Protection Modules
Describes configuration of the Vulnerability ProtectionDeep Security protection modules.
- The Anti-Malware module protects your computers from viruses, trojans, spyware and other software that is intended to harm your computer or perform operations without your consent.
- The Web Reputation module protects against web threats by blocking access to malicious URLs. Vulnerability ProtectionDeep Security uses Trend Micro's Web security databases from Smart Protection Network sources to check the reputation of Web sites that users are attempting to access. The Web site's reputation is correlated with the specific Web reputation policy enforced on the computer. Depending on the Web Reputation Security Level being enforced, Deep
Security will either block or allow access to the URL.
- The Firewall is a bidirectional, stateful firewall that is responsible for making sure that packets originating from unauthorized sources do not reach the applications on its host.
- The Intrusion Prevention module protects computers from being exploited by attacks against known and zero-day vulnerability attacks as well as against SQL injections attacks, cross-site scripting attacks, and other web application vulnerabilities. It shields vulnerabilities until code fixes can be completed. It identifies malicious software and increases visibility into, or control over, applications accessing the
network.
- The Integrity Monitoring module allows you to monitor specific areas on a computer for changes. Vulnerability ProtectionDeep Security has the ability to monitor installed software, running services, processes, files, directories, listening ports, registry keys, and registry values. It functions by performing a baseline scan of the areas on the computer specified in the assigned rules and then periodically rescanning those areas to look for changes. The Vulnerability ProtectionDeep Security
Manager ships with predefined Integrity Monitoring Rules and new Integrity Monitoring Rules are provided in Security Updates.
- The Log Inspection module allows you to monitor the logs and events generated by the operating systems and applications running on the computers. Log Inspection Rules can be assigned directly to computers or can be made part of a Security Profile. Like Integrity Monitoring Events, Log Inspection events can be configured to generate alerts in the Vulnerability ProtectionDeep Security Manager.
- The SAP integration module allows you to integrate Deep Security with SAP NetWeaver.