Hi there folks,
Recently I've deployed Dr.Web for UNIX Internet Gateways in Version 11.1 -- working really good and with very minimal resources ! Great job.
My question today is about the Dr.Web HTTPD daemon and especially the "Threats" menu. I'm addressing Dr.Web for UNIX Internet Gateways through ICAP and that works all fine, replacement messages are displayed in the occurrence of an offending file being caught. Although, the ICAP denied entities never show's up within the "Threats" menu. My guess is that anything listed within the Threats menu would involve either SpIDer Guard or the Network Checker/File Checker -- though that only means whatever passes through the local host -- not any ICAP submissions.
Is there anything to configure to possible list the ICAP triggering Threats within the Treats menu?
If not, are the ICAP triggering submissions available through SNMP?
I would be okay with the solution temporarily "saving" the offending ICAP submissions within a local host controlled folder, which would be subsequently re-scanned by any of the available locally bound Dr.Web daemons in order to report the Threats originally gathered/found/stopped through ICAP. Possibly with a short ICAP log/timestamp.
Let me know,
Kind regards,
Thanks
m.