Many
Manuals
search
Kategorie
Marki
Strona główna
SCAN
Oprogramowanie
5-2
Dokumentacja
SCAN 5-2 Dokumentacja Strona 66
Pobierz
Podziel się
Dzielenie się
Dodaj do moich podręczników
Drukuj
Strona
/
432
Spis treści
ROZWIĄZYWANIE PROBLEMÓW
BOOKMARKI
Oceniono
.
/ 5. Na podstawie
oceny klientów
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
Trend Micro™ OfficeScan™ 10 Administrator’s Guide
2-28
1
2
...
61
62
63
64
65
66
67
68
69
70
71
...
431
432
OfficeScan
1
Chapter 9: Managing Clients
11
Contents
13
Software
14
Chapter 12: Getting Help
14
Appendix A: Glossary
15
List of Tables
17
OfficeScan Documentation
22
Audience
23
Document Conventions
23
Terminology
24
—all of which are
25
TERMINOLOGY DESCRIPTION
26
Chapter 1
27
About OfficeScan
28
New in this Release
28
Introducing OfficeScan
29
Key Features and Benefits
31
The OfficeScan Server
33
The OfficeScan Client
35
Smart Scan Server
36
Smart Scan Server Types
38
Chapter 2
39
The Web Console
40
NSTALLATION TYPE URL
41
Web console banner area
42
Security Summary
43
Top 10 Security Risks screen
47
The OfficeScan Client Tree
49
Client Tree General Tasks
50
Client Tree Specific Tasks
51
MENU BUTTON TASK
52
• Firewall Logs on page 7-17
54
Outbreak Prevention screen
55
Component Update screen
55
Rollback screen
56
Security Risk Logs screen
57
OfficeScan Domains
58
Security Compliance
60
PATH: SECURITY COMPLIANCE
61
TATUS DESCRIPTION
62
Recommended tasks:
63
STATUS DESCRIPTION
63
Section 1
67
Chapter 3
69
Installation Requirements
70
RESOURCE REQUIREMENT
71
• Intel x64 processor
74
• AMD64 processor
74
Installation Methods
79
• Windows Vista Home
80
• Windows XP Home
80
• Windows Vista
80
• Windows 2008
80
• 64-bit platforms
80
INSTALLATION METHOD/
81
OPERATING SYSTEM
81
DEPLOYMENT CONSIDERATIONS
81
PACKAGE TYPE DESCRIPTION
86
file is correct. To
87
Client Packager Settings
88
Using Vulnerability Scanner
98
Domain Structure
100
Network Traffic
101
Network Size
101
Managing General Settings
104
• InterScan eManager 3.x:
105
• InterScan VirusWall™ 3.x:
105
PRODUCT DESCRIPTION
106
Running Vulnerability Scan
108
ETTING DESCRIPTION
109
Creating a Scheduled Task
110
Post-installation
116
To perform a test scan:
117
Uninstalling the Client
118
Chapter 4
125
Antivirus Components
126
Keeping Protection Up-to-Date
127
Anti-spyware Components
130
Firewall Components
130
Web Reputation Component
130
Programs
132
Update Overview
134
Smart Scan Server Update
136
OfficeScan Server Update
137
Server Update Source
139
Proxy for Server Update
140
Server Component Duplication
140
Server Update Methods
143
Server Update Logs
144
Client Update
147
2. Click Notify All Clients
148
Customized Update Source
149
Standard Update Source
150
Client Update Methods
151
OPTION DESCRIPTION
153
Manual Update
155
Update Privileges
157
PROXY SETTINGS USED USAGE
158
Client Update Logs
159
Client Update Notification
159
Component Rollback
160
Update Agents
161
Update Agent Configuration
162
Component Update Summary
167
Chapter 5
169
About Security Risks
170
Spyware and Grayware
172
Potential Risks and Threats
174
Scan Methods
176
Typical
178
Smart Scan Source
183
Standard List
184
Custom Lists
185
Scan Types
187
Manual Scan
189
Scheduled Scan
190
Scan Now
191
Initiating Scan Now
192
Scan Criteria
193
Scan Exclusions
195
Scan Actions
198
<Client installation
204
FILE DESCRIPTION
204
ILE DESCRIPTION
205
<Server installation
206
PARAMETER DESCRIPTION
207
Spyware/Grayware Scan Actions
208
To restore spyware/grayware:
210
Scan-related Privileges
211
Global Scan Settings
211
Security Risk Notifications
212
VARIABLE DESCRIPTION
213
Security Risk Logs
216
Quarantined
217
Access denied
217
Unable to delete the file
219
Unable to clean the file
221
Spyware/Grayware Logs
222
Spyware/Grayware Restore Logs
224
Outbreak Protection
225
FOLDER SESSION LINK
226
4. Click Save
227
Outbreak Prevention
228
Outbreak Prevention Policies
229
Block Ports
230
Disabling Outbreak Prevention
232
Device Control
233
Device Control Logs
235
Chapter 6
237
Web Reputation
238
About Web Threats
238
Location Awareness
239
Web Reputation Policies
239
Approved URLs
241
Proxy for Web Reputation
241
TIONS TAB
242
Web Reputation Logs
243
Chapter 7
245
About the OfficeScan Firewall
246
Using the OfficeScan Firewall
247
Firewall Policies
249
To add a policy:
251
EXCEPTION
253
XCEPTION
254
CTION PROTOCOL PORT DIRECTION
254
To edit a policy exception:
255
To delete an entry:
255
Firewall Profiles
256
To add a profile:
258
To edit a profile:
259
Firewall Privileges
260
Firewall Logs
261
To test the firewall:
262
Services section
264
Section 2
265
Chapter 8
267
Role-based Administration
268
To add a custom role:
271
To modify a custom role:
271
User Accounts
272
To modify a custom account:
275
Trend Micro Control Manager
276
Reference Servers
280
System Event Logs
281
Managing Logs
282
Log Maintenance
284
Licenses
285
ICENSE NEW ACTIVATION CODE
286
OfficeScan Database Backup
287
Web Console Password
289
Quarantine Manager
290
Server Tuner
291
To run Server Tuner:
292
Chapter 9
295
Computer Location
296
Managing Clients
297
Gateway Settings Importer
298
SETTINGS
299
Roaming Privilege
300
Scan Privileges
301
Scheduled Scan Privileges
302
Mail Scan Privileges
306
Toolbox Privilege
308
Proxy Configuration Privilege
308
Component Update Privileges
309
Client Uninstallation
309
Client Unloading
309
Update Settings
309
Web Reputation Setting
310
Scheduled Scan Setting
310
Client Security
311
POP3 Email Scan Settings
311
Restart Notification
311
Global Client Settings
312
Scheduled Scan Settings
317
Firewall Log Settings
319
Alert Settings
319
OfficeScan Service Restart
320
Client Self-protection
321
Reserved Disk Space
322
Automatic Proxy Configuration
323
Client Grouping
324
Online Clients
325
Offline Clients
326
DESCRIPTION
327
Required Actions
329
OfficeScan server
331
Connection Verification Logs
332
Client Proxy Settings
333
External Proxy
334
Client Mover
335
Touch Tool
336
Client Information
337
To import client settings:
338
Managing Inactive Clients
339
Section 3
341
Chapter 10
343
Components and Terms
344
COMPONENT DESCRIPTION
345
TERM DEFINITION
346
Cisco NAC Architecture
348
Policy Server for Cisco NAC
349
The Policy Server
351
Rule Composition
352
Default Rules
354
• Update
355
• Perform automatic
355
• Display
355
• Enable client
356
Policy Composition
357
Default Policies
358
Synchronization
359
Certificates
359
The CA Certificate
361
CA Certificate Installation
366
Cisco Trust Agent Deployment
368
To import the certificate:
369
ACS Server Configuration
377
To add a Policy Server:
378
To delete a Policy Server:
378
Policy Server
378
Policy Server Registration
380
Policies
380
Client Validation Logs
381
Client Log Maintenance
381
Administrative Tasks
381
Chapter 11
383
Configuration
384
OfficeScan Integration
385
NAME VALUE
387
Chapter 12
389
Troubleshooting Resources
390
To enable debug logging:
391
To disable debug logging:
391
Installation Logs
392
Component Update Log
393
Client Packager Log
393
VSEncrypt Log
394
Control Manager MCP Agent Log
394
Getting Help
395
Virus Scan Engine Log
396
Outbreak Logs
396
OfficeScan Client Logs
397
Fresh Installation Log
398
Upgrade/Hot Fix Log
398
Damage Cleanup Services Log
398
Mail Scan Log
398
Client Connection Log
399
Client Update Log
399
Outbreak Prevention Log
399
OfficeScan Firewall Log
400
Contacting Trend Micro
403
TrendLabs
405
Security Information Center
405
Documentation Feedback
406
Appendix A
407
Glossary
409
Trojan Port
417
Komentarze do niniejszej Instrukcji
Brak uwag
Publish
Drukuj dokument
Drukuj stronę 66
Komentarze do niniejszej Instrukcji