SCAN 5-2 Spezifikationen

Stöbern Sie online oder laden Sie Spezifikationen nach Software SCAN 5-2 herunter. SCAN 5-2 Specifications Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 432
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - OfficeScan

OfficeScanTM 10For Enterprise and Medium BusinessAdministrator’s GuideEndpoint Securityes

Seite 2

Trend Micro™ OfficeScan™ 10 Administrator’s Guide viChapter 7: Using the OfficeScan FirewallAbout the OfficeScan Firewall ...

Seite 3

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-32Software/Hardware SpecificationsDomain StructureTABLE 3-14. Software/Hardware specificationsSET

Seite 4

Installing the OfficeScan Client3-33Network TrafficNetwork SizeTABLE 3-16. Network trafficSETUP EFFECTIVENESS OF VULNERABILITY SCANNERLAN connection

Seite 5

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-34User TasksPerform the following tasks from Vulnerability Scanner:• Installing the OfficeScan Clie

Seite 6

Installing the OfficeScan Client3-35To install OfficeScan client with Vulnerability Scanner:1. If running Windows Vista Business, Enterprise, or Ultim

Seite 7

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-36Managing General SettingsTo configure and manage the following Vulnerability Scanner settings, na

Seite 8

Installing the OfficeScan Client3-37ServerProtect for LinuxIf the target computer does not run Windows, Vulnerabil-ity Scanner checks if it has Server

Seite 9

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-38ProtocolsVulnerability Scanner detects products and computers using the following protocols:• RPC

Seite 10

Installing the OfficeScan Client3-39NotificationsTo automatically send the results to yourself or to other administrators in your organization, select

Seite 11 - Chapter 9: Managing Clients

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-40OfficeScan Server SettingsType the OfficeScan server name and port number. Vulnerability Scanner

Seite 12

Installing the OfficeScan Client3-41To run a vulnerability scan on computers requesting IP addresses from a DHCP server:1. Configure DHCP settings in

Seite 13 - Contents

ContentsviiOfficeScan Database Backup ... 8-21OfficeScan Web Server Information ..

Seite 14 - Chapter 12: Getting Help

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-424. Click Start. Vulnerability Scanner begins listening for DHCP requests and performing vulnerabi

Seite 15 - Appendix A: Glossary

Installing the OfficeScan Client3-43Configuring Other Vulnerability Scanner SettingsSome Vulnerability Scanner settings can be configured only from th

Seite 16

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-44Migrating to the OfficeScan ClientMigrate endpoint security software installed on a target comput

Seite 17 - List of Tables

Installing the OfficeScan Client3-45Migrating from ServerProtect Normal ServersThe ServerProtect™ Normal Server Migration Tool is a tool that helps mi

Seite 18

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-463. Select the OfficeScan server. The path of the OfficeScan server appears under OfficeScan serve

Seite 19

Installing the OfficeScan Client3-478. Click the computers on which to perform the migration.a. To select all computers, click Select All.b. To desele

Seite 20

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-48Post-installationAfter completing the installation, verify the following:OfficeScan client shortc

Seite 21

Installing the OfficeScan Client3-49Recommended Post-installation TasksTrend Micro recommends performing the following post-installation tasks:Compone

Seite 22 - OfficeScan Documentation

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-504. To test other computers on the network, attach the EICAR.com file to an email message and send

Seite 23 - Document Conventions

Installing the OfficeScan Client3-515. Check the notification status and verify if there are clients that did not receive the notification.a. Click Se

Seite 24 - Terminology

Trend Micro™ OfficeScan™ 10 Administrator’s Guide viiiClient Self-protection ...

Seite 25 - —all of which are

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-52Manually Uninstalling the ClientPerform manual uninstallation only if you encounter problems unin

Seite 26 - TERMINOLOGY DESCRIPTION

Installing the OfficeScan Client3-536. Delete the following registry keys:If there are no other Trend Micro products installed on the computer:• HKEY_

Seite 27 - Chapter 1

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-54Keys: •ntrtscan•tmcfw•tmcomm• TmFilter•Tmlisten•tmpfw• TmPreFilter•TmProxy•tmtdi•VSApiNt• tmlwf (

Seite 28 - New in this Release

Installing the OfficeScan Client3-5514. Uninstall the Common Firewall Driver.a. Right-click My Network Places and click Properties.b. Right-click Loca

Seite 29 - Introducing OfficeScan

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-56

Seite 30

4-1Chapter 4Keeping Protection Up-to-DateTopics in this chapter:• OfficeScan Components and Programs on page 4-2• Update Overview on page 4-10• Office

Seite 31 - Key Features and Benefits

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-2OfficeScan Components and ProgramsOfficeScan makes use of components and programs to keep client c

Seite 32

Keeping Protection Up-to-Date4-3Download the Virus Pattern and other OfficeScan pattern files from the following Web site, where you can also find the

Seite 33 - The OfficeScan Server

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-4Virus Scan EngineAt the heart of all Trend Micro products lies the scan engine, which was original

Seite 34

Keeping Protection Up-to-Date4-5Virus Scan DriverThe Virus Scan Drive monitors user operations on files. Operations include opening or closing a file,

Seite 35 - The OfficeScan Client

ContentsixDefault Policies ... 10-16Synchronization ...

Seite 36 - Smart Scan Server

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-6Anti-spyware ComponentsSpyware PatternThe Spyware Pattern identifies spyware/grayware in files and

Seite 37

Keeping Protection Up-to-Date4-7Behavior Monitoring ComponentsBehavior Monitoring DriverThis kernel mode driver monitors system events and passes them

Seite 38 - Smart Scan Server Types

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-8ProgramsClient ProgramThe OfficeScan client program provides the actual protection from security r

Seite 39 - Chapter 2

Keeping Protection Up-to-Date4-9This feature is available starting in OfficeScan 8.0 Service Pack 1 with patch 3.• Clients upgraded from version 8.0 S

Seite 40 - The Web Console

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-10Update OverviewAll component updates originate from the Trend Micro ActiveUpdate server. When upd

Seite 41 - NSTALLATION TYPE URL

Keeping Protection Up-to-Date4-11ActiveUpdate server|OfficeScan server|Update Agents|ClientsThe OfficeScan server receives updated components from the

Seite 42 - Web console banner area

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-12Smart Scan Server UpdateA Smart Scan Server downloads the Smart Scan Pattern. Smart scan clients

Seite 43 - Security Summary

Keeping Protection Up-to-Date4-13OfficeScan Server UpdateThe OfficeScan server downloads the following components and deploys them to clients:TABLE 4-

Seite 44

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-14To enable the server to deploy the updated components to clients, configure automatic update sett

Seite 45

Keeping Protection Up-to-Date4-15Server Update SourceConfigure the OfficeScan server to download components from the Trend Micro ActiveUpdate server o

Seite 46

Trend Micro™ OfficeScan™ 10 Administrator’s Guide xChapter 11: Configuring OfficeScan with Third-party SoftwareOverview of Check Point Architecture an

Seite 47 - Top 10 Security Risks screen

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-16Proxy for Server UpdateConfigure server programs hosted on the server computer to use proxy setti

Seite 48

Keeping Protection Up-to-Date4-17Component duplication applies to the following components:•Virus Pattern• Smart Scan Agent Pattern• Virus Cleanup Tem

Seite 49 - The OfficeScan Client Tree

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-182. The server merges the incremental pattern with its current full pattern to generate the latest

Seite 50 - Client Tree General Tasks

Keeping Protection Up-to-Date4-19To illustrate based on the example:• The ActiveUpdate server has 14 incremental patterns:173.175 171.175 169.

Seite 51 - Client Tree Specific Tasks

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-20To configure server update schedule:PATH: UPDATES > SERVER > SCHEDULED UPDATE1. Select Enab

Seite 52 - MENU BUTTON TASK

Keeping Protection Up-to-Date4-21Smart Scan Server UpdateThis section discusses how to update components in the integrated Smart Scan Server. For deta

Seite 53

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-22When clients connect using a specific protocol, they identify the integrated server by its server

Seite 54 - • Firewall Logs on page 7-17

Keeping Protection Up-to-Date4-23Client UpdateTo ensure that clients stay protected from the latest security risks, update client components regularly

Seite 55 - Component Update screen

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-24Updating from the OfficeScan Server and Custom SourcesClients can obtain updates from various sou

Seite 56 - Rollback screen

Keeping Protection Up-to-Date4-25Customized Update SourceAside from the OfficeScan server, clients can update from custom update sources. Custom updat

Seite 57 - Security Risk Logs screen

ContentsxiContacting Trend Micro ... 12-15Technical Support ...

Seite 58 - OfficeScan Domains

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-26If the option is disabled, the client then tries connecting directly to the Trend Micro ActiveUpd

Seite 59

Keeping Protection Up-to-Date4-27Client Update MethodsClients that update components from the OfficeScan server or a customized update source can use

Seite 60 - Security Compliance

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-28There are two types of automatic update:Event-triggered UpdateThe server can notify online client

Seite 61 - PATH: SECURITY COMPLIANCE

Keeping Protection Up-to-Date4-29To update networked computer components automatically:PATH: UPDATES > NETWORKED COMPUTERS > AUTOMATIC UPDATE1.

Seite 62 - TATUS DESCRIPTION

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-30If you have not granted clients scheduled update privilege, perform the following steps first:a.

Seite 63 - STATUS DESCRIPTION

Keeping Protection Up-to-Date4-31b. If you select Daily or Weekly, specify the time of the update and the time period the OfficeScan server will notif

Seite 64

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-322. Choose the clients you want to update. Update clients with outdated components or select speci

Seite 65

Keeping Protection Up-to-Date4-33b. Instruct users to manually update components on the client computer (by right-clicking the OfficeScan icon in the

Seite 66

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-34Proxy for Client Component UpdateOfficeScan clients can use proxy settings during automatic updat

Seite 67 - Section 1

Keeping Protection Up-to-Date4-35Client Update LogsCheck the client update logs to determine if there are problems updating the Virus Pattern on clien

Seite 68

Trend Micro™ OfficeScan™ 10 Administrator’s Guide xii

Seite 69 - Chapter 3

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-36Component RollbackRollback refers to reverting to the previous version of the Virus Pattern, Smar

Seite 70 - Installation Requirements

Keeping Protection Up-to-Date4-37Update AgentsTo distribute the task of deploying components to OfficeScan clients, assign some OfficeScan clients to

Seite 71 - RESOURCE REQUIREMENT

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-38Update Agent ConfigurationUpdate Agent configuration is a 2-step process:1. Assign a client as an

Seite 72

Keeping Protection Up-to-Date4-39Update Source for Update AgentsUpdate Agents can obtain updates from various sources, such as the OfficeScan server o

Seite 73

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-404. If unable to update from all possible sources, the Update Agent quits the update process.The u

Seite 74 - • AMD64 processor

Keeping Protection Up-to-Date4-41Update Agent Standard Update SourceThe OfficeScan server is the standard update source for Update Agents. If you conf

Seite 75

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-42Update Agent Component DuplicationLike the OfficeScan server, Update Agents also use component du

Seite 76

Keeping Protection Up-to-Date4-43To use the Scheduled Update Configuration tool:1. On the Update Agent computer, navigate to <Client installation f

Seite 77

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-44

Seite 78

5-1Chapter 5Protecting Computers from Security RisksTopics in this chapter:• About Security Risks on page 5-2• Scan Methods on page 5-8• Scan Types on

Seite 79 - Installation Methods

List of TablesxiList of TablesTable P-1. OfficeScan documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xviTable P-2.

Seite 80 - • 64-bit platforms

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-2About Security RisksSecurity risk is the collective term for viruses/malware and spyware/grayware.

Seite 81 - DEPLOYMENT CONSIDERATIONS

Protecting Computers from Security Risks5-3VirusA virus is a program that replicates. To do so, the virus needs to attach itself to other program file

Seite 82

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-4Network VirusA virus spreading over a network is not, strictly speaking, a network virus. Only som

Seite 83

Protecting Computers from Security Risks5-5DialerA dialer changes client Internet settings and can force a computer to dial pre-configured phone numbe

Seite 84

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-6Potential Risks and ThreatsThe existence of spyware and other types of grayware on the network hav

Seite 85

Protecting Computers from Security Risks5-7Guarding Against Spyware/GraywareThere are many ways to prevent the installation of spyware/grayware to a c

Seite 86 - PACKAGE TYPE DESCRIPTION

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-8Scan MethodsOfficeScan clients can use either conventional scan or smart scan when scanning for se

Seite 87 - file is correct. To

Protecting Computers from Security Risks5-9Scanning behaviorThe conventional scan client performs scanning on the local computer.• The smart scan clie

Seite 88 - Client Packager Settings

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-10Switching From Conventional Scan to Smart ScanIf you are switching clients from conventional scan

Seite 89

Protecting Computers from Security Risks5-11Local Smart Scan ServerOfficeScan provides two types of local Smart Scan Servers. Both servers have the sa

Seite 90

Trend Micro™ OfficeScan™ 10 Administrator’s GuidexiiTable 3-14. Software/Hardware specifications. . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 91

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-123. Smart Scan Server listAdd the Smart Scan Servers you have set up to the Smart Scan Server list

Seite 92

Protecting Computers from Security Risks5-138. TimingWhen switching to smart scan for the first time, clients need to download the full version of the

Seite 93

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-14Switching From Smart Scan to Conventional ScanWhen you switch clients back to conventional scan,

Seite 94

Protecting Computers from Security Risks5-15To change the scan method:PATH: NETWORKED COMPUTERS > CLIENT MANAGEMENT > SETTINGS > SCAN METHODS

Seite 95

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-16To configure the Smart Scan Server list:PATH: SMART SCAN > SCAN SOURCE > INTERNAL CLIENTS1.

Seite 96

Protecting Computers from Security Risks5-175. To open the console of a local Smart Scan Server, click Launch console.• For the integrated Smart Scan

Seite 97

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-18To obtain the Smart Scan Server address:• For the integrated Smart Scan Server, open the OfficeSc

Seite 98 - Using Vulnerability Scanner

Protecting Computers from Security Risks5-19Scan TypesOfficeScan provides the following scan types to protect client computers from security risks:Rea

Seite 99

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-20Configure and apply Real-time Scan settings to one or several clients and domains, or to all clie

Seite 100 - Domain Structure

Protecting Computers from Security Risks5-21Manual ScanManual Scan is an on-demand scan and starts immediately after a user runs the scan on the clien

Seite 101 - Network Size

List of TablesxiiiTable 5-2. Files that OfficeScan can decrypt and restore . . . . . . . . . . . . . . . . . . 5-36Table 5-32. Restore parameters

Seite 102

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-22Scheduled ScanScheduled Scan runs automatically on the appointed date and time. Use Scheduled Sca

Seite 103

Protecting Computers from Security Risks5-23Scan NowScan Now is initiated remotely by an OfficeScan administrator through the Web console and can be t

Seite 104 - Managing General Settings

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-24Initiating Scan NowInitiate Scan Now on computers that you suspect to be infected.To initiate Sca

Seite 105 - • InterScan VirusWall™ 3.x:

Protecting Computers from Security Risks5-255. Click Stop Notification to prompt OfficeScan to stop notifying clients currently being notified. Client

Seite 106 - PRODUCT DESCRIPTION

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-26Files to ScanSelect from the following options:• All scannable files: Scan all files• File types

Seite 107

Protecting Computers from Security Risks5-27CPU UsageOfficeScan can pause after scanning one file and before scanning the next file. This setting is u

Seite 108 - Running Vulnerability Scan

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-28When you enable scan exclusion, OfficeScan will not scan a file under the following conditions:•

Seite 109 - ETTING DESCRIPTION

Protecting Computers from Security Risks5-29Also configure OfficeScan to exclude Microsoft Exchange 2000/2003 directories by going to Networked Comput

Seite 110 - Creating a Scheduled Task

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-30Scan ActionsSpecify the action OfficeScan performs when a particular scan type detects a security

Seite 111

Protecting Computers from Security Risks5-31CleanOfficeScan cleans the infected file before allowing full access to the file.If the file is uncleanabl

Seite 113

Trend Micro™ OfficeScan™ 10 Administrator’s Guidexiv

Seite 114

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-32Deny AccessThis scan action can only be performed during Real-time Scan. When OfficeScan detects

Seite 115

Protecting Computers from Security Risks5-33Use the same action for all virus/malware typesSelect this option if you want the same action performed on

Seite 116 - Post-installation

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-34Quarantine DirectoryIf the action for an infected file is "Quarantine", the OfficeScan

Seite 117 - To perform a test scan:

Protecting Computers from Security Risks5-35A directory on another OfficeScan server computer (if you have other OfficeScan servers on the network)URL

Seite 118 - Uninstalling the Client

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-36Back Up Files Before CleaningIf OfficeScan is set to clean an infected file, it can first back up

Seite 119

Protecting Computers from Security Risks5-37WARNING! Restoring an infected file may spread the virus/malware to other files and computers. Before rest

Seite 120

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-38If the file is on the OfficeScan server or a custom quarantine directory:1. If the file is on the

Seite 121

Protecting Computers from Security Risks5-396. Use the other parameters to issue various commands.For example, type VSEncode [/d] [/debug] to decrypt

Seite 122

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-40Spyware/Grayware Scan ActionsThe scan action OfficeScan performs depends on the scan type that de

Seite 123

Protecting Computers from Security Risks5-41Spyware/Grayware Approved ListOfficeScan provides a list of "approved" spyware/grayware, which c

Seite 124

xvPrefacePrefaceWelcome to the Trend Micro™ OfficeScan™ Administrator’s Guide. This document discusses getting started information, client installatio

Seite 125 - Chapter 4

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-423. To remove names from the approved list, select the names and click Remove. To select multiple

Seite 126 - Antivirus Components

Protecting Computers from Security Risks5-43Scan-related PrivilegesUsers with scan privileges have greater control over how files on their computers g

Seite 127 - Keeping Protection Up-to-Date

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-44Security Risk NotificationsOfficeScan comes with a set of default notification messages to inform

Seite 128

Protecting Computers from Security Risks5-456. Specify a community name that is difficult to guess.7. Click Save.Security Risk Notifications for Admin

Seite 129

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-46e. Click Save.Security Risk Notifications for Client UsersOfficeScan can display notification mes

Seite 130 - Web Reputation Component

Protecting Computers from Security Risks5-472. If you selected domain(s) or client(s) on the client tree, click Save to apply settings to the domain(s

Seite 131

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-48Security Risk LogsOfficeScan generates logs when it detects virus/malware or spyware/grayware, an

Seite 132 - Programs

Protecting Computers from Security Risks5-49Virus/Malware Scan ResultsA. If Scan Action is SuccessfulThe following results display if OfficeScan was a

Seite 133

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-50Passed• First action is Pass. OfficeScan did not perform any action on the infected file.• First

Seite 134 - Update Overview

Protecting Computers from Security Risks5-51Unable to quarantine the file/Unable to rename the fileExplanation 1The infected file may be locked by ano

Seite 135

Trend Micro™ OfficeScan™ 10 Administrator’s Guide xviOfficeScan DocumentationOfficeScan documentation includes the following:Download the latest versi

Seite 136 - Smart Scan Server Update

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-52SolutionFor infected files on a CD, consider not using the CD as the virus may infect other compu

Seite 137 - OfficeScan Server Update

Protecting Computers from Security Risks5-533. If you use UNC path, ensure that the quarantine directory folder is shared to the group "Everyone&

Seite 138

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-54Explanation 2The infected file is in the Temporary Internet Files folder of the client computer.

Seite 139 - Server Update Source

Protecting Computers from Security Risks5-55Spyware/Grayware Scan ResultsA. If Scan Action is SuccessfulThe first level result is Successful, no actio

Seite 140 - Server Component Duplication

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-56Spyware/Grayware cleaned, restart required. Please restart the computer.OfficeScan cleaned spywar

Seite 141

Protecting Computers from Security Risks5-57Outbreak ProtectionAn outbreak occurs when incidents of virus/malware or spyware/grayware detections over

Seite 142

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-58To configure the outbreak criteria and notifications:PATH: NOTIFICATIONS > ADMINISTRATOR NOTIF

Seite 143 - Server Update Methods

Protecting Computers from Security Risks5-59d. Use token variables to represent data in the Message and Subject fields.4. Click Save.TABLE 5-34. Tok

Seite 144 - Server Update Logs

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-60Outbreak PreventionWhen an outbreak occurs, enforce outbreak prevention measures to respond to an

Seite 145

Protecting Computers from Security Risks5-61Outbreak Prevention PoliciesWhen outbreaks occurs, enforce any of the following policies:• Limit/Deny Acce

Seite 146

PrefacexviiAudienceOfficeScan documentation is intended for the following users:• OfficeScan Administrators: Responsible for OfficeScan management, in

Seite 147 - Client Update

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-62Block PortsDuring outbreaks, block vulnerable ports that viruses/malware might use to gain access

Seite 148 - 2. Click Notify All Clients

Protecting Computers from Security Risks5-63b. To edit settings for the blocked port(s), click the port number.c. In the screen that opens, modify the

Seite 149 - Customized Update Source

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-64Disabling Outbreak PreventionWhen you are confident that an outbreak has been contained and that

Seite 150 - Standard Update Source

Protecting Computers from Security Risks5-65Device ControlOfficeScan provides a device control feature that regulates access to external storage devic

Seite 151 - Client Update Methods

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-66Note: The scanning function in OfficeScan complements and may override the device permissions. Fo

Seite 152

Protecting Computers from Security Risks5-67Device Control LogsClients log unauthorized device access instances and send the logs to the server. A cli

Seite 153 - OPTION DESCRIPTION

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-68

Seite 154

6-1Chapter 6Protecting Computers from Web-based ThreatsTopics in this chapter:• About Web Threats on page 6-2• Web Reputation on page 6-2• Location Aw

Seite 155 - Manual Update

Trend Micro™ OfficeScan™ 10 Administrator’s Guide6-2About Web ThreatsWeb threats encompass a broad array of threats that originate from the Internet.

Seite 156

Protecting Computers from Web-based Threats6-3Location AwarenessIn many organizations, employees use both desktop and notebook computers to perform th

Seite 157 - Update Privileges

Trend Micro™ OfficeScan™ 10 Administrator’s Guide xviiiTerminologyThe following table provides the official terminology used throughout the OfficeScan

Seite 158 - PROXY SETTINGS USED USAGE

Trend Micro™ OfficeScan™ 10 Administrator’s Guide6-4To configure a Web reputation policy:PATH: NETWORKED COMPUTERS > CLIENT MANAGEMENT > SETTING

Seite 159 - Client Update Notification

Protecting Computers from Web-based Threats6-5Approved URLsApproved URLs bypass Web Reputation policies. OfficeScan does not block these URLs even if

Seite 160 - Component Rollback

Trend Micro™ OfficeScan™ 10 Administrator’s Guide6-6Web Threat Notifications for Client UsersOfficeScan can display a notification message on a client

Seite 161 - Update Agents

Protecting Computers from Web-based Threats6-7Web Reputation LogsConfigure both internal and external clients to send Web reputation logs to the serve

Seite 162 - Update Agent Configuration

Trend Micro™ OfficeScan™ 10 Administrator’s Guide6-8

Seite 163

7-1Chapter 7Using the OfficeScan FirewallTopics in this chapter:• About the OfficeScan Firewall on page 7-2• Firewall Policies and Profiles on page 7-

Seite 164

Trend Micro™ OfficeScan™ 10 Administrator’s Guide7-2About the OfficeScan FirewallThe OfficeScan firewall protects clients and servers on the network u

Seite 165

Using the OfficeScan Firewall7-3Intrusion Detection SystemThe OfficeScan firewall also includes an Intrusion Detection System (IDS). When enabled, IDS

Seite 166

Trend Micro™ OfficeScan™ 10 Administrator’s Guide7-4• LAND Attack: A type of attack that sends IP synchronization (SYN) packets with the same source a

Seite 167 - Component Update Summary

Using the OfficeScan Firewall7-5Firewall PoliciesFirewall policies allow you to block or allow certain types of network traffic not specified in a pol

Seite 168

PrefacexixAdministrator (or OfficeScan administrator)The person managing the OfficeScan serverConsole The user interface for configuring and managing

Seite 169 - Chapter 5

Trend Micro™ OfficeScan™ 10 Administrator’s Guide7-6Also create new policies if you have requirements not covered by any of the default policies.All d

Seite 170 - About Security Risks

Using the OfficeScan Firewall7-7Adding and Modifying a Firewall PolicyConfigure the following for each policy:• Security level: A general setting that

Seite 171

Trend Micro™ OfficeScan™ 10 Administrator’s Guide7-84. Under Exception, select the firewall policy exceptions. The policy exceptions included here are

Seite 172 - Spyware and Grayware

Using the OfficeScan Firewall7-9Editing the Firewall Exception TemplateThe firewall exception template contains policy exceptions that you can configu

Seite 173

Trend Micro™ OfficeScan™ 10 Administrator’s Guide7-10Note: Default exceptions apply to all clients. If you want a default exception to apply only to c

Seite 174 - Potential Risks and Threats

Using the OfficeScan Firewall7-113. Select the type of network protocol: TCP, UDP, or ICMP.4. Specify ports on the client computer on which to perform

Seite 175

Trend Micro™ OfficeScan™ 10 Administrator’s Guide7-12• Save Template Changes: Saves the exception template with the current policy exceptions and sett

Seite 176 - Scan Methods

Using the OfficeScan Firewall7-13OfficeScan comes with a default profile named "All clients profile", which uses the "All access"

Seite 177

Trend Micro™ OfficeScan™ 10 Administrator’s Guide7-145. To save the current settings and assign the profiles to clients:a. Select whether to Overwrite

Seite 178 - Typical

Using the OfficeScan Firewall7-15• Computer name: Click the button to open, and select client computers from, the client tree.•Platform• Logon name• C

Seite 179

Trend Micro™ OfficeScan™ 10 Administrator’s Guide xxServer installation folderThe folder on the computer that contains the OfficeScan server files. If

Seite 180

Trend Micro™ OfficeScan™ 10 Administrator’s Guide7-16Firewall PrivilegesGrant users the following privileges:•View the Firewall tab on the client cons

Seite 181

Using the OfficeScan Firewall7-17To modify the content of the notification message:PATH: NOTIFICATIONS > CLIENT USER NOTIFICATIONS1. Click the Fire

Seite 182

Trend Micro™ OfficeScan™ 10 Administrator’s Guide7-18• Description: Specifies the actual security risk (such as a network virus or IDS attack) or the

Seite 183 - Smart Scan Source

Using the OfficeScan Firewall7-19c. Select Firewall view from the client tree view.d. Check if there is a green check mark under the Firewall column o

Seite 184 - Standard List

Trend Micro™ OfficeScan™ 10 Administrator’s Guide7-20To disable the OfficeScan firewall on all client computers:1. On the Web console, go to Administr

Seite 185 - Custom Lists

Section 2Managing the OfficeScanServer and Clients

Seite 186

Trend Micro™ OfficeScan™ 10 Administrator’s Guide

Seite 187 - Scan Types

8-1Chapter 8Managing the OfficeScan ServerTopics in this chapter:• Role-based Administration on page 8-2• Trend Micro Control Manager on page 8-10• Re

Seite 188

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-2Role-based AdministrationUse the role-based administration feature to grant and control access to

Seite 189 - Manual Scan

Managing the OfficeScan Server8-3Power UserDelegate this role to administrators with specific administrative tasks on the Web console.1. Users with th

Seite 190 - Scheduled Scan

1-1Chapter 1Introducing OfficeScanTopics in this chapter:• About OfficeScan on page 1-2• New in this Release on page 1-2• Key Features and Benefits on

Seite 191 - Scan Now

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-4Guest UserDelegate this role to users who want to view the Web console for reference purposes.1. U

Seite 192 - Initiating Scan Now

Managing the OfficeScan Server8-5Adding and Modifying a Custom RoleTo add a custom role:PATH: ADMINISTRATION > USER ROLES > ADDADMINISTRATION &g

Seite 193 - Scan Criteria

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-6User AccountsSet up user accounts and assign a particular role to each user. The user role determi

Seite 194

Managing the OfficeScan Server8-7To use OfficeScan user accounts in Control Manager:Refer to the Control Manager documentation for the detailed steps.

Seite 195 - Scan Exclusions

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-82. Select whether to add a custom account or an Active Directory account.• For custom account, typ

Seite 196

Managing the OfficeScan Server8-9To modify a custom account:PATH: ADMINISTRATION > USER ACCOUNTS > <USER NAME>1. Enable or disable the acc

Seite 197

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-10If you specify an Active Directory group, all members belonging to a group get the same role. If

Seite 198 - Scan Actions

Managing the OfficeScan Server8-11Control Manager allows system administrators to monitor and report on activities such as infections, security violat

Seite 199

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-12• Replicate the following settings from one OfficeScan server to another from the Control Manager

Seite 200

Managing the OfficeScan Server8-134. If you will use a proxy server to connect to the Control Manager server, specify the following proxy settings:• P

Seite 201

Trend Micro™ OfficeScan™ 10 Administrator’s Guide 1-2About OfficeScanTrend Micro™ OfficeScan™ protects enterprise networks from malware, network virus

Seite 202

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-14Reference ServersOne of the ways the OfficeScan client determines which of the firewall profiles

Seite 203

Managing the OfficeScan Server8-15b. Type the port through which clients communicate with this computer. Specify any open contact port (such as ports

Seite 204 - FILE DESCRIPTION

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-16Outbreak Prevention: • Outbreak Prevention enabled• Outbreak Prevention disabled• Number of share

Seite 205 - ILE DESCRIPTION

Managing the OfficeScan Server8-17Firewall LogsOfficeScan generates logs when it detects violations to firewall policies. For details, see Firewall Lo

Seite 206 - <Server installation

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-18Debug LogsUse debug logs to troubleshoot problems with the OfficeScan server and client. For more

Seite 207 - PARAMETER DESCRIPTION

Managing the OfficeScan Server8-19LicensesView, activate, and renew OfficeScan product service licenses on the Web console, and enable/disable the Off

Seite 208 - Spyware/Grayware Scan Actions

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-20If you have an evaluation version license• When the license expires. During this time, OfficeScan

Seite 209

Managing the OfficeScan Server8-213. In the screen that opens, type the Activation Code and click Save.Note: Register a service before activating it.

Seite 210 - To restore spyware/grayware:

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-22To back up the OfficeScan database:PATH: ADMINISTRATION > DATABASE BACKUP1. Type the location

Seite 211 - Global Scan Settings

Managing the OfficeScan Server8-23OfficeScan Web Server InformationDuring OfficeScan server installation, Setup automatically sets up a Web server (II

Seite 212 - Security Risk Notifications

Introducing OfficeScan1-3For smart scan deployment information, refer to the Trend Micro Smart Scan for OfficeScan Getting Started Guide.Active Direct

Seite 213 - VARIABLE DESCRIPTION

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-24To change the Web console password:PATH: ADMINISTRATION > CONSOLE PASSWORD1. Type the current

Seite 214

Managing the OfficeScan Server8-25To configure quarantine directory settings:PATH: ADMINISTRATION > QUARANTINE MANAGER1. Accept or modify the defau

Seite 215

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-26Network TrafficThe amount of network traffic varies throughout the day. To control the flow of ne

Seite 216 - Security Risk Logs

Managing the OfficeScan Server8-274. Under Buffer, modify the following settings:Event BufferType the maximum number of client event reports to the se

Seite 217 - Access denied

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-28connection closes (due to either the completion of the update or the client response reaching the

Seite 218

9-1Chapter 9Managing ClientsTopics in this chapter:• Computer Location on page 9-2• Client Privileges and Other Settings on page 9-5• Global Client Se

Seite 219 - Unable to delete the file

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-2Computer LocationOfficeScan provides a location awareness feature that determines the Web reputati

Seite 220

Managing Clients9-32. If you choose Client connection status, decide if you want to use a reference server. See Reference Servers on page 8-14 for det

Seite 221 - Unable to clean the file

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-4Gateway Settings ImporterOfficeScan checks a computer's location to determine the Web reputat

Seite 222 - Spyware/Grayware Logs

Managing Clients9-5Client Privileges and Other SettingsGrant users the privileges to modify certain settings and perform high level tasks on the Offic

Seite 223

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing an

Seite 224 - Spyware/Grayware Restore Logs

Trend Micro™ OfficeScan™ 10 Administrator’s Guide 1-4Platform SupportThis product release supports server and client installations on Windows Server™

Seite 225 - Outbreak Protection

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-63. If you selected domain(s) or client(s) on the client tree, click Save to apply settings to the

Seite 226 - FOLDER SESSION LINK

Managing Clients9-7Scan PrivilegesThese privileges allow users to configure their own Manual Scan, Real-time Scan and Scheduled Scan settings by openi

Seite 227 - 4. Click Save

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-8Scheduled Scan PrivilegesClients set to run Scheduled Scan can have the privileges to postpone and

Seite 228 - Outbreak Prevention

Managing Clients9-9Skip and Stop Scheduled ScanEnabling this option allows users to perform the following actions:• Skip Scheduled Scan before it runs

Seite 229 - Outbreak Prevention Policies

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-10OfficeScan Firewall PrivilegesFirewall privileges allow users to configure their own firewall set

Seite 230 - Block Ports

Managing Clients9-11Allow Users to Enable/Disable the OfficeScan Firewall, the Intrusion Detection System, and the Firewall Violation Notification Mes

Seite 231

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-12Mail Scan PrivilegesWhen clients have the Mail Scan privileges, the Mail Scan tab displays on the

Seite 232 - Disabling Outbreak Prevention

Managing Clients9-13Outlook Mail ScanWhen the Mail Scan tab displays on the client console, client users can immediately configure Outlook mail scan s

Seite 233 - Device Control

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-14Toolbox PrivilegeWhen you enable this privilege, the Toolbox tab displays on the client console.

Seite 234

Managing Clients9-15Component Update PrivilegesUpdate privileges allow client users to configure their own update settings.Perform "Update Now&qu

Seite 235 - Device Control Logs

Introducing OfficeScan1-5Key Features and BenefitsOfficeScan provides the following features and benefits:Security Risk ProtectionOfficeScan protects

Seite 236

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-16Enable Scheduled UpdateSelecting this option forces the selected clients to always run scheduled

Seite 237 - Chapter 6

Managing Clients9-17Client SecurityThis setting allows or restricts users from accessing OfficeScan client files and registries.If you select High, th

Seite 238 - About Web Threats

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-18Global Client SettingsOfficeScan applies global client settings to all clients or only to clients

Seite 239 - Web Reputation Policies

Managing Clients9-19In a Compressed File, Scan Only the First __ FilesAfter decompressing a compressed file, OfficeScan scans the specified number of

Seite 240

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-20Exclude Microsoft Exchange Server Folders from ScanningIf the OfficeScan client and a Microsoft E

Seite 241 - Proxy for Web Reputation

Managing Clients9-21The following table describes what happens if any of the conditions is not met.TABLE 9-38. Compressed file scenarios and results

Seite 242 - TIONS TAB

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-22Enabled/DisabledNot Clean or Delete (in other words, any of the following: Rename, Quarantine, De

Seite 243 - Web Reputation Logs

Managing Clients9-23Enable Assessment ModeWhen in assessment mode, all clients managed by the server will log spyware/grayware detected during Manual

Seite 244

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-24The notification message can be enabled/disabled by going to Networked Computers > Client Mana

Seite 245 - Chapter 7

Managing Clients9-25Firewall Log SettingsYou can grant certain clients the privilege to send firewall logs to the OfficeScan server. Configure the log

Seite 246 - About the OfficeScan Firewall

Trend Micro™ OfficeScan™ 10 Administrator’s Guide 1-6Because Damage Cleanup Services runs automatically in the background, you do not need to configur

Seite 247 - Using the OfficeScan Firewall

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-26OfficeScan Service RestartOfficeScan restarts client services that stopped responding unexpectedl

Seite 248

Managing Clients9-27Client Self-protectionClient self-protection provides ways for the OfficeScan client to protect the processes and other resources

Seite 249 - Firewall Policies

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-28Protect OfficeScan Client ProcessesOfficeScan blocks all attempts to terminate the following proc

Seite 250

Managing Clients9-29Network Virus Log ConsolidationWhen you enable this option, OfficeScan clients only send network virus logs to the server once eve

Seite 251 - To add a policy:

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-30Use Automatic Configuration ScriptOfficeScan uses the proxy auto-configuration (PAC) script set b

Seite 252

Managing Clients9-31Online ClientsOnline clients maintain a continuous connection with the server. The OfficeScan server can initiate tasks and deploy

Seite 253 - EXCEPTION

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-32Offline ClientsOffline clients are disconnected from the server. The OfficeScan server cannot man

Seite 254 - CTION PROTOCOL PORT DIRECTION

Managing Clients9-33Roaming ClientsRoaming clients cannot update components from, nor send logs to, the OfficeScan server. The OfficeScan server also

Seite 255 - To delete an entry:

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-34Updates to roaming clients occur only on the following occasions:• When the client user performs

Seite 256 - Firewall Profiles

Managing Clients9-35Required ActionsPerform the necessary actions if the client icon indicates any of the following conditions:Pattern File has not be

Seite 257

Introducing OfficeScan1-7and delivers comprehensive reporting. Administrators can perform remote administration, set customized policies for individua

Seite 258 - To add a profile:

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-36A Client Within the Corporate Network is Disconnected from the ServerVerify the connection from t

Seite 259 - To edit a profile:

Managing Clients9-375. Verify from the registry whether or not a client is connected to the corporate network.Key: HKEY_LOCAL_MACHINE\SOFTWARE\TrendMi

Seite 260 - Firewall Privileges

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-38Verify client-server connection manually or let OfficeScan perform scheduled verification. You ca

Seite 261 - Firewall Logs

Managing Clients9-39Client Proxy SettingsConfigure OfficeScan clients to use proxy settings when connecting to internal and external servers.Internal

Seite 262 - To test the firewall:

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-40External ProxyThe OfficeScan server and client can use external proxy settings when connecting to

Seite 263

Managing Clients9-41Client MoverIf you have more than one OfficeScan server on the network, use the Client Mover tool to transfer clients from one Off

Seite 264 - Services section

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-425. To confirm the client now reports to the other server, do the following:a. On the client compu

Seite 265 - Section 2

Managing Clients9-434. Type the following:TmTouch.exe <destination file name> <source file name>Where:<destination file name> is the

Seite 266

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-44Importing and Exporting Client SettingsYou may want many OfficeScan clients to have the same scan

Seite 267 - Chapter 8

Managing Clients9-45Managing Inactive ClientsWhen you use the client uninstallation program to remove the client program from a computer, the program

Seite 268 - Role-based Administration

Trend Micro™ OfficeScan™ 10 Administrator’s Guide 1-8FIGURE 1-1. How the OfficeScan server worksThe OfficeScan server is capable of providing real-t

Seite 269

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-46

Seite 270

Section 3Providing Additional Protection

Seite 271 - To modify a custom role:

Trend Micro™ OfficeScan™ 10 Administrator’s Guide

Seite 272 - User Accounts

10-1Chapter 10Policy Server for Cisco NACTopics in this chapter:• About Policy Server for Cisco NAC on page 10-2• Components and Terms on page 10-2• C

Seite 273

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-2About Policy Server for Cisco NACTrend Micro Policy Server for Cisco Network Admission Control (N

Seite 274

Policy Server for Cisco NAC10-3Network Access DeviceA network device that supports Cisco NAC functionality. Supported Network Access Devices include a

Seite 275 - To modify a custom account:

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-4TermsBecome familiar with the following terms related to Policy Server for Cisco NAC:TABLE 10-43.

Seite 276 - Trend Micro Control Manager

Policy Server for Cisco NAC10-5Authentica-tion, Authori-zation, and Accounting (AAA)Describes the three main services used to control end-user client

Seite 277

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-6Cisco NAC ArchitectureThe following diagram illustrates a basic Cisco NAC architecture.FIGURE 10-

Seite 278

Policy Server for Cisco NAC10-7The Client Validation SequenceClient validation refers to the process of evaluating an OfficeScan client’s security pos

Seite 279

Introducing OfficeScan1-9The OfficeScan ClientProtect Windows computers from security risks by installing the OfficeScan client on each computer. The

Seite 280 - Reference Servers

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-86. The client performs the actions configured in the posture token. FIGURE 10-23. Network access

Seite 281 - System Event Logs

Policy Server for Cisco NAC10-9The Policy ServerThe Policy Server is responsible for evaluating the OfficeScan client’s security posture and for creat

Seite 282 - Managing Logs

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-10Policy Server Policies and RulesPolicy Servers use configurable rules and policies to help enfor

Seite 283

Policy Server for Cisco NAC10-11Security Posture CriteriaRules include the following security posture criteria:• Client machine state: If the client c

Seite 284 - Log Maintenance

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-12Policy Server and OfficeScan Client ActionsIf the client security posture matches the rule crite

Seite 285 - Licenses

Policy Server for Cisco NAC10-13Checkup Virus Pattern version is at least one ver-sion older than the version on the OfficeS-can server to which the c

Seite 286 - ICENSE NEW ACTIVATION CODE

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-14Quaran-tineVirus Pattern version is at least five ver-sions older than the ver-sion on the Offic

Seite 287 - OfficeScan Database Backup

Policy Server for Cisco NAC10-15Policy CompositionPolicies include of any number of rules and default responses and actions.Rule EnforcementPolicy Ser

Seite 288

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-16Default PoliciesPolicy Server provides default policies to give you a basis for configuring sett

Seite 289 - Web Console Password

Policy Server for Cisco NAC10-17SynchronizationRegularly synchronize the Policy Server with registered OfficeScan servers to keep the Policy Server ve

Seite 290 - Quarantine Manager

Trend Micro™ OfficeScan™ 10 Administrator’s Guide 1-10Smart Scan ServerThe smart scan solution makes use of lightweight patterns that work together to

Seite 291 - Server Tuner

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-18The figure below illustrates the steps involved in creating and deploying ACS and CA certificate

Seite 292 - To run Server Tuner:

Policy Server for Cisco NAC10-19The CA CertificateOfficeScan clients with CTA installations authenticate with the ACS server before communicating clie

Seite 293

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-20Hardware• 300MHz Intel Pentium II processor or equivalent • 128MB of RAM• 300MB of available dis

Seite 294

Policy Server for Cisco NAC10-21Hardware• 200MHz single or multiple Intel Pentium processors• 128MB of RAM for Windows 2000• 256MB of RAM for Windows

Seite 295 - Chapter 9

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-22Cisco 3600 series 3640/3640A, 3660-ENT seriesIOS 12.3(8) or later48MB/16MBCisco 3700 series 3745

Seite 296 - Computer Location

Policy Server for Cisco NAC10-23Policy Server for NAC DeploymentThe following procedures are for reference only and may be subject to change depending

Seite 297 - Managing Clients

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-24Cisco Secure ACS Server EnrolmentEnroll the Cisco Secure ACS server with the Certificate Authori

Seite 298 - Gateway Settings Importer

Policy Server for Cisco NAC10-25g. Click Close to close the Add Standalone Snap-in screen.h. Click OK to close the Add/remove Snap-in screen.i. In the

Seite 299 - SETTINGS

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-263. Copy the certificate (.cer file) to the OfficeScan server computer to deploy it to the client

Seite 300 - Roaming Privilege

Policy Server for Cisco NAC10-27Deploying CTA from the OfficeScan Web ConsoleIf you did not select the option to install/upgrade CTA during server ins

Seite 301 - Scan Privileges

Introducing OfficeScan1-11There are no component download overlaps between the Smart Scan Server and the OfficeScan server because each server downloa

Seite 302 - Scheduled Scan Privileges

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-28Cisco Trust Agent VersionBefore installing CTA to clients, check the CTA version (Cisco Trust Ag

Seite 303

Policy Server for Cisco NAC10-29To deploy CTA to clients from the OfficeScan Web console:1. Open the OfficeScan server Web console and click Agent Dep

Seite 304

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-30Cisco Trust Agent Installation VerificationAfter deploying the CTA to clients, verify successful

Seite 305

Policy Server for Cisco NAC10-31To install Policy Server for Cisco NAC using the Policy Server installer:1. Log on to the computer to which you will i

Seite 306 - Mail Scan Privileges

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-32b. Next to Port, type a port that will serve as the server listening port. When the Policy Serve

Seite 307

Policy Server for Cisco NAC10-33Policy Server SSL Certificate PreparationTo establish a secure SSL connection between the ACS server and the Policy Se

Seite 308 - Proxy Configuration Privilege

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-34m. Click Next.n. Click DER encoded binary x.509 or Base 64 encoded X.509 and click Next.o. Enter

Seite 309 - Update Settings

Policy Server for Cisco NAC10-35ACS Server ConfigurationTo allow Cisco Secure ACS to pass authentication requests to the Policy Server for Cisco NAC,

Seite 310 - Scheduled Scan Setting

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-36Policy Server Configuration from OfficeScanThe first step in configuring Policy Servers is to ad

Seite 311 - Restart Notification

Policy Server for Cisco NAC10-37The Configuration Summary table displays the number of OfficeScan servers registered to the Policy Server, the Policy

Seite 312 - Global Client Settings

Trend Micro™ OfficeScan™ 10 Administrator’s Guide 1-12Smart Scan Server TypesThe Smart Scan Server to which a client connects depends on the client’s

Seite 313

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-38Policy Server RegistrationRegister the Policy Server with at least one OfficeScan server so the

Seite 314

Policy Server for Cisco NAC10-39Client Validation LogsUse the client validation logs to view detailed information about clients when they validate wit

Seite 315

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-40

Seite 316

11-1Chapter 11Configuring OfficeScan with Third-party SoftwareTopics in this chapter:• Overview of Check Point Architecture and Configuration on page

Seite 317 - Scheduled Scan Settings

Trend Micro™ OfficeScan™ 10 Administrator’s Guide11-2Overview of Check Point Architecture and ConfigurationIntegrate OfficeScan installations with Che

Seite 318

Configuring OfficeScan with Third-party Software11-3OfficeScan IntegrationOfficeScan client periodically passes the Virus Pattern number and Virus Sca

Seite 319 - Alert Settings

Trend Micro™ OfficeScan™ 10 Administrator’s Guide11-4In this example, the SCV check will allow connections through the firewall if the pattern file ve

Seite 320 - OfficeScan Service Restart

Configuring OfficeScan with Third-party Software11-55. Add a parameter by clicking Edit > Parameters > Add, and then typing a Name and Value in

Seite 321 - Client Self-protection

Trend Micro™ OfficeScan™ 10 Administrator’s Guide11-6SecureClient Support InstallationIf users connect to the office network from a Virtual Private Ne

Seite 322 - Reserved Disk Space

12-1Chapter 12Getting HelpTopics in this chapter:• Troubleshooting Resources on page 12-2• Contacting Trend Micro on page 12-15

Seite 323 - Automatic Proxy Configuration

2-1Chapter 2Getting Started with OfficeScanTopics in this chapter:• The Web Console on page 2-2• Security Summary on page 2-5• The OfficeScan Client T

Seite 324 - Client Grouping

Trend Micro™ OfficeScan™ 10 Administrator’s Guide12-2Troubleshooting ResourcesThis section provides a list of resources you can use to troubleshoot Of

Seite 325 - Online Clients

Getting Help12-3Server Debug Log Using LogServer.exeUse LogServer.exe to collect debug logs for the following:• OfficeScan server basic logs• Trend Mi

Seite 326 - Offline Clients

Trend Micro™ OfficeScan™ 10 Administrator’s Guide12-4Perform the following steps:1. Copy the LogServer folder located in <Server installation folde

Seite 327 - DESCRIPTION

Getting Help12-5Component Update LogFile name: TmuDump.txtLocation: <Server installation folder>\PCCSRV\Web\Service\AU_Data\AU_LogTo get detaile

Seite 328

Trend Micro™ OfficeScan™ 10 Administrator’s Guide12-6ServerProtect Normal Server Migration Tool LogTo enable debug logging for ServerProtect Normal Se

Seite 329 - Required Actions

Getting Help12-7To enable debug logging for the MCP Agent:1. Modify product.ini in <Server installation folder>\PCCSRV\CmAgent as follows:[Debug

Seite 330

Trend Micro™ OfficeScan™ 10 Administrator’s Guide12-8Virus Scan Engine LogTo enable debug logging for the Virus Scan Engine:1. Open the Registry Edito

Seite 331 - OfficeScan server

Getting Help12-9World Virus Tracking LogFile name: wtc.logLocation: <Server installation folder>\PCCSRV\Log\tempOfficeScan Client LogsUse client

Seite 332 - Connection Verification Logs

Trend Micro™ OfficeScan™ 10 Administrator’s Guide12-10To disable debug logging for the OfficeScan client:Delete ofcdebug.ini.Fresh Installation LogFil

Seite 333 - Client Proxy Settings

Getting Help12-11Client Connection LogFile name: Conn_YYYYMMDD.logLocation: <Client installation folder>\ConnLogClient Update LogFile name: Tmud

Seite 334 - External Proxy

The user documentation for Trend Micro OfficeScan introduces the main features of the software and installation instructions for your production envir

Seite 335 - Client Mover

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-2The Web ConsoleThe Web console is the central point for monitoring OfficeScan throughout the corpo

Seite 336 - Touch Tool

Trend Micro™ OfficeScan™ 10 Administrator’s Guide12-12OfficeScan Firewall LogTo enable debug logging for the Common Firewall Driver on Windows Vista/2

Seite 337 - Client Information

Getting Help12-13To enable debug logging for the OfficeScan NT Firewall service:1. Edit TmPfw.ini located in <Client installation folder> as fol

Seite 338 - To import client settings:

Trend Micro™ OfficeScan™ 10 Administrator’s Guide12-14Transport Driver Interface (TDI) LogTo enable debug logging for TDI:1. Add the following data in

Seite 339 - Managing Inactive Clients

Getting Help12-15Contacting Trend MicroTechnical SupportTrend Micro provides technical support, pattern downloads, and program updates for one year to

Seite 340

Trend Micro™ OfficeScan™ 10 Administrator’s Guide12-16Speeding Up Your Support CallWhen you contact Trend Micro, to speed up your problem resolution,

Seite 341 - Section 3

Getting Help12-17TrendLabsTrendLabsSM is the global antivirus research and support center of Trend Micro. Located on three continents, TrendLabs has a

Seite 342

Trend Micro™ OfficeScan™ 10 Administrator’s Guide12-18Sending Suspicious Files to Trend MicroIf you think you have an infected file but the scan engin

Seite 343 - Chapter 10

A-1Appendix AGlossaryActiveUpdateActiveUpdate is a function common to many Trend Micro products. Connected to the Trend Micro update Web site, ActiveU

Seite 344 - Components and Terms

Trend Micro™ OfficeScan™ 10 Administrator’s Guide A-2Denial of Service AttackA Denial of Service (DoS) attack refers to an attack on a computer or net

Seite 345 - COMPONENT DESCRIPTION

GlossaryA-3End User License AgreementAn End User License Agreement or EULA is a legal contract between a software publisher and the software user. It

Seite 346 - TERM DEFINITION

Getting Started with OfficeScan2-3On the Web browser, type one of the following in the address bar based on the type of OfficeScan server installation

Seite 347

Trend Micro™ OfficeScan™ 10 Administrator’s Guide A-4HTTPHypertext Transfer Protocol (HTTP) is a standard protocol used for transporting Web pages (in

Seite 348 - Cisco NAC Architecture

GlossaryA-5IntelliTrapVirus writers often attempt to circumvent virus filtering by using real-time compression algorithms. IntelliTrap helps reduce th

Seite 349 - Policy Server for Cisco NAC

Trend Micro™ OfficeScan™ 10 Administrator’s Guide A-6MCP AgentTrend Micro Management Communication Protocol (MCP) is Trend Micro's next generatio

Seite 350

GlossaryA-7query or log transmission. To reduce the network impact, the MCP agent keeps connection alive and open as much as possible. A subsequent re

Seite 351 - The Policy Server

Trend Micro™ OfficeScan™ 10 Administrator’s Guide A-8POP3Post Office Protocol 3 (POP3) is a standard protocol for storing and transporting email messa

Seite 352 - Rule Composition

GlossaryA-9SNMP TrapA Small Network Management Protocol (SNMP) trap is a method of sending notifications to network administrators that use management

Seite 353

Trend Micro™ OfficeScan™ 10 Administrator’s Guide A-10SSLSecure Socket Layer (SSL) is a protocol designed by Netscape for providing data security laye

Seite 354 - Default Rules

GlossaryA-11Trojan PortTrojan ports are commonly used by Trojan horse programs to connect to a computer. During an outbreak, OfficeScan blocks the fol

Seite 355 - • Display

Trend Micro™ OfficeScan™ 10 Administrator’s Guide A-12Trusted PortThe server and the client use trusted ports to communicate with each other. If you b

Seite 356 - • Enable client

GlossaryA-13To determine the trusted ports:1. Access <Server installation folder>\PCCSRV.2. Open the ofcscan.ini file using a text editor such a

Seite 357 - Policy Composition

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-4The Web Console BannerThe banner area of the Web console provides you the following options:FIGURE

Seite 358 - Default Policies

Trend Micro™ OfficeScan™ 10 Administrator’s Guide A-14Files Infected with WormsA computer worm is a self-contained program (or set of programs) able t

Seite 359 - Certificates

GlossaryA-153. Open the command prompt, and type the following to delete the files:cd \cd recycleddel *.* /SThe last command deletes all files in the

Seite 360

Trend Micro™ OfficeScan™ 10 Administrator’s Guide A-163. If the infected file is in the Windows Temp folder:a. Open the command prompt and go to the W

Seite 361 - The CA Certificate

GlossaryA-17For computers running other operating systems (or those without NTFS):1. Restart the computer in MS-DOS mode.2. If the infected file is in

Seite 362

Trend Micro™ OfficeScan™ 10 Administrator’s Guide A-18

Seite 363

IN-1IndexAAccess Control Server (ACS) 10-3ACS certificate 10-17Active Directory 1-3, 2-22, 3-12, 3-23, 8-9query results 2-24scheduled query 2-27scope

Seite 364

Trend Micro™ OfficeScan™ 10 Administrator’s Guide IN-2client security level 9-17client self-protection 1-3, 9-27client tree 2-11advanced search 2-13ge

Seite 365

Manual NameIN-3profiles 7-2, 7-12tasks 7-4testing 7-18Fragmented IGMP 7-3Ggateway IP address 9-2gateway settings importer 9-4global client settings 9-

Seite 366 - CA Certificate Installation

Trend Micro™ OfficeScan™ 10 Administrator’s Guide IN-4MSI package 3-11–3-12, 3-23–3-24NNetwork Access Device 10-3network virus 5-4, 7-2, 9-29new featu

Seite 367

Manual NameIN-5Ppacker 5-3password 2-3, 8-23password cracking applications 5-5patches 4-8performance control 1-4, 5-27phishing A-7Ping of Death 7-3Plu

Seite 368 - Cisco Trust Agent Deployment

Getting Started with OfficeScan2-5Security SummaryThe Summary screen appears when you open the OfficeScan Web console or click Summary in the main men

Seite 369 - To import the certificate:

Trend Micro™ OfficeScan™ 10 Administrator’s Guide IN-6user accounts 8-6user roles 8-2rootkit protection 4-7Sscan actions 5-30spyware/grayware 5-40viru

Seite 370

Manual NameIN-7Smart Scan Agent Pattern 4-3Smart Scan Pattern 1-10, 4-3Smart Scan Server 1-10, 4-21, 5-10scheduled updates 4-21types 1-12update source

Seite 371

Trend Micro™ OfficeScan™ 10 Administrator’s Guide IN-8Update Agent 4-37URL Filtering Engine 4-6user roleadministrator 8-2guest user 8-4power user 8-3V

Seite 372

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-6If you have obtained an Activation Code, renew a license by going to Administration > Product L

Seite 373

Getting Started with OfficeScan2-7The Conventional Scan tab displays the following information:FIGURE 2-4. Summary screen - Conventional Scan tab• T

Seite 374

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-8The Smart Scan tab displays the following information:FIGURE 2-5. Summary screen - Smart Scan ta

Seite 375

Getting Started with OfficeScan2-9Top 10 Security Risk StatisticsA link on the Detection Status table opens a screen containing top 10 security risk s

Seite 376

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-10Outbreak StatusThe Outbreak Status table provides the status of any current security risk outbrea

Seite 377 - ACS Server Configuration

Getting Started with OfficeScan2-11For each program, view the clients that have not been upgraded by clicking the number link corresponding to the pro

Seite 378 - Policy Server

ContentsiContentsPrefaceOfficeScan Documentation ...xviAudience ...

Seite 379

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-12Client Tree General TasksBelow are the general tasks you can perform when the client tree display

Seite 380 - Policies

Getting Started with OfficeScan2-13• Refresh the client tree by clicking .• View client statistics below the client tree, such as the total number of

Seite 381 - Administrative Tasks

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-14Networked Computers > Client ManagementManage general client settings on this screen.FIGURE 2-

Seite 382

Getting Started with OfficeScan2-15Settings• Choose from the available scan methods. For details, see Scan Methods on page 5-8.• Configure settings fo

Seite 383 - Chapter 11

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-16Logs View the following logs:• Virus/Malware Logs on page 5-48• Spyware/Grayware Logs on page 5-5

Seite 384 - Configuration

Getting Started with OfficeScan2-17Networked Computers > Outbreak PreventionTask: Specify and activate outbreak protection settings.FIGURE 2-11.

Seite 385 - OfficeScan Integration

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-18Updates > Rollback > Synchronize with ServerTask: Perform component rollback.FIGURE 2-13.

Seite 386

Getting Started with OfficeScan2-19Logs > Networked Computer Logs > Security RisksView and manage logs on this screen.FIGURE 2-14. Security Ri

Seite 387 - NAME VALUE

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-20Cisco NAC > Agent DeploymentTask: Perform Cisco Trust Agent Deployment.FIGURE 2-15. Agent De

Seite 388

Getting Started with OfficeScan2-21To add a domain:PATH: NETWORKED COMPUTERS > CLIENT MANAGEMENT > MANAGE CLIENT TREE > ADD DOMAINS1. Type a

Seite 389 - Chapter 12

Trend Micro™ OfficeScan™ 10 Administrator’s Guide iiSection 1: Protecting Networked ComputersChapter 3: Installing the OfficeScan ClientInstallation R

Seite 390 - Troubleshooting Resources

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-22To move a client:PATH: NETWORKED COMPUTERS > CLIENT MANAGEMENT > MANAGE CLIENT TREE > MO

Seite 391 - To disable debug logging:

Getting Started with OfficeScan2-23Active Directory Scope and QueryWhen using Security Compliance for the first time, define the Active Directory scop

Seite 392 - Installation Logs

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-244. Choose whether to check a computer’s connectivity using a particular port number. When connect

Seite 393 - Client Packager Log

Getting Started with OfficeScan2-25Recommended tasks:1. On the Security Status section, click a number link to display all affected computers in the c

Seite 394 - Control Manager MCP Agent Log

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-26OfficeScan Client InstallationBefore installing the client, take note of the following:1. Record

Seite 395 - Getting Help

Getting Started with OfficeScan2-27To install the OfficeScan client:PATH: SECURITY COMPLIANCE1. Click Install on top of the client tree.If an earlier

Seite 396 - Outbreak Logs

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-28

Seite 397 - OfficeScan Client Logs

Section 1Protecting NetworkedComputers

Seite 398 - Mail Scan Log

Trend Micro™ OfficeScan™ 10 Administrator’s Guide

Seite 399 - Outbreak Prevention Log

3-1Chapter 3Installing the OfficeScan ClientTopics in this chapter:• Installation Requirements on page 3-2• Installation Methods on page 3-11• Migrati

Seite 400 - OfficeScan Firewall Log

ContentsiiiChapter 4: Keeping Protection Up-to-DateOfficeScan Components and Programs ... 4-2Antivi

Seite 401

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-2Installation RequirementsThe OfficeScan client can be installed on computers running the following

Seite 402

Installing the OfficeScan Client3-3Hardware Processor300MHz Intel™ Pentium™ or equivalentRAM256MB minimum, 512MB recommendedAvailable disk space350MB

Seite 403 - Contacting Trend Micro

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-4TABLE 3-5. Windows XP/2003, 32-bit versionRESOURCE REQUIREMENTOperating system• Windows XP Profe

Seite 404

Installing the OfficeScan Client3-5Others• Microsoft Internet Explorer 6.0 or later if performing Web setup• Disable Simple File Sharing on Windows XP

Seite 405 - Security Information Center

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-6Hardware Processor• Intel x64 processor• AMD64 processorRAM256MB minimum, 512MB recommendedAvailab

Seite 406 - Documentation Feedback

Installing the OfficeScan Client3-7TABLE 3-7. Windows Vista, 32-bit and 64-bit versionsRESOURCE REQUIREMENTOperating system• Windows Vista™ Business

Seite 407 - Appendix A

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-8Others Windows Internet Explorer 7.0 or later if performing Web setupTABLE 3-8. Windows 2008, 32

Seite 408

Installing the OfficeScan Client3-9Others Windows Internet Explorer 7.0 or later if performing Web setupTABLE 3-9. Windows 2008, 64-bit versionRESOU

Seite 409 - Glossary

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-10Compatibility ListOfficeScan is compatible with the following third-party products:• Citrix XenAp

Seite 410

Installing the OfficeScan Client3-11Installation MethodsThis section provides a summary of the different client installation methods to perform fresh

Seite 411

Trend Micro™ OfficeScan™ 10 Administrator’s Guide ivUpdate Source for Update Agents ...4-39Updat

Seite 412

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-12Client Packager (MSI package deployed through Active Direc-tory)Supported on all operating system

Seite 413

Installing the OfficeScan Client3-13Installing from the Web Install PageUsers can install the client program from the Web install page if you installe

Seite 414

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-14Send the following instructions to users to install the OfficeScan client from the Web install pa

Seite 415

Installing the OfficeScan Client3-15Initiating Browser-based InstallationSet up an email message that instructs users on the network to install the Of

Seite 416

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-16For remote desktop installation using AutoPcc.exe:• The computer must be run in Mstsc.exe /consol

Seite 417 - Trojan Port

Installing the OfficeScan Client3-17To add AutoPcc.exe to the login script using Login Script Setup:1. On the computer you used to run the server inst

Seite 418

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-18Installing with Client PackagerClient Packager can compress Setup and update files into a self-ex

Seite 419

Installing the OfficeScan Client3-194. Configure the following settings (some settings are only available if you select a particular package type):• W

Seite 420

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-20Package deployment guidelines:1. Send the package to users and ask them to run the client package

Seite 421

Installing the OfficeScan Client3-21• If you will use the package to upgrade a client to this OfficeScan version, check the domain level scan method o

Seite 422

ContentsvSecurity Risk Notifications for Administrators ... 5-45Security Risk Notifications for Client Users ...

Seite 423

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-222. The OfficeScan server that manages the Update Agent will not be able to synchronize or deploy

Seite 424

Installing the OfficeScan Client3-23Check Point SecureClient SupportThis tool adds support for Check Point™ SecureClient™ for Windows 2000/XP/Server 2

Seite 425

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-247. Select a deployment method and then click OK.• Assigned: The MSI package is automatically depl

Seite 426

Installing the OfficeScan Client3-256. Browse and select the MSI package file created by Client Packager, and then click Open. The MSI package name ap

Seite 427

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-26To distribute the package to target computers:1. On the Tree tab, click Advertisements.2. On the

Seite 428

Installing the OfficeScan Client3-2717. Click Yes, assign the program, and then click Next.Microsoft SMS creates the advertisement and displays it on

Seite 429

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-283. Select the target computers.•The Domains and Computers list displays all the Windows domains o

Seite 430

Installing the OfficeScan Client3-29Installing from a Client Disk ImageDisk imaging technology allows you to create an image of an OfficeScan client u

Seite 431

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-30Using Vulnerability ScannerUse Vulnerability Scanner to detect installed antivirus solutions, sea

Seite 432

Installing the OfficeScan Client3-31Network Topology and ArchitectureCentralized administra-tionModerately effectiveOutsource service Moderately effec

Kommentare zu diesen Handbüchern

Keine Kommentare