Best State of Art IT Security Solutions
The best Innovative and powerful IT Security products

SecPoint Products / Protector /

Protector UTM VPN Firewall Appliance Questions FAQ Part 3

Get Answers to your questions about Protector UTM Appliance.

Always contact us on Live Chat or email us if more help is required.

Right side menu has a complete list of pages.

The FAQ Questions and answers can help you identify your IT Security question and get a reply to it.

If your question is not in the list please do not hesitate to contact us so we can help you as fast as possible.

Updated IT Security questions for vulnerability scanning, vulnerability assessment and UTM firewall.

How can MCP Rules benefit when performing spam scanning operation

The MCP Message Content Protection module allows a user to look for a specific text in an email header or body content.

How can you configure a firewall for your network easily?

The Anti Virus appliance module can not just scan incoming and outgoing but mails.

When emails are being scanned incoming or outgoing you can add your own custom signature in each email.

You can choose to remove the signature and keep the mails as original or example add your company logo or stamp to all emails.

It can also scan protocols for virus. This includes example FTP traffic running on port TCP 21, SMB traffic and other types of protocols.

If you are getting high amount of email spam from specific domains or being hammered from different IP addresses you can easily stop those attacks on the UTM Appliance. You can block both single IP addresses or IP ranges. It is also possible to block single Email addresses or full email domains and then keep your site clean.

You can also block spam coming from an entire country example if you get spam from China, Russia, Nigeria or other countries.

With our live chat a security professional can you help you fast

Utm firewall Appliance 

➤ Related pages
Anti Virus vendors supported
Block gplus Google Plus
Captive Portal
Categories Intrusion Prevention
How to block social media?
How to block twitter?
How to Install a Firewall
Network Access Control NAC
Secure my server
Telephony Company Security
Web Filter
What is Bridge mode?
What is NAC?
What is the weakness of a firewall?
What is UTM firewall?
White list black list IP

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef