t_test_eicar_file
The European Institute for Computer Antivirus Research (EICAR) has developed a test virus to test your antivirus appliance. This script is an inert text file. The binary pattern is included in the virus pattern file from most antivirus vendors. The test virus is not a virus and does not contain any program code.
Never use real viruses to test your Internet security.
Download the EICAR test virus from one of the following URLs:
Alternatively, you can create your own EICAR test virus by typing or copying the following into a text file, and then naming the file eicar.com:
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
Flush the local browser cache before testing. If the local browser cache contains a copy of the test virus, it is possible an attempt to download the file would get the file from the cache, rather than getting it from the Internet, and Deep Edge would not detect the file.
Log on to the Deep Edge web console.
Click Policies > Rules > Add New.
Type a Policy Name and Description.
Check the Enable and Enable log check boxes.
Click the Action tab. Set the action to Allow with Inspection. Click OK.
For the same policy, click the Profile tab and set the Anti-Malware profile to the Default Profile, and the WRS profile to the Default Profile.
Click URL Filtering Profile > Add New.
Add a new URL Filtering Profile with the following steps:
Type a Name and Description.
Click Adult in the URL filtering category.
Click All in the Adult URL filtering rules to select all.
Click OK.
In the Profile tab, choose the newly added URL Filtering profile.
Click OK and click Apply at the top of the page.
Use a test client to access the following website and download a test virus:
http://www.eicar.org/download/eicar.com.txt
Use a test client machine to access the following website twice:
Use a test client machine to access the following website twice.
Wait 30 seconds and go to Logs & Reports > Log Query > Violation Log.
Go to Policy > Rules.
Delete the added policy, click OK, and then click Apply.
See also: