SCAN 5-2 Dokumentacja

Przeglądaj online lub pobierz Dokumentacja dla Oprogramowanie SCAN 5-2. SCAN 5-2 Specifications Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj

Podsumowanie treści

Strona 1 - OfficeScan

OfficeScanTM 10For Enterprise and Medium BusinessAdministrator’s GuideEndpoint Securityes

Strona 2

Trend Micro™ OfficeScan™ 10 Administrator’s Guide viChapter 7: Using the OfficeScan FirewallAbout the OfficeScan Firewall ...

Strona 3

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-32Software/Hardware SpecificationsDomain StructureTABLE 3-14. Software/Hardware specificationsSET

Strona 4

Installing the OfficeScan Client3-33Network TrafficNetwork SizeTABLE 3-16. Network trafficSETUP EFFECTIVENESS OF VULNERABILITY SCANNERLAN connection

Strona 5

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-34User TasksPerform the following tasks from Vulnerability Scanner:• Installing the OfficeScan Clie

Strona 6

Installing the OfficeScan Client3-35To install OfficeScan client with Vulnerability Scanner:1. If running Windows Vista Business, Enterprise, or Ultim

Strona 7

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-36Managing General SettingsTo configure and manage the following Vulnerability Scanner settings, na

Strona 8

Installing the OfficeScan Client3-37ServerProtect for LinuxIf the target computer does not run Windows, Vulnerabil-ity Scanner checks if it has Server

Strona 9

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-38ProtocolsVulnerability Scanner detects products and computers using the following protocols:• RPC

Strona 10

Installing the OfficeScan Client3-39NotificationsTo automatically send the results to yourself or to other administrators in your organization, select

Strona 11 - Chapter 9: Managing Clients

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-40OfficeScan Server SettingsType the OfficeScan server name and port number. Vulnerability Scanner

Strona 12

Installing the OfficeScan Client3-41To run a vulnerability scan on computers requesting IP addresses from a DHCP server:1. Configure DHCP settings in

Strona 13 - Contents

ContentsviiOfficeScan Database Backup ... 8-21OfficeScan Web Server Information ..

Strona 14 - Chapter 12: Getting Help

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-424. Click Start. Vulnerability Scanner begins listening for DHCP requests and performing vulnerabi

Strona 15 - Appendix A: Glossary

Installing the OfficeScan Client3-43Configuring Other Vulnerability Scanner SettingsSome Vulnerability Scanner settings can be configured only from th

Strona 16

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-44Migrating to the OfficeScan ClientMigrate endpoint security software installed on a target comput

Strona 17 - List of Tables

Installing the OfficeScan Client3-45Migrating from ServerProtect Normal ServersThe ServerProtect™ Normal Server Migration Tool is a tool that helps mi

Strona 18

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-463. Select the OfficeScan server. The path of the OfficeScan server appears under OfficeScan serve

Strona 19

Installing the OfficeScan Client3-478. Click the computers on which to perform the migration.a. To select all computers, click Select All.b. To desele

Strona 20

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-48Post-installationAfter completing the installation, verify the following:OfficeScan client shortc

Strona 21

Installing the OfficeScan Client3-49Recommended Post-installation TasksTrend Micro recommends performing the following post-installation tasks:Compone

Strona 22 - OfficeScan Documentation

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-504. To test other computers on the network, attach the EICAR.com file to an email message and send

Strona 23 - Document Conventions

Installing the OfficeScan Client3-515. Check the notification status and verify if there are clients that did not receive the notification.a. Click Se

Strona 24 - Terminology

Trend Micro™ OfficeScan™ 10 Administrator’s Guide viiiClient Self-protection ...

Strona 25 - —all of which are

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-52Manually Uninstalling the ClientPerform manual uninstallation only if you encounter problems unin

Strona 26 - TERMINOLOGY DESCRIPTION

Installing the OfficeScan Client3-536. Delete the following registry keys:If there are no other Trend Micro products installed on the computer:• HKEY_

Strona 27 - Chapter 1

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-54Keys: •ntrtscan•tmcfw•tmcomm• TmFilter•Tmlisten•tmpfw• TmPreFilter•TmProxy•tmtdi•VSApiNt• tmlwf (

Strona 28 - New in this Release

Installing the OfficeScan Client3-5514. Uninstall the Common Firewall Driver.a. Right-click My Network Places and click Properties.b. Right-click Loca

Strona 29 - Introducing OfficeScan

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-56

Strona 30

4-1Chapter 4Keeping Protection Up-to-DateTopics in this chapter:• OfficeScan Components and Programs on page 4-2• Update Overview on page 4-10• Office

Strona 31 - Key Features and Benefits

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-2OfficeScan Components and ProgramsOfficeScan makes use of components and programs to keep client c

Strona 32

Keeping Protection Up-to-Date4-3Download the Virus Pattern and other OfficeScan pattern files from the following Web site, where you can also find the

Strona 33 - The OfficeScan Server

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-4Virus Scan EngineAt the heart of all Trend Micro products lies the scan engine, which was original

Strona 34

Keeping Protection Up-to-Date4-5Virus Scan DriverThe Virus Scan Drive monitors user operations on files. Operations include opening or closing a file,

Strona 35 - The OfficeScan Client

ContentsixDefault Policies ... 10-16Synchronization ...

Strona 36 - Smart Scan Server

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-6Anti-spyware ComponentsSpyware PatternThe Spyware Pattern identifies spyware/grayware in files and

Strona 37

Keeping Protection Up-to-Date4-7Behavior Monitoring ComponentsBehavior Monitoring DriverThis kernel mode driver monitors system events and passes them

Strona 38 - Smart Scan Server Types

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-8ProgramsClient ProgramThe OfficeScan client program provides the actual protection from security r

Strona 39 - Chapter 2

Keeping Protection Up-to-Date4-9This feature is available starting in OfficeScan 8.0 Service Pack 1 with patch 3.• Clients upgraded from version 8.0 S

Strona 40 - The Web Console

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-10Update OverviewAll component updates originate from the Trend Micro ActiveUpdate server. When upd

Strona 41 - NSTALLATION TYPE URL

Keeping Protection Up-to-Date4-11ActiveUpdate server|OfficeScan server|Update Agents|ClientsThe OfficeScan server receives updated components from the

Strona 42 - Web console banner area

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-12Smart Scan Server UpdateA Smart Scan Server downloads the Smart Scan Pattern. Smart scan clients

Strona 43 - Security Summary

Keeping Protection Up-to-Date4-13OfficeScan Server UpdateThe OfficeScan server downloads the following components and deploys them to clients:TABLE 4-

Strona 44

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-14To enable the server to deploy the updated components to clients, configure automatic update sett

Strona 45

Keeping Protection Up-to-Date4-15Server Update SourceConfigure the OfficeScan server to download components from the Trend Micro ActiveUpdate server o

Strona 46

Trend Micro™ OfficeScan™ 10 Administrator’s Guide xChapter 11: Configuring OfficeScan with Third-party SoftwareOverview of Check Point Architecture an

Strona 47 - Top 10 Security Risks screen

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-16Proxy for Server UpdateConfigure server programs hosted on the server computer to use proxy setti

Strona 48

Keeping Protection Up-to-Date4-17Component duplication applies to the following components:•Virus Pattern• Smart Scan Agent Pattern• Virus Cleanup Tem

Strona 49 - The OfficeScan Client Tree

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-182. The server merges the incremental pattern with its current full pattern to generate the latest

Strona 50 - Client Tree General Tasks

Keeping Protection Up-to-Date4-19To illustrate based on the example:• The ActiveUpdate server has 14 incremental patterns:173.175 171.175 169.

Strona 51 - Client Tree Specific Tasks

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-20To configure server update schedule:PATH: UPDATES > SERVER > SCHEDULED UPDATE1. Select Enab

Strona 52 - MENU BUTTON TASK

Keeping Protection Up-to-Date4-21Smart Scan Server UpdateThis section discusses how to update components in the integrated Smart Scan Server. For deta

Strona 53

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-22When clients connect using a specific protocol, they identify the integrated server by its server

Strona 54 - • Firewall Logs on page 7-17

Keeping Protection Up-to-Date4-23Client UpdateTo ensure that clients stay protected from the latest security risks, update client components regularly

Strona 55 - Component Update screen

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-24Updating from the OfficeScan Server and Custom SourcesClients can obtain updates from various sou

Strona 56 - Rollback screen

Keeping Protection Up-to-Date4-25Customized Update SourceAside from the OfficeScan server, clients can update from custom update sources. Custom updat

Strona 57 - Security Risk Logs screen

ContentsxiContacting Trend Micro ... 12-15Technical Support ...

Strona 58 - OfficeScan Domains

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-26If the option is disabled, the client then tries connecting directly to the Trend Micro ActiveUpd

Strona 59

Keeping Protection Up-to-Date4-27Client Update MethodsClients that update components from the OfficeScan server or a customized update source can use

Strona 60 - Security Compliance

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-28There are two types of automatic update:Event-triggered UpdateThe server can notify online client

Strona 61 - PATH: SECURITY COMPLIANCE

Keeping Protection Up-to-Date4-29To update networked computer components automatically:PATH: UPDATES > NETWORKED COMPUTERS > AUTOMATIC UPDATE1.

Strona 62 - TATUS DESCRIPTION

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-30If you have not granted clients scheduled update privilege, perform the following steps first:a.

Strona 63 - STATUS DESCRIPTION

Keeping Protection Up-to-Date4-31b. If you select Daily or Weekly, specify the time of the update and the time period the OfficeScan server will notif

Strona 64

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-322. Choose the clients you want to update. Update clients with outdated components or select speci

Strona 65

Keeping Protection Up-to-Date4-33b. Instruct users to manually update components on the client computer (by right-clicking the OfficeScan icon in the

Strona 66

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-34Proxy for Client Component UpdateOfficeScan clients can use proxy settings during automatic updat

Strona 67 - Section 1

Keeping Protection Up-to-Date4-35Client Update LogsCheck the client update logs to determine if there are problems updating the Virus Pattern on clien

Strona 68

Trend Micro™ OfficeScan™ 10 Administrator’s Guide xii

Strona 69 - Chapter 3

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-36Component RollbackRollback refers to reverting to the previous version of the Virus Pattern, Smar

Strona 70 - Installation Requirements

Keeping Protection Up-to-Date4-37Update AgentsTo distribute the task of deploying components to OfficeScan clients, assign some OfficeScan clients to

Strona 71 - RESOURCE REQUIREMENT

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-38Update Agent ConfigurationUpdate Agent configuration is a 2-step process:1. Assign a client as an

Strona 72

Keeping Protection Up-to-Date4-39Update Source for Update AgentsUpdate Agents can obtain updates from various sources, such as the OfficeScan server o

Strona 73

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-404. If unable to update from all possible sources, the Update Agent quits the update process.The u

Strona 74 - • AMD64 processor

Keeping Protection Up-to-Date4-41Update Agent Standard Update SourceThe OfficeScan server is the standard update source for Update Agents. If you conf

Strona 75

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-42Update Agent Component DuplicationLike the OfficeScan server, Update Agents also use component du

Strona 76

Keeping Protection Up-to-Date4-43To use the Scheduled Update Configuration tool:1. On the Update Agent computer, navigate to <Client installation f

Strona 77

Trend Micro™ OfficeScan™ 10 Administrator’s Guide4-44

Strona 78

5-1Chapter 5Protecting Computers from Security RisksTopics in this chapter:• About Security Risks on page 5-2• Scan Methods on page 5-8• Scan Types on

Strona 79 - Installation Methods

List of TablesxiList of TablesTable P-1. OfficeScan documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xviTable P-2.

Strona 80 - • 64-bit platforms

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-2About Security RisksSecurity risk is the collective term for viruses/malware and spyware/grayware.

Strona 81 - DEPLOYMENT CONSIDERATIONS

Protecting Computers from Security Risks5-3VirusA virus is a program that replicates. To do so, the virus needs to attach itself to other program file

Strona 82

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-4Network VirusA virus spreading over a network is not, strictly speaking, a network virus. Only som

Strona 83

Protecting Computers from Security Risks5-5DialerA dialer changes client Internet settings and can force a computer to dial pre-configured phone numbe

Strona 84

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-6Potential Risks and ThreatsThe existence of spyware and other types of grayware on the network hav

Strona 85

Protecting Computers from Security Risks5-7Guarding Against Spyware/GraywareThere are many ways to prevent the installation of spyware/grayware to a c

Strona 86 - PACKAGE TYPE DESCRIPTION

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-8Scan MethodsOfficeScan clients can use either conventional scan or smart scan when scanning for se

Strona 87 - file is correct. To

Protecting Computers from Security Risks5-9Scanning behaviorThe conventional scan client performs scanning on the local computer.• The smart scan clie

Strona 88 - Client Packager Settings

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-10Switching From Conventional Scan to Smart ScanIf you are switching clients from conventional scan

Strona 89

Protecting Computers from Security Risks5-11Local Smart Scan ServerOfficeScan provides two types of local Smart Scan Servers. Both servers have the sa

Strona 90

Trend Micro™ OfficeScan™ 10 Administrator’s GuidexiiTable 3-14. Software/Hardware specifications. . . . . . . . . . . . . . . . . . . . . . . . . .

Strona 91

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-123. Smart Scan Server listAdd the Smart Scan Servers you have set up to the Smart Scan Server list

Strona 92

Protecting Computers from Security Risks5-138. TimingWhen switching to smart scan for the first time, clients need to download the full version of the

Strona 93

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-14Switching From Smart Scan to Conventional ScanWhen you switch clients back to conventional scan,

Strona 94

Protecting Computers from Security Risks5-15To change the scan method:PATH: NETWORKED COMPUTERS > CLIENT MANAGEMENT > SETTINGS > SCAN METHODS

Strona 95

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-16To configure the Smart Scan Server list:PATH: SMART SCAN > SCAN SOURCE > INTERNAL CLIENTS1.

Strona 96

Protecting Computers from Security Risks5-175. To open the console of a local Smart Scan Server, click Launch console.• For the integrated Smart Scan

Strona 97

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-18To obtain the Smart Scan Server address:• For the integrated Smart Scan Server, open the OfficeSc

Strona 98 - Using Vulnerability Scanner

Protecting Computers from Security Risks5-19Scan TypesOfficeScan provides the following scan types to protect client computers from security risks:Rea

Strona 99

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-20Configure and apply Real-time Scan settings to one or several clients and domains, or to all clie

Strona 100 - Domain Structure

Protecting Computers from Security Risks5-21Manual ScanManual Scan is an on-demand scan and starts immediately after a user runs the scan on the clien

Strona 101 - Network Size

List of TablesxiiiTable 5-2. Files that OfficeScan can decrypt and restore . . . . . . . . . . . . . . . . . . 5-36Table 5-32. Restore parameters

Strona 102

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-22Scheduled ScanScheduled Scan runs automatically on the appointed date and time. Use Scheduled Sca

Strona 103

Protecting Computers from Security Risks5-23Scan NowScan Now is initiated remotely by an OfficeScan administrator through the Web console and can be t

Strona 104 - Managing General Settings

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-24Initiating Scan NowInitiate Scan Now on computers that you suspect to be infected.To initiate Sca

Strona 105 - • InterScan VirusWall™ 3.x:

Protecting Computers from Security Risks5-255. Click Stop Notification to prompt OfficeScan to stop notifying clients currently being notified. Client

Strona 106 - PRODUCT DESCRIPTION

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-26Files to ScanSelect from the following options:• All scannable files: Scan all files• File types

Strona 107

Protecting Computers from Security Risks5-27CPU UsageOfficeScan can pause after scanning one file and before scanning the next file. This setting is u

Strona 108 - Running Vulnerability Scan

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-28When you enable scan exclusion, OfficeScan will not scan a file under the following conditions:•

Strona 109 - ETTING DESCRIPTION

Protecting Computers from Security Risks5-29Also configure OfficeScan to exclude Microsoft Exchange 2000/2003 directories by going to Networked Comput

Strona 110 - Creating a Scheduled Task

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-30Scan ActionsSpecify the action OfficeScan performs when a particular scan type detects a security

Strona 111

Protecting Computers from Security Risks5-31CleanOfficeScan cleans the infected file before allowing full access to the file.If the file is uncleanabl

Strona 113

Trend Micro™ OfficeScan™ 10 Administrator’s Guidexiv

Strona 114

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-32Deny AccessThis scan action can only be performed during Real-time Scan. When OfficeScan detects

Strona 115

Protecting Computers from Security Risks5-33Use the same action for all virus/malware typesSelect this option if you want the same action performed on

Strona 116 - Post-installation

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-34Quarantine DirectoryIf the action for an infected file is "Quarantine", the OfficeScan

Strona 117 - To perform a test scan:

Protecting Computers from Security Risks5-35A directory on another OfficeScan server computer (if you have other OfficeScan servers on the network)URL

Strona 118 - Uninstalling the Client

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-36Back Up Files Before CleaningIf OfficeScan is set to clean an infected file, it can first back up

Strona 119

Protecting Computers from Security Risks5-37WARNING! Restoring an infected file may spread the virus/malware to other files and computers. Before rest

Strona 120

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-38If the file is on the OfficeScan server or a custom quarantine directory:1. If the file is on the

Strona 121

Protecting Computers from Security Risks5-396. Use the other parameters to issue various commands.For example, type VSEncode [/d] [/debug] to decrypt

Strona 122

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-40Spyware/Grayware Scan ActionsThe scan action OfficeScan performs depends on the scan type that de

Strona 123

Protecting Computers from Security Risks5-41Spyware/Grayware Approved ListOfficeScan provides a list of "approved" spyware/grayware, which c

Strona 124

xvPrefacePrefaceWelcome to the Trend Micro™ OfficeScan™ Administrator’s Guide. This document discusses getting started information, client installatio

Strona 125 - Chapter 4

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-423. To remove names from the approved list, select the names and click Remove. To select multiple

Strona 126 - Antivirus Components

Protecting Computers from Security Risks5-43Scan-related PrivilegesUsers with scan privileges have greater control over how files on their computers g

Strona 127 - Keeping Protection Up-to-Date

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-44Security Risk NotificationsOfficeScan comes with a set of default notification messages to inform

Strona 128

Protecting Computers from Security Risks5-456. Specify a community name that is difficult to guess.7. Click Save.Security Risk Notifications for Admin

Strona 129

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-46e. Click Save.Security Risk Notifications for Client UsersOfficeScan can display notification mes

Strona 130 - Web Reputation Component

Protecting Computers from Security Risks5-472. If you selected domain(s) or client(s) on the client tree, click Save to apply settings to the domain(s

Strona 131

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-48Security Risk LogsOfficeScan generates logs when it detects virus/malware or spyware/grayware, an

Strona 132 - Programs

Protecting Computers from Security Risks5-49Virus/Malware Scan ResultsA. If Scan Action is SuccessfulThe following results display if OfficeScan was a

Strona 133

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-50Passed• First action is Pass. OfficeScan did not perform any action on the infected file.• First

Strona 134 - Update Overview

Protecting Computers from Security Risks5-51Unable to quarantine the file/Unable to rename the fileExplanation 1The infected file may be locked by ano

Strona 135

Trend Micro™ OfficeScan™ 10 Administrator’s Guide xviOfficeScan DocumentationOfficeScan documentation includes the following:Download the latest versi

Strona 136 - Smart Scan Server Update

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-52SolutionFor infected files on a CD, consider not using the CD as the virus may infect other compu

Strona 137 - OfficeScan Server Update

Protecting Computers from Security Risks5-533. If you use UNC path, ensure that the quarantine directory folder is shared to the group "Everyone&

Strona 138

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-54Explanation 2The infected file is in the Temporary Internet Files folder of the client computer.

Strona 139 - Server Update Source

Protecting Computers from Security Risks5-55Spyware/Grayware Scan ResultsA. If Scan Action is SuccessfulThe first level result is Successful, no actio

Strona 140 - Server Component Duplication

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-56Spyware/Grayware cleaned, restart required. Please restart the computer.OfficeScan cleaned spywar

Strona 141

Protecting Computers from Security Risks5-57Outbreak ProtectionAn outbreak occurs when incidents of virus/malware or spyware/grayware detections over

Strona 142

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-58To configure the outbreak criteria and notifications:PATH: NOTIFICATIONS > ADMINISTRATOR NOTIF

Strona 143 - Server Update Methods

Protecting Computers from Security Risks5-59d. Use token variables to represent data in the Message and Subject fields.4. Click Save.TABLE 5-34. Tok

Strona 144 - Server Update Logs

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-60Outbreak PreventionWhen an outbreak occurs, enforce outbreak prevention measures to respond to an

Strona 145

Protecting Computers from Security Risks5-61Outbreak Prevention PoliciesWhen outbreaks occurs, enforce any of the following policies:• Limit/Deny Acce

Strona 146

PrefacexviiAudienceOfficeScan documentation is intended for the following users:• OfficeScan Administrators: Responsible for OfficeScan management, in

Strona 147 - Client Update

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-62Block PortsDuring outbreaks, block vulnerable ports that viruses/malware might use to gain access

Strona 148 - 2. Click Notify All Clients

Protecting Computers from Security Risks5-63b. To edit settings for the blocked port(s), click the port number.c. In the screen that opens, modify the

Strona 149 - Customized Update Source

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-64Disabling Outbreak PreventionWhen you are confident that an outbreak has been contained and that

Strona 150 - Standard Update Source

Protecting Computers from Security Risks5-65Device ControlOfficeScan provides a device control feature that regulates access to external storage devic

Strona 151 - Client Update Methods

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-66Note: The scanning function in OfficeScan complements and may override the device permissions. Fo

Strona 152

Protecting Computers from Security Risks5-67Device Control LogsClients log unauthorized device access instances and send the logs to the server. A cli

Strona 153 - OPTION DESCRIPTION

Trend Micro™ OfficeScan™ 10 Administrator’s Guide5-68

Strona 154

6-1Chapter 6Protecting Computers from Web-based ThreatsTopics in this chapter:• About Web Threats on page 6-2• Web Reputation on page 6-2• Location Aw

Strona 155 - Manual Update

Trend Micro™ OfficeScan™ 10 Administrator’s Guide6-2About Web ThreatsWeb threats encompass a broad array of threats that originate from the Internet.

Strona 156

Protecting Computers from Web-based Threats6-3Location AwarenessIn many organizations, employees use both desktop and notebook computers to perform th

Strona 157 - Update Privileges

Trend Micro™ OfficeScan™ 10 Administrator’s Guide xviiiTerminologyThe following table provides the official terminology used throughout the OfficeScan

Strona 158 - PROXY SETTINGS USED USAGE

Trend Micro™ OfficeScan™ 10 Administrator’s Guide6-4To configure a Web reputation policy:PATH: NETWORKED COMPUTERS > CLIENT MANAGEMENT > SETTING

Strona 159 - Client Update Notification

Protecting Computers from Web-based Threats6-5Approved URLsApproved URLs bypass Web Reputation policies. OfficeScan does not block these URLs even if

Strona 160 - Component Rollback

Trend Micro™ OfficeScan™ 10 Administrator’s Guide6-6Web Threat Notifications for Client UsersOfficeScan can display a notification message on a client

Strona 161 - Update Agents

Protecting Computers from Web-based Threats6-7Web Reputation LogsConfigure both internal and external clients to send Web reputation logs to the serve

Strona 162 - Update Agent Configuration

Trend Micro™ OfficeScan™ 10 Administrator’s Guide6-8

Strona 163

7-1Chapter 7Using the OfficeScan FirewallTopics in this chapter:• About the OfficeScan Firewall on page 7-2• Firewall Policies and Profiles on page 7-

Strona 164

Trend Micro™ OfficeScan™ 10 Administrator’s Guide7-2About the OfficeScan FirewallThe OfficeScan firewall protects clients and servers on the network u

Strona 165

Using the OfficeScan Firewall7-3Intrusion Detection SystemThe OfficeScan firewall also includes an Intrusion Detection System (IDS). When enabled, IDS

Strona 166

Trend Micro™ OfficeScan™ 10 Administrator’s Guide7-4• LAND Attack: A type of attack that sends IP synchronization (SYN) packets with the same source a

Strona 167 - Component Update Summary

Using the OfficeScan Firewall7-5Firewall PoliciesFirewall policies allow you to block or allow certain types of network traffic not specified in a pol

Strona 168

PrefacexixAdministrator (or OfficeScan administrator)The person managing the OfficeScan serverConsole The user interface for configuring and managing

Strona 169 - Chapter 5

Trend Micro™ OfficeScan™ 10 Administrator’s Guide7-6Also create new policies if you have requirements not covered by any of the default policies.All d

Strona 170 - About Security Risks

Using the OfficeScan Firewall7-7Adding and Modifying a Firewall PolicyConfigure the following for each policy:• Security level: A general setting that

Strona 171

Trend Micro™ OfficeScan™ 10 Administrator’s Guide7-84. Under Exception, select the firewall policy exceptions. The policy exceptions included here are

Strona 172 - Spyware and Grayware

Using the OfficeScan Firewall7-9Editing the Firewall Exception TemplateThe firewall exception template contains policy exceptions that you can configu

Strona 173

Trend Micro™ OfficeScan™ 10 Administrator’s Guide7-10Note: Default exceptions apply to all clients. If you want a default exception to apply only to c

Strona 174 - Potential Risks and Threats

Using the OfficeScan Firewall7-113. Select the type of network protocol: TCP, UDP, or ICMP.4. Specify ports on the client computer on which to perform

Strona 175

Trend Micro™ OfficeScan™ 10 Administrator’s Guide7-12• Save Template Changes: Saves the exception template with the current policy exceptions and sett

Strona 176 - Scan Methods

Using the OfficeScan Firewall7-13OfficeScan comes with a default profile named "All clients profile", which uses the "All access"

Strona 177

Trend Micro™ OfficeScan™ 10 Administrator’s Guide7-145. To save the current settings and assign the profiles to clients:a. Select whether to Overwrite

Strona 178 - Typical

Using the OfficeScan Firewall7-15• Computer name: Click the button to open, and select client computers from, the client tree.•Platform• Logon name• C

Strona 179

Trend Micro™ OfficeScan™ 10 Administrator’s Guide xxServer installation folderThe folder on the computer that contains the OfficeScan server files. If

Strona 180

Trend Micro™ OfficeScan™ 10 Administrator’s Guide7-16Firewall PrivilegesGrant users the following privileges:•View the Firewall tab on the client cons

Strona 181

Using the OfficeScan Firewall7-17To modify the content of the notification message:PATH: NOTIFICATIONS > CLIENT USER NOTIFICATIONS1. Click the Fire

Strona 182

Trend Micro™ OfficeScan™ 10 Administrator’s Guide7-18• Description: Specifies the actual security risk (such as a network virus or IDS attack) or the

Strona 183 - Smart Scan Source

Using the OfficeScan Firewall7-19c. Select Firewall view from the client tree view.d. Check if there is a green check mark under the Firewall column o

Strona 184 - Standard List

Trend Micro™ OfficeScan™ 10 Administrator’s Guide7-20To disable the OfficeScan firewall on all client computers:1. On the Web console, go to Administr

Strona 185 - Custom Lists

Section 2Managing the OfficeScanServer and Clients

Strona 186

Trend Micro™ OfficeScan™ 10 Administrator’s Guide

Strona 187 - Scan Types

8-1Chapter 8Managing the OfficeScan ServerTopics in this chapter:• Role-based Administration on page 8-2• Trend Micro Control Manager on page 8-10• Re

Strona 188

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-2Role-based AdministrationUse the role-based administration feature to grant and control access to

Strona 189 - Manual Scan

Managing the OfficeScan Server8-3Power UserDelegate this role to administrators with specific administrative tasks on the Web console.1. Users with th

Strona 190 - Scheduled Scan

1-1Chapter 1Introducing OfficeScanTopics in this chapter:• About OfficeScan on page 1-2• New in this Release on page 1-2• Key Features and Benefits on

Strona 191 - Scan Now

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-4Guest UserDelegate this role to users who want to view the Web console for reference purposes.1. U

Strona 192 - Initiating Scan Now

Managing the OfficeScan Server8-5Adding and Modifying a Custom RoleTo add a custom role:PATH: ADMINISTRATION > USER ROLES > ADDADMINISTRATION &g

Strona 193 - Scan Criteria

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-6User AccountsSet up user accounts and assign a particular role to each user. The user role determi

Strona 194

Managing the OfficeScan Server8-7To use OfficeScan user accounts in Control Manager:Refer to the Control Manager documentation for the detailed steps.

Strona 195 - Scan Exclusions

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-82. Select whether to add a custom account or an Active Directory account.• For custom account, typ

Strona 196

Managing the OfficeScan Server8-9To modify a custom account:PATH: ADMINISTRATION > USER ACCOUNTS > <USER NAME>1. Enable or disable the acc

Strona 197

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-10If you specify an Active Directory group, all members belonging to a group get the same role. If

Strona 198 - Scan Actions

Managing the OfficeScan Server8-11Control Manager allows system administrators to monitor and report on activities such as infections, security violat

Strona 199

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-12• Replicate the following settings from one OfficeScan server to another from the Control Manager

Strona 200

Managing the OfficeScan Server8-134. If you will use a proxy server to connect to the Control Manager server, specify the following proxy settings:• P

Strona 201

Trend Micro™ OfficeScan™ 10 Administrator’s Guide 1-2About OfficeScanTrend Micro™ OfficeScan™ protects enterprise networks from malware, network virus

Strona 202

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-14Reference ServersOne of the ways the OfficeScan client determines which of the firewall profiles

Strona 203

Managing the OfficeScan Server8-15b. Type the port through which clients communicate with this computer. Specify any open contact port (such as ports

Strona 204 - FILE DESCRIPTION

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-16Outbreak Prevention: • Outbreak Prevention enabled• Outbreak Prevention disabled• Number of share

Strona 205 - ILE DESCRIPTION

Managing the OfficeScan Server8-17Firewall LogsOfficeScan generates logs when it detects violations to firewall policies. For details, see Firewall Lo

Strona 206 - <Server installation

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-18Debug LogsUse debug logs to troubleshoot problems with the OfficeScan server and client. For more

Strona 207 - PARAMETER DESCRIPTION

Managing the OfficeScan Server8-19LicensesView, activate, and renew OfficeScan product service licenses on the Web console, and enable/disable the Off

Strona 208 - Spyware/Grayware Scan Actions

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-20If you have an evaluation version license• When the license expires. During this time, OfficeScan

Strona 209

Managing the OfficeScan Server8-213. In the screen that opens, type the Activation Code and click Save.Note: Register a service before activating it.

Strona 210 - To restore spyware/grayware:

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-22To back up the OfficeScan database:PATH: ADMINISTRATION > DATABASE BACKUP1. Type the location

Strona 211 - Global Scan Settings

Managing the OfficeScan Server8-23OfficeScan Web Server InformationDuring OfficeScan server installation, Setup automatically sets up a Web server (II

Strona 212 - Security Risk Notifications

Introducing OfficeScan1-3For smart scan deployment information, refer to the Trend Micro Smart Scan for OfficeScan Getting Started Guide.Active Direct

Strona 213 - VARIABLE DESCRIPTION

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-24To change the Web console password:PATH: ADMINISTRATION > CONSOLE PASSWORD1. Type the current

Strona 214

Managing the OfficeScan Server8-25To configure quarantine directory settings:PATH: ADMINISTRATION > QUARANTINE MANAGER1. Accept or modify the defau

Strona 215

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-26Network TrafficThe amount of network traffic varies throughout the day. To control the flow of ne

Strona 216 - Security Risk Logs

Managing the OfficeScan Server8-274. Under Buffer, modify the following settings:Event BufferType the maximum number of client event reports to the se

Strona 217 - Access denied

Trend Micro™ OfficeScan™ 10 Administrator’s Guide8-28connection closes (due to either the completion of the update or the client response reaching the

Strona 218

9-1Chapter 9Managing ClientsTopics in this chapter:• Computer Location on page 9-2• Client Privileges and Other Settings on page 9-5• Global Client Se

Strona 219 - Unable to delete the file

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-2Computer LocationOfficeScan provides a location awareness feature that determines the Web reputati

Strona 220

Managing Clients9-32. If you choose Client connection status, decide if you want to use a reference server. See Reference Servers on page 8-14 for det

Strona 221 - Unable to clean the file

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-4Gateway Settings ImporterOfficeScan checks a computer's location to determine the Web reputat

Strona 222 - Spyware/Grayware Logs

Managing Clients9-5Client Privileges and Other SettingsGrant users the privileges to modify certain settings and perform high level tasks on the Offic

Strona 223

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing an

Strona 224 - Spyware/Grayware Restore Logs

Trend Micro™ OfficeScan™ 10 Administrator’s Guide 1-4Platform SupportThis product release supports server and client installations on Windows Server™

Strona 225 - Outbreak Protection

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-63. If you selected domain(s) or client(s) on the client tree, click Save to apply settings to the

Strona 226 - FOLDER SESSION LINK

Managing Clients9-7Scan PrivilegesThese privileges allow users to configure their own Manual Scan, Real-time Scan and Scheduled Scan settings by openi

Strona 227 - 4. Click Save

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-8Scheduled Scan PrivilegesClients set to run Scheduled Scan can have the privileges to postpone and

Strona 228 - Outbreak Prevention

Managing Clients9-9Skip and Stop Scheduled ScanEnabling this option allows users to perform the following actions:• Skip Scheduled Scan before it runs

Strona 229 - Outbreak Prevention Policies

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-10OfficeScan Firewall PrivilegesFirewall privileges allow users to configure their own firewall set

Strona 230 - Block Ports

Managing Clients9-11Allow Users to Enable/Disable the OfficeScan Firewall, the Intrusion Detection System, and the Firewall Violation Notification Mes

Strona 231

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-12Mail Scan PrivilegesWhen clients have the Mail Scan privileges, the Mail Scan tab displays on the

Strona 232 - Disabling Outbreak Prevention

Managing Clients9-13Outlook Mail ScanWhen the Mail Scan tab displays on the client console, client users can immediately configure Outlook mail scan s

Strona 233 - Device Control

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-14Toolbox PrivilegeWhen you enable this privilege, the Toolbox tab displays on the client console.

Strona 234

Managing Clients9-15Component Update PrivilegesUpdate privileges allow client users to configure their own update settings.Perform "Update Now&qu

Strona 235 - Device Control Logs

Introducing OfficeScan1-5Key Features and BenefitsOfficeScan provides the following features and benefits:Security Risk ProtectionOfficeScan protects

Strona 236

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-16Enable Scheduled UpdateSelecting this option forces the selected clients to always run scheduled

Strona 237 - Chapter 6

Managing Clients9-17Client SecurityThis setting allows or restricts users from accessing OfficeScan client files and registries.If you select High, th

Strona 238 - About Web Threats

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-18Global Client SettingsOfficeScan applies global client settings to all clients or only to clients

Strona 239 - Web Reputation Policies

Managing Clients9-19In a Compressed File, Scan Only the First __ FilesAfter decompressing a compressed file, OfficeScan scans the specified number of

Strona 240

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-20Exclude Microsoft Exchange Server Folders from ScanningIf the OfficeScan client and a Microsoft E

Strona 241 - Proxy for Web Reputation

Managing Clients9-21The following table describes what happens if any of the conditions is not met.TABLE 9-38. Compressed file scenarios and results

Strona 242 - TIONS TAB

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-22Enabled/DisabledNot Clean or Delete (in other words, any of the following: Rename, Quarantine, De

Strona 243 - Web Reputation Logs

Managing Clients9-23Enable Assessment ModeWhen in assessment mode, all clients managed by the server will log spyware/grayware detected during Manual

Strona 244

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-24The notification message can be enabled/disabled by going to Networked Computers > Client Mana

Strona 245 - Chapter 7

Managing Clients9-25Firewall Log SettingsYou can grant certain clients the privilege to send firewall logs to the OfficeScan server. Configure the log

Strona 246 - About the OfficeScan Firewall

Trend Micro™ OfficeScan™ 10 Administrator’s Guide 1-6Because Damage Cleanup Services runs automatically in the background, you do not need to configur

Strona 247 - Using the OfficeScan Firewall

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-26OfficeScan Service RestartOfficeScan restarts client services that stopped responding unexpectedl

Strona 248

Managing Clients9-27Client Self-protectionClient self-protection provides ways for the OfficeScan client to protect the processes and other resources

Strona 249 - Firewall Policies

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-28Protect OfficeScan Client ProcessesOfficeScan blocks all attempts to terminate the following proc

Strona 250

Managing Clients9-29Network Virus Log ConsolidationWhen you enable this option, OfficeScan clients only send network virus logs to the server once eve

Strona 251 - To add a policy:

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-30Use Automatic Configuration ScriptOfficeScan uses the proxy auto-configuration (PAC) script set b

Strona 252

Managing Clients9-31Online ClientsOnline clients maintain a continuous connection with the server. The OfficeScan server can initiate tasks and deploy

Strona 253 - EXCEPTION

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-32Offline ClientsOffline clients are disconnected from the server. The OfficeScan server cannot man

Strona 254 - CTION PROTOCOL PORT DIRECTION

Managing Clients9-33Roaming ClientsRoaming clients cannot update components from, nor send logs to, the OfficeScan server. The OfficeScan server also

Strona 255 - To delete an entry:

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-34Updates to roaming clients occur only on the following occasions:• When the client user performs

Strona 256 - Firewall Profiles

Managing Clients9-35Required ActionsPerform the necessary actions if the client icon indicates any of the following conditions:Pattern File has not be

Strona 257

Introducing OfficeScan1-7and delivers comprehensive reporting. Administrators can perform remote administration, set customized policies for individua

Strona 258 - To add a profile:

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-36A Client Within the Corporate Network is Disconnected from the ServerVerify the connection from t

Strona 259 - To edit a profile:

Managing Clients9-375. Verify from the registry whether or not a client is connected to the corporate network.Key: HKEY_LOCAL_MACHINE\SOFTWARE\TrendMi

Strona 260 - Firewall Privileges

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-38Verify client-server connection manually or let OfficeScan perform scheduled verification. You ca

Strona 261 - Firewall Logs

Managing Clients9-39Client Proxy SettingsConfigure OfficeScan clients to use proxy settings when connecting to internal and external servers.Internal

Strona 262 - To test the firewall:

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-40External ProxyThe OfficeScan server and client can use external proxy settings when connecting to

Strona 263

Managing Clients9-41Client MoverIf you have more than one OfficeScan server on the network, use the Client Mover tool to transfer clients from one Off

Strona 264 - Services section

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-425. To confirm the client now reports to the other server, do the following:a. On the client compu

Strona 265 - Section 2

Managing Clients9-434. Type the following:TmTouch.exe <destination file name> <source file name>Where:<destination file name> is the

Strona 266

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-44Importing and Exporting Client SettingsYou may want many OfficeScan clients to have the same scan

Strona 267 - Chapter 8

Managing Clients9-45Managing Inactive ClientsWhen you use the client uninstallation program to remove the client program from a computer, the program

Strona 268 - Role-based Administration

Trend Micro™ OfficeScan™ 10 Administrator’s Guide 1-8FIGURE 1-1. How the OfficeScan server worksThe OfficeScan server is capable of providing real-t

Strona 269

Trend Micro™ OfficeScan™ 10 Administrator’s Guide9-46

Strona 270

Section 3Providing Additional Protection

Strona 271 - To modify a custom role:

Trend Micro™ OfficeScan™ 10 Administrator’s Guide

Strona 272 - User Accounts

10-1Chapter 10Policy Server for Cisco NACTopics in this chapter:• About Policy Server for Cisco NAC on page 10-2• Components and Terms on page 10-2• C

Strona 273

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-2About Policy Server for Cisco NACTrend Micro Policy Server for Cisco Network Admission Control (N

Strona 274

Policy Server for Cisco NAC10-3Network Access DeviceA network device that supports Cisco NAC functionality. Supported Network Access Devices include a

Strona 275 - To modify a custom account:

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-4TermsBecome familiar with the following terms related to Policy Server for Cisco NAC:TABLE 10-43.

Strona 276 - Trend Micro Control Manager

Policy Server for Cisco NAC10-5Authentica-tion, Authori-zation, and Accounting (AAA)Describes the three main services used to control end-user client

Strona 277

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-6Cisco NAC ArchitectureThe following diagram illustrates a basic Cisco NAC architecture.FIGURE 10-

Strona 278

Policy Server for Cisco NAC10-7The Client Validation SequenceClient validation refers to the process of evaluating an OfficeScan client’s security pos

Strona 279

Introducing OfficeScan1-9The OfficeScan ClientProtect Windows computers from security risks by installing the OfficeScan client on each computer. The

Strona 280 - Reference Servers

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-86. The client performs the actions configured in the posture token. FIGURE 10-23. Network access

Strona 281 - System Event Logs

Policy Server for Cisco NAC10-9The Policy ServerThe Policy Server is responsible for evaluating the OfficeScan client’s security posture and for creat

Strona 282 - Managing Logs

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-10Policy Server Policies and RulesPolicy Servers use configurable rules and policies to help enfor

Strona 283

Policy Server for Cisco NAC10-11Security Posture CriteriaRules include the following security posture criteria:• Client machine state: If the client c

Strona 284 - Log Maintenance

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-12Policy Server and OfficeScan Client ActionsIf the client security posture matches the rule crite

Strona 285 - Licenses

Policy Server for Cisco NAC10-13Checkup Virus Pattern version is at least one ver-sion older than the version on the OfficeS-can server to which the c

Strona 286 - ICENSE NEW ACTIVATION CODE

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-14Quaran-tineVirus Pattern version is at least five ver-sions older than the ver-sion on the Offic

Strona 287 - OfficeScan Database Backup

Policy Server for Cisco NAC10-15Policy CompositionPolicies include of any number of rules and default responses and actions.Rule EnforcementPolicy Ser

Strona 288

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-16Default PoliciesPolicy Server provides default policies to give you a basis for configuring sett

Strona 289 - Web Console Password

Policy Server for Cisco NAC10-17SynchronizationRegularly synchronize the Policy Server with registered OfficeScan servers to keep the Policy Server ve

Strona 290 - Quarantine Manager

Trend Micro™ OfficeScan™ 10 Administrator’s Guide 1-10Smart Scan ServerThe smart scan solution makes use of lightweight patterns that work together to

Strona 291 - Server Tuner

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-18The figure below illustrates the steps involved in creating and deploying ACS and CA certificate

Strona 292 - To run Server Tuner:

Policy Server for Cisco NAC10-19The CA CertificateOfficeScan clients with CTA installations authenticate with the ACS server before communicating clie

Strona 293

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-20Hardware• 300MHz Intel Pentium II processor or equivalent • 128MB of RAM• 300MB of available dis

Strona 294

Policy Server for Cisco NAC10-21Hardware• 200MHz single or multiple Intel Pentium processors• 128MB of RAM for Windows 2000• 256MB of RAM for Windows

Strona 295 - Chapter 9

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-22Cisco 3600 series 3640/3640A, 3660-ENT seriesIOS 12.3(8) or later48MB/16MBCisco 3700 series 3745

Strona 296 - Computer Location

Policy Server for Cisco NAC10-23Policy Server for NAC DeploymentThe following procedures are for reference only and may be subject to change depending

Strona 297 - Managing Clients

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-24Cisco Secure ACS Server EnrolmentEnroll the Cisco Secure ACS server with the Certificate Authori

Strona 298 - Gateway Settings Importer

Policy Server for Cisco NAC10-25g. Click Close to close the Add Standalone Snap-in screen.h. Click OK to close the Add/remove Snap-in screen.i. In the

Strona 299 - SETTINGS

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-263. Copy the certificate (.cer file) to the OfficeScan server computer to deploy it to the client

Strona 300 - Roaming Privilege

Policy Server for Cisco NAC10-27Deploying CTA from the OfficeScan Web ConsoleIf you did not select the option to install/upgrade CTA during server ins

Strona 301 - Scan Privileges

Introducing OfficeScan1-11There are no component download overlaps between the Smart Scan Server and the OfficeScan server because each server downloa

Strona 302 - Scheduled Scan Privileges

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-28Cisco Trust Agent VersionBefore installing CTA to clients, check the CTA version (Cisco Trust Ag

Strona 303

Policy Server for Cisco NAC10-29To deploy CTA to clients from the OfficeScan Web console:1. Open the OfficeScan server Web console and click Agent Dep

Strona 304

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-30Cisco Trust Agent Installation VerificationAfter deploying the CTA to clients, verify successful

Strona 305

Policy Server for Cisco NAC10-31To install Policy Server for Cisco NAC using the Policy Server installer:1. Log on to the computer to which you will i

Strona 306 - Mail Scan Privileges

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-32b. Next to Port, type a port that will serve as the server listening port. When the Policy Serve

Strona 307

Policy Server for Cisco NAC10-33Policy Server SSL Certificate PreparationTo establish a secure SSL connection between the ACS server and the Policy Se

Strona 308 - Proxy Configuration Privilege

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-34m. Click Next.n. Click DER encoded binary x.509 or Base 64 encoded X.509 and click Next.o. Enter

Strona 309 - Update Settings

Policy Server for Cisco NAC10-35ACS Server ConfigurationTo allow Cisco Secure ACS to pass authentication requests to the Policy Server for Cisco NAC,

Strona 310 - Scheduled Scan Setting

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-36Policy Server Configuration from OfficeScanThe first step in configuring Policy Servers is to ad

Strona 311 - Restart Notification

Policy Server for Cisco NAC10-37The Configuration Summary table displays the number of OfficeScan servers registered to the Policy Server, the Policy

Strona 312 - Global Client Settings

Trend Micro™ OfficeScan™ 10 Administrator’s Guide 1-12Smart Scan Server TypesThe Smart Scan Server to which a client connects depends on the client’s

Strona 313

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-38Policy Server RegistrationRegister the Policy Server with at least one OfficeScan server so the

Strona 314

Policy Server for Cisco NAC10-39Client Validation LogsUse the client validation logs to view detailed information about clients when they validate wit

Strona 315

Trend Micro™ OfficeScan™ 10 Administrator’s Guide10-40

Strona 316

11-1Chapter 11Configuring OfficeScan with Third-party SoftwareTopics in this chapter:• Overview of Check Point Architecture and Configuration on page

Strona 317 - Scheduled Scan Settings

Trend Micro™ OfficeScan™ 10 Administrator’s Guide11-2Overview of Check Point Architecture and ConfigurationIntegrate OfficeScan installations with Che

Strona 318

Configuring OfficeScan with Third-party Software11-3OfficeScan IntegrationOfficeScan client periodically passes the Virus Pattern number and Virus Sca

Strona 319 - Alert Settings

Trend Micro™ OfficeScan™ 10 Administrator’s Guide11-4In this example, the SCV check will allow connections through the firewall if the pattern file ve

Strona 320 - OfficeScan Service Restart

Configuring OfficeScan with Third-party Software11-55. Add a parameter by clicking Edit > Parameters > Add, and then typing a Name and Value in

Strona 321 - Client Self-protection

Trend Micro™ OfficeScan™ 10 Administrator’s Guide11-6SecureClient Support InstallationIf users connect to the office network from a Virtual Private Ne

Strona 322 - Reserved Disk Space

12-1Chapter 12Getting HelpTopics in this chapter:• Troubleshooting Resources on page 12-2• Contacting Trend Micro on page 12-15

Strona 323 - Automatic Proxy Configuration

2-1Chapter 2Getting Started with OfficeScanTopics in this chapter:• The Web Console on page 2-2• Security Summary on page 2-5• The OfficeScan Client T

Strona 324 - Client Grouping

Trend Micro™ OfficeScan™ 10 Administrator’s Guide12-2Troubleshooting ResourcesThis section provides a list of resources you can use to troubleshoot Of

Strona 325 - Online Clients

Getting Help12-3Server Debug Log Using LogServer.exeUse LogServer.exe to collect debug logs for the following:• OfficeScan server basic logs• Trend Mi

Strona 326 - Offline Clients

Trend Micro™ OfficeScan™ 10 Administrator’s Guide12-4Perform the following steps:1. Copy the LogServer folder located in <Server installation folde

Strona 327 - DESCRIPTION

Getting Help12-5Component Update LogFile name: TmuDump.txtLocation: <Server installation folder>\PCCSRV\Web\Service\AU_Data\AU_LogTo get detaile

Strona 328

Trend Micro™ OfficeScan™ 10 Administrator’s Guide12-6ServerProtect Normal Server Migration Tool LogTo enable debug logging for ServerProtect Normal Se

Strona 329 - Required Actions

Getting Help12-7To enable debug logging for the MCP Agent:1. Modify product.ini in <Server installation folder>\PCCSRV\CmAgent as follows:[Debug

Strona 330

Trend Micro™ OfficeScan™ 10 Administrator’s Guide12-8Virus Scan Engine LogTo enable debug logging for the Virus Scan Engine:1. Open the Registry Edito

Strona 331 - OfficeScan server

Getting Help12-9World Virus Tracking LogFile name: wtc.logLocation: <Server installation folder>\PCCSRV\Log\tempOfficeScan Client LogsUse client

Strona 332 - Connection Verification Logs

Trend Micro™ OfficeScan™ 10 Administrator’s Guide12-10To disable debug logging for the OfficeScan client:Delete ofcdebug.ini.Fresh Installation LogFil

Strona 333 - Client Proxy Settings

Getting Help12-11Client Connection LogFile name: Conn_YYYYMMDD.logLocation: <Client installation folder>\ConnLogClient Update LogFile name: Tmud

Strona 334 - External Proxy

The user documentation for Trend Micro OfficeScan introduces the main features of the software and installation instructions for your production envir

Strona 335 - Client Mover

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-2The Web ConsoleThe Web console is the central point for monitoring OfficeScan throughout the corpo

Strona 336 - Touch Tool

Trend Micro™ OfficeScan™ 10 Administrator’s Guide12-12OfficeScan Firewall LogTo enable debug logging for the Common Firewall Driver on Windows Vista/2

Strona 337 - Client Information

Getting Help12-13To enable debug logging for the OfficeScan NT Firewall service:1. Edit TmPfw.ini located in <Client installation folder> as fol

Strona 338 - To import client settings:

Trend Micro™ OfficeScan™ 10 Administrator’s Guide12-14Transport Driver Interface (TDI) LogTo enable debug logging for TDI:1. Add the following data in

Strona 339 - Managing Inactive Clients

Getting Help12-15Contacting Trend MicroTechnical SupportTrend Micro provides technical support, pattern downloads, and program updates for one year to

Strona 340

Trend Micro™ OfficeScan™ 10 Administrator’s Guide12-16Speeding Up Your Support CallWhen you contact Trend Micro, to speed up your problem resolution,

Strona 341 - Section 3

Getting Help12-17TrendLabsTrendLabsSM is the global antivirus research and support center of Trend Micro. Located on three continents, TrendLabs has a

Strona 342

Trend Micro™ OfficeScan™ 10 Administrator’s Guide12-18Sending Suspicious Files to Trend MicroIf you think you have an infected file but the scan engin

Strona 343 - Chapter 10

A-1Appendix AGlossaryActiveUpdateActiveUpdate is a function common to many Trend Micro products. Connected to the Trend Micro update Web site, ActiveU

Strona 344 - Components and Terms

Trend Micro™ OfficeScan™ 10 Administrator’s Guide A-2Denial of Service AttackA Denial of Service (DoS) attack refers to an attack on a computer or net

Strona 345 - COMPONENT DESCRIPTION

GlossaryA-3End User License AgreementAn End User License Agreement or EULA is a legal contract between a software publisher and the software user. It

Strona 346 - TERM DEFINITION

Getting Started with OfficeScan2-3On the Web browser, type one of the following in the address bar based on the type of OfficeScan server installation

Strona 347

Trend Micro™ OfficeScan™ 10 Administrator’s Guide A-4HTTPHypertext Transfer Protocol (HTTP) is a standard protocol used for transporting Web pages (in

Strona 348 - Cisco NAC Architecture

GlossaryA-5IntelliTrapVirus writers often attempt to circumvent virus filtering by using real-time compression algorithms. IntelliTrap helps reduce th

Strona 349 - Policy Server for Cisco NAC

Trend Micro™ OfficeScan™ 10 Administrator’s Guide A-6MCP AgentTrend Micro Management Communication Protocol (MCP) is Trend Micro's next generatio

Strona 350

GlossaryA-7query or log transmission. To reduce the network impact, the MCP agent keeps connection alive and open as much as possible. A subsequent re

Strona 351 - The Policy Server

Trend Micro™ OfficeScan™ 10 Administrator’s Guide A-8POP3Post Office Protocol 3 (POP3) is a standard protocol for storing and transporting email messa

Strona 352 - Rule Composition

GlossaryA-9SNMP TrapA Small Network Management Protocol (SNMP) trap is a method of sending notifications to network administrators that use management

Strona 353

Trend Micro™ OfficeScan™ 10 Administrator’s Guide A-10SSLSecure Socket Layer (SSL) is a protocol designed by Netscape for providing data security laye

Strona 354 - Default Rules

GlossaryA-11Trojan PortTrojan ports are commonly used by Trojan horse programs to connect to a computer. During an outbreak, OfficeScan blocks the fol

Strona 355 - • Display

Trend Micro™ OfficeScan™ 10 Administrator’s Guide A-12Trusted PortThe server and the client use trusted ports to communicate with each other. If you b

Strona 356 - • Enable client

GlossaryA-13To determine the trusted ports:1. Access <Server installation folder>\PCCSRV.2. Open the ofcscan.ini file using a text editor such a

Strona 357 - Policy Composition

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-4The Web Console BannerThe banner area of the Web console provides you the following options:FIGURE

Strona 358 - Default Policies

Trend Micro™ OfficeScan™ 10 Administrator’s Guide A-14Files Infected with WormsA computer worm is a self-contained program (or set of programs) able t

Strona 359 - Certificates

GlossaryA-153. Open the command prompt, and type the following to delete the files:cd \cd recycleddel *.* /SThe last command deletes all files in the

Strona 360

Trend Micro™ OfficeScan™ 10 Administrator’s Guide A-163. If the infected file is in the Windows Temp folder:a. Open the command prompt and go to the W

Strona 361 - The CA Certificate

GlossaryA-17For computers running other operating systems (or those without NTFS):1. Restart the computer in MS-DOS mode.2. If the infected file is in

Strona 362

Trend Micro™ OfficeScan™ 10 Administrator’s Guide A-18

Strona 363

IN-1IndexAAccess Control Server (ACS) 10-3ACS certificate 10-17Active Directory 1-3, 2-22, 3-12, 3-23, 8-9query results 2-24scheduled query 2-27scope

Strona 364

Trend Micro™ OfficeScan™ 10 Administrator’s Guide IN-2client security level 9-17client self-protection 1-3, 9-27client tree 2-11advanced search 2-13ge

Strona 365

Manual NameIN-3profiles 7-2, 7-12tasks 7-4testing 7-18Fragmented IGMP 7-3Ggateway IP address 9-2gateway settings importer 9-4global client settings 9-

Strona 366 - CA Certificate Installation

Trend Micro™ OfficeScan™ 10 Administrator’s Guide IN-4MSI package 3-11–3-12, 3-23–3-24NNetwork Access Device 10-3network virus 5-4, 7-2, 9-29new featu

Strona 367

Manual NameIN-5Ppacker 5-3password 2-3, 8-23password cracking applications 5-5patches 4-8performance control 1-4, 5-27phishing A-7Ping of Death 7-3Plu

Strona 368 - Cisco Trust Agent Deployment

Getting Started with OfficeScan2-5Security SummaryThe Summary screen appears when you open the OfficeScan Web console or click Summary in the main men

Strona 369 - To import the certificate:

Trend Micro™ OfficeScan™ 10 Administrator’s Guide IN-6user accounts 8-6user roles 8-2rootkit protection 4-7Sscan actions 5-30spyware/grayware 5-40viru

Strona 370

Manual NameIN-7Smart Scan Agent Pattern 4-3Smart Scan Pattern 1-10, 4-3Smart Scan Server 1-10, 4-21, 5-10scheduled updates 4-21types 1-12update source

Strona 371

Trend Micro™ OfficeScan™ 10 Administrator’s Guide IN-8Update Agent 4-37URL Filtering Engine 4-6user roleadministrator 8-2guest user 8-4power user 8-3V

Strona 372

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-6If you have obtained an Activation Code, renew a license by going to Administration > Product L

Strona 373

Getting Started with OfficeScan2-7The Conventional Scan tab displays the following information:FIGURE 2-4. Summary screen - Conventional Scan tab• T

Strona 374

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-8The Smart Scan tab displays the following information:FIGURE 2-5. Summary screen - Smart Scan ta

Strona 375

Getting Started with OfficeScan2-9Top 10 Security Risk StatisticsA link on the Detection Status table opens a screen containing top 10 security risk s

Strona 376

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-10Outbreak StatusThe Outbreak Status table provides the status of any current security risk outbrea

Strona 377 - ACS Server Configuration

Getting Started with OfficeScan2-11For each program, view the clients that have not been upgraded by clicking the number link corresponding to the pro

Strona 378 - Policy Server

ContentsiContentsPrefaceOfficeScan Documentation ...xviAudience ...

Strona 379

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-12Client Tree General TasksBelow are the general tasks you can perform when the client tree display

Strona 380 - Policies

Getting Started with OfficeScan2-13• Refresh the client tree by clicking .• View client statistics below the client tree, such as the total number of

Strona 381 - Administrative Tasks

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-14Networked Computers > Client ManagementManage general client settings on this screen.FIGURE 2-

Strona 382

Getting Started with OfficeScan2-15Settings• Choose from the available scan methods. For details, see Scan Methods on page 5-8.• Configure settings fo

Strona 383 - Chapter 11

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-16Logs View the following logs:• Virus/Malware Logs on page 5-48• Spyware/Grayware Logs on page 5-5

Strona 384 - Configuration

Getting Started with OfficeScan2-17Networked Computers > Outbreak PreventionTask: Specify and activate outbreak protection settings.FIGURE 2-11.

Strona 385 - OfficeScan Integration

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-18Updates > Rollback > Synchronize with ServerTask: Perform component rollback.FIGURE 2-13.

Strona 386

Getting Started with OfficeScan2-19Logs > Networked Computer Logs > Security RisksView and manage logs on this screen.FIGURE 2-14. Security Ri

Strona 387 - NAME VALUE

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-20Cisco NAC > Agent DeploymentTask: Perform Cisco Trust Agent Deployment.FIGURE 2-15. Agent De

Strona 388

Getting Started with OfficeScan2-21To add a domain:PATH: NETWORKED COMPUTERS > CLIENT MANAGEMENT > MANAGE CLIENT TREE > ADD DOMAINS1. Type a

Strona 389 - Chapter 12

Trend Micro™ OfficeScan™ 10 Administrator’s Guide iiSection 1: Protecting Networked ComputersChapter 3: Installing the OfficeScan ClientInstallation R

Strona 390 - Troubleshooting Resources

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-22To move a client:PATH: NETWORKED COMPUTERS > CLIENT MANAGEMENT > MANAGE CLIENT TREE > MO

Strona 391 - To disable debug logging:

Getting Started with OfficeScan2-23Active Directory Scope and QueryWhen using Security Compliance for the first time, define the Active Directory scop

Strona 392 - Installation Logs

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-244. Choose whether to check a computer’s connectivity using a particular port number. When connect

Strona 393 - Client Packager Log

Getting Started with OfficeScan2-25Recommended tasks:1. On the Security Status section, click a number link to display all affected computers in the c

Strona 394 - Control Manager MCP Agent Log

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-26OfficeScan Client InstallationBefore installing the client, take note of the following:1. Record

Strona 395 - Getting Help

Getting Started with OfficeScan2-27To install the OfficeScan client:PATH: SECURITY COMPLIANCE1. Click Install on top of the client tree.If an earlier

Strona 396 - Outbreak Logs

Trend Micro™ OfficeScan™ 10 Administrator’s Guide2-28

Strona 397 - OfficeScan Client Logs

Section 1Protecting NetworkedComputers

Strona 398 - Mail Scan Log

Trend Micro™ OfficeScan™ 10 Administrator’s Guide

Strona 399 - Outbreak Prevention Log

3-1Chapter 3Installing the OfficeScan ClientTopics in this chapter:• Installation Requirements on page 3-2• Installation Methods on page 3-11• Migrati

Strona 400 - OfficeScan Firewall Log

ContentsiiiChapter 4: Keeping Protection Up-to-DateOfficeScan Components and Programs ... 4-2Antivi

Strona 401

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-2Installation RequirementsThe OfficeScan client can be installed on computers running the following

Strona 402

Installing the OfficeScan Client3-3Hardware Processor300MHz Intel™ Pentium™ or equivalentRAM256MB minimum, 512MB recommendedAvailable disk space350MB

Strona 403 - Contacting Trend Micro

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-4TABLE 3-5. Windows XP/2003, 32-bit versionRESOURCE REQUIREMENTOperating system• Windows XP Profe

Strona 404

Installing the OfficeScan Client3-5Others• Microsoft Internet Explorer 6.0 or later if performing Web setup• Disable Simple File Sharing on Windows XP

Strona 405 - Security Information Center

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-6Hardware Processor• Intel x64 processor• AMD64 processorRAM256MB minimum, 512MB recommendedAvailab

Strona 406 - Documentation Feedback

Installing the OfficeScan Client3-7TABLE 3-7. Windows Vista, 32-bit and 64-bit versionsRESOURCE REQUIREMENTOperating system• Windows Vista™ Business

Strona 407 - Appendix A

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-8Others Windows Internet Explorer 7.0 or later if performing Web setupTABLE 3-8. Windows 2008, 32

Strona 408

Installing the OfficeScan Client3-9Others Windows Internet Explorer 7.0 or later if performing Web setupTABLE 3-9. Windows 2008, 64-bit versionRESOU

Strona 409 - Glossary

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-10Compatibility ListOfficeScan is compatible with the following third-party products:• Citrix XenAp

Strona 410

Installing the OfficeScan Client3-11Installation MethodsThis section provides a summary of the different client installation methods to perform fresh

Strona 411

Trend Micro™ OfficeScan™ 10 Administrator’s Guide ivUpdate Source for Update Agents ...4-39Updat

Strona 412

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-12Client Packager (MSI package deployed through Active Direc-tory)Supported on all operating system

Strona 413

Installing the OfficeScan Client3-13Installing from the Web Install PageUsers can install the client program from the Web install page if you installe

Strona 414

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-14Send the following instructions to users to install the OfficeScan client from the Web install pa

Strona 415

Installing the OfficeScan Client3-15Initiating Browser-based InstallationSet up an email message that instructs users on the network to install the Of

Strona 416

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-16For remote desktop installation using AutoPcc.exe:• The computer must be run in Mstsc.exe /consol

Strona 417 - Trojan Port

Installing the OfficeScan Client3-17To add AutoPcc.exe to the login script using Login Script Setup:1. On the computer you used to run the server inst

Strona 418

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-18Installing with Client PackagerClient Packager can compress Setup and update files into a self-ex

Strona 419

Installing the OfficeScan Client3-194. Configure the following settings (some settings are only available if you select a particular package type):• W

Strona 420

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-20Package deployment guidelines:1. Send the package to users and ask them to run the client package

Strona 421

Installing the OfficeScan Client3-21• If you will use the package to upgrade a client to this OfficeScan version, check the domain level scan method o

Strona 422

ContentsvSecurity Risk Notifications for Administrators ... 5-45Security Risk Notifications for Client Users ...

Strona 423

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-222. The OfficeScan server that manages the Update Agent will not be able to synchronize or deploy

Strona 424

Installing the OfficeScan Client3-23Check Point SecureClient SupportThis tool adds support for Check Point™ SecureClient™ for Windows 2000/XP/Server 2

Strona 425

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-247. Select a deployment method and then click OK.• Assigned: The MSI package is automatically depl

Strona 426

Installing the OfficeScan Client3-256. Browse and select the MSI package file created by Client Packager, and then click Open. The MSI package name ap

Strona 427

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-26To distribute the package to target computers:1. On the Tree tab, click Advertisements.2. On the

Strona 428

Installing the OfficeScan Client3-2717. Click Yes, assign the program, and then click Next.Microsoft SMS creates the advertisement and displays it on

Strona 429

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-283. Select the target computers.•The Domains and Computers list displays all the Windows domains o

Strona 430

Installing the OfficeScan Client3-29Installing from a Client Disk ImageDisk imaging technology allows you to create an image of an OfficeScan client u

Strona 431

Trend Micro™ OfficeScan™ 10 Administrator’s Guide3-30Using Vulnerability ScannerUse Vulnerability Scanner to detect installed antivirus solutions, sea

Strona 432

Installing the OfficeScan Client3-31Network Topology and ArchitectureCentralized administra-tionModerately effectiveOutsource service Moderately effec

Komentarze do niniejszej Instrukcji

Brak uwag