FpcMalwareInspectionActionReason Enumeration

The FpcMalwareInspectionActionReason enumerated type contains values that specify the reason for the action that was performed on an HTTP response during malware inspection.

Syntax

typedef enum FpcMalwareInspectionActionReason {
  fpcMalwareInspectionActionReasonNone                            = 0,
  fpcMalwareInspectionActionReasonNoneDetected                    = 1,
  fpcMalwareInspectionActionReasonLowMediumThreatsAllowed         = 2,
  fpcMalwareInspectionActionReasonInfected                        = 3,
  fpcMalwareInspectionActionReasonSuspiciousFile                  = 4,
  fpcMalwareInspectionActionReasonEncryptedFile                   = 5,
  fpcMalwareInspectionActionReasonMaxArchiveNestingExceeded       = 6,
  fpcMalwareInspectionActionReasonMaxSizeExceeded                 = 7,
  fpcMalwareInspectionActionReasonMaxUnpackedSizeExceeded         = 8,
  fpcMalwareInspectionActionReasonUnknownEncoding                 = 9,
  fpcMalwareInspectionActionReasonCorruptedFile                   = 10,
  fpcMalwareInspectionActionReasonTimeOut                         = 11,
  fpcMalwareInspectionActionReasonStorageLimitExceeded            = 12,
  fpcMalwareInspectionActionReasonUnsupportedFormat               = 13,
  fpcMalwareInspectionActionReasonStatusNotRequested              = 14,
  fpcMalwareInspectionActionReasonOther                           = 15,
  fpcMalwareInspectionActionReasonDisabled                        = 16,
  fpcMalwareInspectionActionReasonDisabledForPolicyRule           = 17,
  fpcMalwareInspectionActionReasonDisabledForChainingRule         = 18,
  fpcMalwareInspectionActionReasonExceptionList                   = 19,
  fpcMalwareInspectionActionReasonProxyOriginatedResponse         = 20,
  fpcMalwareInspectionActionReasonServedByFilter                  = 21,
  fpcMalwareInspectionActionReasonStreaming                       = 22,
  fpcMalwareInspectionActionReasonResponseToConnect               = 23,
  fpcMalwareInspectionActionReasonRoutedByCarp                    = 24,
  fpcMalwareInspectionActionReasonSourceExceptionList             = 25,
  fpcMalwareInspectionActionReasonDefinitionsFolderNotSpecified   = 26,
  fpcMalwareInspectionActionReasonRangeResponse                   = 27
} FpcMalwareInspectionActionReason;

Constants

  • fpcMalwareInspectionActionReasonNone
    No reason was found to perform any action during malware inspection.

  • fpcMalwareInspectionActionReasonNoneDetected
    No malware was detected during malware inspection.

  • fpcMalwareInspectionActionReasonLowMediumThreatsAllowed
    No remedial action was performed during malware inspection because low and medium threats are allowed.

  • fpcMalwareInspectionActionReasonInfected
    The HTTP response was blocked because it was found to contain an infected file.

  • fpcMalwareInspectionActionReasonSuspiciousFile
    The HTTP response was blocked because it was found to contain suspicious content.

  • fpcMalwareInspectionActionReasonEncryptedFile
    The HTTP response was blocked because it was found to contain an encrypted file.

  • fpcMalwareInspectionActionReasonMaxArchiveNestingExceeded
    The HTTP response was blocked because it was found to contain an archive whose achive depth level exceeded the user-defined maximum.

  • fpcMalwareInspectionActionReasonMaxSizeExceeded
    The HTTP response was blocked because it was found to contain a file whose size exceeded the user-defined maximum file size.

  • fpcMalwareInspectionActionReasonMaxUnpackedSizeExceeded
    The HTTP response was blocked because it was found to contain an achive whose unpacked size exceeded the maximum.

  • fpcMalwareInspectionActionReasonUnknownEncoding
    The HTTP response was blocked because it was found to contain a file with unknown encoding.

  • fpcMalwareInspectionActionReasonCorruptedFile
    The HTTP response was blocked because it was found to contain a corrupted file.

  • fpcMalwareInspectionActionReasonTimeOut
    The HTTP response was blocked because the scanning time exceeded the user-defined maximum.

  • fpcMalwareInspectionActionReasonStorageLimitExceeded
    The HTTP response was blocked because the storage space limit for malware inspection was exceeded.

  • fpcMalwareInspectionActionReasonUnsupportedFormat
    The HTTP response was blocked because an unsupported format was detected during malware inspection.

  • fpcMalwareInspectionActionReasonStatusNotRequested
    The HTTP response was blocked because it was found to contain a status not requested during malware inspection.

  • fpcMalwareInspectionActionReasonOther
    The HTTP response was blocked for another unspecified reason during malware inspection.

  • fpcMalwareInspectionActionReasonDisabled
    The HTTP response was allowed because malware inspection is disabled.

  • fpcMalwareInspectionActionReasonDisabledForPolicyRule
    The HTTP response was allowed because malware inspection is disabled for the matching policy rule.

  • fpcMalwareInspectionActionReasonDisabledForChainingRule
    The HTTP response was allowed because malware inspection is disabled for the matching Web chaining rule.

  • fpcMalwareInspectionActionReasonExceptionList
    The HTTP response was allowed because the destination is included in the list of malware inspection exceptions.

  • fpcMalwareInspectionActionReasonProxyOriginatedResponse
    The HTTP response was allowed because it originated from a proxy server.

  • fpcMalwareInspectionActionReasonServedByFilter
    The HTTP response was allowed because it was servered by the Malware Insepction Filter.

  • fpcMalwareInspectionActionReasonStreaming
    The HTTP response was allowed because the request/response pair was identified as exempted protocol messages.

  • fpcMalwareInspectionActionReasonResponseToConnect
    The HTTP response was allowed because it was found to be a 200 response to a CONNECT request.

  • fpcMalwareInspectionActionReasonRoutedByCarp
    The HTTP response was allowed because it was scanned before being routed by the Cache Array Routing Protocol (CARP).

  • fpcMalwareInspectionActionReasonSourceExceptionList
    The HTTP response was allowed because the source is included in the list of malware insepction exceptions.

  • fpcMalwareInspectionActionReasonDefinitionsFolderNotSpecified
    The HTTP response was allowed because the folder containing the malware inspection definitions is not specified.

  • fpcMalwareInspectionActionReasonRangeResponse
    The HTTP response was blocked because it was a range response that did not include a range specification.

Requirements

Client Requires Windows 7 or Windows Vista.
Server Requires Windows Server 2008 R2 or Windows Server 2008 x64 Edition with SP2.
Version Requires Forefront Threat Management Gateway (TMG) 2010.
Header

Declared in Comenum.h.

See Also

Enumerated Types

Send comments about this topic to Microsoft

Build date: 6/30/2010