Spyware and Grayware Scan Rules

HTTP > HTTP Malware Scan > Policies | Policy | Spyware/Grayware Scan Rule

Spyware, phish, and other so-called grayware threats are beginning to surpass viruses, Trojans and worms in terms of prevalence and risk level. IWSVA can help enforce your right to prevent unwanted or unauthorized software from entering your network. In addition, you can break down your "virus" reports by threat type, and IWSVA can take different actions according to the threat type.

You can also have IWSVA work in conjunction with a Damage Cleanup Server installed on the network to protect against malware being brought into the network, such as on an laptop from the outside, or through a chat client. The following is a list of related topics:

See also: