instvsgen

Vulnerability Scan Settings

Vulnerability scan settings are configured from Trend Micro Vulnerability Scanner (TMVS.exe) or from the TMVS.ini file.

Product Query

Vulnerability Scanner can check for the presence of security software on endpoints. The following table discusses how Vulnerability Scanner checks security products:

Security Products Checked by Vulnerability Scanner

Product

Description

ServerProtect for Windows

Vulnerability Scanner uses RPC endpoint to check if SPNTSVC.exe is running. It returns information including operating system, and Virus Scan Engine, Virus Pattern and product versions. Vulnerability Scanner cannot detect the ServerProtect Information Server or the ServerProtect Management Console.

ServerProtect for Linux

If the target computer does not run Windows, Vulnerability Scanner checks if it has ServerProtect for Linux installed by trying to connect to port 14942.

OfficeScan client

Vulnerability Scanner uses the OfficeScan client port to check if the OfficeScan client is installed. It also checks if the TmListen.exe process is running. It retrieves the port number automatically if executed from its default location.

If you launched TMVS on a computer other than the OfficeScan server, check and then use the other computer's communication port.

PortalProtect™

Vulnerability Scanner loads the web page http://localhost:port/PortalProtect/index.html to check for product installation.

ScanMail™ for Microsoft Exchange™

Vulnerability Scanner loads the web page http://ipaddress:port/scanmail.html to check for ScanMail installation. By default, ScanMail uses port 16372. If ScanMail uses a different port number, specify the port number. Otherwise, Vulnerability Scanner cannot detect ScanMail.

InterScan™ family

Vulnerability Scanner loads each web page for different products to check for product installation.

  • InterScan Messaging Security Suite 5.x: http://localhost:port/eManager/cgi-bin/eManager.htm

  • InterScan eManager 3.x: http://localhost:port/eManager/cgi-bin/eManager.htm

  • InterScan VirusWall™ 3.x: http://localhost:port/InterScan/cgi-bin/interscan.dll

Trend Micro Internet Security™ (PC-cillin)

Vulnerability Scanner uses port 40116 to check if Trend Micro Internet Security is installed.

McAfee VirusScan ePolicy Orchestrator

Vulnerability Scanner sends a special token to TCP port 8081, the default port of ePolicy Orchestrator for providing connection between the server and client. The computer with this antivirus product replies using a special token type. Vulnerability Scanner cannot detect the standalone McAfee VirusScan.

Norton Antivirus™ Corporate Edition

Vulnerability Scanner sends a special token to UDP port 2967, the default port of Norton Antivirus Corporate Edition RTVScan. The computer with this antivirus product replies using a special token type. Since Norton Antivirus Corporate Edition communicates by UDP, the accuracy rate is not guaranteed. Furthermore, network traffic may influence UDP waiting time.

Vulnerability Scanner detects products and computers using the following protocols:

Perform the following steps to configure product query settings:

  1. To specify product query settings from Vulnerability Scanner (TMVS.exe):

    1. Launch TMVS.exe.

    2. Click Settings. The Settings screen appears.

    3. Go to the Product query section.

    4. Select the products to check.

    5. Click Settings next to a product name and then specify the port number that Vulnerability Scanner will check.

    6. Click OK. The Settings screen closes.

  2. To set the number of computers that Vulnerability Scanner simultaneously checks for security software:

    1. Navigate to <Server installation folder>\PCCSRV\Admin\Utility\TMVS and open TMVS.ini using a text editor such as Notepad.

    2. To set the number of computers checked during manual vulnerability scans, change the value for ThreadNumManual. Specify a value between 8 and 64.

    3. For example, type ThreadNumManual=60 if you want Vulnerability Scanner to check 60 computers at the same time.

    4. To set the number of computers checked during scheduled vulnerability scans, change the value for ThreadNumSchedule. Specify a value between 8 and 64.

    5. For example, type ThreadNumSchedule=50 if you want Vulnerability Scanner to check 50 computers at the same time.

    6. Save TMVS.ini.

Method for Retrieving Computer Descriptions

When Vulnerability Scanner is able to "ping" host machines, it can retrieve additional information about the host machines. There are two methods for retrieving information:

Perform the following steps to configure retrieval settings:

  1. Launch TMVS.exe.

  2. Click Settings. The Settings screen appears.

  3. Go to the Method for retrieving computer descriptions section.

  4. Select Normal or Quick.

  5. If you selected Normal, select Retrieve computer descriptions, if available.

  6. Click OK. The Settings screen closes.

Notifications

Vulnerability Scanner can send the vulnerability scan results to OfficeScan administrators. It can also display notifications on unprotected host machines.

Perform the following steps to configure notification settings:

  1. Launch TMVS.exe.

  2. Click Settings. The Settings screen appears.

  3. Go to the Notifications section.

  4. To automatically send the Vulnerability Scan results to yourself or to other administrators in your organization:

    1. Select Email results to the system administrator.

    2. Click Configure to specify email settings.

    3. In To, type the email address of the recipient.

    4. In From, type the email address of the sender.

    5. In SMTP server, type the SMTP server address. For example, type smtp.company.com. The SMTP server information is required.

    6. In Subject, type a new subject for the message or accept the default subject.

    7. Click OK.

  5. To inform users that their computers do not have security software installed:

    1. Select Display a notification on unprotected computers.

    2. Click Customize to configure the notification message.

    3. In the Notification Message screen, type a new message or accept the default message.

    4. Click OK.

  6. Click OK. The Settings screen closes.

Vulnerability Scan Results

You can configure Vulnerability Scanner to save the vulnerability scan results to a comma-separated value (CSV) file.

Perform the following steps to configure vulnerability scan results settings:

  1. Launch TMVS.exe.

  2. Click Settings. The Settings screen appears.

  3. Go to the Save results section.

  4. Select Automatically save the results to a CSV file.

  5. To change the default folder for saving the CSV file:

    1. Click Browse.

    2. Select a target folder on the computer or on the network.

    3. Click OK.

  6. Click OK. The Settings screen closes.

Ping Settings

Use "ping" settings to validate the existence of a target machine and determine its operating system. If these settings are disabled, Vulnerability Scanner scans all the IP addresses in the specified IP address range – even those that are not used on any host machine – thereby making the scanning attempt longer than it should be.

Perform the following steps to configure ping settings:

  1. To specify ping settings from Vulnerability Scanner (TMVS.exe):

    1. Launch TMVS.exe.

    2. Click Settings. The Settings screen appears.

    3. Go to the Ping settings section.

    4. Select Allow Vulnerability Scanner to ping computers on your network to check their status.

    5. In the Packet size and Timeout fields, accept or modify the default values.

    6. Select Detect the type of operating system using ICMP OS fingerprinting. If you select this option, Vulnerability Scanner determines if a host machine runs Windows or another operating system. For host machines running Windows, Vulnerability Scanner can identify the version of Windows.

    7. Click OK. The Settings screen closes.

  2. To set the number of computers that Vulnerability Scanner simultaneously pings:

    1. Navigate to <Server installation folder>\PCCSRV\Admin\Utility\TMVS and open TMVS.ini using a text editor such as Notepad.

    2. Change the value for EchoNum. Specify a value between 1 and 64.

    3. For example, type EchoNum=60 if you want Vulnerability Scanner to ping 60 computers at the same time.

    4. Save TMVS.ini.

OfficeScan Server Settings

OfficeScan server settings are used when:

Perform the following steps to configure OfficeScan server settings:

  1. Launch TMVS.exe.

  2. Click Settings. The Settings screen appears.

  3. Go to the OfficeScan server settings section.

  4. Type the OfficeScan server name and port number.

  5. Select Auto-install OfficeScan client on unprotected computers.

  6. To configure the administrative credentials:

    1. Click Install to Account.

    2. In the Account Information screen, type a user name and password.

    3. Click OK.

  7. Select Send logs to the OfficeScan server.

  8. Click OK. The Settings screen closes.

See also: