eScan BlogeScan Blog    eScan WebsiteeScan Website    eScan ForumeScan Forum    eScan FeedseScan Feeds     
    
Languages:     

From eScan Wiki

(Difference between revisions)
Jump to: navigation, search

Revision as of 11:05, 30 August 2008

Web Anti-Virus (Web Traffic Control) - Shows the current status of the Web Traffic Control Protection level. The green color right tick mark denotes that the module is “Active” while the red color cross mark displays that the module is “InActive”.

On the Web Anti-Virus (Web Traffic Control) option page in the “Configuration” section, when clicked on the “Settings” option, one can change the Web Anti-Virus (Web Traffic Control) Protection level, whereas clicking on the “Start” and /or “Stop” option (next to Settings) makes the module “Active” and /or “InActive”.

The “Block Web Access” option can be found between the “Start” and “Settings”options and enables you to block the web access completely (no internet access at all).

Configuration section -

When clicked on “Settings” the below options are available, through which the eScan software’s real-time Web Traffic Scanning protection can be customized -

a. Webpage Filtering:-

This option helps in controlling and blocking access to the Web as listed below -

i) Filtering options -

This section has pre-defined categories that help to control and block access to the Web -

1. Pornography -

This helps to control and block access to the web based on pornographic content. On selection of this category, it displays the words/phrases defined along with the site names that when found to be accessed would result in Blocking of Access or "Access Denied" to the site desired. The words and phrases and /or sites defined can be added or deleted based on requirements.

2. Gambling –

This helps to control and block access to the web based on gambling content. On selection of this category, it displays the words/phrases defined and when found to be accessed would result in Blocking of Access or "Access Denied" to the site desired.

The words and phrases defined can be added or deleted based on requirements.

3. Ratings_block_category –

This helps to control and block access to the web and is kept open for any words/phrases and site names to be added to the words /phrases and to the site name list.

4. Websites Allowed –

This category contains list of sites that are allowed to be accessed and not blocked. The site names listed within can be customized as per requirements.

  • All the above four (1-4) categories listed are pre-defined.


5. Chat –

This helps to control and block access to the web based on chat. On selection of this category, it displays the words/phrases defined that when found to be accessed would result in Blocking of Access or "Access Denied" to the site desired.

The words and phrases defined can be added or deleted based on requirements.

6. Alcohol –

This helps to control and block access to the web based on alcohol. On selection of this category, it displays the words/phrases defined that when found to be accessed would result in Blocking of Access or "Access Denied" to the site desired.

The words and phrases defined can be added or deleted based on requirements.

7. Violence –

This helps to control and block access to the web based on violence. On selection of this category, it displays the words/phrases defined that when found to be accessed would result in Blocking of Access or "Access Denied" to the site desired.

The words and phrases defined can be added or deleted based on requirements.

8. Drugs –

This helps to control and block access to the web based on drugs. On selection of this category, it displays the words/phrases defined that when found to be accessed would result in Blocking of Access or "Access Denied" to the site desired.

The words and phrases defined can be added or deleted based on requirements.

• All the above four (5-8) categories listed are customized.

• The sites that are denied access to would automatically be added to the Block category to be filtered.


ii) Scanning options –

When clicked on, it has many sub- features and functionalities that help to control and block access to the web.

There are different options available like "Content Matching Options", "Content Type", "ActiveX Blocking", "Port Setting", "Rating Systems" and "Actions"

1. Content Matching Options -

this option is helpful in controlling and blocking access to the web based on matching content and which works on different criterias:-

a. Search in Site Name -

The site name or url typed would be checked if it is listed in the restricted or blocked categories.

b. Search in HTML Tags -

The HTML tags would be checked if they contains any restricted or blocked words/phrases or site names.

c. Search in Title -

The title would be checked if it contains any restricted or blcoked words/phrases or site names.

d. Search in Page Text -

The web page text would be checked if it contains any restricted or blocked words/phrases.

e. Search in Description and Keywords -

The restricted or blocked words/phrases would be checked in the website's description and keywords.

f. Reserved Word Threshold Level -

This is a threshold level/limit set within the software that keeps a count of how many times a restricted or blocked word/s appears, if the set word/s have appeared as per the default value or more the access to the web is blocked or restricted and vice versa.




Content Type -

This option is helpful in controlling and blocking access to the web based on the type of content and which works on different criterias:-

a. Block Images -

Images on websites will be blocked from being viewed

i) Saving on Internet Bandwidth -

For example - to view an image that we like, we would click on it and enlarge it as a result eating up internet bandwidth.

ii) Secure -

The system and data from malwares like spywares, adwares, trojans, etc... - that creep onto the system when surfing and exploit vulnerabilities of the operating system and the applications installed on them.

iii) Degradation of the system (performance).


b. Block Applications -

Applications on websites will be blocked from being run / executed

i) Saving on Internet Bandwidth -

For example - to view an image that we like, we would click on it and enlarge it as a result eating up internet bandwidth.

ii) Secure -

The system and data from malwares like spywares, adwares, trojans, etc... that creep onto the system when surfing and exploit vulnerabilities of the operating system and the applications installed on them.

iii) Degradation of the system (performance).


c. Block eMails (RFC 822) -

Messages of RFC 822 would be blocked by default.

d. Block Audio files -

Audio files on websites will be blocked from being run / executed.

i) Saving on Internet Bandwidth -

for example - listening to a audio available on the website, we would click on it and start listening as a result eating up internet bandwidth.

ii) Secure -

The system and data from malwares like spywares, adwares, trojans, etc... that creep onto the system when surfing and exploit vulnerabilities of the operating system and the applications installed on them.

iii) Degradation of the system (performance).


e. Block Video files -

Video files on websites will be blocked from being run / executed.

i) Saving on Internet Bandwidth -

For example - to view and listen to a video available on the website, we would click on it and start viewing and listening as a result eating up internet bandwidth.

ii) Secure -

The system and data from malwares like spywares, adwares, trojans, etc... that creep onto the system when surfing and exploit vulnerabilities of the operating system and the applications installed on them.

iii) Degradation of the system (performance).



ActiveX Blocking -

ActiveX is a technology developed by Microsoft. With an ActiveX-enabled browser, ActiveX controls can be downloaded as part of a Web document to add functionality to the browser (similar to Java applets).

a. Java Applets -

Java is a programming language from Sun Microsystems and in which an applet is written, it can be included in an HTML page, much in the same way an image is included in a page. When you use a Java technology-enabled browser to view a page that contains an applet, the applet's code is transferred to your system and executed by the browser. For example - to enhance interactive control, primarily in Web browsers and other network-oriented interactive software applications.

b. Scripts (Java and VB) -

Is a list of commands that can be executed without user interaction, to automate certain application tasks or to work in a particular computing environment/scenario. So, when any script be it Java or VB (Visual Basic) is found to contain any malicious code, it is blocked.

This option is very useful in blocking programs that trigger or execute themselves when a website is being viewed.

c. Check for virus -

This is the default action set. This option scans and blocks all activities carried out while browsing (reading of data on the website, downloading the files, etc...) if found to contain any malicious code.


Port Setting -

Internet Access (HTTP Port) - 80,8080,3128,6588,4480,88.

These are the different ports defined within the software that are monitored for any data transfer that happens through them and if it contains any malicious data, it is blocked. You can add or delete the ports as per your requirements.



Rating Systems -

This option is not enabled by default. When enabled, this option allows each user or the administrator to set for each user, of how he/ she should access content on the web. These suggestions (advice) are laid down by World Renowned Organisations that cater to Content Filtering on the Internet, viz. RSACi, ICRA, SafeSurf.

a. RSACi -

Based on the study and work of Dr.Donal F. Roberts of Stanford University on the effects of media on children for nearly 20 years certain guidelines were laid, based on which "Recreational Software Advisory Council" (RSAC) was formed. Is a rating service of websites for content on the Internet.

b. ICRA - "Internet Content Rating Association" (ICRA) -

came into existence to protect children from harmful content on the internet. Is a global, cross-cultural filtering and rating service of websites for content on the Internet.

c. SAFESURF -

Designed with inputs from millions of users (parents) and Net Citizens to empower each family to make informed decisions concerning accessibility of content on the Internet.


6. Actions -

All of the above criteria are checked when enabled and if any violation is found appropriate action is taken.

a. Log Violations -

All violations are logged for easy administration and for future reference.

b. Shutdown program in 30 seconds -

If any of the rules/policies that are defined are found to be violated, then the software has a in-built functionality to automatically shutdown the program (browser) in 30 seconds.


iii) Time Restriction -

This option is set as per requirement. This option helps to customize the access to the web based on time or as per the day of the week or daily, for example - access to the web should be allowed everyday only during lunch hours and blocked otherwise.


  • Block Web Access:-

The “Block Web Access” option can be found between the “Start” and “Settings” options and enables you to block the web access completely (no internet access at all).

When enabled, it blocks access to the web completely. If the need arises, access to the web can be given on a conditional basis, for example - access to the web can be given only to certain websites like www.hotmail.com, yahoo.*, gmail.com, etc... and not others.

This conditional access is applied through the "Websites_Allowed Category”, for which the site names can be customized to the list as per requirements.




b. Popup Filtering:-

This option enables in blocking popup’s on Websites -

i) Notification -

This section helps in notifying the user when a popup is blocked on Websites with other options as explained below -

It has different options like "Block Popup", "Beep via PC Speaker", "Play Sound", "White List" and "History Logs".

1) Block Popup -

This option is not enabled by default. This option is very useful in many ways

i) Saving on Internet Bandwidth - for example - for a popup to appear on the desktop screen, it would utilize the internet bandwidth, thus eating up the internet bandwidth.

ii) Secure the system and data from malwares like spywares, adwares, trojans, etc... that creep onto the system when popups are viewed /opened, exploiting the vulnerabilities of the operating system and the applications installed on them.

iii) Degradation of the system (performance).


2) Beep via PC Speaker -

This option is not enabled by default. This option would beep (makes a sound)when a popup is encountered and filtered/blocked.


3) Play Sound -

This option is not enabled by default. This option will play a sound when a popup is encountered and filtered/blocked.

4) White List -

This is a white list that holds the website addresses where the popup's appear (are not filtered /blocked).


There are different options within:-

1. Add -

This option enables the user or administrator to add a website to the White List so that the next time when this website is accessed, popup's appear, are visible.

2. Delete -

This option enables the user or administrator to delete a website from the White List so that the next time when the same website is accessed, it gets filtered /blocked.

3. Remove All -

This option enables the user or administrator to remove all listed websites from the White List so that when any of these websites are being accessed and a popup tries to appear, they are filtered /blocked.

4. Browse -

This option enables the user to browse any of the listed websites in the White List.


iii) History Logs:

All activity related to popup's (allowed /blocked) is logged for future reference.

1. Log Violations -

All violations that occured are logged for future reference like for which user the popup was blocked along with date & time, website(url) address, reason for blocking and offensive word.

2. Add to White List -

This is a option that enables the user or administrator to add the violated (blocked) popup website to the White (allowed)list.

3 Clear Log -

This option will clear the log file completely (empty).

4. Browse -

This option enables the user to browse the listed websites.

5. Refresh Log -

This option refreshes the logs and displays the latest status.


At the bottom end of the same page, there are other options available like -

1. Hot Key -

Allows you to assign a key that when kept pressed temporarily allows popup's on the website being accessed.

2. Test Popup -

This option opens up a page on our website where you can test the efficacy and userfulnees of this popup filter (there are five different types of popup's displayed).

3. Default -

This option resets all the settings to the original (all latest changes made will be lost).


At the bottom end of this Web Anti-Virus (Web Traffic Control) option page in the “Reports” section, there are different options available like “View Web Anti-Virus Log” and “View Popup Log”.



2. Reports section - The below options are available within -

a. View Web Anti-Virus Log -

This displays the web scan activity done on the system in detail like the user, date and time, url, reason, word, etc…on which the violation was found.

b. View Popup Log –

This displays the popup scan activity done on the system in detail like the user, date and time, url, reason, word, etc…on which the violation was found.

Along with the above statistical reports, it also displays the total sites scanned and number of sites blocked and last site scanned.


eScan Copyright © 2015 MicroWorld Technologies Inc.- AntiVirus & Content Security.       Send your feedback to solutions@escanav.com eScan Wiki

    Privacy policy  About eScan Wiki  Disclaimers