The Message contains "malware or malicious code" criteria allows you to create rules that take actions on messages that contain malware, worms, or other malicious code.
The Malware or Malicious Code screen appears.
Option | Description |
---|---|
Cleanable malware or malicious code |
Apply the rule to messages or attachments that contain cleanable malware. Cleanable malware are those that can be safely removed from the contents of the infected file, resulting in an uninfected copy of the original message or attachment. Warning:
Selecting Cleanable malware or malicious code as a rule criteria, and then selecting a rule action other than Delete or Clean, can result in infected messages or attachments entering your messaging environment. By default, Hosted Email Security is configured with malware rules to appropriately handle threats when it is installed. |
Uncleanables with mass-mailing behavior |
Apply the rule to messages that contain uncleanable malware, worms, or other threats that cannot be removed from messages or attachments, and that propagate by mass-mailing copies of themselves. |
Uncleanables without mass-mailing behavior |
Select the categories below as desired:
|
For details, see About Predictive Machine Learning.
By default, this option is selected.
If you enable this option, Trend Micro only checks potentially risky messages and encrypts all content before transferring any information.
See About Advanced Threat Scan Engine.
Select Enable Virtual Analyzer, and then select the security level from the drop-down list, to perform further observation and analysis for threats detected by the Advanced Threat Scan Engine.
Select Include macro, JSE and VBE scanning to include macro threats during observation and analysis.
If Virtual Analyzer is enabled, Hosted Email Security performs observation and analysis on samples in a closed environment. It takes 3 minutes on average to analyze and identify the risk of an attachment, and the time could be as long as 30 minutes for some attachments.
Hosted Email Security logs advanced threats as follows:
"Probable Advanced Threats": Suspected threats detected by the Advanced Threat Scan Engine or Social Engineering Attack Protection but not analyzed by Virtual Analyzer
Some detected files may be safe. Trend Micro recommends selecting the Quarantine action for suspected threats detected by the Advanced Threat Scan Engine.
"Analyzed Advanced Threats": Suspected threats detected by the Advanced Threat Scan Engine or Social Engineering Attack Protection and detected as the high risk by Virtual Analyzer
if theHighsecurity level is configured, then the action will be applied on all messages that exhibit any suspicious behavior.
if theMediumsecurity level is configured, then the action will be applied on messages that have moderate to high probability of being malicious.
if theLowsecurity level is configured, then the action will be applied only on messages that have high probability of being malicious.