Policy Configuration : Configuring Security Services Settings

Configuring Anti-Virus Settings
The GMS offers anti-virus protection on a subscription-basis through a partnership with McAfee.
This section describes how to configure Anti-Virus settings for SonicWALL appliances.
Anti-Virus Settings
To configure Anti-Virus settings for one or more SonicWALL appliances, follow these steps:
1
2
Expand the Security Services tree and click Client AV Enforcement. The Client AV Enforcement page appears.
3
To enable the Client Anti-Virus Service, navigate to the Network > Zones page. After the service is enabled, proceed to the next steps to configure the settings.
4
Select Enable Anti-Virus Client Automated Installation, Updates and Enforcement.
5
Clicking Disable policing from Trusted to Public allows computers on a trusted zone (such as a LAN) to access computers on public zones (such as DMZ), even if anti-virus software is not installed on the LAN computers. Unchecked, Disable policing from Trusted to Public enforces anti-virus policies on computers located on Trusted zones.
6
To bypass policing to Wireless Guest Services users, click Bypass policing for WGS users. This check box is only applicable to SonicOS Standard and is greyed out unless Enable DMZ/OPT Policing is selected.
7
8
To disable policing from the LAN to the DMZ, select Disable policing from LAN/WorkPort/Trusted to DMZ/HomePort/WLAN/OPT.
9
To configure the SonicWALL appliance(s) to only check for updates once a day, select Reduce AV Traffic for ISDN connections. This is useful for low bandwidth connections or connections that are not “always on.”
Force Update Settings
Dell SonicWALL GMS automatically downloads the latest virus definition files. To configure the maximum number of days that can pass before Dell SonicWALL GMS downloads the latest files, select the number of days from the Maximum Days Allowed Before Forcing Update list box.
Significant virus events can occur without warning (such as Melissa, ILOVEYOU, and others). When these occur, Dell SonicWALL GMS can be configured to block network traffic until the latest virus definition files are downloaded. To configure this feature, determine which types of events will require updating. Then, select Low Risk, Medium Risk, or High Risk.
Force update on alert - SonicWALL, Inc. broadcasts virus alerts to all SonicWALL appliances with an Anti-Virus subscription. Three levels of alerts are available, and you can select more than one. When an alert is received with this option selected, users are upgraded to the latest version of VirusScan ASaP before they can access the Internet. This option overrides the Maximum number of days allowed before forcing update selection. In addition, every virus alert is logged, and an alert message is sent to the administrator.
Low Risk - A virus that is not reported in the field and is considered unlikely to be found in the field in the future has a low risk. Even if such a virus includes a very serious or unforeseeable damage payload, its risk is still low.
Medium Risk - If a virus is found in the field, and if it uses a less common infection mechanism, it is considered to be medium risk. If its prevalence stays low and its payload is not serious, it can be downgraded to a low risk. Similarly, it can be upgraded to high risk if the virus becomes more and more widespread.
High Risk - To be assigned a high risk rating, it is necessary that a virus is reported frequently in the field. Additionally, the payload must have the ability to cause at least some serious damage. If it causes very serious or unforeseeable damage, high risk might be assigned even with a lower level of prevalence.
Exempt Computers
The Exempt Computers section allows the GMS administrator to specify address ranges which should be explicitly included or excluded in Anti-Virus enforcement.
1
Select Enforce Anti-Virus policies for all computers to enforce Anti-Virus policies across your entire network. Selecting this option forces computers to install VirusScan ASaP in order to access the Internet or the DMZ. This is the default configuration
2
Select Include specific address ranges in the Anti-Virus enforcement to force a specified range of addresses to adhere to Anti-Virus enforcement. Choosing this option allows the administrator to define ranges of IP addresses to receive Anti-Virus enforcement. If you select this option, specify a range of IP addresses to be enforced. Any computer requiring enforcement needs a static IP address within the specified range of IP addresses. Up to 64 IP address ranges can be entered for enforcement.
3
Select Exclude specific address ranges in the Anti-Virus enforcement to exempt a specified range of addresses from Anti-Virus enforcement. Selecting this option allows the administrator to define ranges of IP addresses that are exempt from Anti-Virus enforcement. If you select this option, specify the range of IP addresses are exempt. Any computer requiring unrestricted Internet access needs a static IP address within the specified range of IP addresses. Up to 64 IP address ranges can be entered.
Client Anti Virus Enforcement
The Client Anti Virus Enforcement list provides the options to exclude address objects from the Client AV Enforcement list.
You can edit these address objects and groups by clicking the Edit icon, or add address objects by clicking the Add icon for the desired list.
Select the default enforcement type for computers whose addresses did not fail any of the client anti-virus enforcement from the drop-down list.