Перейти к содержимому


Фото
- - - - -

Dr.Web for UNIX Internet Gateways -- a few questions


  • Please log in to reply
1 ответов в теме

#1 mokaz

mokaz

    Newbie

  • Members
  • 1 Сообщений:

Отправлено 22 Март 2024 - 11:29

Hi there folks,

 

Recently I've deployed Dr.Web for UNIX Internet Gateways in Version 11.1 -- working really good and with very minimal resources ! Great job.

 

My question today is about the Dr.Web HTTPD daemon and especially the "Threats" menu. I'm addressing Dr.Web for UNIX Internet Gateways through ICAP and that works all fine, replacement messages are displayed in the occurrence of an offending file being caught. Although, the ICAP denied entities never show's up within the "Threats" menu. My guess is that anything listed within the Threats menu would involve either SpIDer Guard or the Network Checker/File Checker -- though that only means whatever passes through the local host -- not any ICAP submissions.

 

Is there anything to configure to possible list the ICAP triggering Threats within the Treats menu?

If not, are the ICAP triggering submissions available through SNMP?

 

I would be okay with the solution temporarily "saving" the offending ICAP submissions within a local host controlled folder, which would be subsequently re-scanned by any of the available locally bound Dr.Web daemons in order to report the Threats originally gathered/found/stopped through ICAP. Possibly with a short ICAP log/timestamp.

 

Let me know,

Kind regards,

Thanks

m.



#2 Igorn

Igorn

    Advanced Member

  • Dr.Web Staff
  • 514 Сообщений:

Отправлено 27 Март 2024 - 12:12

Is there anything to configure to possible list the ICAP triggering Threats within the Treats menu?

No, you can see only threats in the filesystem

 

 

 

If not, are the ICAP triggering submissions available through SNMP?

Yes. see https://cdn-download.drweb.com/pub/drweb/unix/gateway/11.1/documentation/html/en/index.html?snmpd.htm  to configure

 

 

 

I would be okay with the solution temporarily "saving" the offending ICAP submissions within a local host controlled folder, which would be subsequently re-scanned by any of the available locally bound Dr.Web daemons in order to report the Threats originally gathered/found/stopped through ICAP. Possibly with a short ICAP log/timestamp.

For this case, we do not support local saving. You can see information about these detects  in our log


Сообщение было изменено Igorn: 27 Март 2024 - 12:15



Читают тему: 2

0 пользователей, 1 гостей, 0 скрытых


    Bing (1)