Eicar zip archives virus test files and TMG’s malware inspection Attempt to clean files that are found to be infected option

本文记录了Forefront TMG 2010部署中对Eicar病毒测试文件的访问尝试及TMG的恶意软件检查功能。文章详细描述了当尝试下载已知的Eicar病毒测试ZIP文件时的行为变化,并探讨了TMG设置中尝试清理被感染文件选项的影响。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

Eicar zip archives virus test files and TMG’s malware inspection Attempt to clean files that are found to be infected option

by adrian16. May 2011 22:57

Doing a Forefront TMG 2010 deployment, I went to test if the malware inspection was working.
First thing to do was to access the eicar.org site for the standard Eicar virus test; as expected TMG blocked the request.

tmg_eicar_log__blocked

To be honest it’s been a while since I did not click through TMG the Eicar zip archives links on the mentioned site.
As far as I remember(and searching through my blog entries I found an old one related to a beta version of TMG [3]), TMG used to block access to those archives; maybe I have this impression from the beta stages or so, not sure.
Now, when I clicked an archive link, I could actually download the zip file.
Surprised a little, I’ve taken a look at TMG’s logs:

tmg_eicar_log_allowed

The malware inspection related logs did not seem to show anything specific; the Error Information log field also does not seem to show anything either. [1][2]

Attempting to extract the downloaded archive on the client side(Windows 2008 R2 server) using the Windows’ zip utility, I could not; seems the archive was corrupted or so, see the below error:

tmg_eicar_error_archive

Opening with a hex editor the original file:

tmg_eicar_archive_orig

And the file downloaded through TMG:

tmg_eicar_archive_down

Could be seen that the downloaded one was altered, note its headers.

I kinda had an idea what TMG malware inspection setting might have caused this, the Attempt to clean files that are found to be infected one(checked by default [4]):

tmg_eicar_malw_sett

Unchecked this option and tested again; now as expected TMG blocked the file download(I think Error Information code 0x580=400+100+80 or so [1][2]):

tmg_eicar_archive_down_blk_log
tmg_eicar_archive_down_blk_ie

Not sure why this is not done anymore, however, during TMG’s beta days, I remember the logs mentioning when a file was “cleaned” by the malware inspection(Malware Inspection Action log field) and the threat name indicated(Threat Name log field). [5]
Now since apparently the zip file was attempted to be “cleaned” by the malware inspection and the logs did not indicate this, things were a little bit confusing.

References

[1] Web proxy error log values
http://technet.microsoft.com/en-us/library/cc441745.aspx

[2] Web proxy log fields
http://msdn.microsoft.com/en-us/library/dd447850.aspx

[3] TMG Beta 2 – Quickly Print Screening Through
http://www.carbonwind.net/blog/post/TMG-Beta-2-e28093-Quickly-Print-Screening-Through.aspx

[4] Overview of malware inspection
http://technet.microsoft.com/en-us/library/dd182018.aspx

[5] Exercising TMG Beta 2 NIS with PoC
http://www.carbonwind.net/blog/post/Exercising-TMG-Beta-2-NIS-with-PoC.aspx

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值