Skip to main content
Versa Networks

Configure SD-WAN Malware Protection Policies

Versa-logo-release-icon.pngFor supported software information, click here.

You can configure malware protection policies to detect and prevent malware threats. You then associate the policies with basic or standard master profiles. For more information, see Configure Profiles.

Note that when you configure master profiles and subprofiles, malware protection policies are referred to as antivirus policies.

To configure a malware protection policy:

  1. In Tenant view, go to the Configure lifecycle in the left menu bar.

    Configure_sdwan_profileelements_security_malware_menu.png
     
  2. Select Secure SD-WAN > Profile Elements > Policies > Security >Malware Protection.
    • If you have not yet configured a malware protection policy, the following screen displays. Click Create Malware Protection Profile to display the Add Malware Protection Profile screen. Continue with Step 4.

      Add_malware_profile_first_time.png
       
    • If you have configured one or more malware policies, the Malware Protection Profile screen displays the policies that are already configured.

      Malware_protection_profiles_main_screen.png
       
  3. In the horizontal menu bar, you can select one of the following operations.
     
    Operation Description
    + Add Create a new malware protection policy. This button is active when no existing profile is selected.
    Clone

    Clone the selected malware protection policy. A popup window similar to the following displays.

     

    Malware_clone_popup.png

     

    Rename the default name of the cloned policy (here, Copy_of_TestMalProf), if needed, and then click Submit.

    Delete

    Delete the selected malware protection policy. A popup window similar to the following displays.
     

    Delete_malware_profile_popup_window.png
     

    Click Yes to delete the policy, or click No to retain the profile.

    Refresh Refresh the list of existing policies.
    More Actions

    Perform an action on the selected malware protection policy:

    Select Columns

    To select the columns that you want to display, click the down arrow. To return to the default column selection, click Reset.

     

    Columns_menu.png


    The column headings are:

    • Action
    • Direction
    • File Types
    • Last Modified
    • Protocols
    • Version
  4. Click add_icon.png Add to create a new malware protection policy. A policy consists of one or more match criteria, an action, and permissions. The following screen displays.

    Add_malware_protection_profile_popup_step1_choose_protocols.png
     
  5. In Step 1, File Type and Protocol, select the protocols to scan for malware. Use the search box to find specific protocol types. Check the Select All box to select all protocol types.

    Malware_protection_profiles_step1_choose_file_types.png
  6. Select the types of files to scan for malware. Use the search box to find specific file types. Check the Select All box to select all file types.

    Malware_protection_profiles_step1_choose_traffic_direction.png
     
  7. Scroll to the bottom of the screen, and then click the direction of the traffic on which to perform the malware scan.
  8. Click Next to go to Step 2, Enforcement. You can define the default enforcement actions to take on traffic that meets the previously selected match conditions. The following screen displays the available enforcement actions.

    Malware_protection_profiles_step2_choose_action.png
     
  9. Select the action to enforce when traffic matches the protocols, file types, and traffic direction you selected in Step 1, File Types and Protocol:
    • Alert—Allow the file to pass and log the action.
    • Allow—Allow the file to pass without logging the action.
    • Deny—Do not allow the file to pass and log the action. This is the default.
    • Recommended Action—FTP and HTTP traffic is set to Deny. Email traffic (SMTP, IMAP, POP3, and MAPI) is set to Alert.
    • Reject—Reset the connection to the server and client, and log the action.
  1. Click Next to go to Step 3, Permissions. You can select malware protection policy permissions for each Concerto role.

    Malware_protection_profiles_step3_choose_permissions.png
     
  2. Enter information for the following fields.
     
    Field Description
    Enterprise Administrator

    Select a malware policy permission for user accounts with the Enterprise Administrator role:

    • Edit—User can view and change malware policies.
    • Hide—User cannot view malware policies.
    • Read—User can view malware policies.

    Default: Edit

    Service Provider Administrator

    Select a malware policy permission for user accounts with the Service Provider Administrator role:

    • Edit—User can view and change malware policies.
    • Hide—User cannot view malware policies.
    • Read—User can view malware policies.

    Default: Edit

    Service Provider Operator

    Select a malware policy permission for user accounts with the Service Provider Operator role:

    • Edit—User can view and change malware policies.
    • Hide—User cannot view malware policies.
    • Read—User can view malware policies.

    Default: Read

    Enterprise Operator

    Select a malware policy permission for user accounts with the Enterprise Administrator role:

    • Edit—User can view and change malware policies.
    • Hide—User cannot view malware policies.
    • Read—User can view malware policies.

    Default: Read

     
  3. Click Next to go to Step 4, Review and Submit.
  4. In the General box, enter a name for the malware protection policy. You can also enter a text description for the policy and one or more tags. A tag is an alphanumeric text descriptor with no spaces or special characters. You can specify multiple tags added for the same object. The tags are used for searching the objects.
  5. Review the settings you have selected. Click the pencil-icon-blue-on-white.png Edit icon to change a setting, as needed.
  6. Click Save to create the malware protection policy.

Supported Software Information

Releases 12.1.1 and later support all content described in this article.