SPE CS Implementation Guide
SPE CS Implementation Guide
Symantec, the Symantec Logo, the Checkmark Logo and are trademarks or registered trademarks of
Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks
of their respective owners.
This Symantec product may contain third party software for which Symantec is required to provide attribution
to the third party (“Third Party Programs”). Some of the Third Party Programs are available under open
source or free software licenses. The License Agreement accompanying the Software does not alter any
rights or obligations you may have under those open source or free software licenses. Please see the
Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this Symantec
product for more information on the Third Party Programs.
The product described in this document is distributed under licenses restricting its use, copying, distribution,
and decompilation/reverse engineering. No part of this document may be reproduced in any form by any
means without prior written authorization of Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE
DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY
INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL
DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS
DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO
CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software as defined
in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer
Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and
Commercial Computer Software Documentation," as applicable, and any successor regulations, whether
delivered by Symantec as on premises or hosted services. Any use, modification, reproduction release,
performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government
shall be solely in accordance with the terms of this Agreement.
Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
https://www.symantec.com
Symantec Support
All support services will be delivered in accordance with your support agreement and the
then-current Enterprise Technical Support policy.
Chapter 10 Working with the Core server only mode ..................... 171
About the Core server only mode ................................................... 172
About XMLModifier tool ......................................................... 173
XMLModifier options ............................................................. 174
Accessing the XML modifier command-line tool .......................... 177
Inactive XPaths .......................................................................... 177
Configuring ICAP options in the Core server only mode ...................... 181
Configuring the antivirus scan policy in the Core server only
mode ................................................................................. 182
Configuring APK Reputation in the Core server only mode .................. 183
Configuring the quarantine server in the Core server only mode ........... 184
Configuring file name filtering in the Core server only mode ................. 185
Configuring file size filtering in the Core server only mode ................... 187
Configuring true type file filtering in the Core server only mode ............. 188
Configuring Symantec Protection Engine to handle encrypted container
files in the Core server only mode ............................................ 190
Customizing notifications in the Core server only mode ...................... 191
Contents 9
Enabling Symantec Insight™ in the Core server only mode ................. 195
Configuring the scanning aggression level in the Core server only
mode ................................................................................. 196
Excluding files from scanning based on file size in the Core server only
mode ................................................................................. 197
Monitoring scanning requests in the Core server only mode ................ 198
Enabling resource consumption logging in the Core server only
mode ................................................................................. 200
Specifying the maximum file or message size to scan in the Core server
only mode ........................................................................... 201
Setting container file limits in the Core server only mode ..................... 202
Enabling URL filtering in the Core server only mode .......................... 204
Enabling URL Reputation in the Core server only mode ..................... 205
Denying access to URLs in URL categories in the Core server only
mode ................................................................................. 205
Customizing the access denied message in the Core server only
mode ................................................................................. 206
Specifying the log bind address in the Core server only mode .............. 207
Specifying the local logging level in the Core server only mode ............ 208
Changing the directory where log files are located in the Core server
only mode ........................................................................... 209
Changing the number of log file to be maintained in the Core server
only mode ........................................................................... 210
Enabling statistics reporting in the Core server only mode ................... 211
Configuring logging to the Linux Syslog in the Core server only
mode ................................................................................. 211
Activating SMTP alerts in the Core server only mode ......................... 212
Activating SNMP alerts in the Core server only mode ......................... 214
Configuring outbreak alerts in the Core server only mode .................... 216
Configuring LiveUpdate to occur automatically in the Core server only
mode ................................................................................. 219
Performing LiveUpdate on demand in the Core server only mode
......................................................................................... 221
About editing the LiveUpdate XML file ............................................. 221
on an IP network, regardless of its platform. Any application can pass files or URLs to Symantec
Protection Engine for scanning.
Symantec Protection Engine accepts scan requests from the client applications that use
following protocol:
■ The Internet Content Adaptation Protocol (ICAP), version 1.0, as presented in RFC 3507
(April 2003)
See “About supported protocols for Symantec Protection Engine” on page 17.
You can use the Symantec Protection Engine software development kit (SDK) or build your
own connector to integrate Symantec Protection Engine with your application. The SDK supports
version 1.0 of ICAP, as presented in RFC3507 (April 2003). Symantec also has developed
connector code for some third party applications to seamlessly integrate with Symantec
Protection Engine.
The Symantec Protection Engine Software Developers Guide provides information about how
to create customized integrations with ICAP.
See “Components of Symantec Protection Engine” on page 15.
See “How Symantec Protection Engine works” on page 16.
See “What you can do with Symantec Protection Engine” on page 18.
Feature Description
Support for non-archive files Symantec Protection Engine 8.1 supports the scanning of the
larger than 2 GB non-archive files that are larger than 2 GB. The support is limited to
2 GB in previous releases.
Latest Symantec technologies Symantec Protection Engine 8.1 is integrated with latest internal
Symantec scanning technologies.
Enhanced LiveUpdate Internal critical fixes are now delivered through LiveUpdate.
Improved in-memory file system Symantec Protection Engine uses the system memory to stream and
scan the files. Now, the memory size is no more limited to 4 GB.
Feature Description
Malformed container file detection Malformity is not reported anymore as it is not considered as a
threat.
APK reputation APK reputation is now reported like threats. Earlier it used specific
IDs.
Rapid Release and Intelligent Updating definitions using Rapid Release and Intelligent Update is
Update not supported in this release. You must use LiveUpdate to update
the definitions.
Introducing Symantec™ Protection Engine 15
Components of Symantec Protection Engine
Feature Description
Email Filtering Filtering emails based on subject line and message origin is not
supported int his release.
Symantec Protection Engine The software that you install to protect Symantec_Protection_Engine\
your network from threats (such as
viruses), security risks (such as
adware and spyware), and unwanted
content.
Silent installation The files that you can use to perform Symantec_Protection_Engine\
a silent installation. Also includes Silent_Install\
response files for Red Hat.
Symantec Protection Engine The tools and documentation that you Symantec_Protection_
software developer's kit can use to create the customized Engine_SDK\
integrations that use ICAP.
Table 1-4 lists the components that are included in the Symantec_Protection_Engine_Tools.zip
file.
Introducing Symantec™ Protection Engine 16
How Symantec Protection Engine works
LiveUpdate Log Config files The LiveUpdate Log Config folder Tools\LiveUpdate_Log_Config\
contains the various configuration files
to enable LiveUpdate logging on all
platforms.
Adobe Acrobat Reader is required to view the reports that are generated in .pdf format. You
can download Adobe Acrobat Reader from http://www.adobe.com/.
Protocol Description
Internet Content ICAP is a lightweight protocol for executing a remote procedure call on HTTP
Adaptation Protocol messages. ICAP is part of an architecture that lets corporations, carriers, and
(ICAP) ISPs dynamically scan, change, and augment Web content as it flows through
ICAP servers. The protocol lets ICAP clients pass HTTP messages to ICAP
servers for adaptation. Adaptation might include some sort of transformation or
other processing, such as scanning or content filtering. The server executes its
transformation service on the messages and responds to the client, usually with
modified messages. The adapted messages might be either HTTP requests or
HTTP responses.
See “About secure ICAP support in Symantec Protection Engine” on page 78.
Task Description
Configure protocols to You can change the communication protocol that Symantec Protection Engine
pass files to Symantec uses to communicate with the client applications for which it provides scanning
Protection Engine for services. The features that are available through Symantec Protection Engine
scanning differ depending on the protocol that you use.
You can use the following protocol:
■ ICAP
After you select a protocol, you must provide the configuration information
specific to the protocol. The configuration options differ depending on the protocol
that you select.
Table 1-6 What you can do with Symantec Protection Engine (continued)
Task Description
Detect threats You can configure Symantec Protection Engine to scan files and email messages
for threats, such as viruses and Trojan horses. You can configure the policies
to process the documents that contain threats. You can also quarantine the
infected files.
Prevent potential You can filter files and email messages to further protect your network.
threats
See “Configuring file size filtering in Symantec Protection Engine” on page 89.
See “Configuring file name filtering in Symantec Protection Engine” on page 87.
Symantec Protection Engine can also block certain types of the container files
that might contain threats or malicious code.
Detect security risks Symantec Protection Engine can detect security risks such as: adware, dialers,
hacking tools , joke programs, remote access programs, spyware, and trackware.
You can also quarantine the infected files.
Prevent Symantec Protection Engine protects your network from the file attachments
denial-of-service that can overload the system and cause denial-of-service attacks.
attacks Denial-of-service attacks can include any of the following types of container
files:
Specify the files to scan You can conserve bandwidth and time if you limit the files and messages that
are scanned.
See “Specifying the maximum file or message size to scan” on page 113.
Introducing Symantec™ Protection Engine 20
What you can do with Symantec Protection Engine
Table 1-6 What you can do with Symantec Protection Engine (continued)
Task Description
Filter HTTP requests If your client uses ICAP, you can apply Uniform Resource Locator (URL) filtering
for unwanted content to block access to sites that contain unwanted content. Symantec Protection
Engine uses Symantec URL categories and Child Abuse Image Content (CAIC)
URL categories to scan and block the unwanted URLs.
Customize user Symantec Protection Engine lets you customize messages to users to notify
notifications them when a file has been infected or deleted. You can add the text to the body
of a replacement file for a deleted attachment.
See “Customizing notifications in the Core server only mode” on page 191.
Log events and review Symantec Protection Engine can send events to several logging destinations.
event data and You can activate logging to each available destination when you select the
statistics logging level that you want for that destination. You can then choose the logging
levels for which Symantec Protection Engine generates log messages.
Use the Symantec Protection Engine reporting functionality to view your log
data and statistics.
Issue alerts Symantec Protection Engine can send alerts through Simple Mail Transfer
Protocol (SMTP) and Simple Network Management Protocol (SNMP).
You also can activate outbreak alerts. Symantec Protection Engine can issue
alerts when a certain number of the same types of threat or violations occur in
a given time interval. Outbreak alerts provide an early warning of a potential
outbreak so that you can take the necessary precautions to protect your network.
Monitor Symantec You can monitor Symantec Protection Engine to ensure that it operates at an
Protection Engine optimal level for your environment. Continual monitoring ensures that you can
performance make the necessary adjustments as soon as you detect a degradation in
performance.
Keep your protection You can update your content for Symantec Protection Engine. Content updates
up-to-date ensure that your network is up-to-date with the most current risk and URL
definitions. You also can update Symantec Protection Engine with the latest
definitions without any interruption to scanning or filtering operations.
Table 1-6 What you can do with Symantec Protection Engine (continued)
Task Description
Perform tasks from the The command-line scanner acts as a client to Symantec Protection Engine
command-line scanner through the Symantec Protection Engine API. Use the command-line scanner
to send files to Symantec Protection Engine to be scanned for threats.
The command-line scanner also lets you take the following actions:
See “About the Symantec Protection Engine command-line scanner” on page 230.
■ FreeDiskSpaceInGB
■ TotalMemoryInMB
■ TotalUsedMemoryInMB
■ VendorName
■ VirtualGuest
■ URL
Symantec collects this telemetry data to know about the threats, APK violations, and blocked
URLs from the overall files and URLs scanned.
The details are sent on 1st day of every month if Symantec Protection Engine is running on
that day. If Symantec Protection Engine is not running on the first of the month, report for that
month is not sent.
Step 1 Install Symantec Protection Engine 8.0 or later with a valid trial or paid license.
Step 2 Initiate the on-boarding process using the cloudmgmtutil utility that is available
in the Symantec Protection Engine installation directory.
See “To create an account for centralized cloud console” on page 26.
Step 3 Provide the required details in the form and create an account.
See “To create an account for centralized cloud console” on page 26.
3 On Linux, you must configure the LD_LIBRARY_PATH environment variable to the Symantec
Protection Engine installation directory before you run cloudmgmtutil utility. Execute the
following command for the same:
export LD_LIBRARY_PATH=/opt/SYMCScan/bin:$LD_LIBRARY_PATH
echo $LD_LIBRARY_PATH
4 You must have a valid Symantec Protection Engine license file (.slf) that can be paid or
trial license.
Ensure that the default license directory does not contain any other Symantec Protection
Engine licenses. The default license directory is:
Introducing Symantec™ Protection Engine 27
Onboarding to a centralized cloud console
■ Linux: /opt/Symantec/Licenses
■ If you have a valid license file, but is not yet installed on Symantec Protection Engine
computer:
■ For Linux: ./cloudmgmtutil -onboard -lf [licensefile]
Where [-licensefile] is the location of the license file (.slf).
This command installs the license file on the Symantec Protection Engine computer
and initiates the onboarding process. However, you must restart the Symantec
Protection Engine service manually to apply the license.
6 The command generates the URL. Copy the URL and paste it in the browser.
■ System requirements
■ Disable any third party antivirus products that are running on the server on which you plan
to install Symantec Protection Engine. You can turn on antivirus protection after installation
is complete.
Symantec Protection Engine scans the files that client applications pass to Symantec
Protection Engine. Symantec Protection Engine does not protect the computer on which
it runs. Since Symantec Protection Engine processes the files that might contain threats,
the server on which it runs is vulnerable if it has no real-time protection.
Use an antivirus program to protect the server on which Symantec Protection Engine runs,
such as Symantec Endpoint Protection. To prevent scanning conflicts, configure the antivirus
program not to scan the temporary directory that Symantec Protection Engine uses for
scanning.
■ Review the deployment considerations and recommendations. These recommendations
can enhance your overall performance.
See “Deployment considerations and recommendations” on page 107.
After you complete the installation, perform the post-installation tasks.
See “Symantec Protection Engine post-installation tasks” on page 41.
System requirements
Before you install Symantec Protection Engine, verify that your server meets the minimum
system requirements.
■ System requirements to install Symantec Protection Engine on Linux
For Symantec Protection Engine platform support matrix, see the following pages:
■ Symantec Protection Engine for Cloud Services
https://support.symantec.com/en_US/article.DOC11401.html
■ Symantec Protection Engine for Network Attached Storage
https://support.symantec.com/en_US/article.DOC11402.html
Ensure that your operating system has the latest service patches available.
Processor Intel or AMD Server Grade Single Processor Quad Core systems or higher
Installing Symantec Protection Engine 30
System requirements
Hardware ■ Network interface card (NIC) running TCP/IP with a static IP address
■ Internet connection to update definitions
■ 100 Mbps Ethernet link (1 Gbps recommended)
Installing Symantec Protection Engine 31
System requirements
Note: If any of the above package binary is already present on the computer and if the
installer is still unable to find it, you can add the path to the binary in
LD_LIBRARY_PATH environment variable.
Installing Symantec Protection Engine 32
About installing Symantec Protection Engine
The following Linux guest operating systems have been certified on Hyper-V:
Version 8.0.x is detected Symantec Protection Engine 8.1 supports an upgrade from version
8.0.x. You can choose to upgrade the product and preserve your
existing settings or perform a clean upgrade. If you choose to do a
clean upgrade, the installer removes the previous version, and then
installs the newer version as a full installation, without preserving any
previous settings.
Version 7.9.x is detected Symantec Protection Engine 8.1 supports an upgrade from version
7.9.x. You can choose to upgrade the product and preserve your
existing settings or perform a clean upgrade. If you choose to do a
clean upgrade, the installer removes the previous version, and then
installs the newer version as a full installation, without preserving any
previous settings
Version 7.8.x is detected Symantec Protection Engine 8.1 supports an upgrade from version
7.8.x. You can choose to upgrade the product and preserve your
existing settings or perform a clean upgrade. If you choose to do a
clean upgrade, the installer removes the previous version, and then
installs the newer version as a full installation, without preserving any
previous settings.
Installing Symantec Protection Engine 33
About installing Symantec Protection Engine
Version 7.5 is detected Symantec Protection Engine does not support direct upgrades from
version 7.5.x. You must first migrate to version 7.8.0.
Version 7.0 is detected Symantec Protection Engine does not support direct upgrades from
version 7.0.x. You must first upgrade to version 7.5.x.
After you install Symantec Protection Engine, activate all applicable licenses. If you upgrade
from a previous version that has valid licenses, when the installation is complete, Symantec
Protection Engine automatically recognizes these licenses.
See “About licensing” on page 63.
Symantec Protection Engine is shipped with the minimum set of URL definitions. If you want
to use URL filtering feature, ensure that you run LiveUpdate and get the latest URL definitions
before you start URL filtering.
See “About filtering URLs” on page 117.
If Symantec Protection Engine fails to start before it can initiate standard logging, information
about the failure is written to the abort log file (SymantecProtectionEngineAbortLog.txt). This
file is located in the installation directory (/opt/SYMCScan).
If you need to install or upgrade multiple Symantec Protection Engines on your network, you
can use the silent installation or upgrade feature to facilitate the process.
See “About silent installation and upgrade” on page 223.
See “About authentication modes in Symantec Protection Engine” on page 33.
See “Installing Symantec Protection Engine on Linux” on page 34.
Symantec Protection Engine-based authentication Users can access the Symantec Protection Engine
console using Symantec Protection Engine user
password.
Note: After the installation, Symantec Protection Engine starts LiveUpdate to download the
latest definitions. Definitions download may take some time depending on your network
bandwidth. Symantec Protection Engine service is available for scanning after the LiveUpdate
is completed successfully.
Select one of the following procedures for the type of installation or upgrade that you want to
perform:
■ First time product installation
See “To install Symantec Protection Engine on Linux” on page 34.
■ Upgrade from a previous version
See “Upgrading Symantec Protection Engine on Linux” on page 37.
■ Perform a clean upgrade
Uninstalls your current version of Symantec Protection Engine and installs the newer
version.
See “Configuring clean upgrade installation options on Linux” on page 37.
■ Perform a preserved settings upgrade
Uninstalls your current version of Symantec Protection Engine and installs the newer
version, while preserving your existing settings.
See “Configuring preserve settings upgrade installation options on Linux” on page 40.
./SymantecProtectionEngine.sh
Note: The maximum length of the application name can be upto 40 characters.
7 Select the location to install Symantec Protection Engine, and then press Enter.
The default location is /opt/SYMCScan.
8 When you are prompted whether you want Symantec Protection Engine to run as root,
select one of the following settings:
Default setting.
9 If you selected not to run Symantec Protection Engine as root, type the user account that
you want to use.
The user account must already exist.
10 Press y to specify if you want to enable URL filtering and download URL definitions.
To change the setting after installation, go to Policies > Filtering > URL to enable this
option.
Installing Symantec Protection Engine 36
About installing Symantec Protection Engine
11 Press y to specify if you want to enable URL Reputation and download URL Reputation
definitions.
See “Configuring URL Reputation ” on page 140.
See “Enabling URL Reputation in the Core server only mode ” on page 205.
12 To specify whether you want to use the user-interface console in Symantec Protection
Engine, select one of the following options:
y Select this option if you want to use the user-interface console of Symantec
Protection Engine.
n Select this option if you do not want to use the user-interface console of
Symantec Protection Engine.
14 Specify the Secure Socket Layer (SSL) port number on which encrypted files are
transmitted for increased security.
The default SSL port number is (8005). If this port is already in use, specify an SSL port
that is not in use by any other program or service. Use a port number that is greater than
1024.
15 Type a password for the administrative account, and then confirm the password by typing
it again.
16 Select the aggression level from the following options. The aggression level defines the
detection aggression level of antimalware technologies.
■ 0 for Known Bad
■ 1 for Low
■ 2 for Medium
■ 3 for High
Installing Symantec Protection Engine 37
About installing Symantec Protection Engine
Note: The maximum length of the application name can be upto 40 characters.
8 Select the location to install Symantec Protection Engine, and then press Enter.
The default location is /opt/SYMCScan.
9 When you are prompted whether you want Symantec Protection Engine to run as root,
select one of the following settings:
10 If you selected not to run Symantec Protection Engine as root, type the user account that
you want to use.
The user account must already exist.
11 Press y to specify if you want to enable URL Filtering and download URL Filtering
definitions.
To change the setting after installation, go to Policies > Filtering > URL to enable this
option.
For Core server only mode: See “Enabling URL filtering in the Core server only mode ”
on page 204.
12 Press y to specify if you want to enable URL Reputation and download URL Reputation
definitions.
To change the setting after installation, go to Policies > Filtering > URL to enable this
option.
For Core server only mode: See “Enabling URL Reputation in the Core server only mode
” on page 205.
Installing Symantec Protection Engine 39
About installing Symantec Protection Engine
13 To specify whether you want to use the user-interface console in Symantec Protection
Engine, select one of the following options:
y Select this option if you want to use the user-interface console of Symantec
Protection Engine.
n Select this option if you do not want to use the user-interface console of
Symantec Protection Engine.
y Select this option if you want to use the user-interface console of Symantec
Protection Engine.
Proceed to step 8.
n Select this option if you do not want to use the user-interface console of
Symantec Protection Engine.
Note: Steps 7 to 10 are not applicable if you are upgrading from Symantec Protection
Engine 7.9.0.
Installing Symantec Protection Engine 41
Symantec Protection Engine post-installation tasks
Symantec Protection Engine Update Manager service will be started and stopped by Symantec
Protection Engine automatically.
To verify that the Symantec Protection Engine daemon is running on Linux
1 At the command prompt, type the following command:
If nothing is displayed, the Symantec Protection Engine daemon did not start.
2 If the Symantec Protection Engine daemon did not start, type the following command:
/etc/init.d/symcscan restart
With the new configuration, Symantec Protection Engine might take longer to start than
it did in previous versions.
To stop and restart the Symantec Protection Engine daemon on Linux
1 Log in to the computer as root.
2 At the command prompt, type one of the following commands:
Note: This topic is applicable only when working in the Core server with user interface mode.
Installing Symantec Protection Engine 43
Symantec Protection Engine post-installation tasks
In some configurations, the caching of Java Applets might cause the Symantec Protection
Engine console to display very slowly or fail to display at all. To prevent this problem, you must
clear the Java cache and disable the caching feature.
To clear the Java cache
1 In the Java Control Panel dialog box, on the General tab, click Settings.
2 Clear the Keep temporary files on my computer check box.
3 Click Delete Files.
4 In the Delete Temporary Files dialog box, select the Applications and Applets and
Trace and Log Files check boxes.
5 Click OK.
See “Accessing the Symantec Protection Engine console” on page 43.
Each time that you start a new browser session, log in, and open the console, the Home page
appears. Only one user should use the console at a time to avoid possible race conditions
and configuration change conflicts.
The certificate that is shipped with Symantec Protection Engine to access the console is a
self-signed certificate and must be used for testing purpose only. We recommend that you
purchase and use a security certificate that suits you security requirements.
To access the console with Symantec Protection Engine-based authentication
1 Launch a Web browser on any computer on your network that can access the server that
is running Symantec Protection Engine.
2 In a Web browser, type the following address:
https://<servername>:<port>/
where <servername> is the host name or IP address of the server that is running Symantec
Protection Engine and <port> is the port number that you selected during installation for
the built-in Web server. The default port number is 8004.
3 If a Security Alert dialog box appears, click Yes to confirm that you trust the integrity of
the applet, and then click Yes to display the Web page.
4 In the Login Name box, type a valid login name.
5 In the Enter Password box, type the password for the administrative account.
6 Press Enter.
On successful login, Administrator is displayed on the upper right-hand side corner of the
Symantec Protection Engine console.
See “About authentication modes in Symantec Protection Engine” on page 33.
See “Clearing the Java cache” on page 42.
8005.) If you change the port number, use a number that is equal to or greater than 1024. No
other program or service should use the port number that you choose.
Note: When you configure your firewall, ensure that you do not block the ports for the built-in
HTTPS server and the SSL.
Note: This topic is applicable only when working in the Core server with user interface mode.
Symantec Protection Engine secures the HTTPS servers and SSL servers with public and
private keys, which it creates when you install the product.
You can periodically force Symantec Protection Engine to generate new keys. You can also
import keys from a third-party certificate.
See “Importing keys from a third-party certificate” on page 45.
See “Forcing Symantec Protection Engine to generate new keys” on page 47.
Linux /opt/SYMCscan/bin
2 Type the following to start the graphical user interface for the utility:
java -jar certinstall.jar --gui
Installing Symantec Protection Engine 46
Symantec Protection Engine post-installation tasks
3 In the Certificate Import Utility for Symantec Protection Engine 7.9 window, click Load
Certificate File.
4 In the Load PFX/PKCS#12 Certificate File window, select the certificate file that you want
to import.
5 In the Enter password for certificate window, type the password for the certificate.
A text representation of the certificate appears.
6 Click Import.
7 In the Select destination directory window, select the directory to where you want to
import the file.
The keystore file that is created when you import the certificate is maintained in this
directory. You must select the Symantec Protection Engine default installation directory.
8 Click OK.
The file keyStore.private is created and placed in the destination directory.
9 Click Exit to close the Certificate Import Utility.
To import a third-party private key from the command line
1 At the command line, change directories to the Symantec Protection Engine installation
directory. The default installation directories are as follows:
Linux /opt/SYMCScan/bin
You are prompted for responses. Type your response, and then press
Enter.
See “Forcing Symantec Protection Engine to generate new keys” on page 47.
keyStore.public
Option Description
You must close and reopen the console for the new
SSL port setting to take effect.
You must close and reopen the console for the changes to the console settings to take
effect.
See “About editing the Symantec Protection Engine configuration files” on page 257.
Table 2-3 describes the user information that you can configure.
Option Description
Login name Displays the login name for the user account.
Note: The login name cannot be edited.
Display name Displays the display name for the user account.
New password You can set a new password for the user account.
The email address is an optional data field. You must type the email address
in the [email protected] format.
Note: The Administrator can create a maximum of 24 user accounts only. This number does
not include the default Administrator user account.
Note: Administrator can create, edit, or delete user accounts only for Symantec Protection
Engine-based authentication.
The user login and logout information is logged when the logging level is set to Audit. With the
multiple user account feature, you can monitor who logs in and logs out.
See “Logging levels and events” on page 142.
Note: Only the Administrator can create, edit, or delete user accounts. Hence, the Manage
Users link is visible only to the Administrator.
Option Description
Login name Indicates the login name that you use to sign into
the Symantec Protection Engine console.
Display name Indicates the display name that you view on the
top-right corner of the console after you log in with
your user account credentials.
Password Indicates the password that you use to sign into the
Symantec Protection Engine console.
The information you type is lost if you click Edit user or Delete user tab without saving
your entries.
See “Managing user accounts” on page 51.
See “Editing an existing user account” on page 53.
See “Deleting a user account” on page 55.
See “Viewing existing user accounts” on page 56.
Option Description
Login name Choose the login name of the user account that you
want to modify from the drop-down menu.
Display name The existing display name (if any) is shown here.
Installing Symantec Protection Engine 54
Symantec Protection Engine post-installation tasks
Option Description
New password You can set a new password for the user account.
You cannot view the existing password of the user
account.
The information you type is lost if you click Create new user or Delete user tab without
saving your entries.
Installing Symantec Protection Engine 55
Symantec Protection Engine post-installation tasks
Option Description
4 To delete a particular user account, put a check mark in the Delete column corresponding
to the user account.
5 On the toolbar, select one of the following options:
The information you type is lost if you click Create new user or Edit user tab without
saving your entries.
See “Managing user accounts” on page 51.
See “Creating a new user account” on page 51.
See “Editing an existing user account” on page 53.
See “Viewing existing user accounts” on page 56.
Option Description
Login name Displays the unique login name of the user account
that the user must use to log into the Symantec
Protection Engine console.
Email address Displays the email address for the user account.
6 Close the existing Symantec Protection Engine console and access the console once
again for changes to take effect.
See “About security notice ” on page 57.
Option Description
Temporary directory for Symantec Protection Engine stores files in the installation directory temporary
scanning folder for scanning. You can change the location of this temporary directory to
support sites with large, specialized disk configurations. The disk space that is
required for this directory varies depending on the volume of data to be scanned.
Symantec Protection Engine performance depends on this directory being able
to accommodate a large volume of data during periods of peak use.
If you want to change the temporary directory location, ensure that it has the
proper access permissions so that only authorized entity can access it.
The file directory that you specify must already exist. Symantec Protection
Engine validates the existence of the directory when you save or apply your
changes.
The default temporary directories are as follows:
■ Linux: <Installdir>/temp
Installing Symantec Protection Engine 59
Symantec Protection Engine post-installation tasks
Option Description
Number of available You can specify the maximum number of threads that are available for scanning.
threads for scanning
The pool of threads that is available to Symantec Protection Engine for scanning
dynamically adjusts to the load that is being processed. You can change a
number of additional related parameters in the configuration file. The optimal
settings for these parameters vary depending on your environment and how
you use Symantec Protection Engine.
Symantec Protection Engine performance depends on the following:
Threshold number of Symantec Protection Engine is at maximum load when the number of queued
queued requests requests exceeds the specified threshold. You can configure Symantec
Protection Engine to log the event to the specified logging destinations when
the queue exceeds the maximum load.
Option Description
Log or send alert for Symantec Protection Engine generates log entries and alerts at a prescribed
maximum load every _ interval to notify you that it is at the maximum threshold for scan requests. The
minutes alert interval is the number of minutes between each log entry or alert. The
default interval is every five minutes. If you change the interval, select one that
is informative but does not result in an excessive number of log entries or alerts.
You receive an SMTP alert every <n> minutes when Symantec Protection
Engine rejects a scan request because it is too busy when all of the following
conditions are met:
Symantec Protection Engine posts log entries and sends SNMP alerts for each
event in which a scan request is rejected because the server is too busy.
In-memory file Symantec Protection Engine can decompose and scan the contents of container
processing files in memory, which eliminates the latency imposed by on-disk scanning.
This feature can improve performance in environments in which large volumes
of container and archive file formats are routinely submitted for scanning. You
can limit the resources that are consumed for processing files in memory by
specifying the maximum RAM to use for the in-memory file system (in
megabytes).
5 In the Threshold number of queued requests box, type the threshold number of queued
requests that Symantec Protection Engine considers to be at maximum load.
The default setting is 100.
6 In the Log or send alert for maximum load every __ minutes box, type the alert interval
in minutes.
The default setting is 5 minutes.
7 Under Server Resources, in the Maximum RAM used for in-memory file system box,
type the maximum amount of RAM that can be used for the in-memory file system.
The default setting is 2048 MB.
8 On the toolbar, select one of the following:
This option lets you continue making changes in the console until you are
ready to apply them.
Your changes are not implemented until you apply them. You must perform a
manual restart for the changes to take effect.
7.5.x Symantec Protection Engine does not support direct upgrades from
version 7.5.x. You must migrate to 8.0 first, then upgrade to 8.1.
LD_LIBRARY_PATH="<Base_Location>
/SPE_Tools/Migration_Utility/RedHat/"
7.0.x Symantec Protection Engine does not support direct upgrades from
version 7.0.x. You must first upgrade to version 7.5.x, then migrate
to 8.0.
You must stop the Symantec Protection Engine service before you upgrade the software.
See “Importing keys from a third-party certificate” on page 45.
■ About licensing
About licensing
You activate key features for Symantec Protection Engine when you install the appropriate
license. Key features include scanning for threats and security risks, HTTP content filtering,
and related updates. You must install the licenses through the Symantec Protection Engine
console.
For complete scanning functionality and definition updates, you need the following licenses:
The AV Content license lets you receive updated threat and security
risk definitions. Updated definitions ensure that your server is
protected from risks.
The URL Content license lets you receive updated Content Category
lists.
The URL Reputation Content license lets you use updated IP,
Domain/URL Reputation feeds.
Symantec Insight™ license Symantec Insight™ license activates the Insight scanning.
Symantec APK Reputation license Symantec APK Reputation license activates the APK Reputation
functionality.
You must have valid product licenses to configure the product and to access the threat
(antivirus) scanning, security risk scanning, and HTTP content filtering features. Without valid
product licenses, you cannot access these features in the console.
The first time that you open the console after installation, only the License view is active. You
must install the AV Scanning license to access the Configuration, Reports, Monitors, and
System pages in the console. You must have the AV Scanning and URL Filtering licenses
installed to access the Policies pages. You must also activate the Insight license to take
advantage of the Insight scanning feature.
Symantec Protection Engine installs with the most current definitions that are available at the
time the product is released. After you install the product and activate the licenses, perform a
definition update to obtain the most current definitions. If you discover a problem with the new
definitions, revert to the definitions that were shipped with the product.
See “Rolling back URL definitions” on page 169.
When a license is within 60 days of its expiration date, it is considered to be in a warning
period. After a license expires with no license renewal, all record of the license is removed.
To regain product functionality, you must renew and reactivate your license subscription.
You can configure Symantec Protection Engine to generate log entries when a license is in
the warning period.
See “About logging data” on page 141.
See “Checking the license status” on page 68.
Activating licenses 65
About license activation
Obtain a license To request a license file, you must have the license serial number for each license
file from Symantec. that you want to activate. After you complete the registration process, Symantec
sends you the appropriate license file by email.
Install the license You must install the content licenses and product licenses on each server on which
file. you run Symantec Protection Engine. When you install the licenses, you can enable
the scanning processes and update your product and its associated content.
See “Installing the license file” on page 66.
The serial number is printed on the license certificate or upgrade certificate that Symantec
mails to you. The format of a serial number is a letter followed by 10 digits. For example,
F2430482013.
If you purchase multiple types of licenses but register them separately, Symantec sends you
a separate license file for each license. You must install each license file separately. If you
register multiple licenses at the same time, Symantec sends you a single license file that
contains all of your licenses.
The license file that Symantec sends to you is contained within a .zip file. The .slf file that is
contained within the .zip file is the actual license file. Ensure that your inbound email
environment permits .zip email message attachments.
Warning: License files are digitally signed. If you try to edit a license file, you render it invalid.
Note: You must restart Symantec Protection Engine manually after saving the license files.
Activating licenses 67
About license activation
Linux /opt/Symantec/Licenses
Note: If Symantec Protection Engine is running with a non-root user, that user must have the
required permissions for a license file in /opt/Symantec directory for LiveUpdate to work.
Linux /opt/Symantec/Licenses
Column Description
Expiration This column lists the expiration date for each license. If the license is in the warning
period, a warning message is displayed in this column.
Fulfillment ID The fulfillment ID is the identification number for your license. You must provide this
number to Symantec customer care if you have questions about your license.
The Quick Status pane on the Home page also displays the licenses that are installed. When
a license is about to expire, the License page displays the warning.
To check the license status
1 In the console on the primary navigation bar, click System.
2 In the sidebar under Views, click License.
The licensing information appears in the content area.
See “About licensing” on page 63.
What is a transaction?
A file or a URL scanned is counted in a transaction when it is scanned by at least one scanner
within Symantec Protection Engine (Antivirus, file attributes, container attributes, and URL
Scanner).
The following are considered as a transaction:
■ A file that is sent to Symantec Protection Engine for examination or a file that is extracted
from a container and sent to Symantec Protection Engine for examination.
■ URL that is sent to Symantec Protection Engine for URL filtering (category-based filtering
or URL Reputation).
Activating licenses 69
About transaction-based metering
■ MaxExtractDepth
■ CumulativeExtractSize
■ MaxExtractFileCount
■ Following policy settings (filemod only) where files are skipped based on the size or the
source path and are not counted in transactions:
■ FileSizeScanThreshold
■ DenyFilePaths
4 In the Time range from boxes, type the daily start and end times for which you want the
report.
Use the following time format: HH:MM:SS Use a 24-hour time format.
For example, 23:30:00 is 11:30 P.M.
5 In the sidebar under Tasks, click Generate Report.
General Statistics ■ Requests: Total number of the requests that Symantec Protection
Engine received.
■ Connections: Total number of connector connections to Symantec
Protection Engine.
■ Files Scanned: Files that Symantec Protection Engine scanned. If the
file is an archive and contains multiple files within it, this field shows
number of archive files.
■ Total Files Scanned: Total number of files that Symantec Protection
Engine scanned. If file is an archive and contains multiple files within
it, then this field shows total number of files scanned that is all the files
within the archive file and archive file itself.
For example, if an archive file contains 100 files within it, Files Scanned
displays 1 and Total Files Scanned displays 101.
■ Files Quarantined: Files that Symantec Protection Engine quarantined.
■ Cumulative Scan Time: Total amount of time that Symantec Protection
Engine spent to scan the files within specified date and time range.
■ Scan Errors: Errors that Symantec Protection Engine encountered in
the specified period.
Threat Risk Ratings From the overall viruses and security risks detected, threat risks ratings
classifies it into high, medium, and low risk ratings.
Non-viral threats Detected ■ Security Risks: Security risks that Symantec Protection Engine
detected.
Policy Violations ■ Container Policy Violations: Total container policy violations that
Symantec Protection Engine detected.
■ File Attribute Policy Violations: Total file attribute policy violations
that Symantec Protection Engine detected.
Unscannable Files ■ Encrypted Containers: Total number of encrypted container files that
Symantec Protection Engine could not scan.
Activating licenses 72
About transaction-based metering
URL Statistics ■ URLs Scanned: Total number of URLs that Symantec Protection
Engine scanned.
■ URL Filtering Blocks: Total number of URLs that Symantec Protection
Engine blocked after scanning.
■ URL Filtering Audits: Total number of URLs that Symantec Protection
Engine audited.
■ URL Reputation Blocks: Total number of URLs that Symantec
Protection Engine blocked after scanning with URL Reputation feature.
Internet Content Symantec Protection Engine uses ICAP by default. ICAP is a lightweight protocol
Adaptation Protocol for executing a remote procedure call on HTTP messages. Symantec Protection
(ICAP) Engine supports version 1.0 of ICAP, as presented in RFC 3507 (April 2003).
If you have installed Symantec Protection Engine for Cloud Services, you can only configure
it to run in ICAP-based protocol.
You must upgrade from supported previous version of Symantec Protection Engine for Cloud
Services to the latest version of Symantec Protection Engine for Cloud Services only. Upgrade
Configuring scanning services for client applications 74
About the communication protocols
from Symantec Protection Engine for Cloud Services to Symantec Protection Engine for
Network Attached Storage is not supported and vice versa.
Feature ICAP
See “Configuring antivirus scan policy in Symantec Protection Engine” on page 82.
See “Configuring file name filtering in Symantec Protection Engine” on page 87.
See “Configuring file size filtering in Symantec Protection Engine” on page 89.
See “Specifying the maximum file or message size to scan” on page 113.
Configuring scanning services for client applications 75
About working with ICAP
Feature ICAP
■ Local logs
See “About configuring local logging” on page 146.
■ Statistics Log
See “Enabling statistics reporting in Symantec Protection Engine” on page 149.
■ Abort log
See “Logging destinations” on page 141.
■ Linux Syslog
See “Configuring logging to the Linux Syslog” on page 150.
Notification to the client that the queued requests threshold is reached Supported
See “About the Symantec Protection Engine command-line scanner” on page 230.
this standard can use ICAP to communicate with Symantec Protection Engine to request
scanning services.
The Symantec Protection Engine software development kit (SDK) is available for developing
custom integrations with version 1.0 of ICAP. It includes client-side application program
interfaces (API) to simplify the addition of AV scanning to any C, C++, Java, or .Net application.
When you use ICAP as the communication protocol, Symantec Protection Engine initially
provides information to the ICAP client about which file types to scan. This information is based
on the configuration of Symantec Protection Engine.
If the file extension is one that is identified for scanning, the ICAP client forwards the entire
file to Symantec Protection Engine. If the file extension is unknown or is not one that is identified
for scanning, the ICAP client forwards the first few bytes of the file. Symantec Protection Engine
examines the first few bytes of the file to determine whether the file might contain a threat or
security risk. Based on this examination, Symantec Protection Engine might request and scan
a file even when it is not identified for scanning.
Symantec Protection Engine also scans POST transactions (sending data from a Web browser
to a server using the HTTP protocol). When a threat or security risk is detected in a POST
transaction file, Symantec Protection Engine blocks the file without trying to repair it. An HTTP
message informs the posting client that a risk was detected and that the file was blocked.
See “Configuring ICAP options” on page 76.
Option Description
Bind address Symantec Protection Engine detects all of the available IP addresses that are
installed on the host. By default, Symantec Protection Engine accepts scanning
requests on (binds to) all of the scanning IP addresses that it detects. You can
configure up to 64 IP addresses as scanning IP addresses.
You can specify whether you want Symantec Protection Engine to bind to all
of the IP addresses that it detects, or you can restrict access to one or more
interfaces. If you do not specify at least one IP address, Symantec Protection
Engine binds to all of the scanning IP addresses that it detects.
Port number The port number must be exclusive to Symantec Protection Engine. You must
use the same port number for all of the scanning IP addresses that you want
to bind to Symantec Protection Engine.
The default port number is 1344. If you change the port number, use a number
that is equal to or greater than 1024. No other program or service should use
this port number.
5 Under ICAP Configuration, in the Bind address table, select the scanning IP addresses
that you want to bind to Symantec Protection Engine. Check Select All to select every
IP Address in the Bind address table.
Only four IP addresses appear in the Bind address table. Click the scroll bar to view
additional IP addresses.
By default, Symantec Protection Engine binds to all interfaces.
6 In the Port number box, type the TCP/IP port number that the client application uses to
pass files to Symantec Protection Engine for scanning.
The default setting for ICAP is port 1344. If you change the port number, use a number
that is equal to or greater than 1024. No other program or service should use this port
number. You must use the same port number for every scanning IP addresses that you
want to bind to Symantec Protection Engine.
7 On the toolbar, select one of the following options:
Use this option to continue making changes in the console until you are ready
to apply them.
■ Denial-of-service attacks
See “Setting container file limits” on page 113.
Protecting against risks 80
About scanning for risks
Symantec Protection Engine also helps you protect your network by blocking potential threats.
When you receive information about a new threat, you can block or delete the message, file,
or file attachment before definitions are available.
See “About preventing potential threats in Symantec Protection Engine” on page 86.
Scanning for risks can consume bandwidth, increase overall scanning time, and degrade
performance. You can improve scanning performance by limiting the files and email messages
to be scanned to only those that are most likely to contain risks.
See “About container files in Symantec Protection Engine ” on page 91.
See “Specifying which files to scan” on page 110.
See “Specifying the maximum file or message size to scan” on page 113.
For more information about viral threats, security risks, and other forms of malicious attacks,
on the Internet, go to the following URL for Symantec Security Response:
http://securityresponse.symantec.com
Table 5-1 Risk rating factors and their impact levels (continued)
Symantec Protection Engine calculates the overall impact (Cumulative Risk Rating) of a
detected threat based on the impact levels of individual risk rating factors.
The detailed information for each detected threat is logged to all configured logging destinations
and as part of the ICAP response.
See “Enable nonviral threat categories information” on page 270.
See “Enable threat categories information” on page 273.
Definitions Symantec engineers track reported outbreaks of risks (such as viruses, Trojan
horses, worms, adware, and spyware) to identify new risks. After a risk is identified,
information about the risk (a signature) is stored in a definition file. This file contains
information to detect and eliminate the risk. When Symantec Protection Engine
scans for risks, it searches for these signatures.
Decomposition of Symantec Protection Engine extracts container files so that they can be scanned
container files for risks. Symantec Protection Engine continues to extract container files until it
reaches the base file. Symantec Protection Engine imposes limits on file extraction.
These limits protect against denial-of-service attacks that are associated with the
overly large files or the complex container files that take a long time to decompose.
These limits also improve scanning performance.
Symantec Protection Engine scans a file and its contents until it reaches the
maximum depth that you specify. Symantec Protection Engine stops scanning any
file that meets the maximum file size limit, cumulative file size limit, or maximum file
count. It then generates a log entry. Symantec Protection Engine resumes scanning
any remaining files. This process continues until Symantec Protection Engine scans
all of the files to the maximum depth (that do not meet any of the processing limits).
Symantec Symantec Insight™ is a file-based detection technology that classifies files as good
Insight™ or bad by examining properties, usage patterns, or users of a given file rather than
scanning it.
Android Application Symantec Protection Engine has introduced a new Android Application Reputation
(APK) Reputation feature that you can use to classify the untrusted APK files. APK Reputation uses
Symantec’s mobile intelligence framework that leverages data from the sources
such as Norton community watch, market crawling, and malware industry partners.
The files will have security ratings such as low bad, high bad, neutral, medium bad,
low good, medium good, and high good.
Advanced machine Advanced machine learning technology detects malware based on static attributes.
learning This technology enables Symantec Protection Engine to detect malware in the
pre-execution phase, thereby stopping large classes of malware, both known and
unknown. In Symantec Protection Engine, this technology works with the File Insight
(Reputation) technology to provide best-in-class protection with low false positives.
Symantec Protection Engine gives you an option to quarantine threats. You can quarantine
threats if you have configured quarantine server in Symantec Protection Engine.
You must have a valid antivirus scanning license to scan for threats and a valid content license
to update virus definitions. If you upgrade from a previous version and your licenses are current,
Symantec Protection Engine automatically recognizes these licenses.
Note: If Symantec Protection Engine is enrolled with the centralized console, you can apply
the policies for it from the centralized console. All the policies and the settings that can be
configured from the centralized console are disabled for modification in the standalone user
interface of Symantec Protection Engine.
See “To configure the antivirus scan policy in Symantec Protection Engine” on page 83.
See “How Symantec Protection Engine detects risks” on page 81.
See “Ways to test threat detection capabilities” on page 84.
To configure the antivirus scan policy in Symantec Protection Engine
1 In the console on the primary navigation bar, click Policies.
2 In the sidebar under Views, click Scanning.
3 Under Antivirus Scanning, in the Scan policy list, select how you want Symantec
Protection Engine to handle infected files. The options are as follows:
Protecting against risks 84
Configuring antivirus scan policy in Symantec Protection Engine
Note: Symantec Protection Engine version 8.1 does not support repair of
infected files.
Use this option to continue making changes in the console until you are ready
to apply them.
Warning: Carefully read the disclaimers on the site before you download the test file into your
environment. Any tries to test antivirus software with real or dummy viruses should be handled
with extreme care.
Protecting against risks 85
About quarantining files in Symantec Protection Engine
If your computer already has antivirus software, you must disable the Auto-Protect mode of
the antivirus software before you download the test file.
See “Configuring antivirus scan policy in Symantec Protection Engine” on page 82.
Note: If Symantec Protection Engine is enrolled with the centralized console, you can apply
the policies for it from the centralized console. All the policies and the settings that can be
configured from the centralized console are disabled for modification in the standalone user
interface of Symantec Protection Engine.
Use this option to continue making changes in the console until you are ready
to apply them.
Handle container files Use this feature to handle certain types of container files.
Block or delete files by Use this feature to filter documents by file name.
file name
See “Configuring file name filtering in Symantec Protection Engine” on page 87.
Block or delete files by Use this feature to block or delete files by file or attachment size.
file or attachment size
See “Configuring file size filtering in Symantec Protection Engine” on page 89.
Note: If Symantec Protection Engine is enrolled with the centralized console, you can apply
the policies for it from the centralized console. All the policies and the settings that can be
configured from the centralized console are disabled for modification in the standalone user
interface of Symantec Protection Engine.
Block access to the Blocks access to any top-level file that matches the file name.
file or the message
If a container file or email message contains a file or attachment that matches the
file name, access to the entire container or message is blocked.
Delete the file or Deletes any file that matches the file name and logs the violation.
the attachment
Symantec Protection Engine deletes any attachments within an email message that
match the file name. Attachments that do not match the file name are not deleted
and are delivered with the message.
Symantec Protection Engine deletes any embedded files that match the specified
file name within a container file that contains multiple files. The embedded files that
do not match the specified file name are not deleted. Deleted files are replaced with
a replacement file, DELETED<N>.TXT, which indicates the reason that the file was
deleted.
Use wildcard characters if you are unsure of an exact file name or to block all file attachments
with a specific extension. For example, you can use the wildcard *virus* to block all attachments
with the word virus in the file name.
Protecting against risks 88
About preventing potential threats in Symantec Protection Engine
Note: If your client uses the antivirus-only application programming interface (API), file name
violations are reported to the client in the server's response as mail-policy violations. If you
use the extended API or have a standard ICAP implementation, this type of violation is reported
as a file violation.
See “To configure file name filtering in Symantec Protection Engine” on page 88.
To configure file name filtering in Symantec Protection Engine
1 In the console on the primary navigation bar, click Policies.
2 In the sidebar under Views, click Filtering.
3 In the content area on the Files tab, under Blocking by File Name, check Block files with
the following names.
4 Under When a matching file is found, select one of the following to specify how Symantec
Protection Engine handles the messages that contain an attachment with that file name:
■ Block access to the file or message
This option is enabled by default.
■ Delete the file or attachment
Add a file name to Type the file name that you want to add. Type one entry per line. Search strings
the list. are not case-sensitive.
You can use the following wildcard characters as needed:
■ A question mark (?) to represent a single character.
■ An asterisk (*) to represent zero or more characters.
■ A backslash (\) as an escape character. For example, precede a ? or a *
with \ to match a literal ? or * symbol in a file name. To match a literal \
symbol, use \\.
Remove a file Highlight the file name that you want to remove, and press Delete.
name from the list.
Use this option to continue making changes in the console until you are ready
to apply them.
See “About preventing potential threats in Symantec Protection Engine” on page 86.
See “Configuring file size filtering in Symantec Protection Engine” on page 89.
Note: Configuration of the file true type filtering is supported only on ICAP protocol.
See “Configuring true type file filtering in Symantec Protection Engine” on page 89.
Block access to the Blocks access to any top-level file that matches the file size.
file or the message
If a container file or email message contains a file or attachment that matches the
specified file size, Symantec Protection Engine blocks the entire container or
message.
Delete the file or Deletes any files that match the specified file size and logs the violation.
attachment
Symantec Protection Engine deletes any attachments within an email message that
match a specified file size. Attachments that do not match the specified file size are
delivered with the message.
Symantec Protection Engine deletes any embedded files within a container file that
contains multiple files that match the specified file size. The embedded files that do
not match the specified file size are not deleted. Deleted files are replaced with a
replacement file, DELETED<N>.TXT, which indicates the reason that the file was
deleted.
Note: If your client uses the antivirus-only application programming interface (API), file size
violations are reported to the client in the server's response as mail-policy violations. If you
use the extended API or have a standard ICAP implementation, this type of violation is reported
as a file violation.
See “To configure file size filtering in Symantec Protection Engine” on page 90.
To configure file size filtering in Symantec Protection Engine
1 In the console on the primary navigation bar, click Policies.
2 In the sidebar under Views, click Filtering.
3 In the content area on the Files tab, under Blocking by File Size, check Block files with
the following sizes.
4 Under When a matching file is found, select one of the following options to specify how
you want Symantec Protection Engine to handle the messages that contain an attachment
with that file size:
■ Block access to the file or the message
This option is enabled by default.
■ Delete the file or attachment
Add a file size (in Type the file size that you want to add. Type one entry per line.
bytes) to the list.
Remove a file size Highlight the file size that you want to remove, and press Delete.
from the list.
Use this option to continue making changes in the console until you are ready
to apply them.
See “About preventing potential threats in Symantec Protection Engine” on page 86.
See “Configuring file name filtering in Symantec Protection Engine” on page 87.
Protecting against risks 91
About container files in Symantec Protection Engine
Note: If Symantec Protection Engine is enrolled with the centralized console, you can apply
the policies for it from the centralized console. All the policies and the settings that can be
configured from the centralized console are disabled for modification in the standalone user
interface of Symantec Protection Engine.
Table 5-2 describes the types of container files that you can handle in Symantec Protection
Engine.
Encrypted container Infected files are often encrypted to defect scanning attempts. Encrypted files
files cannot be decrypted and scanned without the appropriate decryption tool. You
can configure Symantec Protection Engine to handle encrypted container files
to protect your network from threats.
In addition, you can also choose to quarantine unscannable files with any of the above options.
See “Configuring Symantec Protection Engine to handle encrypted container files” on page 92.
Block Blocks the encrypted container files and generates a log entry.
Delete Deletes the encrypted container files and generates a log entry.
The options are available only if the Enable Encrypted Container Handling is enabled.
5 On the toolbar, select one of the following options:
Use this option to continue making changes in the console until you are ready
to apply them.
Total threat found This email message was infected. ${TOTAL_THREATS} number of threats
were found.
Denied file size The file attached to this email was removed because the file size is not
allowed. File attachment: ${FILE_NAME}. Matched file size: ${FILE_SIZE}.
Denied file names The file attached to this email was removed because the file name is not
allowed. File attachment: ${FILE_NAME}. Matched pattern:
${MATCHING_FILENAME_ENTRY}.
Encrypted file The encrypted container attached to this email was removed. File
attachment: ${FILE_NAME}. File ${QUARANTINED}.
Web browser The content you just requested contains ${THREAT_NAME} and was
blocked by the Symantec Protection Engine based on local administrator
settings. Contact your local administrator for further information.
Protecting against risks 94
Customizing notifications in Symantec Protection Engine
See “Customizing notifications in the Core server only mode” on page 191. to work with the
Core server only mode.
Table 5-4 lists the variables that you can use to customize your notifications.
Variable Description
${FILE_SIZE} The size of the file that violates the maximum file size threshold.
${TOTAL_THREATS} The total number of risks that are detected in the MIME message.
Use this option to continue making changes in the console until you are ready
to apply them.
Note: Symantec Insight™ provides reputation information for only Portable Executable (PE)
files.
■ Known Bad
Potential threat detection is very low, which detects only the files that are known to be bad.
■ Low
Potential threat detection is low.
■ Medium
Potential threat detection is higher than the low aggression level. By default, medium level
is selected in Symantec Protection Engine.
■ High
Potential threat detection is the highest. However, there could be false positives detected
too.
See “To configure the scanning aggression level” on page 96.
To configure the scanning aggression level
1 In the console on the primary navigation bar, click Policies.
2 In the sidebar under Views, click Scanning Aggression.
3 Select the appropriate scanning aggression level.
4 On the toolbar, select one of the following options:
Use this option to continue making changes in the console until you are ready
to apply them.
5 In the Avoid scanning for files larger than field, enter the file size (in bytes), above
which the files are excluded from scanning.
Note: Ensure that Scan all files except those in the extension or type exclude lists
is selected under Policies > Scanning > Files to Scan.
Use this option to continue making changes in the console until you are ready
to apply them.
requests than the expected load, it logs the event to the designated logging destinations and
alert destinations. The event is logged at the Warning level.
See “Logging levels and events” on page 142.
Symantec Protection Engine averages the number of scan requests for one minute. If the
average number of requests for that minute meets or exceeds the threshold, no alert is sent.
If the average number of scan requests for that minute is below the threshold, Symantec
Protection Engine sends an alert.
For example, if you set a threshold of 20 requests per second for Wednesday from 1:00 A.M.
to 2:00 A.M., Symantec Protection Engine does not generate an alert for any minute in which
it receives 1,200 or more requests (20 requests times 60 seconds). Symantec Protection
Engine only generates an alert for any minute in which it receives fewer than 1,200 requests.
All of the schedules that you create appear in the Existing Schedules table. Active schedules
are denoted in green; inactive schedules are denoted in red.
You can control how scanning requests are monitored in the following ways:
■ Enable or disable the scan request monitor feature.
■ Add a new schedule.
■ Deactivate an existing schedule.
■ Activate a deactivated schedule.
■ Delete a schedule.
See “Monitoring scanning requests” on page 98.
To enable or disable the scan request monitor feature
1 In the console on the primary navigation bar, click Monitors.
2 In the sidebar under Views, click Requests.
3 In the content area under Monitor Requests, do one of the following steps:
■ To enable the feature, check Monitor requests.
You must enable the feature to add, activate, deactivate, or delete any schedules.
■ To disable the feature, uncheck Monitor requests.
Monitoring and tuning the performance of Symantec Protection Engine 100
How to monitor Symantec Protection Engine performance
Use this option to continue making changes in the console until you are ready
to apply them.
Use this option to continue making changes in the console until you are ready
to apply them.
Use this option to continue making changes in the console until you are ready
to apply them.
Use this option to continue making changes in the console until you are ready
to apply them.
To delete a schedule
1 In the content area under Existing Schedules in the Existing Schedules table, click on
schedule that you want to delete.
2 In the sidebar under Tasks, click Delete Schedule.
3 On the toolbar, select one of the following options:
Use this option to continue making changes in the console until you are ready
to apply them.
Item Description
Thread pool size Maximum number of threads that are available for
scanning
Table 6-2 describes the load statistics resources that you can monitor.
Item Description
Number of requests per sec(Average over sixty Average of number of scanning requests that arrived
seconds) in past 60 seconds
Total files scanned(Since Installation) Number of files that Symantec Protection Engine
scanned since the program was installed
Total data scanned(Since Installation) Total data that Symantec Protection Engine
scanned since the program was installed
Table 6-3 describes the logging statistics resources that you can monitor.
Item Description
Used space Amount of used space for the location in which the
Symantec Protection Engine logs are maintained
Monitoring and tuning the performance of Symantec Protection Engine 104
How to monitor Symantec Protection Engine performance
Item Description
Table 6-4 describes the miscellaneous resources that you can monitor.
Item Description
4 In the Number of resource consumption log files to retain (one per day) box, type
the number of individual log files to retain.
The default value is 0 so that all the log files are retained or none are deleted.
5 On the toolbar, select one of the following options:
Use this option to continue making changes in the console until you are ready
to apply them.
Column Description
Timestamp Timestamp when the event was captured. The timestamp value is
the offset from the standard epoch time.
No of requests per sec Average of number of scanning requests that arrived in past 60
seconds.
(Average over sixty seconds)
Total files scanned till now Number of files that Symantec Protection Engine scanned since
the program was installed.
Total data scanned (in bytes) Total data that Symantec Protection Engine scanned (in bytes)
since the program was installed.
Column Description
Used space (in bytes) Amount of space (in bytes) used by the log file directory.
Available space (in bytes) Amount of space available (in bytes) on the location where the log
files are maintained.
Log directory location Location where the log files are maintained.
Memory RSS Size (in bytes) Resident memory size of Symantec Protection Engine process in
bytes.
Memory Virtual Size (in bytes) Virtual memory size of Symantec Protection Engine process in
bytes.
Stargate Temp Dir Size (in MBs) Size of temporary directory of Stargate in MBs.
Stargate Log Dir Size (in MBs) Size of logs directory of Stargate in MBs.
SYMCScan Dir Size (in MBs) Directory size of Symantec Protection Engine in MBs.
SYMCScan Temp Dir Size (in MBs) Temporary directory size of Symantec Protection Engine in MBs.
Available space (in MBs) Amount of space in MBs on the location where the log files are
maintained.
RPC Client-Active Threads-Waiting Details of scanning threads and load statistics for protocol
Threads-Thread Pool configured.
size-Threshold for queued Example:
requests-Queued
Requests-Number of ■ Log file entry for RPC protocol with a single filer configured
requests(RPC) 198.51.100.0-0-16-128-100-0-0
■ Log file entry for RPC protocol with multiple filers configured
198.51.100.0-0-16-128-100-0-0;203.0.113.254-0-16-128-100-0-0;......
For multiple RPC clients ";"is used as a delimiter
■ Log file entry for ICAP protocol
NA-0-16-128-100-0-NA
See “Enabling resource consumption logging in Symantec Protection Engine” on page 104.
Monitoring and tuning the performance of Symantec Protection Engine 107
Ways to improve Symantec Protection Engine performance
Warning: Before you make any modifications, carefully consider the trade offs between security
and performance. For example, excluding certain files from being scanned improves overall
performance. However, the files that are not scanned might contain security risks or threats
that could contaminate your network if unscanned.
Ensure that you monitor performance regularly so that you can detect any degradation in
performance and make the necessary adjustments as soon as possible.
See “How to monitor Symantec Protection Engine performance” on page 98.
Deployment Description
consideration
Determining CPU Symantec Protection Engine server performance can benefit from the following
speed and system features:
architecture capacity
■ Higher CPU speed
CPU bottlenecks occur when \Processor\%Processor Time performance
counter numbers are high while the network adapter and disk I/O remain
below capacity. In this case (which is the ideal CPU-maximized system),
reaching 100% means that the CPU power must be increased. CPU power
can be increased by upgrading to a faster CPU or by adding more
processors.
While Symantec Protection Engine can benefit from faster CPU speeds,
increasing the CPU speed does not ensure a linear increase in performance.
Because of the large and frequent memory access effect, an increase in
CPU speed can result in wasted, idle CPU cycles when waiting for memory.
Hyper-threading capabilities can also aid in lowering CPU utilization levels
when no more than 60% of the CPU capacity is consumed. At higher CPU
utilization levels, enabled hyper-threading consumes the same processing
power as the disabled hyper-threading.
■ Larger processor cache
Large amounts of data can require frequent memory access. An L2/L3 cache
improves performance when large amounts of memory are accessed.
■ Improved system architecture
Symantec Protection Engine transfers large data loads between network
devices, memory, and the CPU. Therefore, the system elements around the
CPU also have an effect on server performance. A faster memory front side
bus and faster I/O buses improve overall performance.
Monitoring and tuning the performance of Symantec Protection Engine 109
Ways to improve Symantec Protection Engine performance
Deployment Description
consideration
Determining network Every network device that exists on a connection has a capacity limit. Such
capacity devices include the client and server network adapters, routers, switches, and
hubs that interconnect them. Adequate network capacity means that none of
these network devices are saturated. You should monitor network activity to
ensure that the actual loads on all network devices are below their maximum
capacity.
In most cases, the Internet connection bandwidth sets the limit for the volume
of Internet traffic. Weak performance during peak traffic hours can be the result
of over-utilization of the Internet link. If Symantec Protection Engine is connected
only to LANs, you must have the proper infrastructure to support maximum
traffic requirements. If the network is 1 Gbps or greater, consider enabling jumbo
frames on the switch and on all of the Symantec Protection Engine servers.
You should also ensure that the entire networking infrastructure is appropriately
rated. For example, if you connect the computers that contain gigabit network
interface cards, ensure that the network interface cards are in full duplex mode.
Also ensure that the network interface cards are configured at their maximum
possible bandwidth.
Determining disk Symantec Protection Engine uses disk space primarily for storing temporary
storage capacity files for scanning and for storing logs. A shortage of disk space might severely
affect the scanning functionality of Symantec Protection Engine. If you
experience disk space shortages, consider adding more physical disks.
Exclude specific file extensions and file types from When you enable this option, Symantec Protection
scanning Engine scans only the file extensions or the file
types that are not in the exclude lists. The default
file exclude lists contain the most common file
extensions and the types that are unlikely to contain
threats.
Block the files or email messages that meet or This option lets you specify the maximum size of
exceed a specific size from scanning files or messages to scan.
Impose limits on container files You can impose limits on how you want Symantec
Protection Engine to decompose and scan container
files. Imposing limits can conserve scanning
resources.
You can specify the following limits for handling
container files:
Note: Although file types are formatted similarly to MIME types, they are not derived from
MIME headers of the messages that are scanned. Symantec Protection Engine derives file
types by an analysis of the data itself, regardless of what information is in the MIME type.
As you evaluate which files to exclude from scanning, consider the trade-offs between
performance and protection. An exclusion list lets some files bypass scanning. Thus, new
types of threats might not always be detected. Scanning all files regardless of type or extension
is the most secure setting, but it imposes the heaviest demand on resources. During outbreaks,
you might want to scan all files even if you normally use the exclusion lists to control the files
that are scanned.
Warning: Use caution if you add .jpg or .jpeg to the File extension exclude list or image/jpg,
image/jpeg, or image/* to the File type exclude list. These file types can be encoded with
threats and might pose a risk to your network.
3 In the content area under Files to Scan, click Scan all files except those in the extension
or type exclude lists.
4 In the File extension exclude list, do any of the following steps:
To add a file Type the file extension that you want to add.
extension to the
Type each entry on a separate line. Each entry should begin with a period.
exclude list
To remove a file Highlight and delete the file extension that you want to remove.
extension from the
exclude list
To add a file type Type the file type that you want to add.
to the exclude list
Type each extension on a separate line. You must type the file type exactly
as it appears in the list. Use the wildcard character /* to include all subtypes
for a file type. For example, if you type audio/* you would exclude all audio
subtypes from being scanned.
To remove a file Highlight and delete the file type that you want to remove.
type from the
exclude list
To exclude files See “Excluding files from scanning based on file size” on page 96.
from scanning
based on file size
6 To restore the default exclude lists, under Tasks, click Reset Default List.
This option restores the default File type exclude list and File extension exclude list.
7 On the toolbar, select one of the following options:
Use this option to continue making changes in the console until you are ready
to apply them.
Use this option to continue making changes in the console until you are ready
to apply them.
■ The maximum file size, in MB, for the individual files that are in a container file
■ The maximum number of nested levels to be decomposed for scanning
Symantec Protection Engine scans a file and its contents until it reaches the maximum depth
that you specify. Symantec Protection Engine stops scanning any file that meets the maximum
file size limit. It then generates a log entry. Symantec Protection Engine resumes scanning
any remaining files. This process continues until Symantec Protection Engine scans all of the
files to the maximum depth (that do not meet any of the processing limits).
You can specify whether to allow or to deny access to files for which an established limit is
met or exceeded. Access is denied by default.
See “To set container file limits” on page 114.
Warning: If you allow access to a file that has not been fully scanned, you can expose your
network to risks.
Use this option to continue making changes in the console until you are ready
to apply them.
Configuration Description
Modify system The system scanning resource settings that you can modify to enhance performance
scanning are as follows:
resources
■ Temporary directory for scanning
You can change the location of this temporary directory to support sites with
large, specialized disk configurations. The disk space that is required for this
directory varies depending on the volume of files to be scanned. Symantec
Protection Engine performance depends on this directory being able to
accommodate a large volume of large files during periods of peak use.
■ Number of available threads for scanning
This value defines the maximum number of scanning threads that Symantec
Protection Engine generates. Symantec Protection Engine initializes the threads
when the service starts. The number of threads that are initialized depends on
the number of cores of the processor. The maximum value is 512 threads.
See “About available threads for scanning” on page 116.
Modify server Symantec Protection Engine can decompose and scan the contents of container
resources files in memory, which eliminates the latency that is imposed by on-disk scanning.
This feature can improve performance in environments in which large volumes of
container and archive file formats are routinely submitted for scanning.
You can limit the resources that Symantec Protection Engine consumes for
processing files in memory by specifying the following settings:
■ The maximum RAM to use for the in-memory file system (in megabytes)
The default value is 2048 MB.
For systems with larger amounts of memory, scanning is improved when a larger
section of RAM is set aside for in-memory file scanning. Keep in mind, however,
that the RAM setting should be set low enough so that no file swap usage occurs.
Notify a file server The process of sending notifications to the file server about definition updates can
when Symantec affect system resources, depending on how often you schedule LiveUpdate. To
Protection Engine minimize the effect on performance, you can send the notification on demand, as
updates definitions needed.
Monitoring and tuning the performance of Symantec Protection Engine 116
Ways to improve Symantec Protection Engine performance
1 8 24
2 8 24
4 8 24
8 8 24
16 16 48
32 32 96
n>=8 n n*3
Chapter 7
Filtering URLs
This chapter includes the following topics:
Audit mode When you select audit mode, Symantec Protection Engine notifies the ICAP client
of all the Symantec, CAIC, and Local categories that the requested URL falls under.
Based on this information, the ICAP client handles the application of the filtering
policies. The client determines whether to block the site and deny access.
Filtering URLs 118
About filtering URLs
Filtering mode When Symantec Protection Engine operates in the filtering mode, Symantec
Protection Engine handles the application of URL filtering. You configure the types
of URL that you want to deny. Based on your configuration, Symantec Protection
Engine determines whether to deny access for each request. Symantec Protection
Engine returns to the user an "Access Denied" message when it blocks access to
a URL.
About categories
Symantec Protection Engine uses categories to determine whether access to a URL should
be denied. Symantec Protection Engine provides predefined URL categories. You can also
create additional categories (local categories) to meet your needs.
See “About predefined URL categories” on page 118.
See “About local categories” on page 131.
Abortion Sites that provide information or arguments in favor of or against abortion; offer
help to obtain or avoid abortion; describe abortion methods and how to perform
them; provide testimonials on the physical, social, mental, moral, or emotional
effects of abortion.
Advertising Sites that provide Internet advertising services such as Sponsored ads, search
engine marketing, pop-up, banner ads and so on.
Alcohol Sites that promote or sell alcoholic beverages; provide recipes or techniques
to make alcoholic beverages; glorify, brag, or otherwise encourage alcohol
consumption or intoxication such as home brewing and distilling, recipes, clubs,
and associations, and drinking games.
Anonymizer Sites that offer anonymous access to Web sites through a PHP or CGI proxy,
allowing users to gain access to Web sites that are blocked by corporate and
school proxies as well as parental control filtering solutions.
Filtering URLs 119
About filtering URLs
Art and Museums Sites that include art galleries, artists, and museums such as performing arts,
theater, painting, drawing, sculpture, and photography are included.
Art Nudes Sites that contain the non-pornographic, tasteful, and artful display of the naked
body. The main purpose of these sites is not sexual arousal.
Automated Web Sites that allow a computer to automatically open an HTTP connection for
Application reasons such as checking for operating system or application updates.
Automotive Sites that relate to manufacturers of motor vehicles, automotive dealers, motor
sports, and clubs.
Bikini Sites that offer the sale of bikinis, microkinis, monokinis, and thongs which are
marketed as beachwear rather than swimwear. Also the sites that feature
galleries and videos of models in bikinis.
Blog Sites that contain ‘blogs’ . Blogs are usually maintained by an individual with
regular entries of commentary, descriptions of events, or other material such
as graphics or video. Entries are commonly displayed in reverse chronological
order like comments on specific topics, online diaries, audio and video blogs.
Business Sites that are sponsored by or devoted to individual businesses and are not
covered by any other categories such as aerospace and defense industries,
Business Wireless
agriculture, biotech, and chemicals.
CAIC Sites that contain or distribute images of non-adult children that are depicted
in a state of abuse. These include the sites that depict indecent images of
children, advertisements for or links to such content, on a publically available
Web site.
Cash Gambling Sites that involve the wagering and exchange of money in addition to placing
bets or participating in betting pools (including lotteries) online; receiving
instructions, assistance or training on participating in games of chance; obtaining
information, assistance or recommendations for placing a bet.
Chat Sites that enable online chatting in real time. These can include text-based chat,
instant messaging chat, and visual chat rooms.
Chat/SMS/Text
Messaging Wireless
Criminal Skills Sites that provide instruction for threatening or violating the security of property
or the privacy of people; also how to avoid complying with legally mandated
duties and obligations. These include how to steal money, how to create fake
IDs and documents, how to defeat locks, how to intercept phone calls, how to
evade or circumvent the law.
Filtering URLs 120
About filtering URLs
Cults Sites that promote prominent, organized, and modern religious groups that are
identified as “cults” by three or more authoritative sources. Examples include:
Drugs Sites that promote, offer, sell, supply, encourage, or otherwise advocate the
recreational or illegal use, cultivation, manufacture, or distribution of drugs,
pharmaceuticals, intoxicating plants, or chemicals and their related
paraphernalia. For instance, how to use recreational drugs, seeds and
manufacturing tips, drug gear, and equipment.
Dynamic Sites that have dynamically changing content and may generate, display, or
offer links to inappropriate material such as search engines, directory services,
Dynamic Wireless
hosting, portals, and blogs.
Education Sites that represent schools or other educational facilities, faculty, or alumni
groups such as homeschooling, public and private schools, universities and
colleges.
Energy Sites that represent companies involved with the production and distribution of
energy such as oil companies, gas companies, power companies, and alternative
energy companies.
Filtering URLs 121
About filtering URLs
Enterprise Webmail Sites that provide free Web email services such as Yahoo, Google, etc.; ISP
email access, business, school, or institutional access by Web email, Web email
provided free or paid hosting services.
Entertainment Sites that relate to the entertainment industry such as official Web sites for
movies, radio stations, film studios, fan sites about celebrities, and so on.
Entertainment Wireless
File sharing Sites that provide files for downloading over the Internet or smaller private
networks, through the client software to enable peer-to-peer sharing and transfer
of the files.
Finance and Investing Sites that provide information about personal finance and investments,
investment models, guides, tips, etc. Sites that allow users online trading, buy
Finance Wireless
or sell financial instruments.
Food and Restaurants Sites that provide information, guides, and reviews about restaurants; specialty
food shops, food recipes, and food delivery.
Forums and Message Sites that provide message boards and forums where users can discuss
Boards numerous topics. Sites that provide monitored or unmonitored Web forums,
Bulletin boards, etc.
Freeware and Sites that make software available for downloading to users such as freeware,
Shareware shareware, or open source software.
Gambling Sites that provide online casinos, lotteries, information and instructions about
placing bets, allowing to bet online and participate in betting pools, and online
Gambling Wireless
Gambling.
Gaming Sites that are dedicated to online games, game tips, game downloads, interactive
games, and multiplayer games.
Glamour Sites that promote and provide information about physical attractiveness; allure,
charm, beauty, or style with respect to personal appearance, clothes, shoes,
hair, make-up, and fashion accessories. Sites that contain information about
Body Art and Cosmetics, hairdressing, Fashion, and Glamourous Portals.
Gore Sites that feature graphic violence, bodily harm, or self inflicted harm. Sites that
contain images of grotesque violence towards humans or animals, images of
death and injury, and frightening descriptions.
Government Sites that are sponsored by government branches or agencies such as Local
and State Government, Health, and Social Services, Elections, Employment,
Public Safety, and Services, Embassies, and Consulates.
Filtering URLs 122
About filtering URLs
Hacking Sites that promote illegal use of technology and programming skills to access
networks, databases, etc. Sites that contain techniques, skills for
denial-of-service, packet sniffing, and spoofing.
Hate Sites that promote hostility against particular individual or group on the basis
of race, religion, color, gender, and origin.
Health Sites that provide information about personal health and medical services,
hygiene, diets, therapies, and counseling services about health.
Hobbies Sites that provide information about personal interests like collectibles, crafts,
pets, and past times.
Hosting Sites that provide online systems such as free or paid hosting, dedicated or
managed hosting, virtual private server hosting, and online backup file storage,
to store the data.
Internet Telephony Sites that provide the facility for telephone calls by Internet, or provide information
or software for the purpose.
Job Search Sites that are dedicated to job searches, job listings, creating and posting
resumes, and organizing job fairs.
Kids Sites that are dedicated to children activities such as artwork, school projects,
crafts, information to answer their questions, and games.
Law Sites that contain legal information about state and regional laws, lawyers, legal
services, legal consultations.
Filtering URLs 123
About filtering URLs
Lifestyle Sites that contain general material relevant to sexual orientation. These sites
contain pages dedicated to the groups* themselves, discussions, issues, clubs,
personal home pages that address or support sexual orientation lifestyle choices.
These are sites mainly by target group members for target group members.
Discussions and the issues that are of an explicitly mature nature are not part
of this category. *The specific TARGET groups in question are gay, lesbian,
bisexual, and transgender and are subsequently referred to as “GLBT”. Examples
include:
Malware Domain Sites where the domain was found to either contain malware or take advantage
of other exploits to deliver adware, spyware, or malware.
Filtering URLs 124
About filtering URLs
Mature Content Sites that contain sexually explicit information that is not of a medical or scientific
nature. These include - Discussions or descriptions of sexual techniques or
exercises.
Military Sites that are sponsored by military branches or agencies as well as official and
personal sites related to military history, ideology, or specific branches of the
military.
Mobile Entertainment Sites that offer a range of add-ons for handheld devices like ringtones,
wallpapers, games, and videos.
Music Sites that are related to the music industry such as radio Websites, band, or
artist pages, music fan sites, music reviews, music studios and venues, and
lyrics, tablature, and music sheet.
Non profit Sites that are owned by non-profit organizations. A non-profit organization
(abbreviated "NPO", also "not-for-profit") is a legally constituted organization
whose primary objective is to support or to actively engage in activities of public
or private interest without any commercial or monetary profit purposes. NPOs
are active in a wide range of areas, like the environment, humanitarian aid,
animal protection, education, the arts, social issues, charities, health care,
politics, religion, research, sports, or other endeavors.
Filtering URLs 125
About filtering URLs
Occult Sites that promote or offer methods, means of instruction, or other resources
to affect or influence real events through the use of spells, curses, magic powers,
or supernatural beings. Examples are:
■ Magic spells and curses, encompassing both self-defined “black” and “white”
magic
■ Chaos Magick, Crowley, Golden Dawn, Ordo Templi Orientalis
■ Demonolatry (worship of demons)
■ Witchcraft and its practices, rituals, and activities, Wiccan magic,
Pagan/neo-Pagan magic. Asatru (Odinism)
■ Vodun (Voodoo/Santeria)
■ Herbs, tools or paraphernalia for casting spells, summoning demons, or
engaging in other magical behavior or activities
Personal Ads and Sites that promote or provide opportunity for establishing or continuing romantic
Dating or sexual relationships. Examples are:
Pets Sites and forums related to the care, maintenance, purchase, rescue, or breeding
of any animal for companionship and enjoyment. The category excludes livestock
or laboratory animals which are kept for economic or scientific reasons.
Examples include:
■ Pet care
■ Pet products
■ Animal rescue
■ Pet breeding
Filtering URLs 126
About filtering URLs
Placeholder Sites that are typically owned by domain name registrars, domain brokers, or
Internet advertising publishers. They usually display dynamically generated
content with the intent to monetize on traffic through linked advertising listings.
Examples of such sites are:
Politics Sites that relate to politicians, election campaigns, political organizations, and
publications. Includes official home pages of politicians and political parties as
well as personal sites about politics and grass-root movements.
Pornography Sites that contain sexually explicit material for the purpose of arousing a sexual
or prurient interest. Examples are:
Pornography Wireless
■ Sex chat rooms and portals
■ Pornography, thumbnail or picpost sites
■ Online pornographic magazines
■ Pornographic picture galleries (general and topic-specific)
■ Pornographic fiction or erotica
■ Phone sex or live video
■ Adult services, escort services, strippers, or mistresses
■ Adult personal ads or Adult-themed dating services
■ Sex toys or marital aids or videos, CD-ROMs, books, fetish clothing
Portal Sites that offer a broad array of resources and services, such as email, forums,
search engines, and online shopping malls. Portals typically publish their own
content or collate multiple sources of information for many areas such as news,
entertainment, sports, technology, and finance.
Real Estate Sites that are commercial and involve in the real estate business. Examples
are:
Religion Sites on religion as any set of beliefs and practices that have the function of
addressing the fundamental questions of human identity, ethics, death, and the
existence of the Divine.
Science Sites that provide research materials in the natural and life sciences.
Search Sites that support searching the Internet, newsgroups , or indices and directories.
Self Harm Sites that describe or discuss ways in which to self harm including eating
disorders and self-injury. Eating disorders sites include:
Sexual Education Sites that provide educational information on reproduction and sexual
development, sexually transmitted disease, contraception, safe sexual practices,
sexuality, and sexual orientation.
Filtering URLs 128
About filtering URLs
Shopping Sites that provide the means to purchase products or services online. Products
or services that are principally marketed to satisfy industrial or commercial
needs are not included in this category. Examples are:
■ Pages offering an item intended for personal usage for sale, with price,
description, order number, or some combination thereof
■ Internet malls
■ Online auctions
■ Department or retail stores online catalogs
■ Services that are meant to benefit the private individual
Sports Sites that promote or provide information about spectator sports. Examples are:
Streaming Media Sites that host streaming media like television, movies, video, radio, or other
media.
Technology and Sites that provide information pertaining to computers, the Internet as well as
Telecommunications telecommunication. Examples are:
Tobacco Sites that encourage, promote, offer for sale or otherwise encourage the
consumption of tobacco. Examples are:
Travel Sites that promote or provide opportunity for travel planning in a general sense,
particularly finding, and making travel reservations. Examples are:
Travel Wireless
■ Travel portals, packages, and information (includes tours, travel clubs and
associations, and travel information for specific demographic groups)
■ Air travel (air carriers: tickets/reservations/charters)
■ Sites that facilitate travel-related transportation
(tickets/reservations/charters/rentals of trains, buses, boats, motorcycles.
Does not include car rentals.)
■ Lodging (includes lodging directories and portals)
■ Travel agents and travel auctions
Violence Sites that advocate or provide instructions to cause physical harm to people or
property through use of weapons, explosives, pranks, or other types of violence.
Examples are:
Virtual Community Sites that offer a variety of tools and mechanisms to enable a group of people
to communicate and interact by the Internet. Examples include:
■ Social networking
■ Chat and instant messaging
■ Forums & Messageboards
■ Hosting of home pages and other user generated content including audio
and video
Weapons Sites that describe or offer for sale weapons including guns, ammunition, firearm
accessories, knives, and martial arts. Examples are:
Webmail Sites that provide Web based email services that are freely available and
accessible through any Internet browser.
Wedding Sites related to the traditions, customs, planning, and products involved in a
marriage or commitment ceremony as well as in civil unions. Examples are:
■ Wedding planning
■ Wedding products
■ Alternative commitment ceremonies
Symantec periodically updates the predefined URL categories. Symantec Protection Engine
automatically downloads updated categories through LiveUpdate. Symantec might create new
URL categories to address additional content areas as needed. New categories are not active
by default. You must select the new categories that you want to use for URL blocking.
The predefined URL categories cannot be modified.
See “Overriding a URL categorization” on page 137.
Note: If the requested URL belongs to the CAIC category, the URL is replaced with the text
CAIC-URL in all the corresponding messages and logs.
Note: When you change from audit mode to the filtering mode, the URL category and local
category settings revert to settings that you configured (and applied) in the filtering mode.
URL filtering can be enabled during installation. If you did not enable URL filtering during
installation, follow the steps below to enable it.
See “To enable URL filtering” on page 133.
See “About the filtering modes” on page 131.
To enable URL filtering
1 In the console on the primary navigation bar, click Policies.
2 In the sidebar under Views, click Filtering.
3 On the URL tab, under URL Filtering, select Enable URL Filtering and download URL
Filtering definitions.
4 Under Enable URL Filtering and download URL Filtering definitions, select Filtering
mode or Audit mode.
5 On the toolbar, select one of the following options:
Use this option to continue making changes in the console until you are ready
to apply them.
Note: Symantec Protection Engine automatically encodes and saves the text strings in
Unicode/UTF-8 when you apply your changes in the console.
None of the URL categories are in the Deny Access list and access to the URLs in every
category is permitted by default. You must select the URL categories that you want to add to
the Deny Access list.
Filtering URLs 134
How to filter a URL
Use this option to continue making changes in the console until you are ready
to apply them.
For example, if you add the domain symantecexample.com to a denied category, access to
all URLs in that domain is denied. If you want to deny access to one of the URLs within that
domain, add a more specific URL to one of the local categories. For example,
www.symantecexample.com/daily-news. Because Symantec Protection Engine looks for the
most exact match, access to the specific URL is allowed. Access is denied to any other content
from that domain.
Note: You cannot allow or deny access to a URL based on Internet protocol (for example,
HTTP, FTP, and HTTPS). When you add a URL to a local category and deny access to that
category, all connections are uniformly blocked.
Use this option to continue making changes in the console until you are ready
to apply them.
Use this option to continue making changes in the console until you are ready
to apply them.
3 In the URLs associated with selected Local Category (maximum 999 characters per
URL) box, type the URL that you want to add.
Type one URL per line. You can enter maximum 999 characters per URL.
4 On the toolbar, select one of the following options:
Use this option to continue making changes in the console until you are ready
to apply them.
Use this option to continue making changes in the console until you are ready
to apply them.
Override, it does not check the Deny Access list categories. The URL List Override functions
in the same manner for both audit and filtering mode.
Add only the URLs to the URL List Override that you know contain acceptable material. When
you place a URL in the URL List Override, you permit unconditional access to the URL.
Note: You cannot allow or deny access to a URL based on Internet protocol (for example,
HTTP, FTP, and HTTPS). When a URL is contained in a local category that is in the Deny
Access list, all connections are uniformly blocked.
Use this option to continue making changes in the console until you are ready
to apply them.
${REASON} An explanation of why the URL address that the user requests is blocked.
When a Web site is blocked due to URL violation, the ${REASON} variable
reads as follows:
where<(category)> is the URL or local category that contains the URL that
is denied.
Use this option to continue making changes in the console until you are ready
to apply them.
Use this option to continue making changes in the console until you
are ready to apply them.
See “Enabling URL Reputation in the Core server only mode ” on page 205.
Chapter 8
Logging data, issuing alerts,
and generating reports
This chapter includes the following topics:
■ About reports
Logging destinations
Table 8-1 shows the destinations to which Symantec Protection Engine can forward log events.
Logging data, issuing alerts, and generating reports 142
About logging data
Destination Description
Local logs Symantec Protection Engine logs events to the local logs by default. The default
location for the local logs for Linux is /opt/SYMCScan/log. You can change the
location of the logs. You can use the reporting functions to view the local logs.
Statistics logs Statistics logs are used to report the following cumulative scan data:
You must enable logging to the statistics logs so that you can view statistics reports.
Scan data is logged daily to the statistics log files. You can use the reporting functions
to view the statistics data.
Abort log Information is logged to the abort log only when Symantec Protection Engine fails
to start before the standard protection engine logging is initiated. This failure can
occur, for example, if the XML does not validate. If this failure occurs, information
about the failure is written to the abort log file,
SymantecProtectionEngineAbortLog.txt. This file is located in the installation directory
(/opt/SYMCScan).
None None
Logging data, issuing alerts, and generating reports 143
About logging data
■ All of the events that are logged at the Error logging level
■ File attribute outbreak alert
■ URL block outbreak alert
■ Nonviral outbreak alert
■ Viral outbreak alert
■ Container limit outbreak alert
Logging data, issuing alerts, and generating reports 144
About logging data
■ All of the events that are logged at the Warning logging level
■ Version information
■ URL audit detection
■ Definitions update
■ LiveUpdate up-to-date
■ LiveUpdate succeeded
■ User logged in
■ Symantec Protection Engine has not scanned the file
■ The AV Connector version and status information is provided
Logging data, issuing alerts, and generating reports 145
About logging data
Note: The Verbose logging level should only be selected for debugging purposes.
Performance is significantly degraded if you activate this logging level for general
logging.
No bind address is selected in the ICAP The logging bind address is the first bind address
Configuration Bind address table. in the ICAP Configuration Bind address table on the
Configuration > Protocol page.
One or more bind addresses are selected in the The logging bind address is the first non-local host
ICAP Configuration Bind address table. IP address from the selected bind addresses in the
ICAP Configuration Bind address table on the
Configuration > Protocol page.
Use this option to continue making changes in the console until you are ready
to apply them.
■ Change the length of time that the log files are maintained.
See “Changing the length of time that log files are maintained” on page 148.
■ Enable statistics reporting.
See “Enabling statistics reporting in Symantec Protection Engine” on page 149.
■ Enable resource consumption logging.
See “Enabling resource consumption logging in Symantec Protection Engine” on page 104.
Logging data, issuing alerts, and generating reports 147
About configuring local logging
Use this option to continue making changes in the console until you are ready
to apply them.
See “Changing the directory where log files are located” on page 147.
See “Changing the length of time that log files are maintained” on page 148.
To change the directory where log files are located
1 In the console on the primary navigation bar, click Monitors.
2 In the sidebar under Views, click Logging.
3 In the content area under Local Logging, in the Log files directory box, type the path
to the new location for the log files.
The file directory that you specify must already exist. Symantec Protection Engine validates
the existence of the directory when you save or apply your changes.
4 On the toolbar, select one of the following options:
Use this option to continue making changes in the console until you are ready
to apply them.
3 In the content area under Local Logging, in the Number of log files to retain (one per
day) box, type the number of individual log files to retain.
The default setting is enabled (0) so that all the log files are retained.
4 On the toolbar, select one of the following options:
Use this option to continue making changes in the console until you are ready
to apply them.
3 In the content area under Local Logging, check Enable statistics reporting.
Statistics reporting is enabled by default.
4 On the toolbar, select one of the following options:
Use this option to continue making changes in the console until you are ready
to apply them.
Use this option to continue making changes in the console until you are
ready to apply them.
See “Configuring logging to the Linux Syslog in the Core server only mode” on page 211.
Logging data, issuing alerts, and generating reports 151
About configuring alerts
5 In the Secondary server address box, type the IP address or host name of a secondary
SMTP server (if one is available) that forwards the alert messages if communication with
the primary SMTP server fails.
6 In the SMTP domain box, type the local domain for Symantec Protection Engine.
The domain name is added to the From box for SMTP messages. SMTP alert messages
that Symantec Protection Engine generates originate from
SymantecProtectionEngine@<domainname>, where <domainname> is the domain name
that you specify in the SMTP domain box.
7 In the Email recipients box, type the email addresses of the recipients of the SMTP alert
messages.
Type one email address per line.
8 On the toolbar, select one of the following options:
Use this option to continue making changes in the console until you are ready
to apply them.
Use this option to continue making changes in the console until you are ready
to apply them.
You can select the types of events for which you want to receive alerts. For each event type,
you can configure the threshold number of occurrences and the time interval. If the number
of occurrences meets or exceeds the configured threshold for the selected interval, Symantec
Protection Engine generates an alert.
See “Configuring outbreak alerts” on page 153.
Table 8-3 lists the outbreak alert events that you can configure.
Event Description
Same viral threat One or more incidence of the same type of viral threat was detected
Container limit A maximum file extraction size or depth was met or exceeded
Same nonviral One or more incidence of the same type of nonviral threat was detected
threat
■ Under Time Interval, type the number of minutes within which the threshold number
of events must occur to generate an outbreak alert.
The default value is 1. You can use any range from 1 to 100000.
Use this option to continue making changes in the console until you are ready
to apply them.
About reports
You can use the Symantec Protection Engine reporting functionality to manage your local log
file data. The log data that is stored in the log files depends on the logging level that you select
for local logging. Local logging is activated by default at the Warning level. If you select a type
of log entry for a report that is not logged at the configured logging level, no data is available.
When working in the Core server with user interface mode, you can manage reports through
the Symantec Protection Engine console by doing any of the following actions:
■ Generate a report of log data from the local logs.
The local log files cannot be read directly. You must use the reporting function to view the
local logs. Local logging is the default logging destination.
See “Viewing the local log data” on page 156.
■ Export selected local log data in a comma-separated value (.csv) format.
See “Exporting local log data to a file” on page 157.
■ Generate a report of statistics information that is contained in the statistics logs.
The statistics log files are in .csv format and can be read or imported into a spreadsheet
program. You must use the reporting function to view the statistics logs.
See “Viewing statistics log data” on page 158.
■ View summary report on Symantec Protection Engine home page.
See “Viewing summary report on Symantec Protection Engine home page” on page 160.
When working in the Core server only mode, you can manage reports, using the logconverter
utility provided in the installation directory, by doing any of the following actions:
Logging data, issuing alerts, and generating reports 156
About reports
■ Generate a report of log data from the local logs in plain text format.
■ Export local log data in a comma-separated value (.csv) format.
■ Export local log data in an html format.
Note: To view the HTML report, you must disable any pop-up blockers that are running on
your computer.
5 Check any activities for which you want to view the log data.
Check all of the options that apply.
Press Ctrl+A to select all items in every category. Press Ctrl+Z to unselect all items in
every category.
6 In the sidebar under Tasks, click Generate Report.
See “About reports” on page 155.
Note: If you try to download large log files during periods of peak usage, the performance of
Symantec Protection Engine might be affected.
7 In the Save logs dialog box, in the Save in list, select the file location where you want to
save the report.
8 In the File name box, type the file name, and then click Save.
See “About reports” on page 155.
Note: You must enable logging to the statistics logs. After you enable logging to the statistics
logs, you can use the statistics reporting feature to view the statistics.
See “Enabling statistics reporting in Symantec Protection Engine” on page 149.
You can obtain summary data from the local logs for a given period of time. For the reported
period, you can review the total number of risks that were found.
The default logging destination for Symantec Protection Engine is the local logs. The default
location for the local logs on Linux is /opt/SYMCScan/log. You can change the location of the
logs.
See “Changing the directory where log files are located” on page 147.
The statistics do not represent a literal physical file count of the total number of files that have
been scanned. This total includes not only the number of files but also the additional objects
within the container files that were scanned. Some containers (such as MIME-encoded
messages and Microsoft Office documents) have additional embedded objects. These
embedded objects might not be files, but they might be scanned depending on the files that
you have selected for scanning. The total does not include any objects within the container
files that were not scanned because their extensions did not match those configured for
scanning.
Logging data, issuing alerts, and generating reports 159
About reports
Category Activity
Category Activity
From version 7.0, Symantec Protection Engine is capable of calculating and retaining cumulative
scan data since installation in addition to retaining data since last restart.
You can configure the following on the Symantec Protection Engine home page:
■ Display summary since installation.
■ Display summary since last restart.
■ Auto-refresh the home page every one minute.
Symantec Protection Engine home page also shows a graphical representation of scanning
activities and threat risk ratings for the selected time frame.
See “Viewing summary report on Symantec Protection Engine home page” on page 160.
See “Auto-refreshing Symantec Protection Engine home page” on page 161.
See “About summary report on Symantec Protection Engine home page” on page 159.
See “Auto-refreshing Symantec Protection Engine home page” on page 161.
Use this option to continue making changes in the console until you are
ready to apply them.
See “About summary report on Symantec Protection Engine home page” on page 159.
See “Viewing summary report on Symantec Protection Engine home page” on page 160.
Chapter 9
Keeping your product up to
date
This chapter includes the following topics:
■ About LiveUpdate
Antivirus Definition files contain the necessary information to detect and eliminate risks, such
as viruses and adware. Symantec supplies updated definition files every day and
whenever a new risk is discovered.
Symantec Protection Engine automatically uses the most current definition files for
scanning.
Keeping your product up to date 164
About LiveUpdate
URL Symantec periodically supplies updated URL definition files. If you subscribe to
content updates, Symantec Protection Engine automatically downloads updated
URL definitions through LiveUpdate. Symantec might create new URL categories
to address emerging URLs as needed. If you subscribe to the content updates, any
new categories are automatically downloaded with the regular updates to the existing
categories.
Symantec Protection Engine automatically uses the most current definition files for
scanning. However, if a problem is discovered with the current URL definitions, you
can revert to the previous set of URL definitions.
You must update Antivirus and URL definitions using LiveUpdate. When you perform a content
update, Symantec Protection Engine downloads and installs the most current definitions. You
must have a valid license to update definitions.
If an error occurs, Symantec Protection Engine tries to roll back to the previous definitions. If
the rollback is successful, Symantec Protection Engine continues scanning using the previous
definitions. If the rollback is unsuccessful, scanning is disabled.
See “Rolling back URL definitions” on page 169.
See “About licensing” on page 63.
About LiveUpdate
When you install or upgrade Symantec Protection Engine, LiveUpdate is enabled by default
to run every two hours. You can modify this schedule, or you can run LiveUpdate manually.
You can also use the XML modifier command-line tool to configure the number of times
Symantec Protection Engine tries to perform a LiveUpdate.
Keeping your product up to date 165
About LiveUpdate
The Symantec Protection Engine LiveUpdate configuration file contains the configuration
options for LiveUpdate. The LiveUpdate configuration file is stored the following locations by
default:
Linux /opt/SYMCScan/bin/liveupdate.xml
When Symantec Protection Engine performs a LiveUpdate, the definitions that are downloaded
are automatically selected as the active definitions. You can revert to the previous versions of
the URL definitions. The definition set that you choose remains active until the next LiveUpdate
occurs, which then becomes the active definition set.
Note: If Symantec Protection Engine is running with a non-root user, that user must have the
required permissions for a license file in /opt/Symantec directory for LiveUpdate to work.
To edit the LiveUpdate server details, See “Configure the LiveUpdate server details” on page 266.
See “Configuring LiveUpdate to occur automatically” on page 165.
See “Performing LiveUpdate on demand” on page 166.
See “Rolling back URL definitions” on page 169.
Note: If you configure LiveUpdate to trigger at a specific frequency and also at a specific time
or range of the day, LiveUpdate at a specific time or range takes the precedence.
Keeping your product up to date 166
About LiveUpdate
Use this option to continue making changes in the console until you are ready
to apply them.
See “About editing the Symantec Protection Engine configuration files” on page 257.
Table 9-1 lists the default parameters that are added to the liveupdate.xml file.
Parameter Description
Port You must specify the TCP/IP port the LiveUpdate server server
is listening on. The default value is 80.
/opt/SYMCScan/bin/definitions/Stargate/logs/
/opt/SYMCScan/bin/definitions/URLListLookup/
DefDownloads/SYM/Logs/lux.log
/opt/SYMCScan/bin/definitions/URLListLookup/
DefDownloads/CAIC/Logs/lux.log
Keeping your product up to date 169
Rolling back URL definitions
/opt/SYMCScan/bin/definitions/URLRepLookup/
URLReputationList/DefDownloads/URLREP/Logs/lux.log
with the new URL definitions, you can revert to the URL definitions that were shipped with the
product.
See “About licensing” on page 63.
The LiveUpdate Content page provides information about whether your definition rollback is
successful. If the rollback operation fails, it might be because a previous definition set does
not exist or because you do not have a valid content license.
To rollback definitions
1 In the console on the primary navigation bar, click System.
2 In the sidebar under Views, click LiveUpdate Content.
3 In the content area under Definition Details, select the definitions set that you want to
rollback.
4 In the sidebar under Tasks, click Rollback <definition feature name> Definitions.
See “About definition updates” on page 163.
■ If any definition update is in progress, then rollback is not allowed and the rollback failed
warning is logged.
■ If any invalid values are mentioned in the RollBackNowFlag file or the file is empty, an error
message is logged indicating Invalid rollback request.
Chapter 10
Working with the Core
server only mode
This chapter includes the following topics:
■ Inactive XPaths
■ Configuring the antivirus scan policy in the Core server only mode
■ Configuring true type file filtering in the Core server only mode
■ Configuring Symantec Protection Engine to handle encrypted container files in the Core
server only mode
■ Configuring the scanning aggression level in the Core server only mode
■ Excluding files from scanning based on file size in the Core server only mode
■ Specifying the maximum file or message size to scan in the Core server only mode
■ Denying access to URLs in URL categories in the Core server only mode
■ Customizing the access denied message in the Core server only mode
■ Specifying the log bind address in the Core server only mode
■ Specifying the local logging level in the Core server only mode
■ Changing the directory where log files are located in the Core server only mode
■ Changing the number of log file to be maintained in the Core server only mode
■ Configuring logging to the Linux Syslog in the Core server only mode
Table 10-1 Adapted features for the Core server only mode
Feature Description
Configuration settings The XMLModifier utility must be used to configure options in Symantec Protection
Engine while operating in the Core server only mode.
Detailed reporting Prior to version 7.5.0, reports and logs were generated using the user interface
only. Now, you can choose to use the LogConverter utility to generate detailed
reports while operating in the Core server only mode. This utility converts the
Symantec Protection Engine log files into a readable format. It also converts
input log file(s) into text, HTML (-h switch) and CSV (-c switch) formats. The
default output format is text.
On Linux, ensure that LogConverter utility is executed from the default installation
directory, /opt/SYMSCan/bin. If you have stored it in another location, set the
LD_LIBRARY_PATH environment variable to the directory that contains this
utility.
Definition updates In the Core server only mode, you can either update definitions on demand or
schedule updates automatically at a specified time interval.
filtering.xml Contains the settings for URL filtering, container limits and
container handling, and file attribute and email attribute
handling.
Following is the XML modifier command-line tool for Symantec Protection Engine:
■ xmlmodifier
A tool used on Linux platforms to modify the XML files.
Always run the XMLModifier utility from the installation directory. After you change the settings
by using the XMLModifier utility, you must stop and start the Symantec Protection Engine
service for the changes to take effect.
XMLModifier options
Use the XML modifier command-line tool of Symantec Protection Engine to modify the XML
files.
Note: For boolean values, allowed and recommended values are true or false.
Table 10-2 provides the option commands that you can use with the XML modifier command-line
tool of Symantec Protection Engine.
Remove If the XPath specifies an attribute, then that attribute is set to an empty string.
If the XPath specifies a group, then the items within that group are removed. If you want to
populate a list within the XML document with new items, first remove the whole list.
where <XPath> is the required XPath and <XMLfile> is the XML file name.
Bulk copy Use the bulk copy command to insert a list of items that are stored at the XPath. Each item is
separated as a new line. The bulk copy command appends the bulk file items to the XPath
location. Only use this command to insert lists. Each entry must be on a separate line.
where <XPath> is the required XPath and <XMLfile> is the XML file name.
Working with the Core server only mode 175
About the Core server only mode
where <XPath> is the required XPath and <XMLfile> is the XML file name.
For example,
Encrypt the password This command encrypts the specified password using the AES 256-bit encryption method and
(using the AES stores it in the specified XPath location. However, only certain parameters support this encryption
256-bit encryption method in Symantec Protection Engine.
method) and store in
Table 10-3 lists the parameters that are encrypted using this method.
specified XPath
location The command is as follows:
where <XPath> is the required XPath, <password> is your password, <SPE install directory>
is the path to the installation directory, and <XMLfile> is the XML file name.
Note: Make sure the path to the Symantec Protection Engine installation directory does not
end with /.
Query This command returns the value of the node in the XML document with no newline.
where <XPath> is the required XPath and <XMLfile> is the XML file name.
Query list This command returns the list of values of the node in the XML document with a newline. The
l is lowercase, as in list.
where <XPath> is the required XPath and <XMLfile> is the XML file name.
Add URL(s) to local This command adds URL(s) to local URL category.
URL category
The command is as follows:
where <url> is the url to be added and <urlcategory> is the local URL category.
Delete URL(s) from This command deletes URL(s) from the local URL category.
local URL category
The command is as follows:
where <url> is the url to be deleted and <urlcategory> is the local URL category.
Add URL(s) to URL This command adds URL(s) to URL Override List
Override List
The command is as follows:
Delete URL(s) from This command deletes the URL(s) from the URL Override List.
URL Override List
The command is as follows:
Table 10-3 Parameters that require password encryption using the AES 256-bit method
Note: The XMLModifier utility has a dependency on the libxml2 library. If this library is not
found, the utility may throw an error. The libxml2 library is already present in the installation
directory. However, if the XMLModifier utility is still unable to find the library on UNIX machines,
you can add the path, /opt/SYMCScan/bin, to the LD_LIBRARY_PATH environment variable.
Inactive XPaths
Some configurations of previous release are no more valid in Symantec Protection Engine
8.1. However, XML files still contain those configurations. You cannot configure these values
using XMLModifier tool. If you run the xmlmodifier command with such inactive XPath, you
get the following error:
XPath is not active in Symantec Protection Engine 8.1 and later versions.
Symantec Protection Engine does not support inactive XPaths.
Ensure that you always use the complete XPath in the command. If you use incomplete XPath
by skipping a child node with two slashes (//), xmlmodifier does not show error even if XPath
is inactive.
For example, you get the error for the following inactive XPath:
/policies/ThreatPolicies/AntiVirusScanning/@enabled
You will not get the error for the same XPath if you skip the child node (ThreatPolicies) with
two slashes (//):
/policies//AntiVirusScanning/@enabled
Working with the Core server only mode 178
Inactive XPaths
Configuration.xml
Inactive XPaths in the configuration.xml file:
■ //configuration/ProtocolSettings/ICAP/EnableSubCategoryDescriptionResp/@value
■ //configuration/ProtocolSettings/ICAP/EnableContainerEngineNameResp/@value
■ //configuration/Logging/Outbreak/Malformed Container/@enabled
■ //configuration/Logging/Outbreak/Malformed Container/@interval
■ //configuration/Logging/Outbreak/Malformed Container/@threshold
■ //configuration/Logging/Outbreak/MailPolicy/@enabled
■ //configuration/Logging/Outbreak/Mailpolicy/@interval
■ //configuration/Logging/Outbreak/Mailpolicy/@threshold
■ //configuration/Logging/Outbreak/InsightDetected/@enabled
■ //configuration/Logging/Outbreak /InsightDetected/@interval
■ //configuration/ Logging/Outbreak/InsightDetected/@threshold
Policy.xml
Inactive XPaths in the policy.xml file:
■ //policies/ThreatPolicies/AntiVirusScanning/@enabled
■ //policies/ThreatPolicies/AntiVirusScanning/BloodhoundLevel/@value
■ //policies/ThreatPolicies/AntiVirusScanning/SecurityRiskScanning/@enabled
■ //policies/ThreatPolicies/AntiVirusScanning/AdvancedHeuristicsScanning/@enabled
■ //policies/ThreatPolicies/AntiVirusScanning/AdvancedMachineLearning/@enabled
■ //policies/ThreatPolicies/AntiVirusScanning/DefaultFileExtension/@value
■ //policies/ThreatPolicies/InsightScanning/InsightCSCAT/@value
■ //policies/ThreatPolicies/InsightScanning/InsightNASCAT/@value
■ //policies/ThreatPolicies/InsightScanning/InsightPolicy/KeepConnectionOpen/@value
■ //policies/ThreatPolicies/InsightScanning/InsightPolicy/BackendNetworkTimeout/@value
■ //policies/ThreatPolicies/InsightScanning/InsightPolicy/ExonerationNetworkTimeout/@value
■ //policies/ThreatPolicies/InsightScanning/InsightPolicy/ConvictionNetworkTimeout/@value
■ //policies/ThreatPolicies/InsightScanning/InsightPolicy/SHA256ExclusionList/items/
Working with the Core server only mode 179
Inactive XPaths
■ //policies/ThreatPolicies/InsightScanning/InsightPolicy/SourceIPExclusionList/items/
■ //policies/ThreatPolicies/InsightScanning/InsightPolicy/SourceURLExclusionList/items/
■ //policies/ThreatPolicies/InsightScanning/InsightServerDetails/TrustedCAFilePath/@value
■ //policies/ThreatPolicies/APKReputation/APKReputationPolicy/ThresholdSecurityRating/@value
■ //policies/ThreatPolicies/APKReputation/PartnerKey/@value
■ //policies/ThreatPolicies/APKReputation/VerifyPeer/@value
■ //policies/ThreatPolicies/APKReputation/QueryTimeOut/@value
■ //policies/ThreatPolicies/APKReputation/ScanTimeOut/@value
■ //policies/ThreatPolicies/APKReputation/FileSizeExclusionThreshold/@value
■ //policies/ThreatPolicies/APKReputation/CacheSettings/ThresholdCacheEntries/@value
■ //policies/ThreatPolicies/APKReputation/CacheSettings/CacheTimeToLive/@value
■ //policies/ThreatPolicies/APKReputation/CacheSettings/CacheDump/@enabled
■ //policies/ThreatPolicies/APKReputation/CacheSettings/CacheDump/@frequency
■ //policies/ThreatPolicies/APKReputation/ThreadPool/MinThreads/@value
■ //policies/ThreatPolicies/APKReputation/ThreadPool/MaxThreads/@value
■ //policies/ThreatPolicies/APKReputation/ThreadPool/ThresholdQueuedAPKQueries/@value
■ //policies/ThreatPolicies/Actions/InsightActionPolicy/@value
■ //policies/ThreatPolicies/Actions/APKReputationActionPolicy/@value
■ //policies/ThreatPolicies/Notifications/FileRepairedNotificationText/@value
■ //policies/ThreatPolicies/Notifications/APKFileDeletedNotificationText/@value
Filtering.xml
Inactive XPaths in the filtering.xml file:
■ //filtering/Container/DecEngines/@value
■ //filtering/Container/MaxInMemoryFileSize/@value
■ //filtering/Container/MaxExtractTime/@actionpolicy
■ //filtering/Container/MaxExtractTime/@value
■ //filtering/Container/DecFileSize/@value
■ //filtering/Container/EnableMSOfficeCRD/@value
■ //filtering/Container/UpdateMailBody/@value
Working with the Core server only mode 180
Inactive XPaths
■ //filtering/Container/EncryptedContainersHandling/SuppressOfficeFormatEncryption/@value
■ //filtering/Container/MalformedContainersHandling/@enabled
■ //filtering/Container/MalformedContainersHandling/Actions/MalformedContainersActionPolicy/@value
■ //filtering/Container/MalformedContainersHandling/Actions/ContinueProcessingInMalformedBlockPolicy
/@value
■ //filtering/Container/MalformedContainersHandling/Actions/Quarantine/@value
■ //filtering/Container/MalformedContainersHandling/IgnoreExtensionMismatchMalformity/@value
■ //filtering/Container/MalformedContainersHandling/IgnoreStructureMismatchMalformity/@value
■ //filtering/Container/MalformedContainersHandling/HandleExtractionFailureAsMalformity/@value
■ //filtering/Container/MalformedContainersHandling/ NotificationText/@value
■ //filtering/Container/MalformedContainersHandling/ ScanMalformedContainersDepth/@value
■ //filtering/Container/DenyPartialMIME/@actionpolicy
■ //filtering/Container/EnableEnhancedContainerHandling/@value
■ //filtering/Container/Options/ExtractNativeOLEStreamsOnly/@value
■ //filtering/Container/Options/NonHQXThreshold/@value
■ //filtering/Container/Options/NonMIMEThreshold/@value
■ //filtering/EmailAttribute/DenySubjects/@value
■ //filtering/EmailAttribute/DenySubjectsList/items
■ //filtering/EmailAttribute/DenyEmptySubjects/@value
■ //filtering/EmailAttribute/DenyBlackLists/@value
■ //filtering/EmailAttribute/BlackListAddresses/items
Liveupdate.xml
Inactive XPaths in the liveupdate.xml file:
■ //liveupdate/Schedule/Retries/@value
■ //liveupdate/RapidRelease/Schedule/@enabled
■ //liveupdate/RapidRelease/Schedule/Interval/@value
■ //liveupdate/RapidRelease/FTPSettings/URL/@value
■ //liveupdate/RapidRelease/FTPSettings/UserName/@value
■ //liveupdate/RapidRelease/FTPSettings/Password/@value
Working with the Core server only mode 181
Configuring ICAP options in the Core server only mode
Option Description
Bind address Symantec Protection Engine detects all of the available IP addresses that are
installed on the host. By default, Symantec Protection Engine accepts scanning
requests on (binds to) all of the scanning IP addresses that it detects. You can
configure up to 64 IP addresses as scanning IP addresses.
You can specify whether you want Symantec Protection Engine to bind to all
of the IP addresses that it detects, or you can restrict access to one or more
interfaces. If you do not specify at least one IP address, Symantec Protection
Engine binds to all of the scanning IP addresses that it detects.
Port number The port number must be exclusive to Symantec Protection Engine. You must
use the same port number for all of the scanning IP addresses that you want
to bind to Symantec Protection Engine.
The default port number is 1344. If you change the port number, use a number
that is equal to or greater than 1024. No other program or service should use
this port number.
Allowed values:
Working with the Core server only mode 182
Configuring the antivirus scan policy in the Core server only mode
■ ICAP
Enables the ICAP protocol.
Default value: ICAP
3 Specify the Bind address.
Command:
xmlmodifier -s //configuration/ProtocolSettings/ICAP/BindAddress/@value
<value> configuration.xml
Allowed values: Scanning IP addresses that you want to bind to Symantec Protection
Engine.
Default value: Symantec Protection Engine binds to all interfaces.
4 Specify the port number that the client application uses to pass files to Symantec Protection
Engine for scanning.
Command:
xmlmodifier -s //configuration/ProtocolSettings/ICAP/Port/@value <value>
configuration.xml
Allowed values: Port number that is equal to or greater than 1024. No other program or
service should use this port number. You must use the same port number for every
scanning IP addresses that you want to bind to Symantec Protection Engine.
Default value: 1344
5 Restart the Symantec Protection Engine service.
See “About working with ICAP” on page 75.
Allowed values:
■ 0 - Scan only
■ 1 - Scan and repair
■ 2 - Scan and repair or delete
■ 3 - Scan and delete
Note: Symantec Protection Engine version 8.1 does not support repair of infected files.
Note: You must select Scan and repair or delete if you plan to quarantine the infected files that
cannot be repaired. See “About quarantining files in Symantec Protection Engine ” on page 85.
Allowed values:
■ true
APK Reputation feature is enabled
■ false
APK Reputation feature is disabled
Default value: true
3 Restart the Symantec Protection Engine service.
See “About Android Application (APK) Reputation ” on page 97.
Working with the Core server only mode 184
Configuring the quarantine server in the Core server only mode
Allowed values:
■ false
Disables quarantine.
■ true
Enables quarantine.
Default value: false
3 Specify the quarantine server name.
Command:
xmlmodifier -s //configuration/QuarantineServerSettings/ServerName/@value
<server name> configuration.xml
Allowed values:
■ Hostname or IP address for the computer on which Symantec Central Quarantine
Server is installed.
For example,
xmlmodifier -s //configuration/QuarantineServerSettings/ServerPort/@value
4200 configuration.xml
Allowed values:
Working with the Core server only mode 185
Configuring file name filtering in the Core server only mode
■ TCP/IP port number that Symantec Protection Engine uses to pass files to Symantec
Central Quarantine.
Block access to the Blocks access to any top level file that matches the file name.
file or the message
If a container file or email message contains a file or attachment that matches the
file name, access to the entire container or message is blocked.
Delete the file or Deletes any file that matches the file name and logs the violation.
the attachment
Symantec Protection Engine deletes any attachments within an email message that
match the file name. Attachments that do not match the file name are not deleted
and are delivered with the message.
Symantec Protection Engine deletes any embedded files that match the specified
file name within a container file that contains multiple files. The embedded files that
do not match the specified file name are not deleted. Deleted files are replaced with
a replacement file, DELETED<N>.TXT, which indicates the reason that the file was
deleted.
Use wildcard characters if you are unsure of an exact file name or to block all file attachments
with a specific extension. For example, you can use the wildcard *virus* to block all attachments
with the word virus in the file name.
Note: If your client uses the antivirus-only application programming interface (API), file name
violations are reported to the client in the server's response as email policy violations. If you
use the extended API or have a standard ICAP implementation, this type of violation is reported
as a file violation.
Working with the Core server only mode 186
Configuring file name filtering in the Core server only mode
Allowed values:
■ true
Enable file name filtering.
■ false
Disable file name filtering.
Default value: true
3 Create a text file and type the file names that you want to filter. Type one entry per line.
Search strings are not case-sensitive.
Command:
xmlmodifier -b //filtering/FileAttribute/DenyFileNames/items <file name>
filtering.xml
Allowed values:
A text file with the list of the file names that you want to filter.
4 Specify an action to block or delete the file.
Select one of the options to specify how you want Symantec Protection Engine to handle
the messages that contain an attachment with that file name:
Command:
xmlmodifier -s //filtering/FileAttribute/DeleteFileNames/@value <value>
filtering.xml
Allowed values:
■ true
Delete the file or attachment.
■ false
Block access to the file or the message.
Working with the Core server only mode 187
Configuring file size filtering in the Core server only mode
Block access to the Blocks access to any top level file that matches the file size.
file or the message
If a container file or email message contains a file or attachment that matches the
specified file size, Symantec Protection Engine blocks the entire container or
message.
Delete the file or Deletes any files that match the specified file size and logs the violation.
attachment
Symantec Protection Engine deletes any attachments within an email message that
match a specified file size. Attachments that do not match the specified file size are
delivered with the message.
Symantec Protection Engine deletes any embedded files within a container file that
contains multiple files that match the specified file size. The embedded files that do
not match the specified file size are not deleted. Deleted files are replaced with a
replacement file, DELETED<N>.TXT (where N denotes the sequence number),
which indicates the reason that the file was deleted.
Allowed values:
■ true
Working with the Core server only mode 188
Configuring true type file filtering in the Core server only mode
Allowed values:
A text file with the list of the file sizes that you want to filter.
4 Specify an action to block or delete the file.
Specify how you want Symantec Protection Engine to handle the messages that contain
an attachment with that file size:
Command:
xmlmodifier -s //filtering/FileAttribute/DeleteFileSizes/@value true
filtering.xml
Allowed values:
■ true
Delete the file or attachment.
■ false
Block access to the file or the message
Default value: false
5 Restart the Symantec Protection Engine service.
See “About preventing potential threats in Symantec Protection Engine” on page 86.
See “Configuring file name filtering in Symantec Protection Engine” on page 87.
contains a file or attachment that matches the file type, access to the entire container or
message is blocked.
You can use wildcard characters for the files based on their categories to block the files. For
example, you can use the wildcard image/* to block all files that fall under the image category.
Note: Configuration of the file true type filtering is supported only on ICAP protocol.
Allowed values:
■ true
Enables true type file filtering in Symantec Protection Engine.
■ false
Disables true type file filtering in Symantec Protection Engine.
Default value: false
3 Create a text file and type the file types that you want to filter. Type one entry per line.
Command:
xmlmodifier -b //filtering/FileAttribute/DenyFileTypes/items <file name>
filtering.xml
Allowed values:
A text file with the list of the file types that you want to filter.
4 Restart the Symantec Protection Engine service.
Working with the Core server only mode 190
Configuring Symantec Protection Engine to handle encrypted container files in the Core server only mode
Allowed values:
■ true
Enables options to handle encrypted container files.
■ false
Disables options to handle encrypted container files.
Default value: true
3 Specify how you want Symantec Protection Engine to handle encrypted container files.
Command:
xmlmodifier -s //filtering/Container/EncryptedContainersHandling/Actions/
EncryptedContainersActionPolicy/@value <value> filtering.xml
Allowed values:
■ 0
Generates a log entry. Symantec Protection Engine only logs instances of encrypted
container files.
■ 1
Blocks the encrypted container files and generates a log entry.
■ 2
Deletes the encrypted container files and generates a log entry.
Default value: 0
4 Continue scanning of the blocked encrypted container file.
Command:
Working with the Core server only mode 191
Customizing notifications in the Core server only mode
xmlmodifier -s //filtering/Container/EncryptedContainersHandling/Actions/
ContinueProcessingInEncryptedBlockPolicy/@value true filtering.xml
Allowed values:
■ true
Continues the scanning of the encrypted file that is blocked.
■ false
Stops the scanning of the encrypted file that is blocked.
Default value: false
5 Quarantine the encrypted files.
Command:
xmlmodifier -s //filtering/Container/EncryptedContainersHandling/
Actions/Quarantine/@value true filtering.xml
Allowed values:
■ true
Quarantines the encrypted files.
■ false
Does not quarantine the encrypted files.
Default value: false
6 Restart the Symantec Protection Engine service.
See “About container files in Symantec Protection Engine ” on page 91.
See “Configuring the quarantine in Symantec Protection Engine” on page 85.
When you use ICAP, Symantec Protection Engine displays an HTML text message to the user
when a requested file is blocked. Access to a file is blocked when the file contains threat.
Table 10-5 describes the types of notification messages that you can customize.
Total threat found This email message was infected. ${TOTAL_THREATS} number of threats
were found.
Denied file size The file attached to this email was removed because the file size is not
allowed. File attachment: ${FILE_NAME}. Matched file size: ${FILE_SIZE}.
Denied file names The file attached to this email was removed because the file name is not
allowed. File attachment: ${FILE_NAME}. Matched pattern:
${MATCHING_FILENAME_ENTRY}.
Encrypted file The encrypted container attached to this email was removed. File
attachment: ${FILE_NAME}. File ${QUARANTINED}.
Web browser The content you just requested contains ${THREAT_NAME} and was
blocked by the Symantec Protection Engine based on local administrator
settings. Contact your local administrator for further information.
Table 10-6 lists the variables that you can use to customize your notifications.
Variable Description
${FILE_SIZE} The size of the file that violates the maximum file size threshold.
Variable Description
${TOTAL_THREATS} The total number of risks that are detected in the MIME message.
Allowed values:
■ true
Adds notifications at the top of the message.
■ false
Does not add notifications at the top of the message.
Default value: false
3 Customize the notification for access denied message.
Command:
xmlmodifier -s
//policies/ThreatPolicies/Notifications/AccessDeniedMessage/@value <text>
policy.xml
Default value: The content you just requested contains ${THREAT_NAME} and was
blocked by the Symantec Protection Engine based on local administrator settings. Contact
your local administrator for further information.
Working with the Core server only mode 194
Customizing notifications in the Core server only mode
Default value: This email message was infected. ${TOTAL_THREATS} number of viruses
were found.
7 Customize the notification for the denied file size message.
Command:
xmlmodifier -s
//filtering/FileAttribute/DenyFileSizesNotificationText/@value <text>
filtering.xml
Default value: The file attached to this email was removed because the file size is not
allowed. File attachment: ${FILE_NAME}. Matched file size: ${FILE_SIZE}.
Working with the Core server only mode 195
Enabling Symantec Insight™ in the Core server only mode
Default value: The file attached to this email was removed because the file name is not
allowed. File attachment: ${FILE_NAME}. Matched pattern:
${MATCHING_FILENAME_ENTRY}.
9 Customize the notification for the denied encrypted container message.
Command:
xmlmodifier -s
//filtering/Container/EncryptedContainersHandling/NotificationText/@value
<text> filtering.xml
Default value: The encrypted container attached to this email was removed. File
attachment: ${FILE_NAME}. File ${QUARANTINED}.
10 Restart the Symantec Protection Engine service.
Allowed values:
■ true
Enables the Symantec Insight feature.
■ false
Working with the Core server only mode 196
Configuring the scanning aggression level in the Core server only mode
Allowed values:
■ 0
Known Bad - Potential threat detection is very low, which detects only the files that
are known to be bad.
■ 1
Low - Potential threat detection is low.
■ 2
Medium - Potential threat detection is higher than the low aggression level. By default,
medium level is selected in Symantec Protection Engine.
■ 3
Working with the Core server only mode 197
Excluding files from scanning based on file size in the Core server only mode
High - Potential threat detection is the highest. However, there could be false positives
detected too.
Default value: 2
3 Restart the Symantec Protection Engine service.
See “Enabling Symantec Insight™ policy” on page 95.
Allowed values:
■ 0 (disable)
■ 2 (enable)
Note: When you enable the exclusion policy, it gets enabled for file size, extension, and
true-type. Review the default values for the files getting excluded for extension and
true-type.
3 Specify the file size (in bytes), above which the files are excluded from scanning.
Command:
xmlmodifier -s //policies/ThreatPolicies/InsightScanning/InsightPolicy/
FileSizeExclusionThreshold/@value <value> policy.xml
Allowed values:
■ Type the file size in bytes.
■ Minimum value is 1 and maximum value is 2147000000.
Working with the Core server only mode 198
Monitoring scanning requests in the Core server only mode
<Weekday>
<Schedule enable="true" start="<start time in 24-hour format>"
end="end time in 24-hour format" threshold="<requests per second>"/>
</Weekday>
You can control how scanning requests are monitored in the following ways:
■ Enable or disable the scan request monitor feature.
■ Add a new schedule.
■ Activate or deactivate an existing schedule.
■ Delete a schedule.
Working with the Core server only mode 199
Monitoring scanning requests in the Core server only mode
Allowed values:
■ true
Enables monitoring scanning requests in Symantec Protection Engine.
■ false
Disables monitoring scanning requests in Symantec Protection Engine.
Default value: false
3 Restart the Symantec Protection Engine service.
To add a new schedule
1 Go to the Symantec Protection Engine installation directory and edit the
Configuration.xml file.
<Weekday>
<Schedule enable="true" start="<start time in 24-hour format>"
end="end time in 24-hour format" threshold="<requests per second>"/>
</Weekday>
For example:
<RequestMonitoringSchedules>
<EnableRequestMonitoring value="true"/>
<ExistingSchedules>
<Tuesday>
<Schedule enable="true" start="23" end="0" threshold="10"/>
</Tuesday>
</ExistingSchedules>
</RequestMonitoringSchedules>
Allowed values:
■ true
■ Activate an existing schedule.
■ false
Deactivate an existing schedule.
Allowed values:
■ true
Enables resource consumption logging in Symantec Protection Engine.
■ false
Disables resource consumption logging in Symantec Protection Engine.
Default value: true
3 Specify the number of individual log files to retain (one per day).
Command:
xmlmodifier -s //configuration/Logging/LogResourceInfo/@logfilestokeep
<value> configuration.xml
Allowed values:
■ 0 to 365
Default value: 0
All resource consumption files will be maintained.
4 Restart the Symantec Protection Engine service.
See “About configuring local logging” on page 146.
See “Monitoring Symantec Protection Engine resources” on page 102.
Allowed values:
Working with the Core server only mode 202
Setting container file limits in the Core server only mode
■ 1 to 4294967296 (4 GB)
■ 0
Default value: 0 (bytes)
3 Restart the Symantec Protection Engine service.
See “Enhance performance by limiting scanning” on page 109.
Warning: If you allow access to a file that has not been fully scanned, you can expose your
network to risks.
Command:
xmlmodifier -s //filtering/Container/MaxExtractSize/@value <value>
filtering.xml
Allowed values:
■ 1 to 131072 (MB)
The maximum value that you can specify for individual files in tar, rar, and zip containers
is 131072 MB (~128 GB). The maximum value that you can specify for other containers
is 1907 MB (~2 GB).
■ 0
Disables this setting (so that no limit is imposed).
Default value: 100 (MB)
3 Specify the maximum depth of the container file that Symantec Protection Engine can
extract for scanning.
Command:
xmlmodifier -s //filtering/Container/MaxExtractDepth/@value <value>
filtering.xml
Allowed values:
■ 1 to 50
Default value: 10
4 Specify the maximum number of files that Symantec Protection Engine can extract for
scanning.
Command:
xmlmodifier -s //filtering/Container/MaxExtractFileCount/@value <value>
filtering.xml
Allowed values:
■ 0 to 32212254720
Default value: 0
5 Specify the action for the container files that exceed the limit for extract depth, size, file
count, and maximum cumulative extract size.
Command:
xmlmodifier -s //filtering/Container/<MaxExtractDepth, MaxExtractSize,
MaxExtractFileCount, or MaxCumulativeExtractSize>/@actionpolicy <value>
filtering.xml
Allowed values:
Working with the Core server only mode 204
Enabling URL filtering in the Core server only mode
■ 0
Creates a log entry and allows access to the file.
■ 1
Blocks access to the file.
For example,
To block the access to the container file that exceeds the limit for max extract file size,
run the following command:
xmlmodifier -s //filtering/Container/MaxExtractSize/@actionpolicy<value>
filtering.xml
Allowed values:
■ true
Enables URL filtering.
■ false
Disables URL filtering.
Default value: false
3 Select the Filtering mode or Audit mode.
Command:
xmlmodifier -s //filtering/URLFilter/FilteringMode/@value <value>
filtering.xml
Working with the Core server only mode 205
Enabling URL Reputation in the Core server only mode
Allowed values:
■ 1
Filtering mode
■ 0
Audit mode
Default value: 1
4 Restart the Symantec Protection Engine service.
See “About the filtering modes” on page 131.
Allowed values:
■ true
Enables URL Reputation.
■ false
Disables URL Reputation.
Default value: false
3 Restart the Symantec Protection Engine service.
${REASON} An explanation of why the URL address that the user requests is blocked.
When a Web site is blocked due to URL violation, the ${REASON} variable
reads as follows:
where<(category)> is the URL or local category that contains the URL that
is denied.
Working with the Core server only mode 207
Specifying the log bind address in the Core server only mode
Allowed values:
■ 0
None
■ 1
Error
■ 2
Outbreak
■ 3
Working with the Core server only mode 209
Changing the directory where log files are located in the Core server only mode
Warning
■ 4
Information
■ 5
Verbose
■ 6
Audit
Default value: 3
The default logging level is Warning. Select Verbose only if you have been instructed to
do so by Symantec Technical Support to troubleshoot issues.
3 Restart the Symantec Protection Engine service.
Allowed values:
■ true
Enables statistics reporting in Symantec Protection Engine.
■ false
Disables statistics reporting in Symantec Protection Engine.
Default value: true
3 Restart the Symantec Protection Engine service.
See “Changing the length of time that log files are maintained” on page 148.
See “About configuring local logging” on page 146.
logged. The default logging level is None (deactivated). Logs are saved at /var/log/messages
location.
You must be running Symantec Protection Engine on Linux to use this feature.
To configure logging to the Linux Syslog
1 Go to the Symantec Protection Engine installation directory.
2 Configure logging to the Linux Syslog.
Command:
xmlmodifier -s //configuration/Logging/Syslog/@loglevel <value>
configuration.xml
Allowed values:
■ 0
None
■ 1
Error
■ 2
Outbreak
■ 3
Warning
■ 4
Information
■ 5
Verbose
■ 6
Audit
Allowed values:
■ 0
None
■ 1
Error
■ 2
Outbreak
■ 3
Warning
■ 4
Information
■ 6
Audit
Default value: 0
SMTP alerts are not activated by default. The SMTP notification level is set to None. The
Verbose notification level is not available for SMTP alerting.
3 In the Primary server address parameter, configure the IP address or host name of the
primary SMTP server that forwards the alert messages.
Command:
xmlmodifier -s //configuration/Logging/LogSMTP/@primary <value>
configuration.xml
Allowed values: Valid IP address or the host name of the SMTP server.
Working with the Core server only mode 214
Activating SNMP alerts in the Core server only mode
4 In the secondary server address parameter, type the IP address or host name of a
secondary SMTP server (if one is available) that forwards the alert messages if
communication with the primary SMTP server fails.
Command:
xmlmodifier -s //configuration/Logging/LogSMTP/@secondary <value>
configuration.xml
Allowed values: Valid IP address or the host name of the SMTP server.
5 In the SMTP domain parameter, type the local domain for Symantec Protection Engine.
Command:
xmlmodifier -s //configuration/Logging/LogSMTP/@domain <domain name>
configuration.xml
The domain name is added to the "From" box for SMTP messages. SMTP alert messages
that Symantec Protection Engine generates originate from
SymantecProtectionEngine@<domainname>, where <domainname> is the domain name
that you specify in the SMTP domain parameter.
6 Create a text file and add the email addresses of the recipients of the SMTP alert
messages. You can add multiple email address in the same file. Ensure you type one
entry per line.
Command:
xmlmodifier -b //configuration/Logging/LogSMTP/RecipientList/items <name
of the text file created above> configuration.xml
Allowed values:
■ 0
None
■ 1
Error
■ 2
Outbreak
■ 3
Warning
■ 4
Information
■ 6
Audit
Default value: 0
SNMP alerts are not activated by default. The SNMP notification level is set to None. The
Verbose notification level is not available for SNMP alerting.
3 In the Primary server address parameter, configure the IP address or host name of the
primary SNMP server that forwards the alert messages.
Command:
xmlmodifier -s //configuration/Logging/LogSNMP/@primary <value>
configuration.xml
Allowed values: Valid IP address or the host name of the SNMP server.
Working with the Core server only mode 216
Configuring outbreak alerts in the Core server only mode
4 In the Primary server port parameter, type the port number of the primary SNMP console
to receive the alert messages.
Command:
xmlmodifier -s //configuration/Logging/LogSNMP/@primaryport <value>
configuration.xml
Allowed values: Valid port number of the primary SNMP console to receive the alert
messages.
Default value: 162
5 In the secondary server address parameter, type the IP address or host name of a
secondary SNMP server (if one is available) that forwards the alert messages if
communication with the primary SNMP server fails.
Command:
xmlmodifier -s //configuration/Logging/LogSNMP/@secondary <value>
configuration.xml
Allowed values: Valid IP address or the host name of the SNMP server.
6 In the secondary server port parameter, type the port number of the primary SNMP console
to receive the alert messages.
Command:
xmlmodifier -s //configuration/Logging/LogSNMP/@secondaryport/<value>
configuration.xml
Allowed values: Valid port number of the secondary SNMP console to receive the alert
messages.
Default value: 162
7 Restart the Symantec Protection Engine service.
See “Logging levels and events” on page 142.
See “About configuring alerts” on page 151.
You can select the types of events for which you want to receive alerts. For each event type,
you can configure the threshold number of occurrences and the time interval. If the number
of occurrences meets or exceeds the configured threshold for the selected interval, Symantec
Protection Engine generates an alert.
Table 10-7 lists the outbreak alert events that you can configure.
Event Description
SameNonViral One or more incidence of the same type of nonviral threat was
detected.
Where, threat or policy violation event can be Infection, Virus, FileAttribute, urlblock,
AnyNonViral, SameNonViral, HighRisk, and MediumRisk.
Allowed values: 2 to 1000000
Default value: 2
For example, to configure the threshold value for container limit violation,
xmlmodifier -s //configuration/Logging/Outbreak/ContainerLimit/@threshold
10 configuration.xml
Allowed values:
■ true
Enables LiveUpdate.
■ false
Disables LiveUpdate.
Default value: true
Working with the Core server only mode 220
Configuring LiveUpdate to occur automatically in the Core server only mode
Allowed values:
■ true
Enable LiveUpdate schedule at a specific time range.
■ false
Disable LiveUpdate schedule at a specific time range.
Default value: false
3 Specify start hour of LiveUpdate schedule.
Command
xmlmodifier -s //liveupdate/TimeRangeSchedule/TimeRange/@starthour
liveupdate.xml
Allowed values:
■ 0 to 23 hours
Default value: 0
4 Specify start minute of LiveUpdate schedule.
Command
xmlmodifier -s //liveupdate/TimeRangeSchedule/TimeRange/@startminute
liveupdate.xml
Allowed values:
■ 0 to 59 minutes
Default value: 0
Working with the Core server only mode 221
Performing LiveUpdate on demand in the Core server only mode
Allowed values:
■ 0 to 29 minutes
Default value: 0
6 Restart the Symantec Protection Engine service.
See “Change the LiveUpdate base time” on page 265.
See “About LiveUpdate” on page 164.
Parameter Description
XPath: /liveupdate/UpdateServer/Protocol/@value
XPath: /liveupdate/UpdateServer/Server/@value
Server port You must specify the TCP/IP port the LiveUpdate server server
is listening on. The default value is 80.
XPath: /liveupdate/UpdateServer/Port/@value
Server path Specify the directory on the LiveUpdate server that contains
the LiveUpdate packages.
XPath: /liveupdate/UpdateServer/Path/@value
Note: This is an optional parameter.
XPath: /liveupdate/UpdateServer/Password/@value
Note: This is an optional parameter.
This response file lets you perform the installation silently using the values that you specified.
See “About initiating a silent installation using the response file” on page 229.
See “About silent installation and upgrade” on page 223.
Note: Do not delete any of the parameters in the response file. The installer must read an input
value for each parameter. You must specify an input value for each parameter.
Table A-1 lists the input values that are contained in the response file.
■ NONE
Use this value if you do not want to perform an upgrade. This value
is the default value.
■ UPGRADE
Use this value if you want to upgrade and you want to preserve your
existing settings. You must configure all of the Java inputs values. All
other input values are ignored.
■ CLEAN
Use this value to uninstall and reinstall the product. Configure the
input values that you want to modify.
AdminPort The port number on which the Web-based console listens. The default
port number is 8004.
Performing a silent installation 225
Implementing a silent installation in Linux
AdminPassword The encrypted password for the virtual administrative account that you
use to manage Symantec Protection Engine.
SSLPort The Secure Socket Layer (SSL) port number on which encrypted files
are transmitted for increased security.
User The name of an existing user under which Symantec Protection Engine
runs.
JavaCmd The full path (can be a symlink) to the 64-bit Java Runtime Environment
(JRE) 8.0 Update 111 or later executables.
JavaBinDir The full path (can be a symlink) to the 64-bit Java Runtime Environment
(JRE) 8.0 Update 111 or later executables.
The installer assumes that the path that you enter is correct. If the path
is incorrect or the JRE version is not the correct version, Symantec
Protection Engine does not function properly. (Symantec Protection Engine
might not function properly even if the installer reports that the installation
was successful.)
Performing a silent installation 226
Implementing a silent installation in Linux
JRELibDir You must provide this information so that the LD_LIBRARY_PATH variable
can locate the file libjvm.so.
For JRE 8:
JavaJRELib=<java_base_location>/jre/lib/amd64
JJavaJRELib=<java_install_location>/jre-10.0.2/lib
The installer assumes that the path that you enter is correct. If the path
that you provide is incorrect, Symantec Protection Engine does not
function properly even if the installer reports that the installation was
successful.
CanRelocate (Linux only) The Boolean value that indicates the version of the Red Hat Package
Manager (RPM) that you are running. If you are running RPM versions
4.0.2 or 4.1, change this setting to 0. If you are not running RPM version
4.0.2 or 4.1, do not change the default setting. The default setting is 1.
UpdateServer Enter the LiveUpdate server name or IP address to which you want to
connect.
This parameter is valid only for an upgrade where you preserve your
existing settings. The default value is liveupdate.symantec.com.
This parameter is valid only for an upgrade where you preserve your
existing settings. The default value is 80.
Performing a silent installation 227
Implementing a silent installation in Linux
UpdateServerPath Enter the directory path on the LiveUpdate server that contains the
LiveUpdate packages.
This parameter is valid only for an upgrade where you preserve your
existing settings. If you do not specify a value, the default is blank.
This parameter is valid only for an upgrade where you preserve your
existing settings. If you do not specify a value, the default is blank.
This parameter is valid only for an upgrade where you preserve your
existing settings. The default value is 0.
ApplicationName Enter the name of the application for which Symantec Protection Engine
will be used. This parameter will be considered only if Deployment value
is 2 (Other Application).
IgnoreGlibcWarning Symantec Protection Engine checks for the glibc component version
during installation. Warning appears if minimum required glibc version is
not found.
Possible values are as follows:
■ true: Ignores the warning for old version of glibc. Installation continues
for older versions of glibc also. Unsupported version of glibc may
cause Symantec Protection Engine to stop responding.
■ false: Doesn’t ignore the warning for old version of glibc. Installation
is canceled.
Performing a silent installation 228
Implementing a silent installation in Linux
AggressionLevel The scanning aggression level defines the detection aggression level for
threat detection technologies. Configure the scanning aggression level.
Possible values are:
■ 0 (Known Bad)
■ 1 (Low)
■ 2 (Medium)
This is the default value.
■ 3 (High)
■ true: Use this value if you want to use the Core server with user
interface mode.
This method requires JRE to be installed.
■ false: Use this value if you want to use the Core server only mode.
This method does not require JRE to be installed.
Note: For the silent installation to initiate, the response file must be located in the /home
directory of the user.
4 At AdminPassword=, copy and paste the encrypted string that the XML modifier
command-line tool generated.
Ensure that you have copied the encrypted string in its entirety.
See “Generating an encrypted password” on page 229.
5 Save the file.
See “Implementing a silent installation in Linux” on page 223.
See “About initiating a silent installation using the response file” on page 229.
Note: The no-ask-questions file is not deleted after the silent installation.
xmlmodifier -e password
where <password> is the password that you will use to access the Symantec Protection
Engine console.
The tool returns an encrypted string.
2 Save the entire encrypted string that the tool returns.
See “Implementing a silent installation in Linux” on page 223.
Appendix B
Using the Symantec
Protection Engine
commnad-line scanner
This appendix includes the following topics:
■ Java based command-line scanner (ssecls.jar) compiled using the Java software
development kit
See “Java based command-line scanner syntax and usage” on page 247.
Use the command-line scanner to send files to Symantec Protection Engine to be scanned
for viruses.
You can also use the command-line scanner to perform the following actions:
■ Recursively descend into subdirectories to scan multiple files.
■ Obtain information about the command-line scanner and Symantec Protection Engine
operation.
See “Setting up a computer to submit files to Symantec Protection Engine for scanning”
on page 231.
The ssecls files are organized into subdirectories by operating system. Use the files for the
operating system of the computer from which you want to submit files for scanning.
Follow these procedures to set up a computer to submit files for scanning from a computer
that does not have Symantec Protection Engine installed.
To set up a computer to submit files for scanning
1 Obtain copies of the command-line scanner files from one of the following locations:
■ In the Symantec Protection Engine.zip file, in the top-level Command_Line_Scanner
directory.
■ On the computer on which Symantec Protection Engine is installed, in the Symantec
Protection Engine installation directory, in the ssecls subdirectory (Linux).
2 Copy the entire contents of the directory for the appropriate operating system.
3 On the computer from which you want to submit files for scanning, place the files in a
directory location that is in the command prompt path.
See “About the Symantec Protection Engine command-line scanner” on page 230.
See “C-based command-line scanner syntax and usage” on page 232.
The <path> parameter lets you specify one or more files or directories to scan. Each file or
directory must be separated by spaces. You can use the absolute or relative path. If the
specified path is to a file, the file is scanned. If the path is to a directory, all of the files in the
directory are scanned.
Note: Do not use a path with a symbolic link. Symantec Protection Engine does not follow a
symbolic link to a file.
On Linux, set the LD_LIBRARY_PATH environment variable to the directory, which contains
the ssecls binary.
export LD_LIBRARY_PATH=/opt/SYMCScan/ssecls/C
You can specify any combination of files and directories. You must separate multiple entries
with a space. For example:
ssecls [-options] <pathtofile1> <pathtofile2> <pathtofile3>
Using the Symantec Protection Engine commnad-line scanner 233
C-based command-line scanner syntax and usage
You can specify any mounted file system, mount point, or mapped drive. For example:
C:\Work\Scantest.exe
/export/home/
Follow the standard formats for your operating system for handling path names (for example,
special characters, quotation marks, or wildcard characters).
If you have specified a directory for scanning and want Symantec Protection Engine to descend
into subdirectories to scan additional files, you must also use the -recurse option.
See “About requesting recursive scanning” on page 243.
You can only specify files or directories for which you have appropriate permissions. To send
files, you must have read access to the files. To replace or delete files, you must have
permission to modify or delete the files. You must also have access to the directory where the
files are located.
If you do not specify a path, input data is read from standard input (STDIN) and sent to
Symantec Protection Engine for scanning. After the scan, the data (original file, if it was clean)
is written to standard output (STDOUT). If a file is infected, no data is written to STDOUT.
Note: DBCS path names in scan requests should not be converted to Unicode (UTF-8) encoding
before the path is passed to Symantec Protection Engine.
See “About the Symantec Protection Engine command-line scanner” on page 230.
See “Setting up a computer to submit files to Symantec Protection Engine for scanning”
on page 231.
See “Supported command-line options for C-based command-line scanner” on page 234.
See “About specifying the Symantec Protection Engine IP address and port for C-based
command-line scanner” on page 238.
See “About specifying the antivirus scanning mode for C-based command-line scanner”
on page 239.
See “About obtaining scan results for C-based command-line scanner” on page 240.
See “About requesting recursive scanning” on page 243.
See “About disposing of infected files when an error occurs” on page 243.
See “Excluding files from scanning” on page 244.
See “Redirecting console output to a log file” on page 245.
See “About scanning files in Symantec Protection Engine using different services/APIs”
on page 245.
See “About using Insight command options with C-based command-line scanner” on page 246.
Using the Symantec Protection Engine commnad-line scanner 234
C-based command-line scanner syntax and usage
Option Description
-server Specify one or more Symantec Protection Engines for scanning files.
You must separate multiple entries with a semicolon. If you do not specify a
Symantec Protection Engine, the server option defaults to the local host that
listens on the default port.
See “About specifying the Symantec Protection Engine IP address and port for
C-based command-line scanner” on page 238.
■ Scanrepairdelete
If you do not specify a scanning mode, the scan policy defaults to
scanrepairdelete. Symantec Protection Engine tries to repair infected files.
Files that cannot be repaired are deleted. This configuration is the
recommended setting.
■ Scan
Files are scanned, but no repair is tried. Infected files are not deleted.
■ Scanrepair
Symantec Protection Engine tries to repair infected files. Files that cannot be
repaired are not deleted.
Note: Symantec Protection Engine version 8.1 does not support repair of infected
files.
See “About specifying the antivirus scanning mode for C-based command-line
scanner” on page 239.
Using the Symantec Protection Engine commnad-line scanner 235
C-based command-line scanner syntax and usage
Table B-1 Supported options for the C-based command-line scanner (continued)
Option Description
-details Report detailed information about the infections or violations that are found.
When you use this option, a block of text is printed to STDOUT for each file that
is scanned. The output text indicates the name of the file that was scanned and
the result of the scan. If the file is infected or violates an established policy, the
output text also provides information about the violation or infection.
Note: If you use the -details option, you do not need to use the -verbose option.
The output for the -verbose option is duplicated as part of the output for the
-details option.
When you use this option, a line of output is printed to STDOUT for each file that
is scanned. The output includes the name of the file that was scanned and the
time that it took Symantec Protection Engine to scan the file.
-recurse Recursively descend into the subdirectories that are inside each path that is
specified on the command line.
-onerror Specify the disposition of a file that has been modified by Symantec Protection
Engine when an error occurs when Symantec Protection Engine replaces a file.
The default setting is to delete the file. You can specify one of the following:
■ Leave
The original (infected) file is left in place.
■ Delete
The original (infected) file is deleted, even though the replacement data is
unavailable.
See “About disposing of infected files when an error occurs” on page 243.
Using the Symantec Protection Engine commnad-line scanner 236
C-based command-line scanner syntax and usage
Table B-1 Supported options for the C-based command-line scanner (continued)
Option Description
-exclude Specify a path of rule file to exclude certain files from scanning. You can exclude
files by name from being scanned.
-maxsize Specify maximum file size in bytes to exclude the files that exceed a limit from
being scanned.
Files that exceed the maximum file size limit are not sent to Symantec Protection
Engine for scanning.
-log The command-line scanner redirects the console output to a log file. When the
scan finishes, Symantec Protection Engine writes a summary to the log file (if
you are running in log mode) and the screen. The summary shows the number
of files that were scanned and the number of viruses found.
-api The command-line scanner now includes services for supporting Symantec
Insight™ , better categorization of threats, and unscannable file handling features.
You can specify one of the following options:
See “About using Insight command options with C-based command-line scanner”
on page 246.
Using the Symantec Protection Engine commnad-line scanner 237
C-based command-line scanner syntax and usage
Table B-1 Supported options for the C-based command-line scanner (continued)
Option Description
See “About using Insight command options with C-based command-line scanner”
on page 246.
See “About using Insight command options with C-based command-line scanner”
on page 246.
See “About using Insight command options with C-based command-line scanner”
on page 246.
See “About using Insight command options with C-based command-line scanner”
on page 246.
See “About using Insight command options with C-based command-line scanner”
on page 246.
Using the Symantec Protection Engine commnad-line scanner 238
C-based command-line scanner syntax and usage
Table B-1 Supported options for the C-based command-line scanner (continued)
Option Description
■ 0: Known Bad
■ 1: Low
■ 2: Medium
This is the default value.
■ 3: High
See “About using Insight command options with C-based command-line scanner”
on page 246.
See “About using Insight command options with C-based command-line scanner”
on page 246.
You can specify multiple Symantec Protection Engines. You must separate multiple entries
with a semicolon. For example:
ssecls -server 192.168.0.100:1344;192.168.0.101:1344 c:\temp
When more than one Symantec Protection Engine is specified, the load balancing and failover
features of the API are activated automatically. The Symantec Protection Engine API provides
scheduling across any number of computers that are running Symantec Protection Engine.
When multiple Symantec Protection Engines are used, the API determines which Symantec
Protection Engine should receive the next file based on the scheduling algorithm.
If a Symantec Protection Engine is unreachable or stops responding during a scan, another
Symantec Protection Engine is called. The faulty Symantec Protection Engine is taken out of
rotation for 30 seconds. If all of Symantec Protection Engines are out of rotation, the faulty
Symantec Protection Engines are called again.
The API does not stop trying to contact Symantec Protection Engine unless any of the following
conditions occur:
■ At least five engines do not function.
■ It appears that a file that was scanned might have caused more than one engine to stop
responding.
See “C-based command-line scanner syntax and usage” on page 232.
See “Supported command-line options for C-based command-line scanner” on page 234.
To override the default antivirus scanning mode, you can specify one of the following scanning
modes using the -mode option:
Scan Files are scanned, but no repair is tried. Infected files are not deleted.
Scanrepair Symantec Protection Engine tries to repair infected files. Files that cannot be repaired
are not deleted.
For example:
ssecls -server 192.168.0.100:1344 -mode scanrepair c:\temp
Using the Symantec Protection Engine commnad-line scanner 240
C-based command-line scanner syntax and usage
When files are sent to Symantec Protection Engine using the command-line scanner, the
command-line scanning mode overrides the scan policy configuration on Symantec Protection
Engine. This override includes scanning the files that are embedded in container files. If you
do not specify a scanning mode using the -mode option, the default setting (scanrepairdelete)
applies.
See “C-based command-line scanner syntax and usage” on page 232.
See “Supported command-line options for C-based command-line scanner” on page 234.
Table B-2 Possible scan result codes for the -verbose option
-2 An error occurred within Symantec Protection Engine. The file was not scanned.
-1 An error occurred within the command-line scanner. The file was not scanned.
Using the Symantec Protection Engine commnad-line scanner 241
C-based command-line scanner syntax and usage
Table B-2 Possible scan result codes for the -verbose option (continued)
The output when four files (for example, a, b, c, and d) are scanned should look similar to the
following:
c:\work\filea -1
c:\work\fileb 2
c:\work\filec 2
c:\work\filed 0
See “C-based command-line scanner syntax and usage” on page 232.
See “Supported command-line options for C-based command-line scanner” on page 234.
Note: The output data mirrors the information that Symantec Protection Engine returns for
each infection or violation that is identified. It might not reflect the final disposition of the file.
The code for the scan results indicates the final disposition of the file. This information is also
displayed when you use the -verbose option.
The output when four files (for example, a, b, c, and d) are scanned and files c and d are found
to be infected with the Kakworm.c virus should look similar to the following example:
c:\work\filec 2
Kakworm.c
2832
Infected
c:\work\filed 2
Kakworm.c
2832
Infected
See “C-based command-line scanner syntax and usage” on page 232.
See “Supported command-line options for C-based command-line scanner” on page 234.
When this option is used, a line of output is printed to STDOUT for each file that is scanned.
The output includes the name of the file that was scanned and the time that it took Symantec
Protection Engine to scan the file.
The reported scan time is calculated as the elapsed time between when the connection with
Symantec Protection Engine opens and closes. The time is reported in seconds with millisecond
accuracy.
The output when four files (for example, a, b, c, and d) are scanned should look similar to the
following example:
c:\work\filea 0.018s
c:\work\fileb 0.013s
c:\work\filec 0.43s
Using the Symantec Protection Engine commnad-line scanner 243
C-based command-line scanner syntax and usage
c:\work\filed 0.03s
See “C-based command-line scanner syntax and usage” on page 232.
See “Supported command-line options for C-based command-line scanner” on page 234.
Note: The recursive option does not apply when you use pipe mode.
Delete The original (infected) file is deleted, even though the replacement data is
unavailable.
For example:
ssecls -server 192.168.0.100:1344 -onerror delete c:\temp
Note: This option does not apply when you use pipe mode.
File name All files by that file name are excluded from scanning regardless of the folders
in which they are found. To exclude all files with a specific extension, use *.ext.
(This instance is the only supported use of a wildcard character.)
Full path name Only this specific file is excluded from scanning.
Full directory path Every file in this directory is excluded from scanning.
names
For example, C:\Documents
Option Description
For example:
ssecls -server 192.168.0.100:1344 -api 1 c:\test.txt
Note: The command options explained in Table B-4 are optional. To use these Insight command
options, make sure that you set the value of -api to 2.
Options Description
-disableinsight This command option lets you specify if you want to enable/disable
Insight.
-digitallysigned This command option lets you specify if the file is digitally signed or
not. By default, Symantec Protection Engine checks if the file is digitally
signed or not.
If the file is not digitally signed, it saves on the time that Symantec
Protection Engine takes to check the digital signature information. This
improves the Insight query performance.
-SHA256 This command option lets you specify the SHA256 hash value of the
file. Symantec Protection Engine calculates the SHA256 value, if not
provided.
You may want to provide the SHA256 value to save on the time taken
to calculate the SHA256 value.
-MD5Hash This command option lets you specify the MD5 hash value of the file.
If specified Symantec Protection Engine may use it for the Insight query.
-SourceIP This command option lets you specify the IP address of the source
from where the file is downloaded.
-SourceURL This command option lets you specify the URL of the source from where
the file is downloaded.
Using the Symantec Protection Engine commnad-line scanner 247
Java based command-line scanner syntax and usage
Options Description
-aggressionlevel This command options lets you set the scanning aggression level.
The Scanning Aggression Level defines the detection aggression level
for threat detection technologies.
Example:
ssecls -api 2 -digitallysigned 1 -SHA256
63ac0ad9c9dbeffdba4dc07c3c685dce4d41a4169eb5efabf9347dd577d3270d -MD5Hash
62825AA34568DA314E60D2AC2ACD2181 -SourceIP "192.172.1.8"
-SourceURL"www.symantec.com" -reportinsightinfo 1 -aggressionlevel 2
c:\testfolder\test.exe
See “Supported command-line options for C-based command-line scanner” on page 234.
See “C-based command-line scanner syntax and usage” on page 232.
The <file to scan> parameter lets you specify a file to scan. You can use the absolute or relative
path.
Note: Do not use a path with a symbolic link. Symantec Protection Engine does not follow a
symbolic link to a file.
You can specify any mounted file system, mount point, or mapped drive. For example:
C:\Work\Scantest.exe
/export/home/
Follow the standard formats for your operating system for handling path names (for example,
special characters, quotation marks, or wildcard characters).
You can only specify files for which you have appropriate permissions. To send files, you must
have read access to the files. To replace or delete files, you must have permission to modify
or delete the files. You must also have access to the directory where the files are located.
Using the Symantec Protection Engine commnad-line scanner 248
Java based command-line scanner syntax and usage
See “About the Symantec Protection Engine command-line scanner” on page 230.
See “Setting up a computer to submit files to Symantec Protection Engine for scanning”
on page 231.
See “Supported command-line options for Java based command-line scanner” on page 248.
See “About specifying the Symantec Protection Engine IP address and port for Java based
command-line scanner” on page 251.
See “About specifying the antivirus scanning mode for Java based command-line scanner”
on page 252.
See “About obtaining scan results for Java based command-line scanner” on page 253.
See “About scanning files in Symantec Protection Engine using different services/APIs with
Java based command-line scanner” on page 254.
See “About using Insight command options with Java based command-line scanner”
on page 254.
Table B-5 Supported options for the Java based command-line scanner
Option Description
-s, --server Specify one or more Symantec Protection Engines for scanning files.
You must separate multiple entries with a semicolon and the entries should be
in double quotes. If you do not specify a Symantec Protection Engine, the server
option defaults to the local host that listens on the default port.
See “About specifying the Symantec Protection Engine IP address and port for
Java based command-line scanner” on page 251.
Using the Symantec Protection Engine commnad-line scanner 249
Java based command-line scanner syntax and usage
Table B-5 Supported options for the Java based command-line scanner (continued)
Option Description
■ Scan
Files are scanned, but no repair is tried. Infected files are not deleted.
■ Scanrepair
Symantec Protection Engine tries to repair infected files. Files that cannot
be repaired are not deleted.
■ Scanrepairdelete
Symantec Protection Engine tries to repair infected files. Files that cannot
be repaired are deleted. This configuration is the recommended setting.
■ Default
If you do not specify a scanning mode, the scan policy defaults to the policy
set on the Symantec Protection Engine.
Note: Symantec Protection Engine version 8.1 does not support repair of infected
files.
See “About specifying the antivirus scanning mode for Java based command-line
scanner” on page 252.
-c, --clobber Always overwrites the scanned file with server response.
-b, --verbose Report detailed information about the file that is scanned.
When you use this option, a line of output is printed to STDOUT for each file that
is scanned. The information includes both the name of the file and the result of
the scan, including the final disposition of the file.
See “About using the --verbose option in the java based command-line scanner”
on page 253.
-p, --api The command-line scanner now includes services for supporting Insight, better
categorization of threats,and unscannable file handling features.
You can specify one of the following options:
Table B-5 Supported options for the Java based command-line scanner (continued)
Option Description
See “About using Insight command options with Java based command-line
scanner” on page 254.
■ 0: Known Bad
■ 1: Low
■ 2: Medium
This is the default value.
■ 3: High
See “About using Insight command options with Java based command-line
scanner” on page 254.
See “About using Insight command options with Java based command-line
scanner” on page 254.
See “About using Insight command options with Java based command-line
scanner” on page 254.
See “About using Insight command options with Java based command-line
scanner” on page 254.
See “About using Insight command options with Java based command-line
scanner” on page 254.
Using the Symantec Protection Engine commnad-line scanner 251
Java based command-line scanner syntax and usage
Table B-5 Supported options for the Java based command-line scanner (continued)
Option Description
See “About using Insight command options with Java based command-line
scanner” on page 254.
See “About using Insight command options with Java based command-line
scanner” on page 254.
See “Java based command-line scanner syntax and usage” on page 247.
You can specify multiple Symantec Protection Engines. You must separate multiple entries
with a semicolon and you must enclose the entries in double quotes. For example:
Using the Symantec Protection Engine commnad-line scanner 252
Java based command-line scanner syntax and usage
When more than one Symantec Protection Engine is specified, the load balancing and failover
features of the API are activated automatically. The Symantec Protection Engine API provides
scheduling across any number of computers that are running Symantec Protection Engine.
When multiple Symantec Protection Engines are used, the API determines which Symantec
Protection Engine should receive the next file based on the scheduling algorithm.
If a Symantec Protection Engine is unreachable or stops responding during a scan, another
Symantec Protection Engine is called. The faulty Symantec Protection Engine is taken out of
rotation for 30 seconds. If all of Symantec Protection Engines are out of rotation, the faulty
Symantec Protection Engines are called again.
The API does not stop trying to contact Symantec Protection Engine unless any of the following
conditions occur:
■ At least five engines do not function
■ It appears that a file that was scanned might have caused more than one engine to stop
responding
See “Java based command-line scanner syntax and usage” on page 247.
See “Supported command-line options for Java based command-line scanner” on page 248.
To override the default antivirus scanning mode, you can specify one of the following scanning
modes using the -action option:
Scan Files are scanned, but no repair is tried. Infected files are not deleted.
Scanrepair Symantec Protection Engine tries to repair infected files. Files that cannot be
repaired are not deleted.
Scanrepairdelete Symantec Protection Engine tries to repair infected files. Files that cannot be
repaired are deleted.
For example:
Using the Symantec Protection Engine commnad-line scanner 253
Java based command-line scanner syntax and usage
Note: Symantec Protection Engine version 8.1 does not support repair of infected files.
When files are sent to Symantec Protection Engine using Java based command-line scanner,
the command-line scanning mode overrides the scan policy configuration on Symantec
Protection Engine. This override includes scanning the files that are embedded in container
files. If you do not specify a scanning mode using the --action option, the default setting is the
antivirus scan policy set on Symantec Protection Engine.
See “Java based command-line scanner syntax and usage” on page 247.
See “Supported command-line options for Java based command-line scanner” on page 248.
The output when a file scanned using the --verbose option should look similar to the following:
File Scanned: c:\work\filea
Scan Status: Clean
See “Java based command-line scanner syntax and usage” on page 247.
See “About obtaining scan results for Java based command-line scanner” on page 253.
See “Supported command-line options for Java based command-line scanner” on page 248.
Using the Symantec Protection Engine commnad-line scanner 254
Java based command-line scanner syntax and usage
Option Description
For example:
java -jar ssecls.jar --server 192.168.0.100:1344 --api 1 -f c:\temp\test.txt
See “Java based command-line scanner syntax and usage” on page 247.
See “Supported command-line options for Java based command-line scanner” on page 248.
Note: The command options explained in Table B-7 are optional. To use these Insight command
options, make sure that you set the value of -api to 2.
Using the Symantec Protection Engine commnad-line scanner 255
Java based command-line scanner syntax and usage
Options Description
-d, --disableinsight This command option lets you specify if you want to enable/disable
Insight.
-n, --digitallysigned This command option lets you specify if the file is digitally signed or
not. By default, Symantec Protection Engine checks if the file is digitally
signed or not.
If the file is not digitally signed, it saves on the time that Symantec
Protection Engine takes to check the digital signature information. This
improves the Insight query performance.
-sha, --sha256 This command option lets you specify the SHA256 hash value of the
file. Symantec Protection Engine calculates the SHA256 value, if not
provided.
You may want to provide the SHA256 value to save on the time taken
to calculate the SHA256 value.
-md5, --md5Hash This command option lets you specify the MD5 hash value of the file.
If specified Symantec Protection Engine may use it for the Insight query.
-i, --sourceip This command option lets you specify the IP address of the source
from where the file is downloaded.
-u, --sourceurl This command option lets you specify the URL of the source from where
the file is downloaded.
-l, --aggressionlevel This command options lets you set the scanning aggression level.
-r, --reportinsightinfo This command option decides if Insight information should be made
available in the response or not.
Example:
java -jar ssecls.jar --api 2 --digitallysigned 1 --sha256
63ac0ad9c9dbeffdba4dc07c3c685dce4d41a4169eb5efabf9347dd577d3270d --md5hash
62825AA34568DA314E60D2AC2ACD2181 --sourceip "192.172.1.8" --sourceurl
"www.symantec.com" --reportinsightinfo 1 --aggressionlevel 2 -f
c:\testfolder\test.exe
See “Supported command-line options for Java based command-line scanner” on page 248.
Using the Symantec Protection Engine commnad-line scanner 256
Java based command-line scanner syntax and usage
See “Java based command-line scanner syntax and usage” on page 247.
Appendix C
About editing configuration
data
This appendix includes the following topics:
configuration.xml Contains logging, the temporary directory location, protocol configurations, and
operating-system-specific settings
filtering.xml Contains settings for URL filtering, MIME, and container limits
Note: When you edit the configuration data, all high-ASCII and double-byte characters must
be written in UTF-8 encoding.
When you are finished with editing the settings in the XML files, you must stop and restart
Symantec Protection Engine. Changes to settings in the console (if any) appear the next time
that you open the console.
See “Verifying, stopping, and restarting the Symantec Protection Engine daemon on Linux ”
on page 41.
Warning: Several configuration options are not addressed here and should not be changed.
Changes to certain options can detrimentally affect product performance. For example, the
installation directory is specified at installation, and the product does not function if you change
this value.
■ Specify maximum file size for extracted files in Symantec Protection Engine
See “Specify maximum file size for extracted files” on page 271.
■ Specify maximum cumulative file size for extracted files in Symantec Protection Engine
See “Specify maximum cumulative file size for extracted files” on page 271.
■ Specify maximum socket timeout value in Symantec Protection Engine
See “Specify the maximum socket timeout value” on page 272.
■ Specify file size threshold for scanning exclusion
See “Specify file size threshold for scanning exclusion” on page 272.
■ Include category information from ICAP response in URL filtering
See “Include category information from ICAP response in URL filtering” on page 273.
■ Enable sub-categories description
You might need to adjust this setting depending on the ICAP 1.0 application for which Symantec
Protection Engine provides scanning services. The default setting is to send an "access denied"
message when a file is blocked. However, some ICAP 1.0 applications are configured to
receive the ICAP 403 response instead.
Table C-1 lists the ICAP response settings.
SecureICAPPort Specify the port number to use secure ICAP. Default secure ICAP port is
11344.
It encrypts and sets plain text private key pass phrase value in
configuration.xml file.
CertificateFile Specify the Symantec Protection Engine server certificate file name.
"ECDHE-RSA-AES128-GCM-SHA256,ECDHE-RSA-AES256-GCM-SHA384,
ECDHE-RSA-AES128-SHA256,ECDHE-RSA-AES256-SHA384,AES128-GCM-SHA256,
AES256-GCM-SHA384,AES128-SHA256,AES256-SHA256"
Note: To disable dynamic thread pool management and use a fixed thread pool size, use the
same number of scanning threads that you set for the fixed thread pool for both the MinThreads
and MaxThreads parameters. You must configure the maximum threads in the console.
See “Allocating resources for Symantec Protection Engine” on page 58.
The configuration file parameters for controlling the dynamic thread pool are as follows:
MinThreads The minimum number of scanning threads that is created at startup time
and the minimum to keep alive regardless of the load that is processed.
ShrinkThreadCount The number of scanning threads to remove when more threads are running
than are needed for the load that is processed.
IdleThreadCount The number of idle scanning threads, which triggers the removal of scanning
threads.
SecondsBetweenChecks The number of seconds between evaluations of the thread pool activity.
Note: For logging to occur at maximum load, the logging level for the logging destination must
be set to Warning or higher.
Note: In the case of a new installation or a clean upgrade installation, you can edit the
liveupdate.xml file after the installation.
Note: If you change any of the values related to the LiveUpdate server in the liveupdate.xml
file, you will need to restart the Symantec Protection Engine service.
The MaxCumulativeExtractSize parameter accepts a value in bytes. The maximum limit you
can enter is 137438953471 bytes (approximately 128 GB). A value of zero (0) disables this
optimization setting.
Table C-16 lists the settings to configure maximum cumulative file size for extracted files.
Note: This parameter is only applicable with new ICAP services introduced in Symantec
Protection Engine version 7.0 and later. For more information, see the Symantec Protection
Engine Software Developer's Guide.
Note: The file paths are case sensitive and each file path must be at a new line.
Also, the file paths must be unique. The xmlmodifier command does not check for duplicate
file path entries.
■ F:\test\
■ \\10.217.1.2\ONTAP_ADMIN$\vol\vol0\home\test\abc\
Note: The file path can include the name of the file too. For example,
C:\testfiles\abc.txt, which means that only the abc.txt file in the testfiles folder is
excluded from scanning.
Note: The file paths must be unique. The xmlmodifier command does not check for
duplicate file path entries.
About editing configuration data 276
About configuration options
2 Add the new file paths to the .txt file, and save the file.
Note: The file paths must be unique. The xmlmodifier command does not check for
duplicate file path entries.
Table C-22
XPath Field values Default setting
/filtering/URLReputation/Threshold/@reputation ■ 1 to 10 8
<value>
//filtering/URLReputation/Threshold/@confidence ■ 1 to 5 4
<value>
Appendix D
Return codes
This appendix includes the following topics:
24 No update available post rollback unless the new set of definitions are available.
F license (continued)
filtering. See HTTP filtering and email, filtering by content license 63
filtering.xml 257 locating the serial number 65
fulfillment ID 68 product 68
product license 63
licensing
H about 63
home page activating 65
auto-refresh 161 checking status 68
scanning summary 159–160 license file
HTTP filtering installing 66
about 118 obtaining 65
customizing the access denied message 138, removing 67
206 types of licenses 63
local categories 131 Linux
modes 132 installing Symantec Protection Engine 34
URL categories 118 stopping and starting service 41
HTTPS server 44–45 uninstalling 62
upgrading Symantec Protection Engine 37
I LiveUpdate
ICAP about 164
about 75 definitions, Symantec update frequency 164
bind address 76, 181 licensing requirement 63
command-line scanner, using 230 logs 167
configuring 76, 181 rolling back definitions 169
port number 76, 181 updating definitions
quarantining files 85 automatically 165, 219
return codes 278 on demand 166
scan policy 76, 181 LiveUpdate error codes 279
supported services 74 liveupdate.xml 257
installation load 102
authentication modes 33 load balancing 17
command-line scanner 231 local categories 131
on Linux 34, 37 See also content categories
preparing for 28 See also HTTP filtering
Intelligent Update about 131
definitions, Symantec update frequency 164 managing 134
local logging
J configuring 147, 208
exporting data 157
JRE (Java Runtime Environment) 28
managing local logs 155
purging log files 148, 210
K statistics reporting 149, 211
keys 45 viewing data 156
keystore 45 logging 151
See also alerts
L about 141
license changing log file location 147, 209
content 68 configuring local logging 146
Index 283