Hey Marco, I think you are right here! Setting it to block for POP3 will definitely block it, but in the process "break" the POP3 account as you explained. Thank you for setting this straight. * POP3/IMAP + block -> You can not get a new email from this server until the virus email is deleted from the server. Otherwise the whole POP3 session will be dropped each time you retry to retrieve you emails. * SMTP + block -> An SMTP 541 error message will be sent as part of the block action when a virus is detected. This will tell the mail server not to retry sending the message, allowing the firewall to drop the mail without the mail server trying to resend it. So I don't realy see why the default action would be just alert. I guess some smtp servers will not listen to these 541 error messages and keep resending the email... You may also find that in the latest PaloAlto admin guide (6.1) there is no mention anymore of the "it's not possible to block POP3 virus". They just skim right over the topic and don't mention why the default action is alert instead of block for certain protocols. The default profile inspects all of the listed protocol decoders for viruses, and generates alerts for SMTP, IMAP, and POP3 protocols while blocking for FTP, HTTP, and SMB protocols. Customized profiles can be used to minimize antivirus inspection for traffic between trusted security zones, and to maximize the inspection of traffic received from untrusted zones, such as the Internet, as well as the traffic sent to highly sensitive destinations, such as server farms.
... View more