23.02.2013 Views

TEC Workbook - IBM

TEC Workbook - IBM

TEC Workbook - IBM

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2.8.3 Virus Scanning<br />

<strong>IBM</strong> Software<br />

Viruses are typically contained in message attachments. XML Virus Protection sets parameters that<br />

handle the following types of attacks in attachments:<br />

● XML virus attacks<br />

● XML encapsulation attacks<br />

● Payload hijack attacks<br />

● Binary injection attacks<br />

There are two levels of protection against virus threats.<br />

● The first level is to determine whether or not to allow attachments. This is accomplished<br />

on the XML Threat Protection tab that is currently displayed in your browser in the<br />

XML Virus (X-Virus) Protection section.<br />

● If attachments are allowed, the second level of protection occurs in the processing rule. A<br />

special “Virus Scan” action will extract the attachment from the message and send it to an<br />

Internet Content Adaption Protocol (ICAP) compatible virus scanner. If the scanner<br />

responds that a virus exists in the attachment, the virus scanning action will either strip the<br />

attachment or reject the message (based on configuration settings).<br />

Lab 2 - Working with XML Page 51

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!