WinGate Kaspensky Antivirus Features

Manual Scanning

Kaspersky AntiVirus for WinGate, comes with the ability to manually scan files, folders and drives on the WinGate Server or a targeted machine across the LAN, giving administrators the ability to identify possible risks at a moments notice.

Http Traffic Scanning

With WinGate handling the Internet connection, the Kaspersky AntiVirus for WinGate can scan all HTTP traffic which ensures safe surfing for users, who may stumble upon a page or website that contains viruses or links to viruses and trojans.

Easy to configure User Interface

The Kaspersky AntiVirus for WinGate, comes with an easy to use interface that allows administrators to set how WinGate will handle an infection once discovered.

Email Scanning

The Kaspersky AntiVirus for WinGate can be set to scan all inbound and outbound mail to the network that utilizes the POP3 and SMTP protocols in WinGate and its built in mail server. This ensures that all mail and attachments entering or leaving the network via WinGate will be free from viruses and trojans.

Quarantine Viewer

Apart from safely isolating files, the Quarantine comes with a built in viewer within WinGate. It can show at a glance, the viruses that have been captured, the source file of the infection, and even the user and event that caused the infection.

Easy Updater

A one button click updater, which allows administrators to ensure that they have the latest virus protection database straight from industry leaders Kaspersky Labs, ensuring the safety of the network is never compromised.

FTP Scanning

Clients are protected from infection, by Kaspersky AntiVirus for WinGate when they download suspect files via the FTP proxy. By intercepting the infected file before it has a chance to reach the client Kaspersky Antivirus for WinGate ensures infected files wont actually get through to the network.

Quarantine

Kaspersky AntiVirus for WinGate utilizes a Quarantine for the safe isolation of discovered viruses stopping them from inflicting further harm and damage to the network. It allows administrators a central location for their containment, and access if a file needs to be released for a particular reason.