TEC Workbook - IBM
TEC Workbook - IBM
TEC Workbook - IBM
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
2.8.3 Virus Scanning<br />
<strong>IBM</strong> Software<br />
Viruses are typically contained in message attachments. XML Virus Protection sets parameters that<br />
handle the following types of attacks in attachments:<br />
● XML virus attacks<br />
● XML encapsulation attacks<br />
● Payload hijack attacks<br />
● Binary injection attacks<br />
There are two levels of protection against virus threats.<br />
● The first level is to determine whether or not to allow attachments. This is accomplished<br />
on the XML Threat Protection tab that is currently displayed in your browser in the<br />
XML Virus (X-Virus) Protection section.<br />
● If attachments are allowed, the second level of protection occurs in the processing rule. A<br />
special “Virus Scan” action will extract the attachment from the message and send it to an<br />
Internet Content Adaption Protocol (ICAP) compatible virus scanner. If the scanner<br />
responds that a virus exists in the attachment, the virus scanning action will either strip the<br />
attachment or reject the message (based on configuration settings).<br />
Lab 2 - Working with XML Page 51