The following are enabled:
            
            Other global settings
            
               - 
                  
                  Guest accounts are disabled 
- 
                  
                  IWSVA uses IP address as the User ID method 
- 
                  
                  The Quarantine folder located at /var/iwss/Quarantine 
Application Control
            
            HTTPS Decryption
            
            HTTP Inspection
            
               - 
                  
                  HTTP Scanning is disabled by default 
- 
                  
                  HTTP Inspection has six default filters 
- 
                  
                  All filters' default action is "Allow (Scan)" 
HTTP virus scanning
            
               - 
                  
                  HTTP Scanning is enabled 
- 
                  
                  No files are blocked 
- 
                  
                  All files are scanned 
- 
                  
                  Block compressed files with more than 50,000 files when expanded 
- 
                  
                  Block compressed files that will be larger than 200 MB when expanded 
- 
                  
                  Block compressed files with more than 10 layers of compression 
- 
                  
                  IWSVA handles large files as follows: 
- 
                  
                  Web Reputation is enabled 
- 
                  
                  Application Control is enabled 
                     - 
                        
                        No application is blocked in the global policy. 
- 
                        
                        The allow and block logs are disabled. 
- 
                        
                        The block log interval is five minutes. 
 
Virus scanning actions
            
               - 
                  
                  Clean virus-infected files 
- 
                  
                  Delete harmful files that cannot be cleaned, for example worms, and Trojans 
- 
                  
                  Pass (ignore) password-protected files 
- 
                  
                  Ignore files containing macros 
Java scanning (Malicious Mobile Code (MMC) module)
            
               - 
                  
                  Valid signature, trusted certificate: Pass applet 
- 
                  
                  Valid signature, flagged certificate: Block applet 
- 
                  
                  No signature: Open applet and examine code 
- 
                  
                  Invalid signature: Block applet 
- 
                  
                  IWSVA validates an applet signature by checking the expiration date of all certificates
                     in the chain 
- 
                  
                  IWSVA strips certificates that it cannot verify (trust) 
- 
                  
                  IWSVA allows to connect back to the originating server 
- 
                  
                  It does not allow an applet to write or read data on a local disk, or to bind to a
                     local port 
Additional behaviors:
            
               - 
                  
                  Applets cannot create new thread groups 
- 
                  
                  Applets cannot create unlimited threads (maximum 8) 
- 
                  
                  Applets cannot create unlimited active windows (maximum 5) 
- 
                  
                  Applets are left unsigned after instrumentation 
ActiveX security rules and settings
            
               - 
                  
                  For the .cab file type IWSVA will block flagged and invalid signatures 
- 
                  
                  For these file types (.exe, .ocx) IWSVA will block invalid signatures 
- 
                  
                  Check the expiration date of the signing certificate 
- 
                  
                  Check the revocation status of the certificate 
- 
                  
                  If unable to check the revocation status, set status to valid 
URL filtering policies
            
               - 
                  
                  URL filtering is enabled 
- 
                  
                  If you select the "block w/override" action, the default password is blank. You must
                     enter a password. 
- 
                  
                  If you select the "time limit" action, the default time limit is 0 minutes. 
- 
                  
                  Global and guest policies block the following sites (under the company prohibited
                     rule): 
                     - 
                        
                        Known "Dialer" sites, 
- 
                        
                        Disease vectors 
- 
                        
                        Known virus accomplice content 
- 
                        
                        Illegal drug content 
- 
                        
                        Violence , hate, and racism content 
- 
                        
                        Adult/matured content 
- 
                        
                        Nudity, Intimate Apparel/Swimsuit 
- 
                        
                        Sex Education 
- 
                        
                        Pornography 
 
- 
                  
                  The setting of Safe Search is off for each search engine 
URL Access Control
            
            FTP scanning
            
               - 
                  
                  FTP scanning is enabled (uploads and downloads) 
- 
                  
                  No file are blocked 
- 
                  
                  All files are scanned 
- 
                  
                  Block compressed files with more than 50,000 files when expanded 
- 
                  
                  Block compressed files that will be larger than 200 MB when expanded 
- 
                  
                  Block compressed files with more than 10 layers of compression 
- 
                  
                  IWSVA handles large files as follows: 
Virus scanning actions
            
               - 
                  
                  Clean virus-infected files 
- 
                  
                  Encrypts quarantined files 
- 
                  
                  Does not scan spyware/grayware 
- 
                  
                  Deletes harmful files that cannot be cleaned (such as worms and Trojans) 
- 
                  
                  Quarantines password-protected files 
- 
                  
                  Ignores files that contain a macro 
Reports and Logs
            
               - 
                  
                  Stores report logs to database, purges those older than 30 days 
- 
                  
                  Includes performance data 
- 
                  
                  Purges logs older than five days 
Updates
            
               - 
                  
                  Checks hourly for bot pattern, Smart Scan Agent pattern, Protocol Information Extraction
                     pattern, virus, spyware, and IntelliTrap, IntelliTrap exception updates 
- 
                  
                  Checks weekly for scan engine, Advanced Threat Scan Engine, and URL filtering engine
                     updates 
Notifications