SecPoint Products / Protector / Protector Questions FAQ Part3 /
The Protector UTM Appliance Intrusion Prevention
has the following categories.
You can enable or disable and configure as you like.
Due to the powerfully CPU it can do deep scanning.
Backdoor Attacks | |
Bad-traffic | |
DNS | |
DOS | |
DDOS | |
Exploit | |
All Finger | |
Finger | |
FTP Attacks | |
FTP | |
TFTP | |
ICMP | |
IMAP attacks | |
IMAP | |
Mail attacks | |
SMTP | |
MYSQL | |
NETBIOS | |
NNTP | |
Oracle | |
POP2 | |
POP3 attacks | |
POP3 | |
RPC | |
Remote Services | |
RTSP | |
SCAN | |
Shellcode | |
SNMP | |
SQL | |
TELNET | |
UPNP | |
Virus | |
WEB CGI | |
WEB CGI DOS | |
WEB Attacks | |
WEB CGI COMMON | |
WEB Coldfusion | |
WEB IIS | |
WEB Frontpage | |
WEB Misc | |
WEB Client | |
WEB PHP | |
WEB Attacks | |
X11 |