SCAN 5-2 Handbücher

Bedienungsanleitungen und Benutzerhandbücher für Software SCAN 5-2.
Wir stellen 1 PDF-Handbücher SCAN 5-2 zum kostenlosen herunterladen nach Dokumenttypen zur Verfügung Spezifikationen


Scan 5-2 Spezifikationen (432 Seiten)


Marke: Scan | Kategorie: Software | Größe: 4.34 MB |

 

Inhaltsverzeichnis

OfficeScan

1

Chapter 9: Managing Clients

11

Contents

13

Software

14

Chapter 12: Getting Help

14

Appendix A: Glossary

15

List of Tables

17

OfficeScan Documentation

22

Audience

23

Document Conventions

23

Terminology

24

—all of which are

25

TERMINOLOGY DESCRIPTION

26

Chapter 1

27

About OfficeScan

28

New in this Release

28

Introducing OfficeScan

29

Key Features and Benefits

31

The OfficeScan Server

33

The OfficeScan Client

35

Smart Scan Server

36

Smart Scan Server Types

38

Chapter 2

39

The Web Console

40

NSTALLATION TYPE URL

41

Web console banner area

42

Security Summary

43

Top 10 Security Risks screen

47

The OfficeScan Client Tree

49

Client Tree General Tasks

50

Client Tree Specific Tasks

51

MENU BUTTON TASK

52

• Firewall Logs on page 7-17

54

Outbreak Prevention screen

55

Component Update screen

55

Rollback screen

56

Security Risk Logs screen

57

OfficeScan Domains

58

Security Compliance

60

PATH: SECURITY COMPLIANCE

61

TATUS DESCRIPTION

62

Recommended tasks:

63

STATUS DESCRIPTION

63

Section 1

67

Chapter 3

69

Installation Requirements

70

RESOURCE REQUIREMENT

71

• Intel x64 processor

74

• AMD64 processor

74

Installation Methods

79

• Windows Vista Home

80

• Windows XP Home

80

• Windows Vista

80

• Windows 2008

80

• 64-bit platforms

80

INSTALLATION METHOD/

81

OPERATING SYSTEM

81

DEPLOYMENT CONSIDERATIONS

81

PACKAGE TYPE DESCRIPTION

86

file is correct. To

87

Client Packager Settings

88

Using Vulnerability Scanner

98

Domain Structure

100

Network Traffic

101

Network Size

101

Managing General Settings

104

• InterScan eManager 3.x:

105

• InterScan VirusWall™ 3.x:

105

PRODUCT DESCRIPTION

106

Running Vulnerability Scan

108

ETTING DESCRIPTION

109

Creating a Scheduled Task

110

Post-installation

116

To perform a test scan:

117

Uninstalling the Client

118

Chapter 4

125

Antivirus Components

126

Keeping Protection Up-to-Date

127

Anti-spyware Components

130

Firewall Components

130

Web Reputation Component

130

Programs

132

Update Overview

134

Smart Scan Server Update

136

OfficeScan Server Update

137

Server Update Source

139

Proxy for Server Update

140

Server Component Duplication

140

Server Update Methods

143

Server Update Logs

144

Client Update

147

2. Click Notify All Clients

148

Customized Update Source

149

Standard Update Source

150

Client Update Methods

151

OPTION DESCRIPTION

153

Manual Update

155

Update Privileges

157

PROXY SETTINGS USED USAGE

158

Client Update Logs

159

Client Update Notification

159

Component Rollback

160

Update Agents

161

Update Agent Configuration

162

Component Update Summary

167

Chapter 5

169

About Security Risks

170

Spyware and Grayware

172

Potential Risks and Threats

174

Scan Methods

176

Typical

178

Smart Scan Source

183

Standard List

184

Custom Lists

185

Scan Types

187

Manual Scan

189

Scheduled Scan

190

Scan Now

191

Initiating Scan Now

192

Scan Criteria

193

Scan Exclusions

195

Scan Actions

198

<Client installation

204

FILE DESCRIPTION

204

ILE DESCRIPTION

205

<Server installation

206

PARAMETER DESCRIPTION

207

Spyware/Grayware Scan Actions

208

To restore spyware/grayware:

210

Scan-related Privileges

211

Global Scan Settings

211

Security Risk Notifications

212

VARIABLE DESCRIPTION

213

Security Risk Logs

216

Quarantined

217

Access denied

217

Unable to delete the file

219

Unable to clean the file

221

Spyware/Grayware Logs

222

Spyware/Grayware Restore Logs

224

Outbreak Protection

225

FOLDER SESSION LINK

226

4. Click Save

227

Outbreak Prevention

228

Outbreak Prevention Policies

229

Block Ports

230

Disabling Outbreak Prevention

232

Device Control

233

Device Control Logs

235

Chapter 6

237

Web Reputation

238

About Web Threats

238

Location Awareness

239

Web Reputation Policies

239

Approved URLs

241

Proxy for Web Reputation

241

TIONS TAB

242

Web Reputation Logs

243

Chapter 7

245

About the OfficeScan Firewall

246

Using the OfficeScan Firewall

247

Firewall Policies

249

To add a policy:

251

EXCEPTION

253

XCEPTION

254

CTION PROTOCOL PORT DIRECTION

254

To edit a policy exception:

255

To delete an entry:

255

Firewall Profiles

256

To add a profile:

258

To edit a profile:

259

Firewall Privileges

260

Firewall Logs

261

To test the firewall:

262

Services section

264

Section 2

265

Chapter 8

267

Role-based Administration

268

To add a custom role:

271

To modify a custom role:

271

User Accounts

272

To modify a custom account:

275

Trend Micro Control Manager

276

Reference Servers

280

System Event Logs

281

Managing Logs

282

Log Maintenance

284

Licenses

285

ICENSE NEW ACTIVATION CODE

286

OfficeScan Database Backup

287

Web Console Password

289

Quarantine Manager

290

Server Tuner

291

To run Server Tuner:

292

Chapter 9

295

Computer Location

296

Managing Clients

297

Gateway Settings Importer

298

SETTINGS

299

Roaming Privilege

300

Scan Privileges

301

Scheduled Scan Privileges

302

Mail Scan Privileges

306

Toolbox Privilege

308

Proxy Configuration Privilege

308

Component Update Privileges

309

Client Uninstallation

309

Client Unloading

309

Update Settings

309

Web Reputation Setting

310

Scheduled Scan Setting

310

Client Security

311

POP3 Email Scan Settings

311

Restart Notification

311

Global Client Settings

312

Scheduled Scan Settings

317

Firewall Log Settings

319

Alert Settings

319

OfficeScan Service Restart

320

Client Self-protection

321

Reserved Disk Space

322

Automatic Proxy Configuration

323

Client Grouping

324

Online Clients

325

Offline Clients

326

DESCRIPTION

327

Required Actions

329

OfficeScan server

331

Connection Verification Logs

332

Client Proxy Settings

333

External Proxy

334

Client Mover

335

Touch Tool

336

Client Information

337

To import client settings:

338

Managing Inactive Clients

339

Section 3

341

Chapter 10

343

Components and Terms

344

COMPONENT DESCRIPTION

345

TERM DEFINITION

346

Cisco NAC Architecture

348

Policy Server for Cisco NAC

349

The Policy Server

351

Rule Composition

352

Default Rules

354

• Update

355

• Perform automatic

355

• Display

355

• Enable client

356

Policy Composition

357

Default Policies

358

Synchronization

359

Certificates

359

The CA Certificate

361

CA Certificate Installation

366

Cisco Trust Agent Deployment

368

To import the certificate:

369

ACS Server Configuration

377

To add a Policy Server:

378

To delete a Policy Server:

378

Policy Server

378

Policy Server Registration

380

Policies

380

Client Validation Logs

381

Client Log Maintenance

381

Administrative Tasks

381

Chapter 11

383

Configuration

384

OfficeScan Integration

385

NAME VALUE

387

Chapter 12

389

Troubleshooting Resources

390

To enable debug logging:

391

To disable debug logging:

391

Installation Logs

392

Component Update Log

393

Client Packager Log

393

VSEncrypt Log

394

Control Manager MCP Agent Log

394

Getting Help

395

Virus Scan Engine Log

396

Outbreak Logs

396

OfficeScan Client Logs

397

Fresh Installation Log

398

Upgrade/Hot Fix Log

398

Damage Cleanup Services Log

398

Mail Scan Log

398

Client Connection Log

399

Client Update Log

399

Outbreak Prevention Log

399

OfficeScan Firewall Log

400

Contacting Trend Micro

403

TrendLabs

405

Security Information Center

405

Documentation Feedback

406

Appendix A

407

Glossary

409

Trojan Port

417