We have a thin client environment, and have been desperately awaiting the filer AV products, as we cannot put scanners on our metaframe boxes, or desktops, so that only leaves the filers !! Up until now we have been carrying out daily scans of the filers, but with this new stuff our problem is soved !! (Hopefully).
Jon Dodman
Server Technology Services Office +44 (0) 1473 222445 Mobile +44 (0) 771 8149324 dodmanj@willis.com
Brian Tao taob@risc.org@mathworks.com on 11/04/2001 19:45:03
Sent by: owner-toasters@mathworks.com
To: jamie rishaw jrishaw@playboy.com cc: "'toasters@mathworks.com'" toasters@mathworks.com bcc:
Subject: Re: Symantec CarrierScan info.
On Wed, 11 Apr 2001, jamie rishaw wrote:
- The product, CarrierScan, sits on a box, like an NT box.
- RPC is set up between the NT box and the Filer (ontap 6.1)
- Any time a new file is introduced, modified, etc, the file is piped to CarrierScan. CarrierScan scans the file (with Norton).
It sounds like the upcoming TrendMicro product takes the same approach as well (their ServerProtect (?) product for the filers, not the thing for the NetCache).
I have a couple outstanding questions with them, like what CarrierScan's abilities and action "flow" is when it finds an infected file (send e-mail, send an snmp trap, etc), but all in all I'm kind of jazzed on it.
If it is a fairly large or complex file scan (like, say, a big ZIP archive), what does the end user see when they try to access the file? Nothing? Or is there some mechanism in CIFS or MS-RFC to pop up a dialog box on the client side with a progress meter?
It's obviously not a cheap product, but it seems logical to have one central point to manage and protect against virii. Integration of that into an already central file storage system is icing.
Definitely... I'm excited about this level of integration.
Don't want to sound like an ad for Symantec, but this product seems damn cool so far, and it runs on both the filer and netcache. The two of them working together would make an enterprise pretty bulletproof.
I was just thinking the same thing, and we are investigating moving to diskless thin client desktops, preventing people from even introducing a virus via modem or floppy and saving it to their local C: drive. -- Brian Tao (BT300, taob@risc.org) "Though this be madness, yet there is method in't"
______________________________________________________________________
The information in this email and in any attachments is confidential and may be privileged. If you are not the intended recipient, please destroy this message, delete any copies held on your systems and notify the sender immediately. You should not retain, copy or use this email for any purpose, nor disclose all or any part of its content to any other person.