Configure threat feed and outbreak prevention without AV engine scan
In the CLI, users can enable malware threat feeds and outbreak prevention without performing an AV scan. In GUI and CLI, users can choose to use all malware thread feeds, or specify the ones that they want to use. Replacement messages have been updated for external block lists.
config antivirus profile edit <name> config http set av-scan {disable | block | monitor} set outbreak-prevention {disable | block | monitor} set external-blocklist {disable | block | monitor} set quarantine {enable | disable} end ... set outbreak-prevention-archive-scan {enable | disable} set external-blocklist-archive-scan {enable | disable} set external-blocklist-enable-all {enable | disable} set external-blocklist <source> next end
To configure malware threat feeds and outbreak prevention without performing an AV scan in the CLI:
config antivirus profile edit "Demo" set feature-set proxy set mobile-malware-db enable config http set av-scan disable set outbreak-prevention block set external-blocklist block set quarantine enable set emulator enable set content-disarm disable end config ftp set av-scan disable set outbreak-prevention block set external-blocklist block set quarantine enable set emulator enable end config imap set av-scan monitor set outbreak-prevention block set external-blocklist block set quarantine enable set emulator enable set executables default set content-disarm disable end config pop3 set av-scan monitor set outbreak-prevention block set external-blocklist block set quarantine enable set emulator enable set executables default set content-disarm disable end config smtp set av-scan monitor set outbreak-prevention block set external-blocklist block set quarantine enable set emulator enable set executables default set content-disarm disable end config mapi set av-scan monitor set outbreak-prevention block set external-blocklist block set quarantine enable set emulator enable set executables default end config nntp set av-scan disable set outbreak-prevention disable set external-blocklist disable set quarantine disable set emulator enable end config cifs set av-scan monitor set outbreak-prevention block set external-blocklist block set quarantine enable set emulator enable end config ssh set av-scan disable set outbreak-prevention disable set external-blocklist disable set quarantine disable set emulator enable end set outbreak-prevention-archive-scan enable set external-blocklist-archive-scan enable set external-blocklist-enable-all disable set external-blocklist "malhash1" set av-virus-log enable set av-block-log enable set extended-log disable set scan-mode default next end
In this example, configuring the quarantine setting is done in each protocol (set quarantine
). The malware threat feed is also specified (set external-blocklist-enable-all disable
) to the threat connector, malhash1 (set external-blocklist "malhash1"
).
To specify a malware threat feed and quarantine in the GUI:
- Go to Security Profiles > AntiVirus and click Create New.
- Enable the protocols you want to inspect.
- Enable Use external malware block list and click Specify.
- Click the + in the field and select a threat feed.
- Optionally, enable Quarantine.
- Configure the other settings as needed.
- Click OK.