Show 

Home > Getting Started > Getting Started...

Getting Started...

After installing IWSVA, there are a number of tasks you can perform to ensure that everything is set up and working properly, and that you will be making full use of the many IWSVA features.

  1. Open the IWSVA console

  2. Secure the IWSVA console

  1. Set up and deploy IWSVA with the Deployment Wizard

  2. Perform an immediate update of IWSVA pattern and program files

  3. Set up the User ID method

  4. Configure the email notification server

  5. Schedule default email notifications

  6. Set up SNMP notifications

  7. Update the virus pattern

  8. Schedule automatic pattern and engine updates

  9. Set up HTTP scanning proxy options (if not completed during Setup)

  10. Configure HTTP scanning policies

  11. Flush the proxy cache to ensure no existing Internet threats are accessible from the cache

  12. Set Up Transparency

  1. Create ActiveX and Java applet Security policies

  2. Create URL Filtering policies

  3. Test URL Filtering

  1. Configure PhishTrap settings and any specific URL sites to block.

  2. Create Access Quota policies

  3. Add the local intranet to the list of Approved URL Filtering sites.

  1. Create URL Access Control policies (anti spyware scanning)

  2. URL Blocking (Local List)

  3. URL Blocking (PhishTrap)

  1. Create FTP scanning policies

  2. Inbound and/or outbound

  1. Obtain the EICAR test file to confirm your installation is working properly

  2. Test HTTP download scanning

  3. Test HTTP upload scanning

  4. Test FTP scanning

  5. Test URL blocking

  1. Configure IWSVA to work with Trend Micro Damage Cleanup Services (if installed)

  2. Configure IWSVA to work with Trend Micro Control Manager

Other Common Tasks: