page 44. See To upgrade Symantec Scan Engine on Solaris on page 46. See To configure clean upgrade installation options on Solaris on page 46.
1 2
Login to the computer on which you want to install Symantec Scan Engine as root. Change directories to the location where the ScanEngine.sh file is located on the product CD. <drive>:\Scan_Engine\Solaris\
45
Indicate the location where JRE 5.0 (update 13 or later) or JRE 6.0 is located. You only need to provide this information if the installer does not find the appropriate version. If you need to install the most current version of JRE 5.0 or JRE 6.0, it is included on the product CD in the following location: \Tools\Java\Solaris JRE 5.0 (update 13 or later) or JRE 6.0 must be installed to continue the product installation.
After you review with the Symantec license agreement, press Y to indicate that you agree with the terms of the agreement. If you indicate No, the installation is canceled.
Select the location to install Symantec Scan Engine, and then press Enter. The default location is /opt/SYMCScan.
When you are prompted whether you want Symantec Scan Engine to run as root, select one of the following settings:
Yes No Symantec Scan Engine is installed to run as root. Symantec Scan Engine is installed not to run as root. Default setting.
If you selected not to run Symantec Scan Engine as root, type the user account that you want to use. The user account must already exist.
Specify the port number on which the Web-based console listens. The default port number is 8004. If you change the port number, use a number that is greater than 1024 that is not in use by any other program or service. You can disable the console by typing 0. If you disable the console, you can configure Symantec Scan Engine by editing the configuration data XML file. See Editing the Symantec Scan Engine configuration files on page 221.
Specify the Secure Socket Layer (SSL) port number on which encrypted files are transmitted for increased security. The default SSL port number is (8005). If this port is already in use, specify a SSL port that is not in use by any other program or service. Use a port number that is greater than 1024.
46
8 9
Type a password for the virtual administrative account, and then confirm the password by typing it again. Press Y to specify if you want to enable URL filtering and download URL definitions. You can also change the setting after installation. Go to Policies > Filtering > URL to enable this option. The installer proceeds from this point with the installation. See Post-installation tasks on page 47.
Indicate the location where JRE 5.0 (update 13 or later) or JRE 6.0 is located. You only need to provide this information if the installer does not find the appropriate version. If you need to install the most current version of JRE 5.0 or JRE 6.0, it is included on the product CD in the following location: \Tools\Java\Solaris JRE 5.0 (update 13 or later) or JRE 6.0 must be installed to continue the product installation.
1 2
Press Y to confirm your understanding that Symantec Scan Engine cannot be installed if you quit at any time during the installation process. After you review with the Symantec license agreement, press Y to indicate that you agree with the terms of the agreement. If you indicate No, the installation is canceled.
47
Select the location to install Symantec Scan Engine, and then press Enter. The default location is /opt/SYMCScan.
When you are prompted whether you want Symantec Scan Engine to run as root, select one of the following settings:
Yes No Symantec Scan Engine is installed to run as root. Symantec Scan Engine is installed not to run as root. Default setting.
If you selected not to run Symantec Scan Engine as root, type the user account that you want to use. The user account must already exist.
Specify the port number on which the Web-based console listens. The default port number is 8004. If you change the port number, use a number that is greater than 1024 that is not in use by any other program or service. You can disable the console by typing 0. If you disable the console, you can configure Symantec Scan Engine by editing the configuration data XML file. See Editing the Symantec Scan Engine configuration files on page 221.
Specify the Secure Socket Layer (SSL) port number on which encrypted files are transmitted for increased security. The default SSL port number is (8005). If this port is already in use, specify a SSL port that is not in use by any other program or service. Use a port number that is greater than 1024.
8 9
Type a password for the virtual administrative account, and then confirm the password by typing it again. Press Y to specify if you want to enable URL filtering and download URL definitions. You can also change the setting after installation. Go to Policies > Filtering > URL to enable this option. The installer proceeds from this point with the installation. See Post-installation tasks on page 47.
Post-installation tasks
The post-installation tasks are as follows:
48
Verifying, stopping, and restarting the Symantec Scan Engine daemon on Linux and Solaris Verifying, stopping, and restarting the Symantec Scan Engine service on Windows Clearing the Java cache Accessing the console Enhancing security for the HTTPS servers and SSL servers Allocating resources for Symantec Scan Engine
Verifying, stopping, and restarting the Symantec Scan Engine daemon on Linux and Solaris
Symantec Scan Engine starts automatically as a daemon when the installation is complete. A transcript of the installation is saved as /var/log/SYMCScan-install.log for later review. You can verify whether the service is running after you install the product. You might need to stop and restart the Symantec Scan Engine daemon. When you do, the client applications that are submitting files for scanning can lose their connection to Symantec Scan Engine. The client applications must re-establish their connections and resubmit files for scanning. Note: Symantec Scan Engine might take longer to start than it did in versions before 5.0.
49
To verify that the Symantec Scan Engine daemon is running on Linux and Solaris
If nothing is displayed, the Symantec Scan Engine daemon did not start.
If the Symantec Scan Engine daemon did not start, type the following command:
/etc/init.d/symcscan restart
With the new configuration, Symantec Scan Engine might take longer to start than it did in previous versions. To stop and restart the Symantec Scan Engine daemon on Solaris and Linux
1 2
Login to the computer as root. At the command prompt, type one of the following commands:
To stop the service To start the service To stop and immediately restart the service /etc/init.d/symcscan stop
/etc/init.d/symcscan start
/etc/init.d/symcscan restart
Verifying, stopping, and restarting the Symantec Scan Engine service on Windows
Symantec Scan Engine starts automatically as a service when the installation is complete. You can verify whether the service is running after you install the product. You might need to stop and restart the Symantec Scan Engine service. When you do, the client applications that are submitting files for scanning can lose their connection to Symantec Scan Engine. The client applications must reestablish their connections and resubmit files for scanning.
50
Note: Symantec Scan Engine might take longer to start than it did in versions before 5.0. To verify that the Symantec Scan Engine service is running on Windows
1 2 3 4
In the Windows Control Panel, click Administrative Tools. In the Administrative Tools window, click Services. In the list of services, browse and locate Symantec Scan Engine. Verify that the status indicates Started.
1 2 3
In the Windows Control Panel, click Administrative Tools. In the Administrative Tools window, click Services. In the list of services, right-click Symantec Scan Engine, and do one of the following steps:
To stop the service To start the service To stop and immediately restart the service Click Stop. Click Start. Click Restart.
1 2 3 4
In the Java Control Panel dialog box, on the General tab, click Settings. Click View Applets. Select all of the items in the table and click Delete. Uncheck Enable Caching. This step disables the Java caching feature.
Click OK until you have closed all of the Java Control Panel dialog boxes.
51
Each time that you start a new browser session, log in, and open the console, the Home page appears. If the browser session continues to run, you return to the page that you were on when you logged off or when the session times-out. Only one user should use the console at a time to avoid possible race conditions and configuration change conflicts.
52
1 2
Launch a Web browser on any computer on your network that can access the server that is running Symantec Scan Engine. In a Web browser, type the following address: https://<servername>:<port>/ where <servername> is the host name or IP address of the server that is running Symantec Scan Engine and <port> is the port number that you selected during installation for the built-in Web server. The default port number is 8004.
3 4 5
If a Security Alert dialog box appears, click Yes to confirm that you trust the integrity of the applet, and then click Yes to display the Web page. In the Enter Password box, type the password for the administrative account. Press Enter.
Content area
53
Figure 2-2
Resizing bar
Sidebar
Management operations are grouped into the following categories on the primary navigation bar:
Home Shows the recent activity and system metrics that are calculated since the last restart. Use to configure Symantec Scan Engine to provide scanning for client applications and set limits to protect server resources. Use to specify scanning policies for mail, file properties, URL filtering, and antivirus scanning. You can also configure custom user messages. Use to examine scanning statistics, load statistics, logging status, and log data. Use to configure logging and alerting options, outbreak management, and monitor scan requests. Use to perform the following actions:
Configuration
Policies
Reports
Monitors
System
Manage the Symantec Scan Engine administrator account Install new license keys Check the status of the license keys that are installed Update definitions
54
Use the toolbar icons in the Symantec Scan Engine console to perform the following actions:
Save Saves your changes to the XML configuration files. Your changes are saved but Symantec Scan Engine does not implement them until you apply the changes. You can continue to make changes to the Symantec Scan Engine configuration through the console. Apply Applies all of your changes. Some changes can be applied without restarting Symantec Scan Engine. Other changes do not take effect until the service is restarted. When you click "Apply," you initiate the necessary actions to apply all of the changes. You are prompted to perform a manual restart if one is necessary. Cancel Returns the configuration settings to the values that you last saved. Refreshes the display. Logs you out of Symantec Scan Engine. Opens the online help file.
The toolbar also displays messages about the status of Symantec Scan Engine and any pending changes that need to be saved. The "Changes pending" message indicates that during the session, you have interacted with the console in some way. "Changes pending" does not necessarily mean that you have made modifications to any settings. For example, if you enable an option and then immediately disable it, "Changes pending" appears on the toolbar. "Changes pending" also appears if you click a drop-down menu to view the available options, but you do not select a different option.
55
or service. Do not use port number 443, which is the default port number for secure Web server connections. You are also prompted upon installation to assign a Secure Socket Layer (SSL) port number on which encrypted files are transmitted for increased security. (The default port number is 8005.) If you change the port number, use a number that is equal to or greater than 1024. No other program or service should use the port number that you choose. Note: When you configure your firewall, ensure that you do not block the ports for the built-in HTTPS server and the SSL. See Enhancing security for the HTTPS servers and SSL servers on page 55.
56
To import keys from a third-party certificate with the Certificate Import Utility graphical user interface
At the command line, change directories to the Symantec Scan Engine installation directory. The default installation directories are as follows:
Windows Linux and Solaris C:\Program Files\Symantec\Scan Engine /opt/SYMCscan/bin
Type the following to start the graphical user interface for the utility: java -jar certinstall.jar --gui
3 4 5
In the Certificate Import Utility for Symantec Scan Engine 5.2.10 window, click Load Certificate File. In the Load PFX/PKCS#12 Certificate File window, select the certificate file that you want to import. In the Enter password for certificate window, type the password for the certificate. A text representation of the certificate appears.
6 7
Click Import. In the Select destination directory window, select the directory to where you want to import the file. The keystore file that is created when you import the certificate is maintained in this directory. You must select the Symantec Scan Engine default installation directory.
Click OK. The file keyStore.private is created and placed in the destination directory.
57
At the command line, change directories to the Symantec Scan Engine installation directory. The default installation directories are as follows:
Windows Linux and Solaris C:\Program Files\Symantec\Scan Engine /opt/SYMCscan/bin
58
1 2
Stop the Symantec Scan Engine service. In the installation directory, delete the following files: keyStore.private keyStore.public
See Verifying, stopping, and restarting the Symantec Scan Engine service on Windows on page 49. See Verifying, stopping, and restarting the Symantec Scan Engine daemon on Linux and Solaris on page 48.
Confirm
59
Note: If you change the administrator server address through the console, you must close and reopen the console. To access the console after the change, you must update the URL address to include the new administrator address.
Administrator port number The Web-based interface binds to a TCP/IP port number. You are prompted to provide an administrator port number during installation. You can change the port number through the console. If you change the administrator port number, use a number that is equal to or greater than 1024. No other program or service should use the port number that you choose.
Note: If you change the port number through the console, you
must close and reopen the console. To access the console after the change, you must update the URL address to include the new port number. SSL port Symantec Scan Engine uses a Secure Socket Layer (SSL) port to transmit files securely. You are prompted to provide an SSL port number during installation. You can change the port number through the console. If you change the SSL port number, use a number that is equal to or greater than 1024. No other program or service should use the port number that you choose.
Note: You must close and reopen the console for the new SSL port
setting to take effect. Administrator timeout By default, Symantec Scan Engine is configured to automatically log off the administrator after a period of inactivity. The default period of inactivity is 300 seconds (five minutes). You can change the default time-out period. The minimum value is 60 seconds.
Note: You must close and reopen the console for the new timeout
interval setting to take effect.
1 2
In the console on the primary navigation bar, click System. In the sidebar under Views, click Administrator Settings.
60
3 4 5
In the content area under Administrator Password, in the New password box, type the new password for the virtual administrative account. In the Confirm box, type the new password again to confirm it. Under Administrator Settings, in the Administrator server address box, type a bind address, if necessary. By default, Symantec Scan Engine binds to all interfaces. Specify the appropriate bind address to restrict administrative access.
In the Administrator port number box, type a port number. The default setting is port 8004. If you change the port number, choose a port number that is exclusive to Symantec Scan Engine interface and that is greater than 1024. Do not use port number 80. To disable the console, type 0. If you disable the console, you must configure Symantec Scan Engine by editing the configuration file. See Editing the Symantec Scan Engine configuration files on page 221.
In the SSL port box, type a secure port number. The default setting is port 8005. If you change the port number, choose a port number that is exclusive to Symantec Scan Engine and that is between 1024 and 65535. Do not use port number 80 or port 443.
In the Administrator timeout box, type the period of inactivity, in seconds, after which the administrator is automatically logged off. The default period of inactivity is 300 seconds (five minutes). The minimum value is 60 seconds; the maximum value is 3600 seconds (60 minutes).
You must close and reopen the console for the changes to the administrator settings (except the Administrator Server address) to take effect.
61
62
Volume of data being scanned Number of the client applications that make requests Available memory and disk space Number of scanning threads
Note: If you use the RPC protocol and support multiple RPC
clients, Symantec Scan Engine creates a separate pool of threads for each RPC client. (The RPC clients do not share a common pool of threads.) The number of available threads for scanning that you select for this setting is applied to each RPC client individually.
63
Logs the event to the logging destinations Rejects the scan request Notifies the client that the server is too busy to process the request
When the ICAP threshold notification feature is disabled, Symantec Scan Engine continues to queue all incoming requests after the threshold is exceeded until a thread becomes available. You can configure the threshold for queued requests for Symantec Scan Engine. The client can then adjust the load balancing, which prevents the server from being overloaded with scan requests.
Note: For logging to occur at maximum load, the logging level for
the logging destination must be set to Warning or higher.
64
Log or send alert for Symantec Scan Engine generates log entries and alerts at a maximum load every _ prescribed interval to notify you that it is at the maximum minutes threshold for scan requests. The alert interval is the number of minutes between each log entry or alert. The default interval is every five minutes. If you change the interval, select one that is informative but does not result in an excessive number of log entries or alerts. You receive an SMTP alert every <n> minutes when Symantec Scan Engine rejects a scan request because it is too busy when all of the following conditions are met:
The ICAP threshold client notification feature is enabled (default setting). See What's new on page 14. You enable SMTP alerts.
You configure "Log or send alert for maximum load every __ minutes."
Symantec Scan Engine posts log entries and sends SNMP alerts for each event in which a scan request is rejected because the server is too busy. See Activating SMTP alerts on page 176. In-memory file processing Symantec Scan Engine can decompose and scan the contents of container files in memory, which eliminates the latency imposed by on-disk scanning. This feature can improve performance in environments in which large volumes of container and archive file formats are routinely submitted for scanning. You can limit the resources that are consumed for processing files in memory by specifying the following values: The maximum RAM to use for the in-memory file system (in megabytes) The maximum file size that can be stored within the in-memory file system (in megabytes)
1 2
In the console on the primary navigation bar, click Configuration. In the sidebar under Views, click Resources.
65
In the content area under System Scanning Resources, in the Temporary directory for scanning box, type the temporary directory to be used for scanning. Configure the client antivirus software to avoid all scans of the Symantec Scan Engine temporary directory (for example, real-time scans, manual scans, and scheduled scans). This reconfiguration prevents the client software from scanning files before they are sent to Symantec Scan Engine for scanning.
In the Number of available threads for scanning box, type the maximum number of scanning threads that are allowed for scanning. The default setting is 128. The maximum recommended value is 512.
In the Threshold number of queued requests box, type the threshold number of queued requests that Symantec Scan Engine considers to be at maximum load. The default setting is 100.
In the Log or send alert for maximum load every __ minutes box, type the alert interval in minutes. The default setting is 5 minutes.
Under Server Resources, in the Maximum RAM used for in-memory file system box, type the maximum amount of RAM that can be used for the in-memory file system. The default setting is 16 MB. The maximum setting is 2048 MB (2 GB).
In the Maximum file size stored within the in-memory file system box, type the maximum file size that can be stored in the in-memory file system. The default setting is 3 MB. The maximum setting is 2048 MB (2 GB). Files that exceed the specified size are written to the disk.
66
Note: Symantec Scan Engine does not support upgrades from version 5.0. You must stop the Symantec Scan Engine service before you upgrade the software. If you cancel the upgrade on Solaris after selecting the upgrade type, you must reinstall the previous version. See Verifying, stopping, and restarting the Symantec Scan Engine service on Windows on page 49. If you are upgrading from version 5.2/5.1 and use security certificates, take the following actions:
If you use the default security files that Symantec Scan Engine generated, delete the keystore.public and keystore.private before you perform the upgrade installation.
67
If you use custom security files, you can retain the custom security files. Symantec Scan Engine automatically uses the existing files when you upgrade.
The ArchiveTypes setting from version 4.3 is not preserved. Instead, the DecEngines setting in version 5.2.10 uses a default value. Exclusion lists are not upgraded. For security reasons, changes were made to the default exclusion list. Version 5.2.10 does not support inclusion lists. Domain blocking settings are not preserved, and the syntax of the entries has changed. The previous settings are saved into an upgrade folder in the installation directory for review and re-entry by the user in the new format. If "Enable trickle" is selected, then "Blocking by File Name" and "Blocking by File Size" are disabled after the upgrade. If the LiveUpdate interval in Symantec Scan Engine 4.3 is set to a value that is not supported in Symantec Scan Engine 5.2.10, then the interval is reset to every 2 hours. Upgrades on Linux and Solaris run under the configured user of the previous installation. To change the user that Symantec Scan Engine runs as, uninstall the existing installation, and perform a clean installation of version 5.2.10. The installation user interface asks what (non-root) user you want Symantec Scan Engine to run as. Symantec Scan Engine tries to use port 8005 after an upgrade for the Secure Socket Layer (SSL). If that port is in use, manually change the SSL port to an available port number. Then restart the Symantec Scan Engine. See About the built-in HTTPS server on page 54. If you upgrade from version 4.3.7 or later, the maximum file size settings are not preserved. The maximum file size threshold is automatically set to 2,147,483,648 bytes (2 GB).
Table 2-4 provides information about how the configuration files are affected after an upgrade from version 4.3x.
68
69
Existing local log files are retained. The logs in version 5.2.10 use a different format. Data from previous log files are not included in the reports that are generated in version 5.2.10.
filtering.xml
All DDR-related tags have been removed. The permissible value for FilteringMode parameter has been changed and a new parameter EnableFilteringAndDownloadDefinitions has been added to the file. The Locale parameter has been removed.
70
1 2 3 4
Log on to the computer as administrator or as a user with administrator rights. In the Add or Remove Programs Control Panel, click Symantec Scan Engine. Click Remove. Follow the on-screen instructions to complete the uninstallation.
1 2
Login to the computer as root. At the command prompt, type the following command: pkgrm SYMCScan
1 2
Login to the computer as root. At the command prompt, type the following command: rpm -e SYMCScan
Chapter
Activating licenses
This chapter includes the following topics:
About licensing
You activate key features for Symantec Scan Engine when you install the appropriate license. Key features include scanning for threats and security risks, HTTP content filtering, and related updates. You install the licenses through the Symantec Scan Engine console. For complete scanning functionality and definition updates, you need the following licenses:
Product licenses Product licenses activate scanning functionality. The AV Scanning license activates the threat scanning features and security risk scanning features. The URLFiltering license activates the HTTP URL filtering features. See About scanning for risks on page 101. See About categories on page 140. Content licenses Content licenses let you receive product updates. The AV Content license lets you receive updated threat and security risk definitions. Updated definitions ensure that your server is protected from risks. The URL Content license lets you receive updated Content Category lists. See About definition updates on page 185.
72
You must have valid product licenses to configure the product and to access the threat (antivirus), security risk, and HTTP content filtering features. Without valid product licenses, you cannot access these features in the console. The first time that you open the console after installation, only the License view is active. You must install the AV Scanning license to access the Configuration, Reports, Monitors, and System pages in the console. You must have the AV Scanning and URL Filtering licenses installed to access the Policies pages. Note: If you upgrade from a previous version and your licenses are current, Symantec Scan Engine automatically recognizes these licenses. You do not need to reinstall your licenses. Symantec Scan Engine installs with the most current definitions that are available at the time the product is released. After you install the product and active the licenses, perform a definition update to obtain the most current definitions. If you discover a problem with the new definitions, revert to the definitions that were shipped with the product. See Rolling back definitions on page 197. When a license is within 60 days of its expiration date, it is considered to be in a warning period. After a license expires, the licensed feature continues to operate for a specified period of time. This specified period of time is the grace period. If the grace period expires with no license renewal, all record of the license is removed. To regain product functionality when your license expires, you must renew and reactivate your license subscription. You can configure Symantec Scan Engine to generate log entries when a license is in the warning period or the grace period. See About logging data on page 163. See Checking the license status on page 75.
73
reasons, the license certificate is not included in the Symantec Scan Engine software distribution package. If you upgrade from a previous version and you have an active maintenance contract, you might receive the serial number certificate with an upgrade insurance letter. See If you do not have a serial number on page 73. License activation involves the following process:
Obtain a license file from Symantec. To request a license file, you must have the license serial number for each license that you want to activate. After you complete the registration process, Symantec sends you the appropriate license file by email. See Obtaining a license file on page 73. Install the license file. You must install the content licenses and product licenses on each server on which you run Symantec Scan Engine. When you install the licenses, you can enable the scanning processes and update your product and its associated content. See Installing the license file on page 74.
74
The license file that Symantec sends to you is contained within a .zip file. The .slf file that is contained within the .zip file is the actual license file. Ensure that your inbound email environment permits .zip email message attachments. Warning: License files are digitally signed. If you try to edit a license file, you render it invalid. To obtain a license file
In a Web browser, type the following address: https://licensing.symantec.com Your Web browser must use 128-bit encryption to view the site.
2 3
If a Security Alert dialog box appears, click OK. Follow the procedures on the Symantec Licensing Portal to register your license and request your license file. Symantec sends you an email message that contains the license file in an attachment. If the email message does not arrive within two hours, an error might have occurred. Try again to obtain the license file through the Symantec Web site. If the problem continues, contact Symantec Technical Support. See Where to get more information on page 28.
When you receive the email message from Symantec that contains the license file, save the file that is attached to the email message to the computer from which you intend to access the Symantec Scan Engine console. In the console on the primary navigation bar, click System. If no license has been installed, when you open the console, the System tab appears by default.
75
3 4 5 6 7
In the sidebar under Views, click License. Under Tasks, click Install License. In the Install License window, click Browse. In the Load File window, browse to the folder location where you saved the license file, select it, and then click Open. In the Install License window, click Install. A status message indicates that the license was successfully installed.
When you receive the email message from Symantec that contains the license file, do one of the following steps:
In Windows, save the license file in the following location: C:\Program Files\Common Files\Symantec Shared\Licenses In Solaris or Linux, save the license file in the following location: /opt/Symantec/Licenses
Note: You must restart Symantec Scan Engine manually after saving the license files.
76
Table 3-1 describes the license information that is displayed on the License page. Table 3-1 Column
Feature Expiration
Fulfillment ID
The Quick Status pane on the Home page also displays the licenses that are installed. When a license is about to expires, the License page displays the grace period. To check the license status
1 2
In the console on the primary navigation bar, click System. In the sidebar under Views, click License. The licensing information appears in the content area.
Chapter
About the communication protocols About working with ICAP Working with the native protocol Working with the RPC protocol Editing the service startup properties
78
Configuring scanning services for client applications About the communication protocols
Symantec Scan Engine Symantec Scan Engine includes its own native protocol. The native native protocol protocol is a TCP/IP protocol. It is text-based like HTTP or SMTP. It uses ASCII commands and responses to communicate between the client and the server. See Working with the native protocol on page 88. Remote procedure call If you use Windows, you can use a proprietary scanning protocol (RPC) with the MS-RPC protocol to interface with client applications. This option is not available for Solaris or Linux. See Working with the RPC protocol on page 90.
RPC protocol
Threat detection See Enabling threat detection on page 103. Data trickling See Enabling data trickle on page 87. Security risk detection See Enabling security risk detection on page 106. Container processing limits See Setting container file limits on page 135.
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Configuring scanning services for client applications About the communication protocols
79
Supported services by protocol (continued) Internet Content Native protocol Adaptation Protocol (ICAP)
Supported Supported
RPC protocol
Partial and encrypted malformed MIME detection See Configuring Symantec Scan Engine to block unscannable container files on page 109. File name filtering See Configuring file name filtering on page 111. File or attachment size filtering See Configuring file size filtering on page 113. Scanning by file extension and file type See Specifying which files to scan on page 131. Scanning by file size See Specifying the maximum file or message size to scan on page 134. Message origin filtering See Configuring message origin filtering on page 116. Subject line content filtering See Configuring subject line content filtering on page 114. Quarantining infected files See Quarantining infected files that cannot be repaired on page 105.
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
80
Configuring scanning services for client applications About the communication protocols
Supported services by protocol (continued) Internet Content Native protocol Adaptation Protocol (ICAP)
Supported
RPC protocol
HTTP content filtering See How to filter a URL on page 154. Logging events to the following destinations:
Supported
Supported
Supported
Local logs See About configuring local logging on page 169. Windows Application Event Log See Configuring logging to the Windows Application Event Log on page 174. Statistics Log See Enabling statistics reporting on page 173. Symantec Security Information Manager See Configuring Symantec Scan Engine to log events to SSIM on page 175. Abort log See Logging destinations on page 163. Supported
RPC client logging See Logging to the RPC client logging subsystem on page 97. Monitor scanning requests See Monitoring scanning requests on page 121. Supported Supported
Supported
Configuring scanning services for client applications About working with ICAP
81
Supported services by protocol (continued) Internet Content Native protocol Adaptation Protocol (ICAP)
Supported
RPC protocol
Continuous self-test scanning See Disabling automatic self-test scanning on page 235. Notification to the ICAP client that the queued requests threshold is reached See Allocating resources for Symantec Scan Engine on page 61. See Disabling the ICAP threshold client notification on page 228. SMTP and SNMP alert and outbreak notifications See About configuring alerts on page 176. Command-line scanning See About the Symantec Scan Engine command-line scanner on page 207.
Supported
Supported
Supported
Supported
Supported
Supported
82
Configuring scanning services for client applications About working with ICAP
When you use ICAP as the communication protocol, Symantec Scan Engine initially provides information to the ICAP client about which file types to scan. This information is based on the configuration of Symantec Scan Engine. If the file extension is one that is identified for scanning, the ICAP client forwards the entire file to Symantec Scan Engine. If the file extension is unknown or is not one that is identified for scanning, the ICAP client forwards the first few bytes of the file. Symantec Scan Engine examines the first few bytes of the file to determine whether the file might contain a threat or security risk. Based on this examination, Symantec Scan Engine might request and scan a file even when it is not identified for scanning. Symantec Scan Engine also scans POST transactions (sending data from a Web browser to a server using the HTTP protocol). When a threat or security risk is detected in a POST transaction file, Symantec Scan Engine blocks the file without trying to repair it. An HTTP message informs the posting client that a risk was detected and that the file was blocked.
Configuring scanning services for client applications About working with ICAP
83
Note: You can use 127.0.0.1 (the loopback interface) to let only
the clients that are running on the same computer connect to Symantec Scan Engine. Port number The port number must be exclusive to Symantec Scan Engine. You must use the same port number for all of the scanning IP addresses that you want to bind to Symantec Scan Engine. The default port number is 1344. If you change the port number, use a number that is equal to or greater than 1024. No other program or service should use this port number.
84
Configuring scanning services for client applications About working with ICAP
Note: If you use the data trickle feature, the ICAP scan policy can
only be set to "Scan only." When you enable data trickle, the ICAP scan policy is set automatically. See Warnings and limitations about data trickle on page 86. Enable trickle You can use the data trickle feature to provide users with a quicker download response. Data trickle can also prevent potential session time-out errors when users download files from the Internet. When you enable data trickle, the requested file is sent (trickled) to the user in small amounts at regular intervals until the scan is complete. See Enabling data trickle on page 87. Time before data trickle starts You can specify how long Symantec Scan Engine should wait before data trickling starts. Data trickle does not start if scanning is complete before the time-out period elapses.
1 2 3
In the console on the primary navigation bar, click Configuration. In the sidebar under Views, click Protocol. In the content area under Select Communication Protocol, click ICAP.
Configuring scanning services for client applications About working with ICAP
85
In the Manual Restart Required dialog box, click OK. Whenever you switch protocols, you must restart the server. You can continue to make and apply changes in the console. However, the changes do not take effect until you restart the Symantec Scan Engine service. See Verifying, stopping, and restarting the Symantec Scan Engine service on Windows on page 49.
Under ICAP Configuration, in the Bind address table, select the scanning IP addresses that you want to bind to Symantec Scan Engine. Check Select All to select every IP Address in the Bind address table. Only four IP addresses appear in the Bind address table. Click the scroll bar to view additional IP addresses. By default, Symantec Scan Engine binds to all interfaces.
In the Port number box, type the TCP/IP port number that the client application uses to pass files to Symantec Scan Engine for scanning. The default setting for ICAP is port 1344. If you change the port number, use a number that is equal to or greater than 1024. No other program or service should use this port number. You must use the same port number for every scanning IP addresses that you want to bind to Symantec Scan Engine.
In the Scan policy list, select how you want Symantec Scan Engine to handle infected files. The default setting is Scan and repair or delete.
86
Configuring scanning services for client applications About working with ICAP
After the user enters a file location, the file is trickled to the user in small amounts at regular intervals until the scan is complete. The trickling of data prevents the browser from timing out. The browser indicates how much of the file has been trickled so far. If no risk is detected during the scan, data trickling stops, and the remainder of the file is sent to the user. If a risk is detected, data trickling stops, and no additional details are sent to the user. The user receives no notification that the file might be incomplete or that it might contain a risk. A log message about the risk detection is sent to the specified logging destinations. Note: The data trickle feature is not supported on POST transaction data.
The data that is trickled to the user might contain a risk. Note: If you enable data trickle, install an antivirus program that provides real-time scanning. If the trickled data is infected, the real-time scanning feature detects the risk immediately. For FTP downloads that use optimizers, when a broken connection is detected, the optimizer resumes the download from the point where the disconnection occurred. The remainder of the file is downloaded, which could possibly reconstruct an infected file. ICAP requires that a return code message be included in the first line of the file header. When data trickle begins, the ICAP return code 200 (OK) is embedded in the data file. Because the file has not been scanned, this message might be inaccurate. The data file might contain a risk. Symantec Scan Engine automatically sets the scan policy to "Scan only" when you enable the data trickle feature. You cannot configure your scanning policy to repair or delete infected files. See Enabling data trickle on page 87. You cannot use the Quarantine feature when you enable the data trickle feature. The user receives no notification that the trickled data file is incomplete or infected.
Configuring scanning services for client applications About working with ICAP
87
Delete the file or attachment is enabled. Delete the file or attachment is enabled. The policy is set to Scan only.
88
Configuring scanning services for client applications Working with the native protocol
When you disable the data trickle feature, you must manually change these options back to your previous settings. The previous settings are not automatically restored. To enable data trickling
1 2 3
In the console on the primary navigation bar, click Configuration. In the sidebar under Views, click Protocol. In the content area under Trickle, check Enable trickle. Data trickle is disabled by default.
In the Time before trickle data starts box, type the number of seconds that the scan process runs before data trickle begins. Data trickle does not start if scanning is complete before the trickle time-out elapses. The default setting is 5 seconds. The maximum setting is 86400 seconds (24 hours).
Configuring scanning services for client applications Working with the native protocol
89
Table 4-4 describes the configuration options for the native protocol. Table 4-4 Option
Bind address
Port number
If you use Windows and you change the protocol setting to the native protocol, you might need to change the service startup properties to identify an account that has sufficient permissions to run Symantec Scan Engine. See Editing the service startup properties on page 98. To configure native protocol options
1 2 3 4
In the console on the primary navigation bar, click Configuration. In the sidebar under Views, click Protocol. In the content area under Select Communication Protocol, click Native. In the Manual Restart Required dialog box, click OK. Whenever you switch protocols, you must restart the Symantec Scan Engine service. You can continue to make and apply changes in the console. However, the changes do not take effect until you restart the service.
90
Configuring scanning services for client applications Working with the RPC protocol
Under Native Protocol Configuration, in the Bind address box, type a bind address, if necessary. By default, Symantec Scan Engine binds to all interfaces. You can restrict access to a specific interface by typing its bind address. You can use 127.0.0.1 (the loopback interface) to let only the clients that are running on the same computer connect to Symantec Scan Engine.
In the Port number box, type the TCP/IP port number that the client application uses to pass files to Symantec Scan Engine for scanning. The default setting is port 7777. If you change the port number, use a port number that is equal to or greater than 1024. No other program or service should use this port number.
In the Local scan directory box, type a local scan directory path, if necessary. The file directory that you specify must already exist. Symantec Scan Engine validates the existence of the directory when you save or apply your changes. If you do not specify a local scan directory location, Symantec Scan Engine uses the temporary directory for scanning. See Allocating resources for Symantec Scan Engine on page 61.
Configuring scanning services for client applications Working with the RPC protocol
91
the connection at a configured time interval. If Symantec Scan Engine determines that the connection is not active, it tries to reconnect. (You can configure the number of times that Symantec Scan Engine tries to reestablish the connection.) Symantec Scan Engine stops checking the connection with the RPC client when it reaches the maximum number of tries. Symantec Scan Engine resumes trying connections when the scan engine service restarts. See Verifying, stopping, and restarting the Symantec Scan Engine service on Windows on page 49.
Check RPC connection Symantec Scan Engine maintains a connection with the RPC client. every __ seconds You can configure Symantec Scan Engine to check the RPC connection with the client periodically to ensure that the connection is active. The default value is 20 seconds. See Configuring RPC connection options on page 94. Maximum number of reconnect attempts You can limit the number of times Symantec Scan Engine tries to re-establish a lost connection with the RPC client. If the client does not respond within this limit, Symantec Scan Engine stops trying to reestablish a connection. By default, Symantec Scan Engine tries to reconnect with the RPC client indefinitely.
Note: Do not set a maximum number of reconnect tries if Symantec Scan Engine provides scanning for multiple RPC clients.
See Configuring RPC connection options on page 94.
92
Configuring scanning services for client applications Working with the RPC protocol
1 2 3
In the console on the primary navigation bar, click Configuration. In the sidebar under Views, click Protocol. In the content area under Select Communication Protocol, click RPC.
Configuring scanning services for client applications Working with the RPC protocol
93
In the Manual Restart Required dialog box, click OK. Whenever you switch protocols, you must restart the server. You can continue to make and apply changes in the console. However, the changes do not take effect until you restart the Symantec Scan Engine service.
1 2 3
In the console on the primary navigation bar, click Configuration. In the sidebar under Views, click Protocol. In the content area under RPC Configuration, in the RPC client list box, type an IP address for the RPC client for which Symantec Scan Engine provides scanning services. Type one entry per line.
94
Configuring scanning services for client applications Working with the RPC protocol
1 2 3 4 5
In the console on the primary navigation bar, click Configuration. In the sidebar under Views, click Protocol. In the content area under RPC Configuration, in the list of RPC clients, highlight the RPC clients that you want to remove from the list. Press Delete. On the toolbar, select one of the following options:
Save Saves your changes. Use this option to continue making changes in the console until you are ready to apply them. Apply Applies your changes. Your changes are not implemented until you apply them.
1 2 3
In the console on the primary navigation bar, click Configuration. In the sidebar under Views, click Protocol. In the content area under RPC Configuration, in the Check RPC connection every box, type the number of times Symantec Scan Engine should check the connection with the RPC client to ensure that the connection is active. The default interval is 20 seconds.
Configuring scanning services for client applications Working with the RPC protocol
95
In the Maximum number of reconnect attempts box, type the maximum number of times that Symantec Scan Engine should try to re-establish a lost connection with the RPC client. The default setting is 0, which causes Symantec Scan Engine to try indefinitely to reestablish a connection. Use the default setting if Symantec Scan Engine provides scanning for multiple RPC clients.
1 2
In the console on the primary navigation bar, click Configuration. In the sidebar under Views, click Protocol.
96
Configuring scanning services for client applications Working with the RPC protocol
In the content area under RPC Configuration, in the Antivirus scan policy list, select one of the following:
Scan only Denies access to the infected file but does nothing to the infected file. Tries to repair infected files and denies access to any unrepairable files.
Scan and repair or Tries to repair infected files and deletes any unrepairable files delete from archive files. This is the default setting.
Configuring scanning services for client applications Working with the RPC protocol
97
You can configure Symantec Scan Engine to automatically notify the network file server of updated definitions after a LiveUpdate occurs. You can also notify the file server on demand, as needed. To automatically notify a file server when definitions are updated
1 2 3
In the console on the primary navigation bar, click Configuration. In the sidebar under Views, click Protocol. In the content area under RPC Configuration, check Automatically send antivirus update notifications. This option is disabled by default.
1 2 3
In the console on the primary navigation bar, click Configuration. In the sidebar under Views, click Protocol. Under Tasks, click Send AntiVirus Update Notification.
Unrepairable infections Container violations Scans that are canceled because the antivirus scanning license is expired
98
Configuring scanning services for client applications Editing the service startup properties
identification information includes the security identifier of the user and the IP address and host name of the requesting computer. This information is included in all related log messages that are sent to all active logging destinations for Symantec Scan Engine. This feature provides administrators with as much information as possible when a risk is found. Note: Symantec Scan Engine can obtain only the information that the RPC client makes available. If the identification information is available, Symantec Scan Engine records it in the related log entries. Any identification information that cannot be obtained from the RPC client is omitted from the log messages and from the user notification window. You also can configure Symantec Scan Engine to notify the requesting user that the retrieval of a file failed because a risk was found. The notification message only displays if the user is running Windows. The notification message includes the following information:
Date and time of the event Name of the infected file Threat or security risk name and ID Manner in which the infected file was handled (for example, the file was deleted)
See Notifying RPC-client users that a threat was found on page 120. To use the user notification feature, the Windows Messenger service must be on the same computer as Symantec Scan Engine and on the user's computer. See Editing the service startup properties on page 98.
Access rights to the RPC clients Domain administrators or backup operators privileges Local administrator permissions on the computer on which Symantec Scan Engine runs
Configuring scanning services for client applications Editing the service startup properties
99
If your client uses the native protocol, the account that you assign to the Symantec Scan Engine service must have access rights to any shared drives or universal naming convention (UNC) paths for which you want to provide scanning services. This account should also have Change permission so that Symantec Scan Engine can delete the infected files that it cannot repair. To edit the service startup properties
1 2 3 4 5
In the Windows Control Panel, click Administrative Tools. Click Services. In the list of services, right-click Symantec Scan Engine, and then click Properties. In the Properties dialog box, on the Log On tab, click This account. Type the account name and password for the account on which Symantec Scan Engine runs. Use the following format for the account name: domain\username
6 7
Click OK. Stop and restart the Symantec Scan Engine service. See Verifying, stopping, and restarting the Symantec Scan Engine service on Windows on page 49.
100
Configuring scanning services for client applications Editing the service startup properties
Chapter
About scanning for risks Enabling threat detection Enabling security risk detection About preventing potential threats Customizing user notifications
Threats (such as viruses, worms, and Trojan horses) See Enabling threat detection on page 103. Security risks (such as adware and spyware) See Enabling security risk detection on page 106. Denial-of-service attacks See Setting container file limits on page 135.
Symantec Scan Engine also helps you protect your network by blocking potential threats. When you receive information about a new threat, you can block or delete the message, file, or file attachment before definitions are available. See About preventing potential threats on page 108.
102
Scanning for risks can consume bandwidth, increase overall scanning time, and degrade performance. You can improve scanning performance by limiting the files and email messages to be scanned to only those that are most likely to contain risks. See Configuring Symantec Scan Engine to block unscannable container files on page 109. See Specifying which files to scan on page 131. See Specifying the maximum file or message size to scan on page 134. For more information about threats, security risks, and other forms of malicious attacks, on the Internet, go to the following URL for Symantec Security Response: http://securityresponse.symantec.com
Heuristics
103
Symantec Scan Engine contains a decomposer that extracts container files so that they can be scanned for risks. The decomposer continues to extract container files until it reaches the base file. Symantec Scan Engine imposes limits on file extraction. These limits protect against denial-of-service attacks that are associated with the overly large files or the complex container files that take a long time to decompose. These limits also improve scanning performance. Symantec Scan Engine scans a file and its contents until it reaches the maximum depth that you specify. Symantec Scan Engine stops scanning any file that meets the maximum file size limit or that exceeds the maximum amount of time to decompose. It then generates a log entry. Symantec Scan Engine resumes scanning any remaining files. This process continues until Symantec Scan Engine scans all of the files to the maximum depth (that do not meet any of the processing limits).
1 2 3
In the console on the primary navigation bar, click Policies. In the sidebar under Views, click Scanning. In the content area under Antivirus Scanning, check Enable virus scanning.
104
In the Bloodhound detection level drop-down list, select the appropriate Bloodhound detection level as follows:
Off Low Disables antivirus scanning. Optimizes server performance, but might not detect potential threats. Provides a balance between threat detection and server performance. This is the default setting. High Increases the detection of threats, but might impact server performance.
Medium
105
1 2
In the console on the primary navigation bar, click Policies. In the sidebar under Views, click Scanning.
106
In the content area under Quarantine, check Quarantine files. If you enable the data trickle feature, the Quarantine settings are unavailable. See Enabling data trickle on page 87.
In the Central server quarantine host or IP box, type the host name or the IP address for the computer on which Symantec Central Quarantine Server is installed. In the Port box, type the TCP/IP port number that Symantec Scan Engine uses to pass files to Symantec Central Quarantine. On the toolbar, select one of the following options:
Save Saves your changes. Use this option to continue making changes in the console until you are ready to apply them. Apply Applies your changes. Your changes are not implemented until you apply them.
5 6
Provide unauthorized access to computer systems Compromise data integrity, privacy, confidentiality, or security Present some type of disruption or nuisance
These programs can put your employees and your organization at risk for identity theft or fraud if they can do any of the following actions:
Log keystrokes Capture email and instant messaging traffic Harvest personal information, such as passwords and logon identifications
Security risks can be introduced into your system unknowingly when users do any of the following tasks:
107
Click links or attachments in email messages Use instant messaging clients Agree to an end-user license agreement from another software program
Table 5-1 lists the categories of security risks that Symantec Scan Engine detects. Table 5-1 Category
Spyware
Adware
Other risks
Hacking tools Programs that are used to gain unauthorized access to a user's computer. For example, a keystroke logger tracks and records individual keystrokes and sends this information to a remote computer. The remote user can perform port scans or vulnerability scans. Hacking tools might also be used to create viruses. Dialers Programs that use a computer, without the user's permission or knowledge, to dial out through a modem to a 900 number or FTP site, typically to accrue charges. Joke programs Programs that alter or interrupt the operation of a computer in a way that is intended to be humorous or bothersome. For example, a joke program might move the Recycling Bin away from the mouse when the user tries to click on it. Remote access programs Programs that allow a remote user to gain access to a computer over the Internet to gain information, attack, or alter the host computer. Trackware Applications that trace a user's path on the Internet and relay the information to a remote computer.
Symantec Scan Engine scans for security risks in all types of content, such as email messages and Web content. Symantec Scan Engine can also scan POST
108
transactions for security risks. Symantec Scan Engine can only perform security risk scanning when you enable virus scanning. See Enabling threat detection on page 103. If a security risk is detected, Symantec Scan Engine applies the scan policy that you configured for ICAP; however, security risks cannot be repaired. Files that contain only security risks cannot be quarantined. See Configuring ICAP options on page 82. You must have a valid antivirus scanning license to scan for security risks and a valid content license to update security risk definitions. If you upgrade from a previous version and your licenses are current, Symantec Scan Engine automatically recognizes these licenses. See About licensing on page 71. To enable security risk detection
1 2 3
In the console on the primary navigation bar, click Policies. In the sidebar under Views, click Scanning. In the content area under Security Risk Scanning, check the security risks that you want Symantec Scan Engine to detect. Security risk options are only available if virus scanning is enabled. When you enable virus scanning, all of the security risk options are enabled by default.
109
Use this feature to block certain types of unscannable container files, such as partial container files, that might contain threats or malicious code. See Configuring Symantec Scan Engine to block unscannable container files on page 109.
Block or delete files by Use this feature to filter documents by file name. file name See Configuring file name filtering on page 111. Block or delete files by Use this feature to block or delete files by file or attachment size. file or attachment size See Configuring file size filtering on page 113. Block or delete email messages by subject line content Use this feature to filter email messages based on subject line content. You can also use subject line content filtering to create a comprehensive mail filtering policy. You can search the subject lines for offensive language, confidential information, and content with potential legal consequences. Mail policies are applied only to MIME-encoded messages and do not affect non-MIME-encoded file types. See Configuring subject line content filtering on page 114. Block or delete email messages by message origin Use this feature to filter email messages based on message origin. You can block or delete email messages from a specific domain or email address. You can also use message origin filtering to create a comprehensive mail filtering policy. Mail policies are applied only to MIME-encoded messages and do not affect non-MIME-encoded file types. See Configuring message origin filtering on page 116.
110
1 2 3
In the console on the primary navigation bar, click Policies. In the sidebar under Views, click Filtering. In the content area on the Container Handling tab, under Partial Container Handling, check Deny partial containers. By default, Symantec Scan Engine rejects partial container files.
Under Malformed Container File Processing, check Block malformed containers. By default, Symantec Scan Engine rejects malformed container files.
111
Under Encrypted Container Handling, check Delete encrypted containers. Encrypted containers are automatically deleted by default.
112
Use wildcard characters if you are unsure of an exact file name or to block all file attachments with a specific extension. For example, you can use the wildcard *virus* to block all attachments with the word virus in the file name. Note: If your client uses the native protocol or the antivirus-only application program interface (API), file name violations are reported to the client in the server's response as mail-policy violations. If you use the extended API or have a standard ICAP implementation, this type of violation is reported as a file violation. To configure file name filtering
1 2 3 4
In the console on the primary navigation bar, click Policies. In the sidebar under Views, click Filtering. In the content area on the Files tab, under Blocking by File Name, check Block files with the following names. Under When a matching file is found, select one of the following to specify how Symantec Scan Engine handles the messages that contain an attachment with that file name:
Block access to the file or message This option is enabled by default. Delete the file or attachment
A question mark (?) to represent a single character. An asterisk (*) to represent zero or more characters. A backslash (\) as an escape character. For example, precede a ? or a * with \ to match a literal ? or * symbol in a file name. To match a literal \ symbol, use \\.
113
Remove a file Highlight the file name that you want to remove, and press name from the list. Delete.
114
Note: If your client uses the native protocol or the antivirus-only application program interface (API), file size violations are reported to the client in the server's response as mail-policy violations. If you use the extended API or have a standard ICAP implementation, this type of violation is reported as a file violation. To configure file size filtering
1 2 3 4
In the console on the primary navigation bar, click Policies. In the sidebar under Views, click Filtering. In the content area on the Files tab, under Blocking by File Size, check Block files with the following sizes. Under When a matching file is found, select one of the following options to specify how you want Symantec Scan Engine to handle the messages that contain an attachment with that file size:
Block access to the file or the message This option is enabled by default. Delete the file or attachment
Remove a file size Highlight the file size that you want to remove, and press Delete. from the list.
115
created. You can also use this feature to filter mail messages for inappropriate or confidential information or potential spam. Symantec Scan Engine scans the subject lines of incoming mail messages for the text string that you specify. You can use wildcard characters when you are not sure of the exact subject line. Symantec Scan Engine ignores any white space (tabs or spaces) at the beginning of the subject line. It also ignores any white space that you enter at the beginning of your text string. Note: Symantec Scan Engine automatically encodes and saves the text strings in Unicode/UTF-8 when you apply your changes in the console. To configure subject line content filtering
1 2 3 4
In the console on the primary navigation bar, click Policies. In the sidebar under Views, click Filtering. In the content area on the Mail tab, under Blocking by Subject Line, check Use the following subjects. In the subject line text box, do any of the following:
Add a subject line to the list. Type the subject line or text string in the subject line that you want to block. Type as many subject lines to block as needed. Type one entry per line. Search strings are not case-sensitive. You can use the following wildcard characters as needed:
A question mark (?) to represent a single character. An asterisk (*) to represent zero or more characters. A backslash (\) as an escape character. For example, precede a ? or a * symbol with \ to match a literal ? or * symbol in a file name. To match a literal symbol \, use \\.
Highlight the subject line entry that you want to remove, and press Delete.
116
5 6
Check Block messages with empty subject lines to block the mail messages that have blank subject lines. On the toolbar, select one of the following options:
Save Saves your changes. Use this option to continue making changes in the console until you are ready to apply them. Apply Applies your changes. Your changes are not implemented until you apply them.
117
.symantecdomain.com
Blocks all mail from an entire domain, including any subdomains. For example, mail from example.symantecdomain.com or internet.symantecdomain.com would be blocked. You must precede the domain address with a period to ensure that any subdomains are blocked. You cannot use wildcard characters in subdomain or domain addresses.
1 2 3 4
In the console on the primary navigation bar, click Policies. In the sidebar under Views, click Filtering. In the content area on the Mail tab, under Blocked Senders, check Use the following domains. In the blacklist text box, do any of the following tasks:
Add a domain Type a domain address or email address. Type one per line. You address or email can enter up to 5000 addresses. Search strings are not address to the list. case-sensitive. Remove a domain address or email address from the list. Highlight the address that you want to remove, and press Delete.
118
the body of an infected MIME-encoded message or to the body of a replacement file for a deleted attachment. Symantec Scan Engine attaches a text file to the email message in the place of each attachment that is deleted because it cannot be repaired. The text file that is inserted is called DELETEN.TXT, where N is a sequence number. For example, if two attachments are deleted, the replacement files are called DELETE0.TXT and DELETE1.TXT. When you use ICAP, Symantec Scan Engine displays an HTML text message to the user when a requested file is blocked. Access to a file is blocked when the file contains a threat and cannot be repaired. Table 5-3 describes the types of notification messages that you can customize. Table 5-3 Notification messages Default text
File: ${FILE_NAME} was infected with ${VIRUS_NAME} ({$VIRUS_ID}). File {$QUARANTINED}. File was deleted File: ${FILE_NAME} was infected with ${VIRUS_NAME} ({$VIRUS_ID}). File {$QUARANTINED}. File was repaired File: ${FILE_NAME} was infected with ${VIRUS_NAME} ({$VIRUS_ID}). File {$QUARANTINED}. File is still infected This email message was infected. ${TOTAL_VIRUSES} number of viruses or security risks were found. The file attached to this email was removed because the file size is not allowed. File attachment: ${FILE_NAME}. Matched file size: ${FILE_SIZE}. The file attached to this email was removed because the file name is not allowed. File attachment: ${FILE_NAME}. Matched pattern: ${MATCHING_FILENAME_ENTRY}. The encrypted container attached to this email was removed. File attachment: ${FILE_NAME}. The content you just requested contains ${VIRUS_NAME} and was blocked by the Symantec Scan Engine based on local administrator settings. Contact your local administrator for further information.
Type of notification
Deleted file
Repaired file
Infected file
Encrypted file
Web browser
Table 5-4 lists the variables that you can use to customize your notifications.
119
The name of the threat or security risk. The threat or security risks identification number. Indicates whether a file was quarantined. The total number of risks that are detected in the MIME message. The file name pattern that triggered the violation. See Configuring file name filtering on page 111.
${MATCHING_ FILENAME_ENTRY}
1 2 3
In the console on the primary navigation bar, click Policies. In the sidebar under Views, click Notifications. Under User Message Notifications, check Add text to the body of infected MIME-encoded messages to warn recipients of infections (threats and security risks). Check Add text to the body of replacement file for a deleted attachment. Customize any of the user notification messages. On the toolbar, select one of the following options:
Save Saves your changes. Use this option to continue making changes in the console until you are ready to apply them. Apply Applies your changes. Your changes are not implemented until you apply them.
4 5 6
120
Date and time of the event Name of the infected file Threat name and ID Manner in which the infected file was handled (for example, whether the file was repaired or deleted)
The notification message also includes information about the Symantec Scan Engine that detected the infection. For example, the message contains the IP address and the port number of Symantec Scan Engine. The message also contains the date and the revision number of the definitions that were used to detect the threat. This feature is only available on Windows. The requesting user's computer must be in the same domain as Symantec Scan Engine. The Windows Messenger service must be running both on the computer on which Symantec Scan Engine is running and on the user's computer. If the notification information cannot be delivered to the requesting user, a failure message is logged. To notify RPC-client users that a threat was found
1 2 3
In the console on the primary navigation bar, click Monitors. In the sidebar under Views, click Alerting. In the content area under Log Windows Messenger, check Enable Windows Messaging alerting. User notification is disabled by default.
Chapter
How to monitor Symantec Scan Engine performance Ways to improve Symantec Scan Engine performance
122
Monitoring and tuning Symantec Scan Engine performance How to monitor Symantec Scan Engine performance
to the designated logging destinations and alert destinations. The event is logged at the Warning level. See Logging levels and events on page 165. Symantec Scan Engine averages the number of scan requests for one minute. If the average number of requests for that minute meets or exceeds the threshold, no alert is sent. If the average number of scan requests for that minute is below the threshold, Symantec Scan Engine sends an alert. For example, if you set a threshold of 20 requests a second for Wednesday from 1:00 A.M. to 2:00 A.M., Symantec Scan Engine does not generate an alert for any minute in which it receives 1,200 requests (20 requests times 60 seconds). Symantec Scan Engine only generates an alert for any minute in which it receives fewer than 1,200 requests. All of the schedules that you create appear in the Existing Schedules table. Active schedules are denoted in green; inactive schedules are denoted in red. You can control how scanning requests are monitored in the following ways:
Enable or disable the scan request monitor feature. Add a new schedule. Deactivate an existing schedule. Activate a deactivated schedule. Delete a schedule.
1 2 3
In the console on the primary navigation bar, click Monitors. In the sidebar under Views, click Requests. In the content area under Monitor Requests, do one of the following steps:
To enable the feature, check Monitor request/second. You must enable the feature to add, activate, deactivate, or delete any schedules. To disable the feature, uncheck Monitor request/second.
Monitoring and tuning Symantec Scan Engine performance How to monitor Symantec Scan Engine performance
123
In the content area under Plan a Schedule, click the Day drop-down list, and select the day of the week that you want to monitor. You can only select one day.
Click the From drop-down list, and select the beginning hour for the schedule time range. This setting uses a 24-hour clock. For example, 14 is 2:00 PM. You can select a range from 0 (12:00 AM of the day selected by the user) to 23 (11:00 PM). Hours that you have already used to create schedules for that day do not appear in the list.
Click the To drop-down list, and select the ending hour for the schedule time range. This option uses a 24-hour clock. For example, 14 is 2:00 PM. You can select a range from 0 (12:00 AM of the previous day) to 23 (11:00 PM). For example, if you select Tuesday, select 23 from the From drop-down list, and then select 0 from the To drop-down list, you are monitoring the threshold for the last hour of the day on Tuesday. Hours that you have already used to create schedules for that day do not appear in the list.
In the Threshold box, type the threshold that represents the expected file load at which you want Symantec Scan Engine to issue an alert. Specify a threshold that would signify a possible issue but not generate a high number of false alarms.
124
Monitoring and tuning Symantec Scan Engine performance How to monitor Symantec Scan Engine performance
In the sidebar under Tasks, click Add Schedule. The schedule appears in the Existing Schedules table. New schedules are activated by default.
1 2 3
In the content area under Existing Schedules in the Existing Schedules table, click the schedule that you want to deactivate. Under Plan a Schedule, uncheck Enable Schedule. In the sidebar under Tasks, click Update Schedule. The schedule appears in red in the Existing Schedules table.
1 2
In the content area under Existing Schedules in the Existing Schedules table, click the schedule that you want to activate. Under Plan a Schedule, check Enable Schedule.
Monitoring and tuning Symantec Scan Engine performance How to monitor Symantec Scan Engine performance
125
In the sidebar under Tasks, click Update Schedule. The schedule appears in green in the Existing Schedules table.
To delete a schedule
1 2 3
In the content area under Existing Schedules in the Existing Schedules table, click on schedule that you want to delete. In the sidebar under Tasks, click Delete Schedule. On the toolbar, select one of the following options:
Save Saves your changes. Use this option to continue making changes in the console until you are ready to apply them. Apply Applies your changes. Your changes are not implemented until you apply them.
126
Monitoring and tuning Symantec Scan Engine performance How to monitor Symantec Scan Engine performance
Active threads
Number of threads that Symantec Scan Engine uses to perform the scan Number of threads that are available for the scanning job Maximum number of threads that are available for scanning See Allocating resources for Symantec Scan Engine on page 61.
Waiting threads
Table 6-2 describes the load statistics resources that you can monitor. Table 6-2 Item
Threshold for queued requests
Queued requests
Number of scan requests that are currently scheduled or pending Average of number of scanning requests that arrived in past 60 seconds Number of files that Symantec Scan Engine scanned since the program was last restarted Total data that Symantec Scan Engine scanned since the program was last restarted
Table 6-3 describes the logging statistics resources that you can monitor.
Monitoring and tuning Symantec Scan Engine performance Ways to improve Symantec Scan Engine performance
127
Used space
Amount of used space for the location in which the Symantec Scan Engine logs are maintained Remaining available space for the location in which the Symantec Scan Engine logs are maintained
Available space
Table 6-4 describes the miscellaneous resources that you can monitor. Table 6-4 Item
Process priority
Miscellaneous Description
The Symantec Scan Engine process priority For more information about how to change a process priority, see the documentation for your operating system.
In the console on the primary navigation bar, click Reports, and then click Resources. In the console on the Home page, in the Quick Links pane, click View resources report.
128
Monitoring and tuning Symantec Scan Engine performance Ways to improve Symantec Scan Engine performance
See Deployment considerations and recommendations on page 128. See Enhance performance by limiting scanning on page 130. See Configuration settings that can conserve and enhance performance on page 137. Warning: Before you make any modifications, carefully consider the trade offs between security and performance. For example, excluding certain files from being scanned improves overall performance. However, the files that are not scanned might contain security risks or threats that could contaminate your network if unscanned. Ensure that you monitor performance regularly so that you can detect any degradation in performance and make the necessary adjustments as soon as possible. See How to monitor Symantec Scan Engine performance on page 121.
Monitoring and tuning Symantec Scan Engine performance Ways to improve Symantec Scan Engine performance
129
130
Monitoring and tuning Symantec Scan Engine performance Ways to improve Symantec Scan Engine performance
Symantec Scan Engine uses disk space primarily for storing temporary files for scanning and for storing logs. A shortage of disk space might severely affect the scanning functionality of Symantec Scan Engine. If you experience disk space shortages, consider adding more physical disks.
Monitoring and tuning Symantec Scan Engine performance Ways to improve Symantec Scan Engine performance
131
Exclude specific file extensions and file types When you enable this option, Symantec Scan from scanning Engine scans only the file extensions or the file types that are not in the exclude lists. The default file exclude lists contain the most common file extensions and the types that are unlikely to contain threats. See Specifying which files to scan on page 131. Block the files or email messages that meet This option lets you specify the maximum or exceed a specific size from scanning size of files or messages to scan. This option is available for the ICAP and native protocols only. See Specifying the maximum file or message size to scan on page 134. Impose limits on container files You can impose limits on how you want Symantec Scan Engine to decompose and scan container files. Imposing limits can conserve scanning resources. You can specify the following limits for handling container files: The maximum amount of time, in seconds, that is spent decomposing a container file and its contents This setting does not apply to .hqx or .amg files. The maximum file size, in bytes, for the individual files that are in a container file The maximum number of nested levels to be decomposed for scanning The maximum number of bytes that are read when determining whether a file is MIME-encoded
132
Monitoring and tuning Symantec Scan Engine performance Ways to improve Symantec Scan Engine performance
bandwidth and time by only scanning files that might contain threats, based upon their file extensions or file types. Symantec Scan Engine is configured by default to scan all files regardless of extension or type. You can choose to scan all files except those that are in the file extension and file type exclude lists. Symantec Scan Engine scans only top-level files or the files that are embedded in the archival file formats that are not contained in either list. The default exclude lists contain the most common file extensions and the file types that are unlikely to contain threats. You can add any file extension to the File extension exclude list (file extensions must begin with a period). The file types that you can add to the File type exclude list are as follows:
image/jpeg image/tiff image/x-ico audio/x-au audio/x-realaudio audio/shn audio/x-mod video/x-msvideo image/bmp image/x-png audio/mtm audio/midi audio/x-mpeg audio/x-stx audio/med video/mpeg image/gif image/x-pixmap audio/x-aiff audio/x-wav audio/x-s3m audio/it video/x-ms-wmv video/quicktime application/pcx application/x-lharc application/lz application/ole application/graphicconverter application/cab application/x-bz2 application/x-ogg application/x-sit application/iso
binary/ms-structured-storage application/x86-win-32-exe application/ms-tnef application/x-lha application/arj application/x-zip application/java-archive application/ani application/imz application/x-pdf application/x-zoo application/lzh application/rar application/x-gzip application/x-ace application/x-tar application/bh application/x-macbinary application/rtf application/postscript
Monitoring and tuning Symantec Scan Engine performance Ways to improve Symantec Scan Engine performance
133
Note: Although file types are formatted similarly to MIME types, they are not derived from MIME headers of the messages that are scanned. Symantec Scan Engine derives file types by an analysis of the data itself, regardless of what information is in the MIME type. As you evaluate which files to exclude from scanning, consider the trade-offs between performance and protection. An exclusion list lets some files bypass scanning. Thus, new types of threats might not always be detected. Scanning all files regardless of type or extension is the most secure setting, but it imposes the heaviest demand on resources. During outbreaks, you might want to scan all files even if you normally use the exclusion lists to control the files that are scanned. Warning: Use caution if you add .jpg or .jpeg to the File extension exclude list or image/jpg, image/jpeg, or image/* to the File type exclude list. These file types can be encoded with threats and might pose a risk to your network. To specify which files to scan
1 2 3 4
In the console on the primary navigation bar, click Policies. In the sidebar under Views, click Scanning. In the content area under Files to Scan, click Scan all files except those in the extension or type exclude lists. In the File extension exclude list, do any of the following steps:
To add a file extension to the exclude list Type the file extension that you want to add. Type each entry on a separate line. Each entry should begin with a period.
To remove a file Highlight and delete the file extension that you want to remove. extension from the exclude list
134
Monitoring and tuning Symantec Scan Engine performance Ways to improve Symantec Scan Engine performance
To restore the default exclude lists, under Tasks, click Reset Default List. This option restores the default File type exclude list and File extension exclude list.
1 2
In the console on the primary navigation bar, click Policies. In the sidebar under Views, click Filtering.
Monitoring and tuning Symantec Scan Engine performance Ways to improve Symantec Scan Engine performance
135
In the content area on the Files tab, under Blocking by Total Message Size, in the Block files or messages that are larger than box, type the maximum file size (in bytes) that Symantec Scan Engine should accept. The default value is 0. This setting places no limits on file or message size.
Overly large Contain large numbers of embedded, compressed files Are designed to maliciously use resources and degrade performance
To enhance scanning performance and reduce your exposure to denial-of-service attacks, you can impose limits to control how Symantec Scan Engine handles container files. You can specify the following limits for handling container files:
The maximum amount of time, in seconds, that is spent decomposing a container file and its contents This setting does not apply to .hqx or .amg files. The maximum file size, in bytes, for the individual files that are in a container file The maximum number of nested levels to be decomposed for scanning The maximum number of bytes that are read when determining whether a file is MIME-encoded
Symantec Scan Engine scans a file and its contents until it reaches the maximum depth that you specify. Symantec Scan Engine stops scanning any file that meets
136
Monitoring and tuning Symantec Scan Engine performance Ways to improve Symantec Scan Engine performance
the maximum file size limit or that exceeds the maximum amount of time to decompose. It then generates a log entry. Symantec Scan Engine resumes scanning any remaining files. This process continues until Symantec Scan Engine scans all of the files to the maximum depth (that do not meet any of the processing limits). You can specify whether to allow or to deny access to files for which an established limit is met or exceeded. Access is permitted by default. Warning: If you allow access to a file that has not been fully scanned, you can expose your network to risks. If you allow access and Symantec Scan Engine detects a risk, it does not repair the file, even if under normal circumstances the file can be repaired. In this case, the file is handled as though the file is unrepairable. To set container file limits
1 2 3
In the console on the primary navigation bar, click Policies. In the sidebar under Views, click Filtering. In the content area on the Container Handling tab, under Container File Processing Limits, in the Time to extract file meets or exceeds box, type the maximum time that Symantec Scan Engine can spend extracting a single container file. The default setting is 180 seconds (3 minutes). To disable this setting (so that no limit is imposed), type 0.
In the Maximum extract size of file meets or exceeds box, type the maximum file size, in bytes, for individual files in a container file. The default setting is 100 MB. To disable this setting (so that no limit is imposed), type 0.
In the Maximum extract depth of file meets or exceeds box, type the maximum number of nested levels of files that are decomposed within a container file. The default setting is 10 levels. The maximum value for this setting is 50.
Under When processor limit is met (or exceeded), select whether to allow or deny access to container files for which one or more limits are exceeded. Access is denied by default.
Monitoring and tuning Symantec Scan Engine performance Ways to improve Symantec Scan Engine performance
137
Under NonMIME threshold, in the No determination after reading box, type the maximum number of bytes that Symantec Scan Engine should scan to determine whether a file is MIME-encoded. The default setting is 200000 bytes. If Symantec Scan Engine reads the maximum number of bytes and cannot determine whether the file is MIME-encoded, the file is considered to be non-MIME-encoded.
138
Monitoring and tuning Symantec Scan Engine performance Ways to improve Symantec Scan Engine performance
See Allocating resources for Symantec Scan Engine on page 61. Notify a file server when Symantec Scan Engine updates definitions The process of sending notifications to the file server about definition updates can affect system resources, depending on how often you schedule LiveUpdate or Rapid Release. To minimize the impact on performance, you can send the notification on demand, as needed. See Notifying a file server when definitions are updated on page 96.
Chapter
Filtering URLs
This chapter includes the following topics:
140
Filtering mode
When Symantec Scan Engine operates in filtering mode, Symantec Scan Engine handles the application of URL filtering. You configure the types of URL that you want to deny. Based on your configuration, Symantec Scan Engine determines whether to deny access for each request. Symantec Scan Engine returns to the user an "Access Denied" message when it blocks access to a URL.
See About the filtering modes on page 154. See How to filter a URL on page 154.
About categories
Symantec Scan Engine uses categories to determine whether access to a URL should be denied. Symantec Scan Engine provides predefined URL categories. You can also create additional categories (local categories) to meet your needs. See About local categories on page 153.
Advertising
Alcohol
Anonymizer
141
Art Nudes
Automotive
Bikini
Blog
Business
CAIC
Cash Gambling
Chat
142
Cults
The Church of Satan Aum Shinrikyo The Hare Krishna movement The Family The Unification Church Branch Davidians Scientologists
*Sources: AFF (American Family Foundation), http://www.csj.org/ - A non-profit, tax-exempt research center whose research comes from volunteer professionals ranging from fields in journalism, education, society, and law enforcement. CESNUR (Center for Studies on New Religions), http://www.cesnur.org/ - Associations of scholars working in the field of new religious movements; they operate independent of any church, denomination, or religion. University of Virginia - Religious Movements page, http://religiousmovements.lib.virginia.edu/profiles/listalpha.htm - A scholarly source consisting of mainly students research, it appears- and claims- to be one of the most current sources. Ontario Consultants on Religious Tolerance, http://www.religioustolerance.com/ - Scholarly collection of researched topics and elaborate categorization of all belief systems.
Drugs
Sites that promote, offer, sell, supply, encourage, or otherwise advocate the recreational or illegal use, cultivation, manufacture, or distribution of drugs, pharmaceuticals, intoxicating plants, or chemicals and their related paraphernalia. For instance, how to use recreational drugs, seeds and manufacturing tips, drug gear, and equipment.
143
Education
Energy
Enterprise Webmail
Entertainment
File sharing
Finance and Investing Sites that provide information about personal finance and investments, investment models, guides, tips, etc. Sites that allow users online trading, buy or sell financial instruments. Food and Restaurants Sites that provide information, guides, and reviews about restaurants; specialty food shops, food recipes, and food delivery. Forums and Message Boards Sites that provide message boards and forums where users can discuss numerous topics. Sites that provide monitored or unmonitored Web forums, Bulletin boards, etc. Sites that make software available for downloading to users such as freeware, shareware, or open source software. Sites that provide online casinos, lotteries, information and instructions about placing bets, allowing to bet online and participate in betting pools, and online Gambling. Sites that are dedicated to online games, game tips, game downloads, interactive games, and multiplayer games.
Gaming
144
Gore
Government
Hacking
Hate
Health
Hobbies
Hosting
Internet Telephony
Job Search
Kids
145
Lifestyle
Sites dedicated to GLBT orientation issues, resources, outreach, portals, clubs, associations, personal sites (personal home pages), and activism. Religion, political, legal and news sources that accept, promote, or wholly address target groups. Incorporates politics (politicians and their platforms, PACs*, lobby groups); political issues (legality of gay rights, adoption, marriage, health or wellness (ACT-UP)); legal rulings or precedents. Family, adoption, or marriage or partner concerns and rights within target groups All chat pages that are devoted to GLBT issues, regardless of stated or implied chat subject(s). Gay politics chat, lesbian mothering chat, bisexual rights chat are conisered as GLBT issues. GLBT advice; the sites that exclusively discuss sexual orientation issues, coming out; how to address ones orientation with friends and family. These sites does not include these discussions that are mainly mature in nature. Transgender lifestyles by choice, cross-dressing, youth pages and genderqueer categories (excludes intersexual issues, that is the medical discussions, treatments, and theories surrounding children born with indeterminate genitalia); incorporates hormone therapy, elective gender reassignment, personal accounts, mental or emotional health issues and similar related items.
146
Sexual relationship counseling Products to improve ones sex life Explicit discussions of sex and sexuality Sexual orientation issues Lingerie sales Nudism or Naturism Sites that refer to themselves as nudist sites, but are thinly disguised porn sites and not part of Mature Content, but are covered by the Pornography category.
Military
Sites that are sponsored by military branches or agencies as well as official and personal sites related to military history, ideology, or specific branches of the military.
Mobile Entertainment Sites that offer a range of add-ons for handheld devices like ringtones, wallpapers, games, and videos. Music Sites that are related to the music industry such as radio Websites, band, or artist pages, music fan sites, music reviews, music studios and venues, and lyrics, tablature, and music sheet. Sites that primarily report, inform, or comment, on current events or contemporary issues of the day. Includes sports, weather, editorials, and human interest news. Examples include:
News
Mainstream news services, daily news, local or regional news Alternative news Internet news broadcasts (audio or video) News-oriented online and print magazines or newspapers News services or personalized news Editorials or opinion columns
Non profit
Sites that are owned by non-profit organizations. A non-profit organization (abbreviated "NPO", also "not-for-profit") is a legally constituted organization whose primary objective is to support or to actively engage in activities of public or private interest without any commercial or monetary profit purposes. NPOs are active in a wide range of areas, like the environment, humanitarian aid, animal protection, education, the arts, social issues, charities, health care, politics, religion, research, sports, or other endeavors.
147
Magic spells and curses, encompassing both self-defined black and white magic Chaos Magick, Crowley, Golden Dawn, Ordo Templi Orientalis
Witchcraft and its practices, rituals, and activities, Wiccan magic, Pagan/neo-Pagan magic. Asatru (Odinism) Vodun (Voodoo/Santeria)
Herbs, tools or paraphernalia for casting spells, summoning demons, or engaging in other magical behavior or activities
Sites that promote or provide opportunity for establishing or continuing romantic or sexual relationships. Examples are:
Personal ads like general, regional, lifestyle, 900 numbers, personal pages that promote or provide personal ads Cyber relationships
Cyber relationships and dating services, matchmaking services, and e-dating services International introductions, pen pal agencies, and introduction agencies Pets Sites and forums related to the care, maintenance, purchase, rescue, or breeding of any animal for companionship and enjoyment. The category excludes livestock or laboratory animals which are kept for economic or scientific reasons. Examples include:
148
Domains for sale Parked domains Expired domains Domains under construction Sites that are coming soon
Politics
Sites that relate to politicians, election campaigns, political organizations, and publications. Includes official home pages of politicians and political parties as well as personal sites about politics and grass-root movements. Sites that contain sexually explicit material for the purpose of arousing a sexual or prurient interest. Examples are:
Pornography
Sex chat rooms and portals Pornography, thumbnail or picpost sites Online pornographic magazines Pornographic picture galleries (general and topic-specific) Pornographic fiction or erotica Phone sex or live video Adult services, escort services, strippers, or mistresses Adult personal ads or Adult-themed dating services Sex toys or marital aids or videos, CD-ROMs, books, fetish clothing
Portal
Sites that offer a broad array of resources and services, such as email, forums, search engines, and online shopping malls. Portals typically publish their own content or collate multiple sources of information for many areas such as news, entertainment, sports, technology, and finance.
149
Sites of individual brokers and agents Real estate companies Real estate search or property location services Sites offering real estate tips and advice
Reference
Religion
Sites on religion as any set of beliefs and practices that have the function of addressing the fundamental questions of human identity, ethics, death, and the existence of the Divine. Sites that provide research materials in the natural and life sciences. Sites that support searching the Internet, newsgroups , or indices and directories.
Science
Search
150
Self-injury sites include: Sites about self-injury including cutting, punching, hitting, scratching, choking, self-biting, picking at wounds, and self-poisoning. Personal pages, forums, and clubs that may trigger self-injurious behavior Self injury webrings
Sexual Education
Sites that provide educational information on reproduction and sexual development, sexually transmitted disease, contraception, safe sexual practices, sexuality, and sexual orientation. Sites that provide the means to purchase products or services online. Products or services that are principally marketed to satisfy industrial or commercial needs are not included in this category. Examples are: Pages offering an item intended for personal usage for sale, with price, description, order number, or some combination thereof Internet malls
Shopping
Online auctions Department or retail stores online catalogs Services that are meant to benefit the private individual
151
Sports portals and directories - scores, schedules, news, statistics, discussion, etc.; spectator sports link aggregations Sports event ticket sales for targeted professional or collegiate sports; sports tourism Online magazines, newsletters, chats, and forums for targeted professional and collegiate sports
Streaming Media
Sites that host streaming media like television, movies, video, radio, or other media. Sites that describe or promote suicide. Examples are: Suggestions on how to kill yourself; newsgroups; chat rooms; message boards Descriptions or depictions of methods,systems, or machines; instructions Personal stories; suicide diaries; blogs; forums
Suicide
Famous suicides or details of famous suicides Famous suicide spots Glorification or worshipful attitude to suicide
Sites that provide information pertaining to computers, the Internet as well as telecommunication. Examples are:
Computer and telecommunication hardware, devices, and gadgets Internet and phone access services
Technology news
152
Retailers and manufacturers from the tobacco industry Tobacco products and paraphernalia Smoking is good, glamorous, or cool How to smoke or smoking lessons
Travel
Sites that promote or provide opportunity for travel planning in a general sense, particularly finding, and making travel reservations. Examples are: Travel portals, packages, and information (includes tours, travel clubs and associations, and travel information for specific demographic groups) Air travel (air carriers: tickets/reservations/charters)
Sites that facilitate travel-related transportation (tickets/reservations/charters/rentals of trains, buses, boats, motorcycles. Does not include car rentals.) Lodging (includes lodging directories and portals)
Violence
Sites that advocate or provide instructions to cause physical harm to people or property through use of weapons, explosives, pranks, or other types of violence. Examples are: Explosives and bombs: How to manufacture, obtain materials, transport, or seed an area, including but not limited to making explosives using common household items. Pranks, destructive mischief, "revenge," teenage anarchy including but not limited to dangerous chemistry Descriptions or instructions for killing people
Virtual Community
Sites that offer a variety of tools and mechanisms to enable a group of people to communicate and interact by the Internet. Examples include:
Social networking Chat and instant messaging Forums & Messageboards Hosting of home pages and other user generated content including audio and video
153
Online sales of firearms, ammunition, accessories, and knives Descriptions, reviews, specifications, or weapons
Weapons retailers, manufacturers, auctions, and trading centers Instructions for manufacture of weapons Webmail Sites that provide Web-based email services that are freely available and accessible through any Internet browser. Sites related to the traditions, customs, planning, and products involved in a marriage or commitment ceremony as well as in civil unions. Examples are:
Wedding
Symantec periodically updates the predefined URL categories. If you subscribe to category updates, Symantec Scan Engine automatically downloads updated categories through LiveUpdate. Symantec might create new URL categories to address additional content areas as needed. If you subscribe to the category updates, any new categories are automatically downloaded with the regular updates to the existing categories. New categories are not active by default. You must select the new categories that you want to use for URL blocking. The predefined URL categories cannot be viewed or modified. See Overriding a URL categorization on page 160. Note: If the requested URL belongs to the CAIC category, the URL is replaced with the text CAIC-URL in all the corresponding messages and logs.
154
Enable URL filtering and select the appropriate filtering mode. See Enabling URL filtering on page 155. See About the filtering modes on page 154. Specify the URLs (by subject content) to which you want to deny access. See Denying access to URLs in URL categories on page 156. Create and populate local categories with sites to which you want to deny user access. See Managing local categories on page 157. Override URL categorizations by adding URLs to Allow categories. See Overriding a URL categorization on page 160. Customize the "Access Denied" message that users see when access to a URL is denied. See Customizing the access denied message on page 161.
155
See Customizing the access denied message on page 161. When Symantec Scan Engine scans in filtering mode, it stops scanning when the first URL match is found.
1 2 3
In the console on the primary navigation bar, click Policies. In the sidebar under Views, click Filtering. On the URL tab, under URL Filtering, select Enable URL filtering and download URL definitions.
156
4 5
Under Enable URL filtering and download URL definitions, select Filtering mode or Audit mode. On the toolbar, select one of the following options:
Save Saves your changes. Use this option to continue making changes in the console until you are ready to apply them. Apply Applies your changes. Your changes are not implemented until you apply them.
1 2 3
In the console on the primary navigation bar, click Policies. In the sidebar under Views, click Filtering. On the URL tab, under URL Filtering, select Enable URL filtering and download URL definitions.
157
4 5
Under Configure Categories, select Deny Access for each URL category for which you want to deny access. On the toolbar, select one of the following options:
Save Saves your changes. Use this option to continue making changes in the console until you are ready to apply them. Apply Applies your changes. Your changes are not implemented until you apply them.
For example, if you add the domain symantecexample.com to a denied category, access to all URLs in that domain is denied. If you want to deny access to one of the URLs within that domain, add a more specific URL to one of the local categories.
158
For example, www.symantecexample.com/daily-news. Because Symantec Scan Engine looks for the most exact match, access to the specific URL is allowed. Access is denied to any other content from that domain. Note: You cannot allow or deny access to a URL based on Internet protocol (for example, HTTP, FTP, and HTTPS). When you add a URL to a local category and deny access to that category, all connections are uniformly blocked. You can manage local categories as follows:
Create a local category You can create up to 256 local categories. Delete a local category Add a URL to a local category Use host names rather than IP addresses. Delete a URL from a local category
1 2 3 4
In the console on the primary navigation bar, click Policies. In the sidebar under Views, click Filtering. On the URL tab, under URL Filtering, select Enable URL filtering and download URL definitions. Under Tasks, click Add Local Category. In the content area on the URL tab, under Local Categories, the new category displays in the list of local categories. The category is temporarily called: rename.
Type a new name for the category. Categories can be up to 64 characters in length. Category names are not case-sensitive. Local categories are denied by default.
159
1 2 3 4
On the URL tab, under URL Filtering, select Enable URL filtering and download URL definitions. Under Local Categories, select the category you want to delete from the list of local categories. In the sidebar under Tasks, click Delete Local Category. On the toolbar, select one of the following options:
Save Saves your changes. Use this option to continue making changes in the console until you are ready to apply them. Apply Applies your changes. Your changes are not implemented until you apply them.
1 2 3
On the URL tab, under URL Filtering, select Enable URL filtering and download URL definitions. Under Local Categories, select the category to which you want to add a URL from the list of local categories. In the URLs associated with selected Local Category (maximum 511 characters per URL) box, type the URL that you want to add. Type one URL per line. You can enter maximum 511 characters per URL.
160
1 2
On the URL tab, under URL Filtering, select Enable URL filtering and download URL definitions. Under Local Categories, select the local category from which you want to delete a URL. The URLs that are contained in the selected category are displayed in the URLs associated with selected Local Category (maximum 511 characters per URL) box.
3 4
In the URLs associated with selected Local Category (maximum 511 characters per URL) box, highlight the URL that you want to remove and then press Delete. On the toolbar, select one of the following options:
Save Saves your changes. Use this option to continue making changes in the console until you are ready to apply them. Apply Applies your changes. Your changes are not implemented until you apply them.
161
1 2 3 4
In the console on the primary navigation bar, click Policies. In the sidebar under Views, click Filtering. On the URL tab, under URL Filtering, select Enable URL filtering and download URL definitions. Under URL List Override (maximum 511 characters per URL), type the URL for which you want to allow access. Type one URL per line. You can enter maximum 511 characters per URL.
1 2
In the console on the primary navigation bar, click Policies. In the sidebar under Views, click Filtering.
162
3 4 5
On the URL tab, under URL Filtering, select Enable URL filtering and download URL definitions. Under Access Denied Message, customize the user notification message. On the toolbar, select one of the following options:
Save Saves your changes. Use this option to continue making changes in the console until you are ready to apply them. Apply Applies your changes. Your changes are not implemented until you apply them.
Chapter
About logging data About configuring local logging Configuring logging to the Windows Application Event Log Configuring Symantec Scan Engine to log events to SSIM About configuring alerts About reports
Logging destinations
Table 8-1 shows the destinations to which Symantec Scan Engine can forward log events.
164
Logging data, issuing alerts, and generating reports About logging data
Windows If you are running Symantec Scan Engine on Windows, you can log Application Event events to the Windows Application Event Log. Log See Configuring logging to the Windows Application Event Log on page 174. Statistics logs Statistics logs are used to report the following cumulative scan data:
Total number of files that are scanned, repaired, and quarantined Total megabytes scanned Types of violations that are found by violation type
You must enable logging to the statistics logs so that you can view statistics reports. Scan data is logged daily to the statistics log files. You can use the reporting functions to view the statistics data. See Enabling statistics reporting on page 173. Symantec Security You can log events to the Symantec Security Information Manager Information for event management and correlation. Symantec Security Information Manager Manager integrates multiple Symantec Enterprise Security products and third-party products to provide a central point of control for security within an organization. For more information about how to integrate Symantec Scan Engine with Symantec Security Information Manager, on the Internet, go to the following URL: https://www-secure.symantec.com/platinum/en/Collectors/ See Configuring Symantec Scan Engine to log events to SSIM on page 175. RPC client logging If your client uses RPC, Symantec Scan Engine logs certain events to subsystem (RPC the RPC client logging subsystem. Logging to the RPC client is in only) addition to the other logging destinations that are available. See Logging to the RPC client logging subsystem on page 97.
Logging data, issuing alerts, and generating reports About logging data
165
166
Logging data, issuing alerts, and generating reports About logging data
Definitions corrupted Definitions update failure Licensing error Filer (RPC) retry error Scan error Critical error Crash error
Logging error (SMTP/SNMP/RPC user notification) Entries for this event are only logged to the local logs. RPC client disconnected error
Outbreak
All of the events that are logged at the Error logging level File attribute outbreak alert URL block outbreak alert Malformed container outbreak alert Mail policy outbreak alert Infection outbreak alert Virus outbreak alert Container limit outbreak alert
Logging data, issuing alerts, and generating reports About logging data
167
All of the events that are logged at the Error logging level Definitions rollback failed Infection found Spyware Risk Adware Risk Other Security Risk Container violation found File attribute violation found Definitions rollback Mail policy violation found Licensing warning URL block File Access Allowed
Symantec Scan Engine has not received configured number of requests Scanning feature hung or scan engine is overloaded
Scan request rejected Failed to set Rapid Release parameters Failed to create self scan test file
Information
All of the events that are logged at the Error logging level Version information URL audit detection Definitions update LiveUpdate up-to-date LiveUpdate succeeded
168
Logging data, issuing alerts, and generating reports About logging data
All of the events that are logged at the Error logging level Outbreak alerts for the configured events All of the events that are logged at the Warning logging level All of the events that are logged at the Information logging level Files scanned URLs scanned
Note: The Verbose logging level is not available for SMTP alerts and
SNMP alerts or SSIM logging.
Note: The Verbose logging level should only be selected for debugging
purposes. Performance is significantly degraded if you active this logging level for general logging.
Logging data, issuing alerts, and generating reports About configuring local logging
169
The logging bind address is the first bind address in the ICAP Configuration Bind address table on the Configuration > Protocol page. If the first bind address is the local host, then the Logging IP address is the second bind address in the list.
One or more bind addresses are selected in The logging bind address is the first the ICAP Configuration Bind address table. non-local host IP address from the selected bind addresses in the ICAP Configuration Bind address table on the Configuration > Protocol page.
See Configuring ICAP options on page 82. To specify the log bind address
1 2 3
In the console on the primary navigation bar, click Monitors. In the sidebar under Views, click Logging. In the content area under Logging Properties, in the Log bind address box, type an IP address to identify the computer on which Symantec Scan Engine is running. On the toolbar, select one of the following options:
Save Saves your changes. Use this option to continue making changes in the console until you are ready to apply them. Apply Applies your changes. Your changes are not implemented until you apply them.
Change the local logging level. See Specifying the local logging level on page 170. Change the directory where log files are located. See Changing the directory where log files are located on page 170.
170
Logging data, issuing alerts, and generating reports About configuring local logging
Change the length of time that the log files are maintained. See Changing the length of time that log files are maintained on page 172. Enable statistics reporting. See Enabling statistics reporting on page 173.
1 2 3
In the console on the primary navigation bar, click Monitors. In the sidebar under Views, click Logging. In the content area under Local Logging, in the Local logging level list, select the appropriate local logging level. The default logging level is Warnings. Select Verbose only if you have been instructed to do so by Symantec Technical Support to troubleshoot issues.
Logging data, issuing alerts, and generating reports About configuring local logging
171
The disk space that is required for the log files varies, depending upon your scan volume, associated activity, and how long you retain the log files. The specified location must be large enough to accommodate these files. If you change the log file location, old log files remain in the former directory and are not removed during uninstallation. Old logs must be removed manually. See Changing the length of time that log files are maintained on page 172. To change the directory where log files are located
1 2 3
In the console on the primary navigation bar, click Monitors. In the sidebar under Views, click Logging. In the content area under Local Logging, in the Log files directory box, type the path to the new location for the log files. The file directory that you specify must already exist. Symantec Scan Engine validates the existence of the directory when you save or apply your changes.
172
Logging data, issuing alerts, and generating reports About configuring local logging
Map or mount the shared resource from the host on which Symantec Scan Engine is installed. For more information about how to map or mount a shared resource, see the documentation for your operating system.
Stop the Symantec Scan Engine service. See Verifying, stopping, and restarting the Symantec Scan Engine service on Windows on page 49. See Verifying, stopping, and restarting the Symantec Scan Engine daemon on Linux and Solaris on page 48.
3 4 5 6
Change the account of the Symantec Scan Engine service to the Administrator. Restart the Symantec Scan Engine service. In the console on the primary navigation bar, click Monitors, and then click Logging. Under Local Logging, in the Log files directory box, type the fully qualified path to the shared directory where you want the log file to reside. For example, <drive>:\logfiles\scanengine\
Logging data, issuing alerts, and generating reports About configuring local logging
173
1 2 3
In the console on the primary navigation bar, click Monitors. In the sidebar under Views, click Logging. In the content area under Local Logging, in the Number of log files to retain (one per day) box, type the number of individual log files to retain. The default setting is disabled (0) so that no log files are deleted.
174
Logging data, issuing alerts, and generating reports Configuring logging to the Windows Application Event Log
Symantec Scan Engine creates a new statistics log file for each day. The file name has the following format: SSEyyyymmdd.dat, where yyyy is the year, mm is the month, and dd is the day. The statistics log files are stored in the same location as the log files. The default location for the log files for Solaris and Linux is /opt/SYMCScan/log.The default location for Windows is C:\Program Files\Symantec\ScanEngine\log\. See Changing the length of time that log files are maintained on page 172. To enable statistics reporting
1 2 3
In the console on the primary navigation bar, click Monitors. In the sidebar under Views, click Logging. In the content area under Local Logging, check Enable statistics reporting. Statistics reporting is enabled by default.
1 2
In the console on the primary navigation bar, click Monitors. In the sidebar under Views, click Logging.
Logging data, issuing alerts, and generating reports Configuring Symantec Scan Engine to log events to SSIM
175
In the content area under Windows Logging, in the Windows logging level list, select the appropriate logging level. The default logging level for the Windows Application Event Log is None. See Logging levels and events on page 165.
1 2 3
In the console on the primary navigation bar, click Monitors. In the sidebar under Views, click Logging. In the content area under Symantec Security Information Manager, in the SSIM logging level drop-down list, select the appropriate logging level. Logging to SSIM is not activated by default. See Logging levels and events on page 165.
In the SSIM agent address box, type the IP address on which the local SSIM Agent listens. The default setting is 127.0.0.1 (the loopback interface), which restricts connections to the same computer.
176
Logging data, issuing alerts, and generating reports About configuring alerts
In the Port number box, type the TCP/IP port number on which the local SSIM Agent listens. The port number that you enter here must match the port number on which the local SSIM Agent listens. The default port is 8086.
Logging data, issuing alerts, and generating reports About configuring alerts
177
You must select the types of events for which SMTP alert messages are generated. See Logging levels and events on page 165. To activate SMTP alerts
1 2 3
In the console on the primary navigation bar, click Monitors. In the sidebar under Views, click Alerting. In the content area under SMTP Notifications, in the SMTP notification level list, select the SMTP notification level. SMTP alerts are not activated by default. The SMTP notification level is set to None. The Verbose notification level is not available for SMTP alerting.
4 5
In the Primary server address box, type the IP address or host name of the primary SMTP server that forwards the alert messages. In the Secondary server address box, type the IP address or host name of a secondary SMTP server (if one is available) that forwards the alert messages if communication with the primary SMTP server fails. In the SMTP domain box, type the local domain for Symantec Scan Engine. The domain name is added to the From box for SMTP messages. SMTP alert messages that Symantec Scan Engine generates originate from SymantecScanEngine@<domainname> ,where <domainname> is the domain name that you specify in the SMTP domain box.
In the Email recipients box, type the email addresses of the recipients of the SMTP alert messages. Type one email address per line.
178
Logging data, issuing alerts, and generating reports About configuring alerts
optional. Alert messages are sent to the primary SNMP console and secondary SNMP console in all instances. You can also configure ports for the primary server and secondary server. The Management Information Base file (symcscan.mib) is located in the MIB directory on the Symantec Scan Engine CD. You can use this file to configure SNMP alerts. You must select the types of events for which SNMP alert messages are generated. See Logging levels and events on page 165. To activate SNMP alerts
1 2 3
In the console on the primary navigation bar, click Monitors. In the sidebar under Views, click Alerting. In the content area under SNMP Notifications, in the SNMP notification level list, select the SNMP notification level. SNMP alerts are not activated by default. The SNMP notification level is set to None. The Verbose notification level is not available for SNMP alerting.
4 5
In the Primary server address box, type the computer name or IP address of the primary SNMP console to receive the alert messages. In the Primary server port box, type the port of the primary SNMP console to receive the alert messages. The default value is 162.
6 7
In the Secondary server address box, type the computer name or IP address of a secondary SNMP console to receive the alert messages, if one is available. In the Secondary server port box, type the port of a secondary SNMP console to receive the alert messages, if one is available. The default value is 162.
In the SNMP community box, type the SNMP community string. The default setting is public.
Logging data, issuing alerts, and generating reports About configuring alerts
179
A URL was blocked due to a URL filtering violation A maximum file extraction limit was met or exceeded A malformed container was detected and blocked
1 2 3
In the console on the primary navigation bar, click Monitors. In the sidebar under Views, click Outbreak. In the content area under Outbreak Management, check the events for which you want to receive alerts. You must select Outbreak alerting (or a higher logging level that includes outbreak alerting) for at least one logging destination to generate an outbreak alert. See Logging levels and events on page 165.
180
For each selected event type, do the following in the order given:
Under Occurrences, type the occurrence threshold. The default value is 2. You can use any value from 2 to 100000. Under Time Interval, type the number of minutes within which the threshold number of events must occur to generate an outbreak alert. The default value is 1. You can use any range from 1 to 100000.
About reports
You can use the Symantec Scan Engine reporting functionality to manage your local log file data. The log data that is stored in the log files depends on the logging level that you select for local logging. Local logging is activated by default at the Warning level. If you select a type of log entry for a report that is not logged at the configured logging level, no data is available. You can manage reports through the Symantec Scan Engine console by doing any of the following actions:
Generate a report of log data from the local logs. The local log files cannot be read directly. You must use the reporting function to view the local logs. Local logging is the default logging destination. See Viewing the local log data on page 181. Export selected local log data in a comma-separated value (.csv) format. See Exporting local log data to a file on page 182. Generate a report of statistics information that is contained in the statistics logs. The statistics log files are in .csv format and can be read or imported into a spreadsheet program. You must use the reporting function to view the statistics logs. See Viewing statistics log data on page 182.
181
1 2 3
In the console on the primary navigation bar, click Reports. In the sidebar under Views, click Detailed. In the content area under Log View Page, in the Date range from boxes, type the start date and the end date for the range you want to report. Use the following date format: MM/DD/YY For example, 02/25/08 is February 25, 2008.
In the Time range from boxes, type the daily start times and the end times for the time range that you want to report. Use the following time format: HH:MM:SS Use a 24-hour time format. For example, 23:30:00 is 11:30 P.M.
Check any activities for which you want to view the log data. Check all of the options that apply. Press Ctrl+A to select all items in every category. Press Ctrl+Z to unselect all items in every category.
182
1 2 3
In the console on the primary navigation bar, click Reports. In the sidebar under Views, click Detailed. In the content area under Log View Page, in the Date range from boxes, type the start date and end dates for the date range that you want. Use the following date format: MM/DD/YY For example, 02/25/08 is February 25, 2008.
In the Time range from boxes, type the daily start times and the end times for the time range that you want. Use the following time format: HH:MM:SS Use a 24-hour time format. For example, 23:30:00 is 11:30 P.M.
Check any activities for which you want to export the log data. Check all of the options that apply. Press Ctrl+A to select all items in every category. Press Ctrl+Z to unselect all items in every category.
6 7 8
In the sidebar under Tasks, click Export (CSV). In the Save logs dialog box, in the Save in list, select the file location where you want to save the report. In the File name box, type the file name, and then click Save.
183
statistics data. You can also select one or more types of statistics that you want to view. Statistic logs are used to report the following cumulative scan data:
Total number of files that are scanned, repaired, and quarantined Total megabytes scanned Types of violations that Symantec Scan Engine found by violation type
Note: You must enable logging to the statistics logs. After you enable logging to the statistics logs, you can use the statistics reporting feature to view the statistics. See Enabling statistics reporting on page 173. You can obtain summary data from the local logs for a given period of time. For the reported period, you can review the total number of risks that were found and the total number of files that were repaired. The default logging destination for Symantec Scan Engine is the local logs. The default location for the local logs on Solaris and Linux is /opt/SYMCScan/log. The default location for Windows is C:\Program Files\Symantec\Scan Engine\log\. You can change the location of the logs. See Changing the directory where log files are located on page 170. The statistics do not represent a literal physical file count of the total number of files that have been scanned. This total includes not only the number of files but also the additional objects within the container files that were scanned. Some containers (such as MIME-encoded messages and Microsoft Office documents) have additional embedded objects. These embedded objects might not be files, but they might be scanned depending on the files that you have selected for scanning. The total does not include any objects within the container files that were not scanned because their extensions did not match those configured for scanning. To view statistics log data
1 2 3
In the console on the primary navigation bar, click Reports. In the sidebar under Views, click Statistics. In the content area under Statistics View, in the Date range from boxes, type the start date and end date for the range you want to report. Use the following date format: MM/DD/YY For example, 02/25/08 is February 25, 2008.
184
In the Time range from boxes, type the daily start and end times for which you want to report. Use the following time format: HH:MM:SS Use a 24-hour time format. For example, 23:30:00 is 11:30 P.M.
Chapter
About content updates About LiveUpdate About Intelligent Updater About Rapid Release Rolling back definitions
186
Security risks
Definition files contain the necessary information to detect and eliminate risks, such as viruses and adware. Symantec supplies updated definition files at least every week and whenever a new risk is discovered. You can update risk definitions using LiveUpdate, Rapid Release, or Intelligent Updater.
URL
Symantec periodically supplies updated URL definition files. If you subscribe to content updates, Symantec Scan Engine automatically downloads updated URL definitions through LiveUpdate. Symantec might create new URL categories to address emerging URLs as needed. If you subscribe to the content updates, any new categories are automatically downloaded with the regular updates to the existing categories. You must update URL definitions using LiveUpdate.
Symantec Scan Engine automatically uses the most current definitions files for scanning. However, if a problem is discovered with the current definitions, you can revert (roll back) to the previous set of antivirus or URL definitions. When you perform a content update, Symantec Scan Engine downloads and installs the most current definitions. If an error occurs, Symantec Scan Engine tries to roll back to the previous definitions. If the rollback is successful, Symantec Scan Engine continues scanning using the previous definitions. If the rollback is unsuccessful, scanning is disabled. You must have a valid license to update definitions. See Rolling back definitions on page 197. See About licensing on page 71.
187
Methods to obtain updated definitions from Symantec Description How often Symantec provides updated definitions
Use LiveUpdate to automatically Weekly, except in cases of update your protection. When outbreaks, when definitions are LiveUpdate runs, it only updated more often downloads and installs definitions that are more current than the definitions that are found on the Symantec Scan Engine server. You can configure LiveUpdate to run on a scheduled basis, or you can run it manually. See About LiveUpdate on page 188.
Rapid Release
You can use Rapid Release when you need quick responses to emerging threats. Rapid Release definitions are most useful for a perimeter defense to mitigate quickly spreading threats. You can configure Rapid Release to run on a scheduled basis, or you can run it manually. See About Rapid Release on page 195.
Hourly
Intelligent Updater
Use Intelligent Updater if your Daily organization has a high-speed Internet connection and is at a high risk of exposure to threats and security risks. You download Intelligent Updater definitions from the Symantec Web site.
You can use more than one method at a time to update your protection. You do not have to choose one or the other. For example, you can perform on-demand
188
LiveUpdate definition updates and schedule Rapid Release definition updates to occur simultaneously. You must have a valid content license to install definition files. A content license is a grant by Symantec Corporation for you to update Symantec corporate software with the latest associated content, such as new definitions. When you do not have a content license or your license expires, your product does not receive the most current definitions. Outdated definitions can leave your servers vulnerable to risks. See About licensing on page 71.
About LiveUpdate
When you install or upgrade Symantec Scan Engine, LiveUpdate is enabled by default to run every two hours. You can modify this schedule, or you can run LiveUpdate manually. You can also use the XML modifier command-line tool to configure the number of times Symantec Scan Engine tries to perform a LiveUpdate. See Configuring the number of LiveUpdate retries on page 230. See Configuring LiveUpdate to occur automatically on page 188. See Performing LiveUpdate on demand on page 189. When Symantec Scan Engine performs a LiveUpdate, the definitions that are downloaded are automatically selected as the active definitions. However, you can revert to the previous versions of the antivirus or URL definitions. The definition set that you choose remains active until the next LiveUpdate or Rapid Release update occurs, which then becomes the active definition set. See Rolling back definitions on page 197. Symantec Scan Engine uses Symantec Java LiveUpdate technology. To run LiveUpdate, you must have the Java 2SE Runtime Environment (JRE) 5.0 (update 13 or later) or JRE 6.0 installed.
189
When LiveUpdate is scheduled, it runs at the specified time interval that is relative to the LiveUpdate base time. The default LiveUpdate base time is the time that Symantec Scan Engine was installed. You can change the LiveUpdate base time by editing the configuration file. If you change the scheduled LiveUpdate interval, the interval adjusts based on the LiveUpdate base time. See Changing the LiveUpdate base time on page 231. To configure LiveUpdate to occur automatically
1 2 3
In the console on the primary navigation bar, click System. In the sidebar under Views, click LiveUpdate Content. In the content area under LiveUpdate Content, check Enable scheduled LiveUpdate. The default setting is enabled.
In the LiveUpdate interval drop-down list, select the interval. You can choose from 2, 4, 8, 10, 12, or 24-hour intervals. The default setting is 2 hours.
1 2 3
In the console on the primary navigation bar, click System. In the sidebar under Views, click LiveUpdate Content. Under Tasks, click LiveUpdate Content.
190
191
downloadCacheSize
The maximum size the Java LiveUpdate cache can grow until it is eligible for purging. If CacheMode is true, this parameter needs to be configured, otherwise, Java LiveUpdate fails. For example, downloadCacheSize=5368709120
maxPackageContentSize
The maximum allowed size of the package contents. For example, maxPackageContentSize=2147483647
maxPackageSize
The maximum allowed size of the package file. For example, maxPackageSize=2147483647
192
In the configuration file at workdir=, type the path for the temporary directory.
193
In the configuration file at logfile=, type the log file path where you want to store the LiveUpdate activity log file. The following is an example of a log file path for Windows: logfile=C:\WINNT\Temp\LiveUpdate.log
In the configuration file at urls=, type 1 to allow downloads from the specified URL, or type 0 to prevent downloads.
In the configuration file at proxy=, type the proxy server host name or IP address and the port number (separated by a colon). You must use the following format: <servername>:<portnumber> where <servername> is the IP address or host name of the proxy server, and <portnumber> is the appropriate port.
194
Symantec provides the latest definition files for download on the Symantec Web site through Intelligent Updater. Intelligent Updater is updated daily with the most current definition files. The name of the Intelligent Updater file, which changes with each update, uses the following format:
yyyymmdd-vvv-Pbb.exe The file name provides the following information: yyyy year mm month dd day vvv version P processor (I=Intel, A=Alpha) bb platform (16=16-bit, 32=32-bit)
For example, 20080225-003-i32.exe is the February 25, 2008 build version three, Intel 32-bit update for Windows. Note: Intelligent Updater file downloads are larger than LiveUpdate file downloads or Rapid Release file downloads. The downloads are larger because LiveUpdate and Rapid Release add definitions to the current definitions set. Intelligent Updater replaces the current definition set with a new definitions set that contains both older and the newly added definitions. Symantec Scan Engine must be running when you install definitions using Intelligent Updater to ensure that the newer definitions become the active definitions set.
Run the following script: <default directory>\Program Files\Symantec\ScanEngine\definitions\ AntiVirus\setup-iu.bat enable Symantec Scan Engine checks shared definitions once per minute.
195
Run the following script: <default directory>\Program Files\Symantec\ScanEngine\definitions\ AntiVirus\setup-iu.bat disable Symantec Scan Engine performs updates through LiveUpdate.
Run the following script: <default directory>/opt/SYMCScan/bin/definitions/AntiVirus/setup-iu.sh enable Symantec Scan Engine checks shared definition once per minute.
Run the following script: <default directory>/opt/SYMCScan/bin/definitions/AntiVirus/setup-iu.sh disable Symantec Scan Engine performs updates through LiveUpdate.
196
Warning: Rapid Release definitions do not undergo the same rigorous quality assurance tests as LiveUpdate and Intelligent Updater definitions. Symantec encourages users to rely on the full quality-assurance-tested definitions whenever possible. Ensure that you deploy Rapid Release definitions to a test environment before you install them on your network. If you use a proxy or firewall that blocks FTP communications, the Rapid Release feature does not function. Your environment must allow FTP traffic for the FTP session to succeed. The Rapid Release definitions that are downloaded are automatically selected as the active definitions. However, you can revert to the previous version of the antivirus definition set. The definition set that you choose remains active until the next definition update runs. See Rolling back definitions on page 197. Rapid Release does not support URL definition updates. You must update URL definitions using LiveUpdate. See About LiveUpdate on page 188.
1 2 3
In the console on the primary navigation bar, click System. In the sidebar under Views, click Rapid Release Content. In the content area under Rapid Release Content, check Enable scheduled Rapid Release to enable automatic downloads of Rapid Release definitions. This option is disabled by default.
In the Rapid Release interval box, to specify the interval between which you want Symantec Scan Engine to download Rapid Release definitions, do any of the following steps:
Type the interval. Click the up arrow or down arrow to select the interval.
197
You can select any number between 5 minutes and 120 minutes. The default value is 30 minutes.
1 2 3
In the console on the primary navigation bar, click System. In the sidebar under Views, click Rapid Release Content. Under Tasks, click Rapid Release Content.
198
1 2 3
In the console on the primary navigation bar, click System. In the sidebar under Views, click LiveUpdate Content. In the content area under Definition Details, select the definitions set that you want to roll back. To select multiple definitions, press and hold the CTRL key and select the definitions that you want to roll back.
In the sidebar under Tasks, click Rollback <definition feature name> Definitions.
Appendix
About silent installation and upgrade Implementing a silent installation in Solaris and Linux About implementing a silent installation for Windows Generating an encrypted password
200
Create a response file to capture your input values for installation. Run the installation program to read the response file. This response file lets you perform the installation silently using the values that you specified.
201
AdminPassword
JavaBinDir
202
The boolean value that indicates the version of the Red Hat Package Manager (RPM) that you are running. If you are running RPM versions 4.0.2 or 4.1, change this setting to 0. If you are not running RPM version 4.0.2 or 4.1, do not change the default setting. The default setting is 1. Enables URL Scanning and downloading of the URL definitions. Possible values are as follows: true: Use this value if you want to enable URL scanning in filtering mode and Download URL definitions. false: Use this value if you want to disable URL Scanning and Definition Download. This is the default value.
EnableFilteringAnd DownloadDefinitions
203
Locate the response file, response, on the Symantec Scan Engine CD and copy it to the /tmp directory. For the silent installation to initiate, the response file must be located in the /tmp directory.
2 3
Rename the file as no-ask-questions and open the file. Supply the input value for each parameter. Make changes only to the right of the equal sign (=) for each parameter.
At AdminPassword=, copy and paste the encrypted string that the XML modifier command-line tool generated. Ensure that you have copied the encrypted string in its entirety. See Generating an encrypted password on page 205.
204
USERUPGRADESELECTION
Specifies that the installation is an upgrade. Possible values are as follows: UPGRADE Use this value to preserve your existing settings. All other input values are ignored. CLEAN Use this value to uninstall and reinstall the product. Configure the input values that you want to modify.
ADMIN_PORT
The port number on which the Web-based console listens. The default port number is 8004.
SSL_PORT
The Secure Socket Layer (SSL) port number on which encrypted files are transmitted for increased security. The default port number is 8005.
ENCRYPTED_PASSWORD
The encrypted password for the virtual administrative account that you use to manage Symantec Scan Engine. If you do not specify a password, the default is blank (no password).
205
ENABLE_URL_FILTERING
1 2
Change directories to the location of the Symantec Scan Engine installation program, ScanEngine.exe. At the command prompt, type the following:
ScanEngine /s /v"/qn <arguments>"
where <arguments> are the input values that you want to specify. You must use the format <inputname>=<value> and use a space to separate each value. For example:
ScanEngine /s /v"/qn USERUPGRADESELECTION=CLEAN SSL_PORT=8006"
You must include the quotation marks in the command, or the silent installation does not function properly. The silent installation proceeds automatically from this point using the input values that you provide.
206
and paste it in the appropriate location in the response file. The XML modifier command-line tool is included on the product CD. To generate an encrypted password
where <password> is the password that you will use to access the Symantec Scan Engine console. The tool returns an encrypted string.
Appendix
About the Symantec Scan Engine command-line scanner Setting up a computer to submit files for scanning Command-line scanner syntax and usage
Repair infected files and delete those files that are unrepairable. Recursively descend into subdirectories to scan multiple files.
208
Using the Symantec Scan Engine command-line scanner Setting up a computer to submit files for scanning
Obtain information about the command-line scanner and Symantec Scan Engine operation.
Windows Server 2003 Solaris 9 Red Hat Enterprise Linux version 3.0
If you send files from the same computer on which Symantec Scan Engine runs, you do not need to install any additional files for the command-line scanner. The appropriate files are installed automatically during the installation of Symantec Scan Engine. You can use the command-line scanner to submit files for scanning from a computer that does not have Symantec Scan Engine installed. You must copy the command-line scanner files to the computer. The ssecls files are organized into subdirectories by operating system. Use the files for the operating system of the computer from which you want to submit files for scanning. Follow these procedures to set up a computer to submit files for scanning from a computer that does not have Symantec Scan Engine installed. To set up a computer to submit files for scanning
Obtain copies of the command-line scanner files from one of the following locations:
Using the Symantec Scan Engine command-line scanner Command-line scanner syntax and usage
209
On the Symantec Scan Engine CD, in the top-level Command_Line_Scanner directory On the computer on which Symantec Scan Engine is installed, in the Symantec Scan Engine installation directory, in the ssecls subdirectory
2 3
Copy the entire contents of the directory for the appropriate operating system. On the computer from which you want to submit files for scanning, place the files in a directory location that is in the command prompt path.
210
Using the Symantec Scan Engine command-line scanner Command-line scanner syntax and usage
(replace) or delete files, you must have permission to modify or delete the files. You must also have access to the directory where the files are located. If you do not specify a path, input data is read from standard input (STDIN) and sent to Symantec Scan Engine for scanning. After the scan, the data (either the original file, if it was clean, or the repaired file) is written to standard output (STDOUT). If a file is infected and cannot be repaired, no data is written to STDOUT. Note: DBCS path names in scan requests should not be converted to Unicode (UTF-8) encoding before the path is passed to Symantec Scan Engine.
Note: When more than one Symantec Scan Engine is specified, the
load balancing and failover features of the API are activated automatically. See About specifying the Symantec Scan Engine IP address and port on page 212.
Using the Symantec Scan Engine command-line scanner Command-line scanner syntax and usage
211
See About specifying the antivirus scanning mode on page 213. -verbose Report detailed information about the file that is scanned. When you use this option, a line of output is printed to STDOUT for each file that is scanned. The information includes both the name of the file and the result of the scan, including the final disposition of the file. See About using the -verbose option on page 214. -details Report detailed information about the infections or violations that are found. When you use this option, a block of text is printed to STDOUT for each file that is scanned. The output text indicates the name of the file that was scanned and the result of the scan. If the file is infected or violates an established policy, the output text also provides information about the violation or infection.
Note: If you use the -details option, you do not need to use the -verbose
option. The output for the -verbose option is duplicated as part of the output for the -details option. See About using the -details option on page 215.
212
Using the Symantec Scan Engine command-line scanner Command-line scanner syntax and usage
-recurse
Recursively descend into the subdirectories that are inside each path that is specified on the command-line. See About requesting recursive scanning on page 216.
-onerror
Specify the disposition of a file that has been modified (repaired) by Symantec Scan Engine when an error occurs when Symantec Scan Engine replaces a file. The default setting is to delete the file. You can specify one of the following: leave The original (infected) file is left in place. delete The original (infected) file is deleted, even though the replacement data is unavailable.
See About disposing of infected files when an error occurs on page 217.
Using the Symantec Scan Engine command-line scanner Command-line scanner syntax and usage
213
You can specify multiple Symantec Scan Engines. You must separate multiple entries with a semicolon. For example: ssecls -server 192.168.0.100:1344;192.168.0.101:1344 c:\temp When more than one Symantec Scan Engine is specified, the load balancing and failover features of the API are activated automatically. The Symantec Scan Engine API provides scheduling across any number of computers that are running Symantec Scan Engine. When multiple Symantec Scan Engines are used, the API determines which Symantec Scan Engine should receive the next file based on the scheduling algorithm. If a Symantec Scan Engine is unreachable or stops responding during a scan, another Symantec Scan Engine is called. The faulty Symantec Scan Engine is taken out of rotation for 30 seconds. If all of Symantec Scan Engines are out of rotation, the faulty Symantec Scan Engines are called again. The API does not stop trying to contact Symantec Scan Engine unless any of the following conditions occur:
At least five engines do not function It appears that a file that was scanned might have caused more than one engine to stop responding
For example: ssecls -server 192.168.0.100:1344 -mode scanrepair c:\temp When files are sent to Symantec Scan Engine using the command-line scanner, the command-line scanning mode overrides the scan policy configuration on Symantec Scan Engine. This override includes scanning the files that are embedded
214
Using the Symantec Scan Engine command-line scanner Command-line scanner syntax and usage
in container files. If you do not specify a scanning mode using the -mode option, the default setting (scanrepairdelete) applies.
-verbose See About using the -verbose option on page 214. -details See About using the -details option on page 215. -timing See About using the -timing option on page 216.
These options are not available if you use the pipe mode to send a file for scanning.
-1
The file was not infected. The file was infected and repaired. The file was a container file that contains the embedded files that were infected and were repaired or deleted.
Using the Symantec Scan Engine command-line scanner Command-line scanner syntax and usage
215
Possible scan result codes for the -verbose option (continued) Description
The file was successfully scanned, was not able to be repaired, and was not deleted. This result code can mean either that the file was unrepairable or that the scan policy did not allow repair. The file was successfully scanned, was not able to be repaired, and was deleted. This result code can mean either that the file was unrepairable or that the scan policy did not permit repair.
The output when four files (for example, a, b, c, and d) are scanned should look similar to the following: c:\work\filea -1 c:\work\fileb 2 c:\work\filec 2 c:\work\filed 0
Note: The output data mirrors the information that Symantec Scan Engine returns for each infection or violation that is identified. It might not reflect the final disposition of the file. The code for the scan results indicates the final disposition of the file. This information is also displayed when you use the -verbose option.
216
Using the Symantec Scan Engine command-line scanner Command-line scanner syntax and usage
The output when four files (for example, a, b, c, and d) are scanned and files c and d are found to be infected with the Kakworm.c virus should look similar to the following example: c:\work\filec 2 Kakworm.c 2832 Infected c:\work\filed 2 Kakworm.c 2832 Infected
Using the Symantec Scan Engine command-line scanner Command-line scanner syntax and usage
217
Symantec Scan Engine for scanning. You must use the -recurse option to do so, as in the following example: ssecls -server 192.168.0.100:1344 -recurse c:\winnt Note: The recursive option does not apply when you use pipe mode.
For example: ssecls -server 192.168.0.100:1344 -onerror delete c:\temp Note: This option does not apply when you use pipe mode.
Exclude the files that exceed a limit from being scanned Exclude files by name from being scanned
218
Using the Symantec Scan Engine command-line scanner Command-line scanner syntax and usage
where <bytes> is the maximum file size to be scanned. Files that exceed the maximum file size limit are not sent to Symantec Scan Engine for scanning. To exclude files by name from being scanned
where <path> is the path to the rule file. The format for a rule file is one string per line, where the string can contain one of the following:
File name All files by that file name are excluded from scanning regardless of the folders in which they are found. To exclude all files with a specific extension, use *.ext. (This instance is the only supported use of a wildcard character.) For example, memo.doc. Full path name Only this specific file is excluded from scanning. For example, C:/Programs/memo.doc Full directory path Every file in this directory is excluded from scanning. names For example, C:/Programs
Using the Symantec Scan Engine command-line scanner Command-line scanner syntax and usage
219
Type the following argument: -log <_path_> where <path> is a full or partial path to a file. The file is created if it does not exist. If the file exists, it is overwritten. Most output is sent to the log file instead of the screen when you use in this mode. Ssecls writes a series of dots to the screen as it scans files so that you can view the progress.
220
Using the Symantec Scan Engine command-line scanner Command-line scanner syntax and usage
Appendix
Editing the Symantec Scan Engine configuration files How to use the XML modifier command-line tool About configuration options
222
Editing configuration data How to use the XML modifier command-line tool
In Solaris and Linux, the default location for the XML files is /opt/SYMCScan/bin/. In Windows, the default location is C:\Program Files\Symantec\Scan Engine\ for 32-bit Windows platform, and C:\Program Files (x86)\Symantec\Scan Engine\ for 64-bit Windows platform. Note: When you edit the configuration data, all high-ASCII and double-byte characters must be written in UTF-8 encoding. When you are finished editing the XML files, you must stop and restart Symantec Scan Engine. Changes to settings in the console (if any) appear the next time that you open the console. See Verifying, stopping, and restarting the Symantec Scan Engine daemon on Linux and Solaris on page 48. See Verifying, stopping, and restarting the Symantec Scan Engine service on Windows on page 49. Warning: Several configuration options are not addressed here and should not be changed. Changes to certain options can detrimentally affect product performance. For example, the installation directory is specified at installation, and the product does not function if you change this value.
Editing configuration data How to use the XML modifier command-line tool
223
Option commands
Description
If the XPath specifies an attribute, then that attribute is set to an empty string. If the XPath specifies a group, then the items within that group are removed. If you want to populate a list within the XML document with new items, first remove the whole list. The remove option command is as follows: java -jar xmlmodifier.jar -r XPath XMLfile
Bulk copy
Use the bulk copy command to insert a list of items that are stored at the XPath. Each item is separated as a new line. The bulk copy command appends the bulk file to the XPath location. Only use this command to insert lists. Each entry must be on a separate line. The bulk copy command is as follows: java -jar xmlmodifier.jar -b XPath bulkfile XMLfile
Node value
This command sets a node value. The value option command is as follows: java -jar xmlmodifier.jar -s XPath newvalue XMLfile
Setting a password This command sets the password that is found in the configuration.xml file to the appropriate encrypted value. The password option command is as follows: java -jar xmlmodifier.jar -p password configuration.xml
This command tests the password that is found in the configuration.xml file with the specified value. An output is made to the command-line that indicates whether the passwords are equal. The password test command is as follows: java -jar xmlmodifier.jar -t password configuration.xml
224
Description
This command encrypts the specified password and outputs the results to the command-line. The password encryption command is as follows: java -jar xmlmodifier.jar -e password where <password> is your password. You can use the set (-e) option to set the encrypted value into the file. For example, the following command sets the password to the specified encrypted value: java -jar xmlmodifier.jar -e //admin/password/@value 1F49C564D6F77B2B8E8BEA2D831E6614D3893AE7ADB8D378CBFAF676F0670D0E configuration.xml
Query
This command returns the value of the node in the XML document with no newline. The query option command is as follows: java -jar xmlmodifier.jar -q XPath XMLfile
Query list
This command returns the list of values of the node in the XML document with a newline. The l is lowercase, as in list. The query list command is as follows: java -jar xmlmodifier.jar -l Xpath XMLfile
Configure the ICAP response See Configuring the ICAP response on page 225. Configure the ICAP preview option See Configuring the ICAP preview option on page 226. Control the dynamic thread pool See Controlling the dynamic thread pool on page 226. Disable the ICAP threshold client notification feature
225
Specify the maximum file name lengths See Specifying maximum lengths for file names on page 229. Specify whether to scan top-level files See Specifying whether to scan top-level files on page 230. Configure the number of LiveUpdate retries See Configuring the number of LiveUpdate retries on page 230. Change the LiveUpdate base time See Changing the LiveUpdate base time on page 231. Extract all streams from OLE-structured storage documents for scanning See Extracting all streams from OLE-structured storage documents for scanning on page 231. Specify a replacement file name See Specifying a replacement file name on page 232. Specify archive file types to scan See Specifying archive file types to scan on page 232. Modify the ICAP options attribute-list extension See Modifying the ICAP options attribute-list extension on page 233. Modify the ICAP response to send the non-viral threat category name See Modifying the ICAP response to send the non-viral threat category name on page 234. Access scan error files See Accessing scan error files on page 234. Delete or repair infected read-only files See Deleting or repairing infected read-only files on page 235. Enable non-viral threat categories information See Enabling non-viral threat categories information on page 236.
226
Table C-2 lists the ICAP response settings. Table C-2 Xpath ICAP response settings Field values Default setting
True
/configuration/protocol/ False ICAP/ICAPResponse/@value Send an access denied message or ICAP 403 response. True Send a replacement file.
/configuration/protocol/ False True icap/ICAPPreviewAll/@value Send the transfer headers based on the Symantec Scan Engine extension lists. True Send a transfer-preview header indicating preview all.
227
The configuration file parameters for controlling the dynamic thread pool are as follows:
MinThreads The minimum number of scanning threads that is created at start-uptime and the minimum to keep alive regardless of the load that is processed. The default setting is 16. You can increase this number if the default setting of 16 cannot satisfy a typical load. The MinThreads value cannot be greater than the MaxThreads value. (Symantec Scan Engine does not validate the value that you input to ensure that it is lower than the MaxThreads value.) If the MinThreads value is greater than MaxThreads value, Symantec Scan Engine generates the minimum thread pool based on the MinThreads value, regardless of MaxThreads value. As a result, the "Active threads" value and the "Waiting threads" value on the Reports > Resources page would be greater than "Thread pool size" value. GrowThreadCount The GrowThreadCount is number of scanning threads to add when the existing threads cannot handle the load that is processed. The default setting is 4. The GrowThreadCount value must be larger than the ShrinkThreadCountvalue. Reasonable values are in the range of 0 to 16.
228
IdleThreadCount
The number of idle scanning threads, which triggers the removal of scanning threads. The default setting is 6.
SecondsBetweenChecks
The number of seconds between evaluations of the thread-pool activity. The default setting is 5 seconds. This value cannot be smaller than 2.
Table C-4 lists the dynamic thread-pool settings. Table C-4 Xpath Dynamic thread-pool settings Field values Default setting
16
/configuration/resources/ Integer between 0 - 512 system/MinThreads/@value /configuration/resources/ system/GrowThreadCount/ @value Integer between 0 - 16
/configuration/resources/ Integer between 0 - 16 system/ShrinkThreadCount/ @value /configuration/resources/ Integer 0 or greater system/BusyRequestCount/ @value /configuration/resources/ system/IdleThreadCount/ @value /configuration/resources/ system/ SecondsBetweenChecks/ @value Integer between 0 - 16
Integer 2 or greater
229
Symantec Scan Engine also rejects the scan request and sends a notification to the client. This feature lets the client determine load balancing and prevents the server from being overloaded with scan requests. If you disable the client notification feature, Symantec Scan Engine continues to send messages to the specified logging destinations when the threshold is met. The "Log or send alert for maximum load every <n> minutes" setting applies only to SMTP alerts. Note: For logging to occur at maximum load, the logging level for the logging destination must be set to Warning or higher. See Allocating resources for Symantec Scan Engine on page 61. See ICAP return codes on page 240. See Logging levels and events on page 165. Table C-5 lists the threshold client notification settings. Table C-5 Xpath Threshold client notification settings Field values Default setting
True
/configuration/protocol/ False ICAP/EnableServerTooBusy Disables the ICAP Response/@value threshold client notification. True Enables the ICAP threshold client notification.
230
/policies/AntiVirus/ False True ScanTopLevelMIME/@value Open the top-level file as a container file and scan only the contents of the file (do not scan the top-level file). True Scan all top-level files.
231
Default setting
4
/liveupdate/schedules/ retries/@value
Default setting
<install time>
232
Default setting
False True Extracts all streams. True Extracts only native OLE streams.
Default setting
DELETE%.TXT The percentage mark (%) is a sequence number. For example, if two attachments are deleted, the replacement files are called DELETE0.TXT and DELETE1.TXT.
233
/configuration/resources/ DecEngines/@value
amg, arj, cab, gzip, id, lha, lz, zip, ss, gzip, cab, lha, tnef, ole1, ss, rar, rtf, tar, tnef, zip, arj, rar, lz, amg, tar, rtf, text, text, mb3, as, bzip2, pdf bzip2, pdf
Default setting
True
234
Modifying the ICAP response to send the non-viral threat category name
You can specify whether you want ICAP to return the name of the non-viral threat in its response when a such a threat is detected. By default, the ICAP response does not send the non-viral threat category name. Table C-14 lists the EnableNonViralThreatCategoryResp header settings. Table C-14 Xpath Enable non-viral threat name Field values Default setting
/configuration/protocol/ True False ICAP/EnableNonViral Returns the non-viral ThreatCategoryResp/@value threat category name. False Does not return the non-viral threat category name.
235
Default setting
False False Prohibits access to the files that are blocked by the Internal Server Error result. True Permits access to the files that would normally be blocked by the Internal Server Error result.
Default setting
False True Symantec Scan Engine repairs or deletes the read-only file, if that is the scanning policy. True Symantec Scan Engine does not repair or delete the read-only file, even if that is the scanning policy.
236
is sent for Symantec Scan Engine to scan. If Symantec Scan Engine does not respond with a scan result before the timeout period expires, a Warning message is logged. Each self-test scan occurs 1 minute after the last self-test scan finishes. Disable this feature if any of the following conditions apply:
You do not want the automatic self-testing scanning events logged to the specified logging destinations. You configure Symantec Scan Engine to sends alerts for Warning level events, but you do not want alerts about this event.
See Logging levels and events on page 165. Table C-17 lists the selfscantest settings. Table C-17 Xpath
/configuration/logging/ selfscantest/@enabled
Default setting
True
237
See Verifying, stopping, and restarting the Symantec Scan Engine service on Windows on page 49. For more information about ICAP response headers, see the Symantec Scan Engine Software Developer's Guide. Table C-18 lists the EnableNonViralThreatCategoryResp settings. Table C-18 Xpath EnableNonViralThreatCategoryResp settings Field values Default setting
configuration/protocol/ True False ICAP/EnableNonViral Symantec Scan Engine ThreatCategoryResp/@value sends the non-viral threat category name. False Symantec Scan Engine does not send the non-viral threat category name.
238
Appendix
Return codes
This appendix includes the following topics:
Native protocol return codes ICAP return codes RPC protocol return codes
200 Command okay. 201 Output file available. 203 Local output file available. 220 Symantec Scan Engine ready. 221 Service closing transmission channel. 230 File scanned. 420 Service not available, closing transmission channel. 430 File not acceptable at this time. 500 Syntax error, command unrecognized. 501 Syntax error in parameters. 502 Command not implemented. 503 Bad sequence of commands. 504 Unsupported protocol version. 530 File not acceptable.
240
531 File unscannable. 532 Output file unavailable. 533 Error scanning file. 534 File name exceeds configured length. 535 Maximum Extract Time exceeded - scan incomplete. 536 Maximum Extract Depth exceeded - scan incomplete. 537 Maximum Extract Size exceeded - scan incomplete. 538 Malformed container file found. File not scanned. 539 Aborted - no antivirus scanning license.
100 Continue. 200 OK. 201 Created. 204 No content necessary. 400 Bad request. 403 Forbidden. Infected and not repaired. 404 Not found. 405 Method not implemented. 408 Request timeout. 500 Internal server error. 503 Service unavailable/overloaded. 505 ICAP version not supported. 506 Server too busy. 533 Error scanning file. 551 Resource unavailable. 558 Aborted - no scanning license.
241
Infection found, repaired Infection found, repair failed Infection found, repair failed, file quarantined Infection found, repair failed, quarantine failed Infection found Maximum Extract Size exceeded, scan incomplete Maximum Extract Time exceeded, scan incomplete Maximum Extract Depth exceeded, scan incomplete Aborted - No AV scanning license Internal server error Infection found, repair failed, read-only file
242
Glossary
The product's response to a policy violation. An automatic notification that an event or error has occurred. The process of attaching a network listener to a locally-bound IP address. When you bind a network service to an IP address, Symantec Scan Engine uses this address to listen on, and to transmit data to and from the client. A program that makes requests of or transmits data to a parent server program. An application that is configured to pass files to Symantec Scan Engine for scanning. A set of rules that are designed to let computers exchange data. A communications protocol defines issues such as transmission rate, interval type, and mode. See also ICAP, native protocol, and RPC protocol. A program interface for the management of software. A pre-defined category provided with Symantec Scan Engine that consists of URLs that contain related subject matter. A usability feature in which Symantec Scan Engine sends (trickles) small amounts of data to the user at regular intervals until the scan is complete. The trickled data triggers the File Download or Save File As dialog box, which provides the user with a quicker download response. A file that contains viral and non-viral definitions. You can obtain updated definition files using LiveUpdate or Intelligent Updater. Symantec Scan Engine uses the most current definition file that is available for scanning. The content that contains necessary information to detect and eliminate risks, such as viruses and adware. Definitions can also include new URL categories. compressed files that are designed to overload your system and maliciously use resources and degrade performance. To reduce your exposure to denial-of-service attacks, you can impose limits to control how Symantec Scan Engine handles container files.
communications protocol
data trickle
definition file
definitions
denial-of-service attack Container files that are overly large or that contain large numbers of embedded,
244
Glossary
encrypted attachment
A message attachment that has been converted into a form that Symantec Scan Engine cannot scan. You to choose an action to take when an encrypted attachment is detected. A significant occurrence in a system or application that a program detects. Events typically trigger actions, such as sending a user notification or adding a log entry. A suffix consisting of a period followed by several letters at the end of a file that, by convention, indicates the type of the file. A method for analyzing files, messages, or Web content. A set of actions that apply to a category of messages, Web content, and files. A lightweight protocol for executing a remote procedure call on HTTP messages. Symantec Scan Engine supports version 1.0 of ICAP, as presented in RFC 3507 (April 2003). Content from Web sites that is being passed to the user. The method or protocol by which data is sent from one computer to another on the Internet. Each computer (known as a host) on the Internet has at least one address that uniquely identifies it to all other computers on the Internet. A unique number that identifies a workstation on a TCP/IP network and specifies routing information. Each workstation on a network must be assigned a unique IP address, which consists of the network ID, plus a unique host ID assigned by the network administrator. This address is usually represented in dot-decimal notation, with the decimal values separated by a period (for example 123.45.6.24). A dialog box containing a list of items from which a user can choose. A custom category that you create that consists of URLs that contain related subject matter. A system or server or computer that hosts multiple network interface cards. Symantec Scan Engine's own protocol. The native protocol is a simple TCP/IP protocol. It is text-based like HTTP or SMTP. It uses standard ASCII commands and responses to communicate between the client and the server. An email that can be automatically sent to the sender, to the recipients, or to other email addresses when a specified condition is met. For example, if you have a policy that removes .exe attachments from incoming messages, you can notify the sender that the attachment has been removed. When a certain number of the same type of threat or policy violation occurs in a given time interval. You can use outbreak alerts as an early warning for a potential outbreaks. This lets you can take the necessary precautions to protect your network.
event
extension
IP address
notification
outbreak
Glossary
245
parameter
A value that is assigned to a variable. In communications, a parameter is a means of customizing program (software) and hardware operation. A set of instructions that Symantec Scan Engine implements on a file, Web content, or email messages. You can also set policies for scanning. A set of rules for encoding and decoding data so that messages can be exchanged between computers. These rules also ensure that each computer reliably use the data. On the Internet, the exchange of information between different computers is made possible by the suite of protocols known as TCP/IP. Protocols can be stacked, meaning that one transmission can use two or more protocols. For example, an FTP session uses the FTP protocol to transfer files, the TCP protocol to manage connections, and the IP protocol to deliver data. See also ICAP, native protocol, and RPC protocol. An application (or agent) that runs on the security gateway and acts as both a server and client, accepting connections from a client and making requests on behalf of the client to the destination server. There are many types of proxies, each used for specific purposes. See also proxy server. The location where files that are suspected of containing viruses can be isolated. Quarantined files can be forwarded to Symantec Security Response for analysis. If a new threat is discovered, updated definitions are returned automatically. 1. An event that can compromise your network security. 2. A threat (such as a virus, worm or Trojan horse) or a security risk (such as adware and spyware). with client applications. This option is not available for Solaris or Linux. The components in Symantec Scan Engine that filter email, files, and Web content. The policies, practices, and procedures that are applied to information systems. Securing your information systems ensures that the data that is communicated among and maintained within those systems is not vulnerable to inappropriate or unauthorized use, access, or modification. It also ensures that the networks that are used to store, process, or transmit information are kept operational and secure. Programs that do any of the following actions: Provide unauthorized access to computer systems Compromise data integrity, privacy, confidentiality, or security Present some type of disruption or nuisance
policy
protocol
proxy
quarantine
risk
RPC (Remote Procedure A proprietary scanning protocol that uses the MS-RPC protocol to communicate Call) scanner security
security risk
SSL certificate
An electronic, digital certificate that authenticates the identity of the server. SSL certificates are typically signed by an independent, trusted third party. The
246
Glossary
certificate lets the browser verify the authenticity of the server before it permits the SSL session to begin.
threat
1. A virus, worm, mass-mailer worm, or Trojan horse. 2. A circumstance, event, or person with the potential to cause harm to a system in the form of destruction, disclosure, modification of data, or denial-of-service. See also virus. A predetermined period of time during which a given task must be completed. If the time-out value is reached before or during the execution of a task, the task is canceled. In the Symantec Scan Engine console, the row below the menu bar containing buttons for a commonly used commands. A technology that identifies the actual type of a file, whether or not the file extension matches that type. A file that cannot be scanned by Symantec Scan Engine for any reason. For example, encrypted files are unscannable.
time-out
toolbar
URL (Uniform Resource A string of alphanumeric characters that specify an Internet resource. For example: Locator)
http://symantecexample.com/news A URL consists of the protocol (http), the domain name of the computer on which the information is stored (symantecexample.com), and the location of the content (news).
virus
A piece of programming code inserted into other programming to cause some unexpected and, for the victim, usually undesirable event. Viruses can be transmitted by downloading programming from other sites or be present on a diskette. The source of the file you are downloading or of a diskette you have received is often unaware of the virus. The virus lies dormant until circumstances cause the computer to execute its code. Some viruses are playful in intent and effect, but some can be harmful, erasing data or causing your hard disk to require reformatting. See also threats. A client program that uses the Hypertext Transfer Protocol (HTTP) to make requests of Web servers throughout the Internet on behalf of the browser user. A special type of virus. A worm does not attach itself to other programs like a traditional virus, but creates copies of itself, which create even more copies. See also threat and virus. formatted in Hypertext Markup Language (HTML), which facilitates text, graphics, and layout. As the World Wide Web has grown in popularity, its capabilities have expanded to include the exchange of video, audio, animation, and other specialized documents. The World Wide Web is also a system of Internet servers that support specially formatted documents. Another important aspect of the World Wide Web
Web browser
worm
WWW (World Wide Web) An application on the Internet that allows for the exchange of documents
Glossary
247
is the inclusion of hypertext links that allow users to click links and quickly navigate to other related sites.
248
Glossary
Index
Symbols
.zip files. See container files
A
ActiveX 101 administrator settings password 58 timeout 58 Adobe Acrobat Reader 17 adware. See security risks alerts 176 See also logging about 176 intervals, maximum load 61 outbreak notifications 179 SMTP 176 SNMP 177 antivirus. See threats
B
bind address console 58 ICAP 82 log 168 native protocol 88
command-line scanner (continued) supported protocol 208 syntax and usage 209 configuration data 221 configuration.xml 221 console 221 See also XML modifier command-line tool accessing 51 configuring interface settings 58 password 58 port 58 server address 58 SSL port 58 time-out 58 container files blocking unscannable 109 setting processing limits 135 content categories 153 See also HTTP filtering See also local categories content license 71
D
data trickle about 85 enabling 87 warnings and limitations 86 DBCS path names 209 definitions about 185 Rapid Release 195 types 185 updating using Intelligent Updater 193 using LiveUpdate 188 dynamic thread pool 61
C
certificate file 55 Certificate Import Utility 55 command-line scanner about 207 file scanning 208 installing 208 IP address and port 212 options 210 recursive scanning 216 redirecting console output 218 scanning mode 213 scanning results 214 supported platforms 208
E
email, filtering by file name 111 file or attachment size 113
250
Index
email, filtering by (continued) maximum mail size 134 message origin 116 subject 114 events, logging 165
K
keys 55 keystore 55
L
license content 75 content license 71 locating the serial number 73 product 75 product license 71 licensing about 71 activating 72 checking status 75 license file installing 74 obtaining 73 removing 75 types of licenses 71 Linux installing Symantec Scan Engine 40 stopping and starting service 48 system requirements 32 uninstalling 69 LiveUpdate about 188 configuring LiveUpdate server 190 definitions, Symantec update frequency 186 licensing requirement 71 rolling back definitions 197 updating definitions automatically 188 on demand 189 LiveUpdate Administration Utility 17 liveupdate.xml 221 load 125 load balancing 22 local categories 153 See also content categories See also HTTP filtering about 153 managing 157 local logging configuring 170 exporting data 182 managing local logs 180 purging log files 172 statistics reporting 173
F
filtering. See HTTP filtering and email, filtering by filtering.xml 221 fulfillment ID 75
H
Home page components 52 HTTP filtering about 140 customizing the access denied message 161 local categories 153 modes 155 URL categories 140 HTTPS server 5455
I
ICAP 87 See also data trickle about 81 bind address 82 command-line scanner, using 207 configuring 82 port number 82 quarantining unrepairable files 105 return codes 240 scan policy 82 supported services 78 installation command-line scanner 208 on Linux 40 on Solaris 44 on Windows 35 preparing for 29 Intelligent Updater about 193 definition file size 193 definitions, Symantec update frequency 186 enabling 194
J
JRE (Java Runtime Environment) 17, 29
Index
251
local logging (continued) viewing data 181 logging 176 See also alerts about 163 changing log file location 170 configuring local logging 169 destinations 163 levels and events 165 outbreak alerting 179 purging log files 172 reporting functions 180 SMTP alerts 176 SNMP alerts 177 statistics reporting 173 viewing statistic logs data 182 Windows Event Log 174
port number, configuring (continued) ICAP 82 native protocol 88 POST transactions 81, 85, 106 process priority 125 processing limits 135 product license 71, 75 protection, updating Rapid Release 195 using Intelligent Updater 193 using LiveUpdate 188 protocol ICAP 90 native 88 RPC 90 supported protocols 77 supported services 78
M
mail filter policy, blocking by file name 111 individual file size 113 mail subject 114 message origin 116 total file or message size 134 mail message update feature 111
Q
Quarantine 105 queue size 61
R
Rapid Release about 195 updating definitions automatically 196 on demand 197 recursive scanning 216 resource 125 resource consumption 125 return codes ICAP 240 native protocol 239 RPC 241 risks. See threats and security risks RPC client IP address 93 configuring 90 notifying server of updated definitions 96 notifying users of threat detection 120 quarantining unrepairable files 105 return codes 241 supported services 78
N
native protocol about 88 bind address 88 configuring 88 port number 88 return codes 239 supported services 78 notifications configuring 169 logging 163
O
outbreak alerts 179
P
PFX certificate file 55 PKCS#12 certificate file 55 policy.xml 221 port number, configuring console 58
252
Index
S
scanning 214 See also command-line scanner See also HTTP filtering See also threats improving performance 131, 134 scanning thread 125 scans licensing requirements 71, 75 specifying temporary scanning directory 61 security risks categories of 106 detecting 106 self-test scanning 235 serial number 73 service startup properties editing 98 silent installation creating response file 200 generating encrypted password 205 initiating installation Linux and Solaris 203 Windows 205 installing Linux and Solaris 199 Windows 203 SMTP alerts alert bind address 168 configuring 176 SNMP alerts alert bind address 168 configuring 177 Solaris installing Symantec Scan Engine 44 stopping and starting service 48 system requirements 31 uninstalling 69 spyware. See security risks SSIM Symantec Security Information Manager 175 SSL (Secure Socket Layer) 55 Symantec Scan Engine allocating resources 61 configuring using XML modifier command-line tool 221 installing 34 new features 14 running other antivirus software 30 starting and stopping the daemon 48
Symantec Scan Engine (continued) starting and stopping the service 49 types of risks detected 101 Symantec Security Information Manager. See SSIM Symantec Security Response 195 symcscan.cfg 66 system requirements 30
T
temporary scanning directory specifying 61 third-party certificate 55 thread pool maximum threads 61 XML modifier command-line tool 226 threats 101, 135 See also command-line scanner See also container files blocking by file name 111 individual file size 113 mail subject 114 message origin 116 blocking unscannable files 109 enabling detection 103 quarantining infected files 105 testing detection capabilities 104
U
uninstallation 69 upgrade 29, 66 URL (Uniform Resource Locator) 139 URL categories about 140 denying access 156 overriding a URL categorization 160 predefined categories 140 URL filtering about 140 customizing the access denied message 161 local categories 153 See also modes 155 URL categories 140 user notifications customizing 117, 161 RPC-client users 120 UTF-8 encoding 114, 156, 221
Index
253
V
virus 101, 135 See also command-line scanner See also container files blocking by file name 111 individual file size 113 mail subject 114 message origin 116 blocking unscannable files 109 enabling detection 103 quarantining infected files 105 testing detection capabilities 104
W
Windows installing Symantec Scan Engine 35 system requirements 31 uninstalling 69 Windows 2000 Server/Server 2003 stopping and starting service 49 Windows Event Log 174
X
XML modifier command-line tool accessing 222 configuration options 224 file locations 221 using 222 XPath argument 222