Download AVG Internet Security Network

Transcript
195
AVG Internet Security Network
Again, the default rules send special messages relating to some
important events to the AVG DataCenter. These messages are reflected
in the respective dedicated overviews. For example, a test result
message is further processed according to conditions defined in the AVG
DataCenter mode (enabled/disabled passing of negative test results).
Besides this, it is possible to send a generic event message to the AVG
DataCenter. These events are recorded in the event log.
14.4. Configuration Suggestions
Please pay attention to the following suggestions for rules configuration.
Ignoring these main principles can result in serious problems, such as
network congestion, Denial of Service error occurrence on application
servers, etc.
z
For the proper AVG Internet Security Network Edition functionality we
recommend that you keep the specific notifications sending action in default
rules. If you want to disable this action you should have an actual serious
reason to do so. For generic text notification sending we recommend creating
a new rule!
z
Using the E-mail action is recommended only for exceptional situations, such
as virus detection by the Resident Shield on a mission critical system.
Otherwise, the load generated by E-mail sending action can congest a
recipient’s mailbox and overload the mail server. The final damage can then
be greater than the potential one caused by a successfully captured virus.
z
Generally, use of automatic actions is not recommended in the Dialog for
Resident Shield option. Deletion of system-essential files can result in
unwanted system or application failures without informing the user of possible
reasons for such a situation. Moreover, the user is not informed in case a virus
epidemic is caused by dangerous or irresponsible behavior, such as browsing
untrustworthy websites or the launching of unknown applications.
z
Before implementing a rule in a larger network we recommend testing the rule
in a testing environment first. Particularly, it is necessary to evaluate the
potential impact of a newly-created rule on the network resources – mail
servers, free disk space, number of event records in operating system Event
Log and so on.
www.grisoft.com
Copyright (c) 1992-2006 GRISOFT, s.r.o. All rights reserved.