Advanced Cyber Security

SecPoint Products / Protector /

Protector UTM VPN Firewall Appliance Questions FAQ Part 3

Get Answers to your questions about Protector UTM Appliance.

Always contact us on Live Chat or email us if more help is required.

Right side menu has a complete list of pages.

The FAQ Questions and answers can help you identify your IT Security question and get a reply to it.

If your question is not in the list please do not hesitate to contact us so we can help you as fast as possible.

Updated IT Security questions for vulnerability scanning, vulnerability assessment and UTM firewall.

How can MCP Rules benefit when performing spam scanning operation

The MCP Message Content Protection module allows a user to look for a specific text in an email header or body content.

How can you configure a firewall for your network easily?

The Anti Virus appliance module can not just scan incoming and outgoing but mails.

When emails are being scanned incoming or outgoing you can add your own custom signature in each email.

You can choose to remove the signature and keep the mails as original or example add your company logo or stamp to all emails.

It can also scan protocols for virus. This includes example FTP traffic running on port TCP 21, SMB traffic and other types of protocols.

If you are getting high amount of email spam from specific domains or being hammered from different IP addresses you can easily stop those attacks on the UTM Appliance. Y

ou can block both single IP addresses or IP ranges. It is also possible to block single Email addresses or full email domains and then keep your site clean.

You can also block spam coming from an entire country example if you get spam from China, Russia, Nigeria or other countries.

With our live chat a security professional can you help you fast

Pricing Click Here ->

Buy from a VAR or VAD Click Here ->

Get a Free Vulnerability Scan Click Here ->

Ingenco2 Trustmark SecPoint Trustpilot Emaerket

➤ Related Pages

Anti Virus vendors supported
Block gplus Google Plus
Captive Portal
How to Install a Firewall
How to block social media?
How to block twitter?
Network Access Control NAC
Secure my server
Telephony Company Security
What is Bridge mode?
What is NAC?
What is UTM firewall?
What is the weakness of a firewall?
White list black list IP