Anti-Phishing Software Policy
Perform the following operations to configure and manage anti-phishing software Policy on the INC:
- Add/Modify Anti-Phishing Software Policy
- Enter the anti-phishing software policy page.
Select the User tab, and then select User Security Policy > PC Security Software Policy > Anti-Phishing from the navigation tree.
- Click the Add button or the
icon of an anti-phishing software policy.
- Configure the basic information of the anti-phishing software policy.
- Select the checkbox in the Check column of the software to check that anti-phishing software is installed and applied to the target programs (such as IE).
- Click the move up or move down icon in the Priority column to sort anti-phishing software by priority. The software in the top row has the highest priority and will be checked first.
- Click OK.
Note
- You cannot change the name or service group of an existing anti-phishing software policy.
- Delete Anti-Phishing Software Policy
- Select the User tab, and then select User Security Policy > PC Security Software Policy > Anti-Phishing from the navigation tree.
- Click the
icon of an anti-phishing software policy. A confirmation box appears.
- Click OK.
Note
- An anti-phishing software policy being used by a security policy cannot be deleted.
Precautions
- An anti-phishing software name represents a series of anti-phishing software. Users can install any software in this series.
- The iNode client checks whether any anti-phishing software in the anti-phishing software list runs on the terminal in the order of priority. If yes, the iNode client stops the check and reports the status of the anti-phishing software to the security policy server.
Related Topics