OfficeScan 10.6 SP1 Online Help
Contents
Index
Search
Search Knowledge Base
Collapse All
Expand All
Previous Page
Next Page
Preface
OfficeScan Documentation
Audience
Document Conventions
Terminology
Introducing OfficeScan
About OfficeScan
New in this Release
Policy Management from Control Manager
Behavior Monitoring 64-bit Support
Client Self-protection 64-bit Support
Device Control 64-bit Support for Unauthorized Change Prevention
Data Protection Enhancements
Virtual Desktop Infrastructure Enhancements
Extended Web Reputation Port Scanning
New in Version 10.6
Key Features and Benefits
The OfficeScan Server
The OfficeScan Client
Integration with Trend Micro Products and Services
Getting Started with OfficeScan
The Web Console
Requirements for Opening the Web Console
Logon Account
The Web Console Banner
The Summary Dashboard
Product License Status Section
Tabs and Widgets
Working with Tabs
Working with Widgets
Predefined Tabs and Widgets
Available Widgets
Client Connectivity Widget
Client Connectivity Widget Presented as a Table
Client Connectivity Widget Presented as a Pie Chart
Security Risk Detections Widget
Outbreaks Widget
Client Updates Widget
OfficeScan and Plug-ins Mashup Widget
Top Data Loss Preventions Incidents Widget
Data Loss Prevention Incidents Over Time Widget
Web Reputation Top Threat Sources Widget
Web Reputation Top Threatened Users Widget
File Reputation Threat Map Map Widget
Active Directory Integration
Integrating Active Directory with OfficeScan
Synchronizing Data with Active Directory Domains
Manually Synchronizing Data with Active Directory Domains
Automatically Synchronizing Data with Active Directory Domains
The OfficeScan Client Tree
Client Tree General Tasks
Advanced Search Options
Client Tree Specific Tasks
Client Management Screen
Outbreak Prevention Screen
Component Update for Networked Computers Screen
Rollback Screen
Security Risk Logs for Networked Computers Screen
Agent Deployment Screen
OfficeScan Domains
Client Grouping
Manual Client Grouping
Configuring Manual Client Grouping
Automatic Client Grouping
Configuring Automatic Client Grouping
Defining a Client Grouping Rule by Active Directory Domains
Defining a Client Grouping Rule by IP Addresses
Client Grouping Tasks
Adding a Domain
Deleting a Domain or Client
Renaming a Domain
Moving an OfficeScan Client to Another Domain or OfficeScan Server
Sorting Clients
Using Trend Micro Smart Protection
About Trend Micro Smart Protection
The Need for a New Solution
Smart Protection Services
File Reputation Services
Web Reputation Services
Smart Feedback
Smart Protection Sources
Trend Micro Smart Protection Network
Smart Protection Server
Smart Protection Sources Compared
Smart Protection Pattern Files
Smart Scan Agent Pattern
Smart Scan Pattern
Web Blocking List
Smart Protection Pattern Update Process
Usage of Smart Protection Patterns
Setting Up Smart Protection Services
Smart Protection Server Installation
Standalone Smart Protection Server Installation
Integrated Smart Protection Server Installation
Integrated Smart Protection Server Tool
Smart Protection Server Best Practices
Customizing ptngrowth.ini for the Standalone Server
Customizing ptngrowth.ini for the Integrated Server
Integrated Smart Protection Server Management
Enabling the Integrated Server’s File Reputation Services and Web Reputation Services
Recording the Integrated Server’s Addresses
Updating the Integrated Server’s Components
Integrated Server’s Approved/Blocked URL List Configuration
Configuring an Integrated Smart Protection Server Settings
Smart Protection Source List
IPv6 Support for Smart Protection Sources
Smart Protection Sources and Computer Location
Configuring the Standard List of Smart Protection Sources
Configuring Custom Lists of Smart Protection Sources
Client Connection Proxy Settings
Computer Location Settings
Trend Micro Network VirusWall Installations
Using Smart Protection Services
Installing the OfficeScan Client
OfficeScan Client Fresh Installations
Installation Considerations
OfficeScan Client Features
OfficeScan Client Installation and IPv6 Support
Operating System
Installation Methods
Client IP Addresses
Configuring the IP Address that Dual-stack Clients Use When Registering to the Server
Deployment Considerations
Web Install Page Installations
Installing from the Web Install Page
Browser-based Installation
Initiating a Browser-based Installation
Performing a UNC-based Installation
Installing Remotely from the OfficeScan Web Console
Installing with Login Script Setup
OfficeScan Client Installation
Program and Component Updates
The Windows Server 2003 and Windows Server 2008 Scripts
Adding Autopcc.exe to the Login Script Using Login Script Setup
Installing with Client Packager
Creating an Installation Package Using Client Packager
Package Deployment Guidelines
Windows Operating System Type
Scan Method
Silent Mode
Disable Prescan
Force Overwrite with Latest Version
Update Agent Capabilities
Outlook Mail Scan
Check Point SecureClient Support
Components
Deploying an MSI Package Using Active Directory
Deploying an MSI Package Using Microsoft SMS
Obtaining the Package Locally
Obtaining the Package Remotely
Distributing the Package to Target Computers
Installations Using a Client Disk Image
Creating a Disk Image of an OfficeScan Client
Vulnerability Scanner Usage
Considerations When Using Vulnerability Scanner
Network Administration
Network Topology and Architecture
Software/Hardware Specifications
Domain Structure
Network Traffic
Network Size
Guidelines When Installing the OfficeScan Client Using Vulnerability Scanner
Vulnerability Scan Methods
Running a Manual Vulnerability Scan
Running a DHCP Scan
Configuring a Scheduled Vulnerability Scan
Vulnerability Scan Settings
Product Query
Configuring Product Query Settings
Method for Retrieving Computer Descriptions
Configuring Retrieval Settings
Notifications
Configuring Notification Settings
Vulnerability Scan Results
Configuring Scan Results
Ping Settings
Configuring Ping Settings
OfficeScan Server Settings
Configuring OfficeScan Server Settings
Installing with Security Compliance
Installing the OfficeScan Client
Migrating to the OfficeScan Client
Migrating from Other Endpoint Security Software
OfficeScan Client Migration Issues
Migrating from ServerProtect Normal Servers
Using the ServerProtect Normal Server Migration Tool
Post-installation
OfficeScan Client Shortcut
Programs List
OfficeScan Client Services
OfficeScan Client Installation Logs
Recommended Post-installation Tasks
Component Updates
Test Scan Using the EICAR Test Script
Performing a Test Scan
OfficeScan Client Uninstallation
Uninstalling the OfficeScan Client from the Web Console
The OfficeScan Client Uninstallation Program
Granting the OfficeScan Client Uninstallation Privilege
Running the OfficeScan Client Uninstallation Program
Manually Uninstalling the OfficeScan Client
Keeping Protection Up-to-Date
OfficeScan Components and Programs
Antivirus Components
Virus Patterns
Virus Scan Engine
Updating the Scan Engine
Virus Scan Driver
IntelliTrap Pattern
IntelliTrap Exception Pattern
Damage Cleanup Services Components
Virus Cleanup Engine
Virus Cleanup Template
Anti-spyware Components
Spyware Pattern
Spyware Scan Engine
Spyware Active-monitoring Pattern
Firewall Components
Common Firewall Driver
Common Firewall Pattern
Web Reputation Component
URL Filtering Engine
Behavior Monitoring Components
Behavior Monitoring Detection Pattern
Behavior Monitoring Driver
Behavior Monitoring Core Service
Behavior Monitoring Configuration Pattern
Digital Signature Pattern
Policy Enforcement Pattern
Programs
OfficeScan Client Program
Cisco Trust Agent
Hot Fixes, Patches, and Service Packs
Hot Fix and Patch History
Update Overview
OfficeScan Server and OfficeScan Client Update
Smart Protection Source Update
OfficeScan Server Updates
OfficeScan Server Update Sources
IPv6 Support for OfficeScan Server Updates
Proxy for OfficeScan Server Updates
Configuring Proxy Settings
Configuring the Server Update Source
OfficeScan Server Component Duplication
Component Duplication Scenario
Isolated OfficeScan Server Updates
Updating an Isolated OfficeScan Server
OfficeScan Server Update Methods
Manually Updating the OfficeScan Server
Scheduling Updates for the OfficeScan Server
OfficeScan Server Update Logs
Viewing the Update Logs
Integrated Smart Protection Server Updates
OfficeScan Client Updates
OfficeScan Client Update Sources
IPv6 Support for OfficeScan Client Updates
Standard Update Source for OfficeScan Clients
Configuring the Standard Update Source for OfficeScan Clients
OfficeScan Client Update Process
Customized Update Sources for OfficeScan Clients
Configuring Customized Update Sources for OfficeScan Clients
OfficeScan Client Update Process
ActiveUpdate Server as the OfficeScan Client Update Source
Limiting Downloads from the ActiveUpdate Server
OfficeScan Client Update Methods
OfficeScan Client Automatic Updates
Event-triggered Updates
Schedule-based Updates
Updating OfficeScan Client Components Automatically
Configuring Scheduled OfficeScan Client Updates with NAT
Using the Domain Update Scheduling Tool
OfficeScan Client Manual Updates
Updating OfficeScan Clients Manually
Update Privileges and Other Settings for OfficeScan Clients
Perform "Update Now"
Enable Scheduled Update
Clients Download Updates From the Trend Micro ActiveUpdate Server
Clients Can Update Components but not Upgrade the Client Program or Deploy Hot Fixes
Granting Update Privileges to OfficeScan Clients
Configuring Reserved Disk Space for OfficeScan Clients Updates
Proxy for OfficeScan Client Component Updates
Configuring OfficeScan Client Update Notifications
Viewing OfficeScan Client Update Logs
Enforcement of OfficeScan Client Updates
Rolling Back Components for OfficeScan Clients
Running the Touch Tool for OfficeScan Client Hot Fixes
Update Agents
Update Agent System Requirements
Update Agent Configuration
Assigning an OfficeScan Client as an Update Agent
Specifying the OfficeScan Clients that Update from an Update Agent
Update Sources for Update Agents
IPv6 Support for Update Agents
Standard Update Source for Update Agents
Customized Update Sources for Update Agents
Configuring the Update Source for the Update Agent
Update Agent Component Duplication
Update Methods for Update Agents
Using the Scheduled Update Configuration Tool
Update Agent Analytical Report
Component Update Summary
Update Status for OfficeScan Clients
Components
Scanning for Security Risks
About Security Risks
Viruses and Malware
Spyware and Grayware
Types of Spyware/Grayware
How Spyware/Grayware Gets into the Network
Potential Risks and Threats
Guarding Against Spyware/Grayware and Other Threats
Scan Methods
Default Scan Method
Scan Methods Compared
Changing the Scan Method
Switching from Smart Scan to Conventional Scan
Switching from Conventional Scan to Smart Scan
Scan Types
Real-time Scan
Configuring Real-time Scan Settings
Manual Scan
Configuring a Manual Scan
Scheduled Scan
Configuring a Scheduled Scan
Scan Now
Configuring Scan Now Settings
Initiating Scan Now
Settings Common to All Scan Types
Scan Criteria
User Activity on Files
Files to Scan
Scan Settings
CPU Usage
Schedule
Scan Exclusions
Wildcard Exceptions
Scan Exclusion List (Directories)
Scan Exclusion List (Files)
Scan Exclusion List (File Extensions)
Apply Scan Exclusion Settings to All Scan Types
Scan Actions
Virus/Malware Scan Actions
Use ActiveAction
Use the Same Action for all Virus/Malware Types
Use a Specific Action for Each Virus/Malware Type
Quarantine Directory
Back Up Files Before Cleaning
Damage Cleanup Services
Display a Notification Message When Virus/Malware is Detected
Display a Notification Message When Probable Virus/Malware is Detected
Restoring Encrypted Files
Decrypting and Restoring Files
Spyware/Grayware Scan Actions
Display a Notification Message When Spyware/Grayware is Detected
Spyware/Grayware Approved List
Adding Already Detected Spyware/Grayware to the Approved List
Managing the Spyware/Grayware Approved List
Restoring Spyware/Grayware
Scan Privileges and Other Settings
Scan Type Privileges
Granting Scan Type Privileges
Configuring Scan Settings for the OfficeScan Client Computers
Scheduled Scan Privileges and Other Settings
Postpone Scheduled Scan
Skip and Stop Scheduled Scan
Scheduled Scan Privilege Notification
Granting Scheduled Scan Privileges and Displaying the Privilege Notification
Postponing/Skipping and Stopping Scheduled Scan on the Client Computer
Mail Scan Privileges and Other Settings
Granting Mail Scan Privileges and Enabling POP3 Mail Scan
Cache Settings for Scans
Digital Signature Cache
On-demand Scan Cache
Configuring Cache Settings for Scans
Global Scan Settings
Configuring Global Scan Settings
Scan Settings Section
Configure Scan Settings for Large Compressed Files
Add Manual Scan to the Windows Shortcut Menu on OfficeScan client Computers
Exclude the OfficeScan Server Database Folder from Real-time Scan
Exclude Microsoft Exchange Server Folders and Files from Scans
Clean/Delete Infected Files Within Compressed Files
Enable Assessment Mode
Scan for Cookies
Scheduled Scan Settings Section
Remind Users of the Scheduled Scan __ Minutes Before it Runs
Postpone Scheduled Scan for up to __ Hours and __ Minutes
Automatically Stop Scheduled Scan When Scanning Lasts More Than __ Hours and __ Minutes
Skip Scheduled Scan When a Wireless Computer's Battery Life is Less Than __ % and its AC Adapter is Unplugged
Resume a Missed Scheduled Scan
Virus/Malware Log Bandwidth Settings Section
Enable OfficeScan Clients to Create a Single Virus/Malware Log Entry for Recurring Detections of the Same Virus/Malware Within an Hour
Security Risk Notifications
Security Risk Notifications for Administrators
Configuring Security Risk Notifications for Administrators
Security Risk Notifications for OfficeScan Client Users
Notifying Users of Virus/Malware and Spyware/Grayware Detections
Configuring Virus/Malware Notifications
Configuring Spyware/Grayware Notifications
Notifying Clients of a Restart to Finish Cleaning Infected Files
Security Risk Logs
Viewing Virus/Malware Logs
Virus/Malware Scan Results
Viewing Spyware/Grayware Logs
Spyware/Grayware Scan Results
Viewing Spyware/Grayware Restore Logs
Scan Logs
Security Risk Outbreaks
Security Risk Outbreak Criteria and Notifications
Configuring the Security Risk Outbreak Criteria and Notifications
Configuring Security Risk Outbreak Prevention
Outbreak Prevention Policies
Limiting/Denying Access to Shared Folders
Blocking Vulnerable Ports
Denying Write Access to Files and Folders
Disabling Outbreak Prevention
Using Behavior Monitoring
Behavior Monitoring
Malware Behavior Blocking
Event Monitoring
Behavior Monitoring Exception List
Configuring Malware Behavior Blocking, Event Monitoring, and the Exception List
Modifying the Time Period Before a Program is Allowed to Run
Certified Safe Software Service
Enabling Certified Safe Software Service
Behavior Monitoring Privileges
Granting Behavior Monitoring Privileges
Behavior Monitoring Notifications for OfficeScan Client Users
Enabling the Sending of Notification Messages
Modifying the Content of the Notification Message
Behavior Monitoring Logs
Viewing Behavior Monitoring Logs
Configuring the Behavior Monitoring Log Sending Schedule
Using Device Control
Device Control
Permissions for Storage Devices
Advanced Permissions for Storage Devices
Specifying a Digital Signature Provider
Specifying a Program Path and Name
Permissions for Non-storage Devices
Managing Access to External Devices (Data Protection Activated)
Configuring Advanced Permissions
Configuring an Approved List of USB Devices
Managing Access to External Devices (Data Protection Not Activated)
Adding Programs to the Device Control Lists Using ofcscan.ini
Modifying Device Control Notifications
Device Control Logs
Viewing Device Control Logs
Managing Data Protection and Using Data Loss Prevention
Data Protection Installation
Installing Data Protection
Data Protection License
Activating or Renewing the Data Protection License
Viewing the Data Protection License Information
Deployment of Data Protection to Clients
Deploying the Data Protection Module to Clients
About Data Loss Prevention
Data Loss Prevention Policies
Policy Configuration
Data Identifier Types
Expressions
Predefined Expressions
Viewing Settings for Predefined Expressions
Customized Expressions
Criteria for Customized Expression
Creating a Customized Expression
Importing Customized Expressions
File Attributes
Creating a File Attribute List
Importing a File Attribute List
Keywords
Predefined Keyword Lists
How Keyword Lists Work
Number of Keywords Condition
Distance Condition
Customized Keyword Lists
Customized Keyword List Criteria
Creating a Keyword List
Importing a Keyword List
Data Loss Prevention Templates
Predefined DLP Templates
Customized DLP Templates
Condition Statements and Logical Operators
Creating a Template
Importing Templates
DLP Channels
Network Channels
Email Clients
FTP
HTTP and HTTPS
IM Applications
SMB Protocol
Webmail
Transmission Scope and Targets for Network Channels
Transmission Scope: All Transmissions
Transmission Scope: Only Transmissions Outside the Local Area Network
Defining Monitored and Non-monitored Targets
Resolving Conflicts
System and Application Channels
Data Recorders (CD/DVD)
Peer-to-Peer Applications
PGP Encryption
Printer
Removable Storage
Synchronization Software (ActiveSync)
Windows Clipboard
Data Loss Prevention Actions
Decompression Rules
Rule 1: Maximum Size of a Decompressed File
Rule 2: Maximum Compression Layers
Rule 3: Maximum Number of Files to Scan
Events that Trigger Decompression Rules
Data Loss Prevention Policy Configuration
Enabling Data Loss Prevention
Configuring Template Settings
Configuring Channel Settings
Configuring Action Settings
Device List Tool
Running the Device List Tool
Data Loss Prevention Notifications
Data Loss Prevention Notifications for Administrators
Configuring Data Loss Prevention Notification for Administrators
Data Loss Prevention Notifications for Client Users
Configuring Data Loss Prevention Notification for Clients
Data Loss Prevention Logs
Viewing Data Loss Prevention Logs
Processes by Channel
Descriptions
Data Protection Debug Logs
Enabling Debug Logging for the Data Protection Module
Uninstalling Data Protection
Uninstalling Data Protection from Plug-In Manager
Protecting Computers from Web-based Threats
About Web Threats
Web Reputation
Web Reputation Policies
Configuring a Web Reputation Policy
Proxy for Web Reputation
Web Threat Notifications for Client Users
Enabling the Web Threat Notification Message
Modifying the Web Threat Notification Message
Web Reputation Logs
Viewing Web Reputation Logs
Using the OfficeScan Firewall
About the OfficeScan Firewall
Traffic Filtering
Application Filtering
Certified Safe Software List
Scanning for Network Viruses
Customizable Profiles and Policies
Stateful Inspection
Intrusion Detection System
Firewall Violation Outbreak Monitor
OfficeScan Client Firewall Privileges
Enabling or Disabling the OfficeScan Firewall
Enabling or Disabling the OfficeScan Firewall on Selected Computers
Method A: Create a new policy and apply it to OfficeScan clients.
Method B: Enable/Disable the firewall driver and service.
Method C: Enable/Disable the firewall service from the web console
Enabling or Disabling the OfficeScan Firewall on All Computers
Firewall Policies and Profiles
Firewall Policies
Configuring the Firewall Policy List
Adding or Modifying a Firewall Policy
Adding a Firewall Policy
Modifying an Existing Firewall Policy
Editing the Firewall Exception Template
Adding a Firewall Policy Exception
Modifying a Firewall Policy Exception
Saving the Policy Exception List Settings
Firewall Profiles
Configuring the Firewall Profile List
Adding and Editing a Firewall Profile
Adding a Firewall Profile
Modifying a Firewall Profile
Firewall Privileges
Granting Firewall Privileges
Global Firewall Settings
Configuring Global Firewall Settings
Firewall Violation Notifications for OfficeScan Client Users
Granting Users the Privilege to Enable/Disable the Notification Message
Modifying the Content of the Firewall Notification Message
Firewall Logs
Viewing Firewall Logs
Firewall Violation Outbreaks
Configuring the Firewall Violation Outbreak Criteria and Notifications
Testing the OfficeScan Firewall
Managing the OfficeScan Server
Role-based Administration
User Roles
Menu Item Permissions
Menu Item Types
Menu Items for Servers and Clients
Menu Items for Managed Domains
Client Management Menu Items
Built-in User Roles
Custom Roles
Adding a Custom Role
Modifying a Custom Role
Deleting a Custom Role
Importing or Exporting Custom Roles
User Accounts
Adding a Custom Account
Modifying a Custom Account
Adding an Active Directory Account or Group
Adding Several Active Directory Accounts or Groups
Changing a Custom or Active Directory Account’s Role
Enabling or Disabling a Custom or Active Directory Account
Using OfficeScan User Accounts in Control Manager
Trend Micro Control Manager
Control Manager Integration in this OfficeScan Release
Supported Control Manager Versions
Registering OfficeScan to Control Manager
Checking the OfficeScan Status on the Control Manager Management Console
Reference Servers
Managing the Reference Server List
Administrator Notification Settings
Configuring Administrator Notification Settings
System Event Logs
Viewing System Event Logs
Log Management
Log Maintenance
Deleting Logs Based on a Schedule
Manually Deleting Logs
Licenses
Viewing Product License Information
Activating or Renewing a License
OfficeScan Database Backup
Backing up the OfficeScan Database
Restoring the Database Backup Files
OfficeScan Web Server Information
Configuring Connection Settings
Web Console Password
Web Console Settings
Configuring Web Console Settings
Quarantine Manager
Configuring Quarantine Directory Settings
Server Tuner
Running Server Tuner
Smart Feedback
Participating in the Smart Feedback Program
Managing the OfficeScan Client
Computer Location
Location Criteria
Configuring Location Settings
Gateway Settings Importer
Using Gateway Settings Importer
OfficeScan Client Program Management
OfficeScan Client Services
Enabling or Disabling the Client Services from the Web Console
Using the Trend Micro Performance Tuning Tool
OfficeScan Client Service Restart
Configuring Service Restart Settings
Client Self-protection
Configuring OfficeScan Client Self-protection Settings
Protect OfficeScan Client Services
Protect Files in the OfficeScan Client Installation Folder
Protect OfficeScan Client Registry Keys
Protect OfficeScan Client Processes
OfficeScan Client Security
Controlling Access to the OfficeScan Client Installation Directory and Registry Keys
OfficeScan Client Console Access Restriction
Restricting Access to the OfficeScan Client Console
OfficeScan Client Unloading
Granting the Client Unloading Privilege
OfficeScan Client Roaming Privilege
Granting the Client Roaming Privilege
Disabling Automatic Client Update on Roaming Clients
Revoking the Scheduled Update Privilege on roaming OfficeScan Clients
Client Mover
Running Client Mover
Inactive OfficeScan Clients
Automatically Removing Inactive Clients
Client-Server Connection
OfficeScan Client Icons
Smart Scan Icons
Conventional Scan Icons
Solutions to Issues Indicated in OfficeScan Client Icons
Pattern File Has Not Been Updated for a While
Real-time Scan Service Has Been Disabled or is Not Functional
Real-time Scan was Disabled
Real-time Scan was Disabled and an OfficeScan Client is in Roaming Mode
An OfficeScan Client is Connected to the Network but Appears Offline
Smart Protection Sources are Unavailable
Client-Server Connection Verification
Verifying Client-Server Connections
Connection Verification Logs
Viewing Connection Verification Logs
Unreachable Clients
Heartbeat
Server Polling
Configuring the Heartbeat and Server Polling Features
OfficeScan Client Proxy Settings
Internal Proxy for OfficeScan Clients
Configuring Internal Proxy Settings
External Proxy for OfficeScan Clients
Configuring Proxy Server Authentication Credentials
Proxy Configuration Privileges for Clients
Granting Proxy Configuration Privileges
Automatic Proxy Settings for the OfficeScan Client
Configuring Automatic Proxy Settings
Viewing OfficeScan Client Information
Importing and Exporting Client Settings
Exporting Client Settings
Importing Client Settings
Security Compliance
Security Compliance for Managed Clients
Services
Components
Scan Compliance
Settings
On-demand Compliance Reports
Generating an On-demand Compliance Report
Scheduled Compliance Reports
Configuring Settings for Scheduled Compliance Reports
Security Compliance for Unmanaged Endpoints
Defining the Active Directory/IP Address Scope and Query
Viewing the Query Results
Recommended Tasks
Configuring the Scheduled Query Assessment
Trend Micro Virtual Desktop Support
Virtual Desktop Support Installation
Installing Virtual Desktop Support
Virtual Desktop Support License
Activating or Renewing Virtual Desktop Support
Viewing License Information for Virtual Desktop Support
Virtual Server Connections
Adding Server Connections
Adding Additional Server Connections
Deleting a Connection Setting
Troubleshooting Microsoft Hyper-V Connections
Allowing WMI Communication through the Windows Firewall
Opening Port Communication through the Windows Firewall or a Third-party Firewall
VDI Pre-Scan Template Generation Tool
Creating a Pre-scan Template
Removing GUIDs from Templates
Global Client Settings
Configuring Client Privileges and Other Settings
Using Plug-In Manager
About Plug-In Manager
Client-side Agents and Client Plug-in Manager
Widgets
Plug-In Manager Installation
Performing Post-installation Tasks
Native OfficeScan Feature Management
Managing Plug-in Programs
Plug-in Program Installation
Installing a Plug-in Program
Plug-in Program Management
Managing a Plug-in Program
Plug-in Program Upgrades
Upgrading a Plug-in Program
Plug-in Program Uninstallation
Uninstalling a Plug-in Program from the Plug-In Manager Console
Uninstalling Plug-In Manager
Troubleshooting Plug-In Manager
Plug-in Program Does not Display on the Plug-in Manager Console
Client-side Agent Installation and Display Issues
The Apache Web Server Version is not Supported
A Client-side Agent Cannot be Launched if the Automatic Configuration Script Setting on Internet Explorer Redirects to a Proxy Server
An Error in the System, Update Module, or Plug-in Manager Program occurred and the Error Message Provides a Certain Error Code
Using Policy Server for Cisco NAC
About Policy Server for Cisco NAC
Components and Terms
Components
Terms
Cisco NAC Architecture
The Client Validation Sequence
The Policy Server
Policy Server Policies and Rules
Rule Composition
Security Posture Criteria
Default Responses for Rules
Policy Server and OfficeScan Client Actions
Default Rules
Policy Composition
Default Policies
Synchronization
Certificates
The CA Certificate
Policy Server System Requirements
Cisco Trust Agent (CTA) Requirements
Supported Platforms and Requirements
Policy Server for NAC Deployment
Cisco Secure ACS Server Enrolment
CA Certificate Installation
Exporting and Installing the CA Certificate for Distribution
Cisco Trust Agent Deployment
Deploying CTA During OfficeScan Server Installation
Deploying CTA from the OfficeScan Web Console
Importing the Client Certificate
Cisco Trust Agent Version
Checking the CTA Version
Manually Replacing the CTA Package
Deploying the Cisco Trust Agent
Cisco Trust Agent Installation Verification
Policy Server for Cisco NAC Installation
Installing the Policy Server Using the Policy Server Installer
Installing Policy Server for Cisco NAC from the OfficeScan Server Master Installer
Policy Server SSL Certificate Preparation
Preparing the IIS Policy Server SSL Certificate
Preparing the Apache Policy Server SSL Certificate
ACS Server Configuration
Policy Server for Cisco NAC Configuration
Policy Server Configuration from OfficeScan
Adding a Policy Server from OfficeScan
Deleting a Policy Server from OfficeScan
Summary Information for a Policy Server
Viewing and Modifying Configuration Summary Details for a Policy Server
Synchronizing the Policy Server with Registered OfficeScan Servers
Policy Server Registration
Rules
Policies
Client Validation Logs
Client Log Maintenance
Administrative Tasks
Configuring OfficeScan with Third-party Software
Overview of Check Point Architecture and Configuration
OfficeScan Integration
Configuring the Secure Configuration Verification File for OfficeScan
SecureClient Support Installation
Granting Users the Privilege to View the Toolbox Tab
Installing SecureClient Support
Getting Help
Troubleshooting Resources
Support Intelligence System
Case Diagnostic Tool
Trend Micro Performance Tuning Tool
OfficeScan Server Logs
Server Debug Logs Using LogServer.exe
Enabling Debug Logging
Disabling Debug Logging
Enabling Debug Logging for Server Installation and Upgrade
Installation Logs
Active Directory Logs
Role-based Administration Logs
OfficeScan Client Grouping Logs
Component Update Logs
Getting Detailed Server Update Information
Stopping the Collection of Detailed Server Update Information
Apache Server Logs
Client Packager Logs
Enabling Logging for Client Packager Creation
Disabling Logging for Client Packager Creation
Security Compliance Report Logs
Outside Server Management Logs
Device Control Exception Logs
Web Reputation Logs
ServerProtect Normal Server Migration Tool Logs
Enabling Debug Logging for ServerProtect Normal Server Migration Tool
VSEncrypt Logs
Control Manager MCP Agent Logs
Enabling Debug Logging for the MCP Agent
Disabling Debug Logging for the MCP Agent
Virus Scan Engine Logs
Enabling Debug Logging for the Virus Scan Engine
Virus/Malware Logs
Spyware/Grayware Logs
Outbreak Logs
Current Firewall Violation Outbreak Logs
Last Firewall Violation Outbreak Logs
Current Virus /Malware Outbreak Logs
Last Virus /Malware Outbreak Logs
Current Spyware/Grayware Outbreak Logs
Last Spyware/Grayware Outbreak Logs
Virtual Desktop Support Logs
OfficeScan Client Logs
OfficeScan Client Debug Logs Using LogServer.exe
Enabling Debug Logging for the OfficeScan Client
Fresh Installation Logs
Upgrade/Hot Fix Logs
Damage Cleanup Services Logs
Enabling Debug Logging for Damage Cleanup Services
Disabling Debug Logging for Damage Cleanup Services
Cleanup Log
Mail Scan Logs
ActiveUpdate Logs
OfficeScan Client Connection Logs
OfficeScan Client Update Logs
Getting Detailed OfficeScan Client Update Information
Outbreak Prevention Logs
Outbreak Prevention Restore Logs
OfficeScan Firewall Logs
Enabling Debug Logging for the Common Firewall Driver on Windows Vista/Server 2008/7 Computers
Enabling Debug Logging for the Common Firewall Driver on Windows XP and Windows Server 2003 Computers
Disabling Debug Logging for the Common Firewall Driver (all operating systems)
Enabling Debug Logging for the OfficeScan NT Firewall Service
Disabling Debug Logging for the OfficeScan NT Firewall Service
Web Reputation and POP3 Mail Scan Logs
Enabling Debug Logging for the Web Reputation and POP3 Mail Scan Features
Disabling Debug Logging for the Web Reputation and POP3 Mail Scan Features
Device Control Exception List Logs
Data Protection Debug Logs
Enabling Debug Logging for the Data Protection Module
Windows Event Logs
Transport Driver Interface (TDI) Logs
Enabling Debug Logging for TDI
Contacting Technical Support
Contact Information
Speeding Up Your Support Call
The Trend Micro Knowledge Base
TrendLabs
Security Information Center
Sending Suspicious Files to Trend Micro
Documentation Feedback
IPv6 Support in OfficeScan
IPv6 Support for OfficeScan Server and Clients
OfficeScan Server Requirements
OfficeScan Client Requirements
Pure IPv6 Server Limitations
Pure IPv6 OfficeScan Client Limitations
Configuring IPv6 Addresses
Screens That Display IP Addresses
Windows Server Core 2008 Support
Windows Server Core 2008 Support
Installation Methods for Windows Server Core
Installing the OfficeScan Client Using Login Script Setup
Installing the OfficeScan Client Using an OfficeScan Client Package
OfficeScan Client Features on Windows Server Core
Windows Server Core Commands
Glossary
ActiveUpdate
Compressed File
Cookie
Denial of Service Attack
DHCP
DNS
Domain Name
Dynamic IP Address
ESMTP
End User License Agreement
False Positive
FTP
GeneriClean
Hot Fix
HTTP
HTTPS
ICMP
IntelliScan
IntelliTrap
IP
Java File
LDAP
Listening Port
MCP Agent
Mixed Threat Attack
NAT
NetBIOS
One-way Communication
Patch
Phish Attack
Ping
POP3
Proxy Server
RPC
Security Patch
Service Pack
SMTP
SNMP
SNMP Trap
SOCKS 4
SSL
SSL Certificate
TCP
Telnet
Trojan Port
Trusted Port
Determining the Trusted Ports
Two-way Communication
UDP
Uncleanable File
Files Infected with Trojans
Files Infected with Worms
Write-protected Infected Files
Password-protected Files
Backup Files
Infected Files in the Recycle Bin
Solution Based on Operating System:
Windows XP or Windows Server 2003 with NTFS File System
Other Operating Systems (or those without NTFS)
Infected Files in Windows Temp Folder or Internet Explorer Temporary Folder
Solution Based on Operating System:
Windows XP or Windows Server 2003 with NTFS File System
Other Operating Systems (or those without NTFS):
Access Control Server (ACS)
[1]
ACS certificate
[1]
action on monitored system events
[1]
actions
Data Loss Prevention
[1]
ActiveAction
[1]
Active Directory
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
client grouping
[1]
credentials
[1]
custom client groups
[1]
duplicate structure
[1]
integration
[1]
outside server management
[1]
role-based administration
[1]
scope and query
[1]
synchronization
[1]
[2]
ActiveSync
[1]
ActiveX malicious code
[1]
Additional Service Settings
[1]
[2]
advanced permissions
configuring
[1]
storage devices
[1]
[2]
application filtering
[1]
approved list
[1]
approved programs list
[1]
assessment mode
[1]
Authentication, Authorization, and Accounting (AAA)
[1]
automatic client grouping
[1]
[2]
AutoPcc.exe
[1]
[2]
[3]
[4]
[5]
Behavior Monitoring
[1]
action on system events
[1]
exception list
[1]
logs
[1]
Behavior Monitoring Configuration Pattern
[1]
Behavior Monitoring Core Service
[1]
Behavior Monitoring Detection Pattern
[1]
Behavior Monitoring Driver
[1]
blocked programs list
[1]
boot sector virus
[1]
CA certificate
[1]
[2]
cache settings for scans
[1]
Case Diagnostic Tool
[1]
Certificate Authority (CA)
[1]
certificates
[1]
CA
[1]
SSL
[1]
[2]
[3]
Certified Safe Software List
[1]
Certified Safe Software Service
[1]
Check Point SecureClient
[1]
Cisco NAC
architecture
[1]
components and terms
[1]
policy server deployment
[1]
Cisco Trust Agent
[1]
[2]
client console
access restriction
[1]
client disk image
[1]
[2]
client grouping
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
Active Directory
[1]
[2]
adding a domain
[1]
automatic
[1]
[2]
custom groups
[1]
deleting a domain or client
[1]
DNS
[1]
IP addresses
[1]
manual
[1]
[2]
methods
[1]
moving a client
[1]
NetBIOS
[1]
renaming a domain
[1]
sorting clients
[1]
tasks
[1]
client installation
[1]
[2]
browser-based
[1]
Client Packager
[1]
from the web console
[1]
from the web install page
[1]
Login Script Setup
[1]
post-installation
[1]
system requirements
[1]
using client disk image
[1]
using Security Compliance
[1]
using Vulnerability Scanner
[1]
client logs
ActiveUpdate logs
[1]
client connection logs
[1]
client update logs
[1]
Damage Cleanup Services logs
[1]
Data Protection debug logs
[1]
[2]
debug logs
[1]
fresh installation logs
[1]
Mail Scan logs
[1]
OfficeScan firewall debug logs
[1]
Outbreak Prevention debug logs
[1]
TDI debug logs
[1]
upgrade/hot fix logs
[1]
web reputation debug logs
[1]
client mover
[1]
Client Packager
[1]
[2]
[3]
[4]
[5]
deployment
[1]
settings
[1]
clients
[1]
[2]
[3]
[4]
[5]
[6]
[7]
connection
[1]
deleting
[1]
features
[1]
grouping
[1]
installation
[1]
locations
[1]
moving
[1]
proxy settings
[1]
sorting
[1]
client security level
[1]
client self-protection
[1]
client tree
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
about
[1]
advanced search
[1]
[2]
filters
[1]
general tasks
[1]
specific tasks
[1]
[2]
[3]
[4]
[5]
[6]
[7]
Cisco NAC agent deployment
[1]
client management
[1]
manual component updates
[1]
outbreak prevention
[1]
rollback component updates
[1]
security risk logs
[1]
views
[1]
client uninstallation
[1]
client update
automatic
[1]
customized source
[1]
event-triggered
[1]
from the ActiveUpdate server
[1]
manual
[1]
privileges
[1]
scheduled update
[1]
[2]
scheduled update with NAT
[1]
standard source
[1]
client upgrade
disable
[1]
client validation
[1]
COM file infector
[1]
Common Firewall Driver
[1]
[2]
[3]
[4]
Common Firewall Pattern
[1]
Compliance Report
[1]
component duplication
[1]
[2]
components
[1]
[2]
[3]
on the client
[1]
on the OfficeScan server
[1]
on the Update Agent
[1]
update privileges and settings
[1]
update summary
[1]
compressed files
[1]
[2]
[3]
condition statements
[1]
Conflicted ARP
[1]
connection verification
[1]
contacting
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
documentation feedback
[1]
Knowledge Base
[1]
sending suspicious files
[1]
technical support
[1]
Trend Micro
[1]
[2]
[3]
[4]
[5]
continuity of protection
[1]
Control Manager
integration with OfficeScan
[1]
MCP Agent logs
[1]
conventional scan
[1]
[2]
switching to smart scan
[1]
cookie scanning
[1]
CPU usage
[1]
criteria
customized expressions
[1]
keywords
[1]
custom client groups
[1]
[2]
customized expressions
[1]
[2]
[3]
criteria
[1]
importing
[1]
customized keywords
[1]
criteria
[1]
importing
[1]
customized templates
[1]
creating
[1]
importing
[1]
Damage Cleanup Services
[1]
[2]
dashboards
Summary
[1]
[2]
[3]
[4]
database backup
[1]
database scanning
[1]
data identifiers
[1]
expressions
[1]
file attributes
[1]
keywords
[1]
Data Loss Prevention
[1]
[2]
[3]
[4]
actions
[1]
channels
[1]
data identifiers
[1]
expressions
[1]
[2]
[3]
[4]
[5]
[6]
file attributes
[1]
[2]
[3]
keywords
[1]
[2]
[3]
[4]
[5]
[6]
[7]
network channels
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
policies
[1]
policy
[1]
system and application channels
[1]
[2]
[3]
[4]
[5]
[6]
[7]
templates
[1]
[2]
[3]
[4]
[5]
[6]
Data Loss Prevention:decompression rules;decompression rules;compressed files:decompression rules
[1]
Data Loss Prevention:system and application channels;system and application channels;system and application channels:PGP encryption
[1]
Data Protection
deployment
[1]
installation
[1]
license
[1]
status
[1]
uninstallation
[1]
debug logs
clients
[1]
server
[1]
device control
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
advanced permissions
[1]
configuring
[1]
approved list
[1]
Digital Signature Provider
[1]
external devices
[1]
[2]
managing access
[1]
[2]
non-storage devices
[1]
permissions
[1]
[2]
[3]
[4]
[5]
program path and name
[1]
requirements
[1]
storage devices
[1]
[2]
[3]
USB devices
[1]
wildcards
[1]
Device Control
[1]
logs
[1]
[2]
notifications
[1]
device control;device control list;device control list:adding programs
[1]
Device List Tool
[1]
DHCP settings
[1]
Digital Asset Control
widgets
[1]
[2]
digital certificates
[1]
digital signature cache
[1]
Digital Signature Pattern
[1]
[2]
Digital Signature Provider
[1]
specifying
[1]
documentation
[1]
documentation feedback
[1]
domains
[1]
[2]
[3]
[4]
[5]
adding
[1]
client grouping
[1]
deleting
[1]
renaming
[1]
DSP
[1]
EICAR test script
[1]
[2]
email domains
[1]
encrypted files
[1]
End User License Agreement (EULA)
[1]
evaluation version
[1]
Event Monitoring
[1]
exception list
[1]
Behavior Monitoring
[1]
EXE file infector
[1]
export settings
[1]
expressions
[1]
[2]
customized
[1]
[2]
criteria
[1]
predefined
[1]
[2]
external device protection
[1]
external devices
managing access
[1]
[2]
FakeAV
[1]
file attributes
[1]
[2]
[3]
[4]
creating
[1]
importing
[1]
wildcards
[1]
file reputation
[1]
[2]
firewall
[1]
[2]
benefits
[1]
default policy exceptions
[1]
disabling
[1]
outbreak monitor
[1]
policies
[1]
policy exceptions
[1]
privileges
[1]
[2]
[3]
profiles
[1]
[2]
tasks
[1]
testing
[1]
firewall log count
[1]
Fragmented IGMP
[1]
FTP
[1]
gateway IP address
[1]
gateway settings importer
[1]
hot fixes
[1]
[2]
HTML virus
[1]
HTTP and HTTPS
[1]
IDS
[1]
IM applications
[1]
import settings
[1]
inactive clients
[1]
incremental pattern
[1]
installation
[1]
client
[1]
Data Protection
[1]
Plug-in Manager
[1]
plug-in program
[1]
Policy Server
[1]
Security Compliance
[1]
integrated server
[1]
integrated Smart Protection Server
[1]
ptngrowth.ini
[1]
update
[1]
[2]
components
[1]
Web Blocking List
[1]
IntelliScan
[1]
IntelliTrap Exception Pattern
[1]
IntelliTrap Pattern
[1]
intranet
[1]
Intrusion Detection System
[1]
IPv6
[1]
support
[1]
IPv6 support
[1]
displaying IPv6 addresses
[1]
limitations
[1]
[2]
IpXfer.exe
[1]
Java malicious code
[1]
JavaScript virus
[1]
joke program
[1]
keywords
[1]
[2]
customized
[1]
[2]
[3]
predefined
[1]
[2]
[3]
Knowledge Base
[1]
LAND Attack
[1]
licenses
[1]
Data Protection
[1]
status
[1]
location awareness
[1]
locations
[1]
awareness
[1]
logical operators
[1]
Login Script Setup
[1]
[2]
[3]
[4]
[5]
logs
[1]
about
[1]
Behavior Monitoring
[1]
client update logs
[1]
connection verification logs
[1]
Device Control logs
[1]
firewall logs
[1]
[2]
[3]
scan logs
[1]
security risk logs
[1]
spyware/grayware logs
[1]
spyware/grayware restore logs
[1]
system event logs
[1]
virus/malware logs
[1]
[2]
web reputation logs
[1]
LogServer.exe
[1]
[2]
MAC address
[1]
macro virus
[1]
mail scan
[1]
[2]
[3]
Malware Behavior Blocking
[1]
manual client grouping
[1]
[2]
Manual Scan
[1]
shortcut
[1]
Microsoft Exchange Server scanning
[1]
Microsoft SMS
[1]
[2]
migration
from ServerProtect Normal Servers
[1]
from third-party security software
[1]
monitored email domains
[1]
monitored system events
[1]
monitored targets
[1]
[2]
MSI package
[1]
[2]
[3]
[4]
NetBIOS
[1]
Network Access Device
[1]
network channels
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
email clients
[1]
FTP
[1]
HTTP and HTTPS
[1]
IM applications
[1]
monitored targets
[1]
[2]
non-monitored targets
[1]
[2]
SMB protocol
[1]
transmission scope
[1]
all transmissions
[1]
conflicts
[1]
external transmissions
[1]
transmission scope and targets
[1]
webmail
[1]
network virus
[1]
[2]
Network VirusWall Enforcer
[1]
new features
[1]
non-monitored email domains
[1]
non-monitored targets
[1]
[2]
non-storage devices
permissions
[1]
notifications
client update
[1]
computer restart
[1]
Device Control
[1]
firewall violations
[1]
for administrators
[1]
[2]
for client users
[1]
[2]
outbreaks
[1]
[2]
outdated Virus Pattern
[1]
spyware/grayware detection
[1]
virus/malware detection
[1]
[2]
web threat detection
[1]
OfficeScan
about
[1]
client
[1]
client services
[1]
components
[1]
[2]
component update
[1]
database backup
[1]
database scanning
[1]
documentation
[1]
key features and benefits
[1]
licenses
[1]
logs
[1]
programs
[1]
SecureClient integration
[1]
terminology
[1]
web console
[1]
web server
[1]
OfficeScan client
connection with OfficeScan server
[1]
[2]
connection with Smart Protection Server
[1]
[2]
detailed client information
[1]
files
[1]
import and export settings
[1]
inactive clients
[1]
installation methods
[1]
processes
[1]
registry keys
[1]
reserved disk space
[1]
uninstallation
[1]
OfficeScan server
[1]
functions
[1]
OfficeScan update
[1]
on-demand scan cache
[1]
outbreak criteria
[1]
[2]
outbreak prevention
[1]
disabling
[1]
policies
[1]
outbreak prevention policy
block ports
[1]
deny write access
[1]
limit/deny access to shared folders
[1]
outside server management
[1]
[2]
logs
[1]
query results
[1]
scheduled query
[1]
Overlapping Fragment
[1]
packer
[1]
password
[1]
patches
[1]
pattern files
smart protection
[1]
Smart Scan Agent Pattern
[1]
Smart Scan Pattern
[1]
Web Blocking List
[1]
PCRE
[1]
performance control
[1]
Performance Tuning Tool
[1]
Perle Compatible Regular Expressions
[1]
permissions
advanced
[1]
non-storage devices
[1]
program path and name
[1]
storage devices
[1]
phishing
[1]
Ping of Death
[1]
Plug-in Manager
[1]
[2]
[3]
installation
[1]
managing native OfficeScan features
[1]
troubleshooting
[1]
uninstallation
[1]
plug-in program
installation
[1]
policies
Data Loss Prevention
[1]
firewall
[1]
[2]
web reputation
[1]
policy
[1]
Policy Enforcement Pattern
[1]
Policy Server for Cisco NAC
[1]
CA certificate
[1]
certificates
[1]
client validation process
[1]
default policies
[1]
default rules
[1]
[2]
deployment overview
[1]
policies
[1]
policies and rules
[1]
policy composition
[1]
Policy Server installation
[1]
rule composition
[1]
rules
[1]
SSL certificate
[1]
synchronization
[1]
[2]
system requirements
[1]
port blocking
[1]
posture token
[1]
predefined expressions
[1]
viewing
[1]
predefined keywords
distance
[1]
number of keywords
[1]
predefined tabs
[1]
predefined templates
[1]
predefined widgets
[1]
pre-installation tasks
[1]
[2]
[3]
privileges
firewall privileges
[1]
[2]
mail scan privileges
[1]
proxy configuration privileges
[1]
roaming privilege
[1]
scan privileges
[1]
Scheduled Scan privileges
[1]
unload privilege
[1]
probable virus/malware
[1]
[2]
programs
[1]
[2]
proxy settings
[1]
automatic proxy settings
[1]
clients
[1]
for external connection
[1]
for internal connection
[1]
for server component update
[1]
for web reputation
[1]
privileges
[1]
ptngrowth.ini
[1]
[2]
quarantine directory
[1]
[2]
quarantine manager
[1]
Real-time Scan
[1]
Real-time Scan service
[1]
reference server
[1]
Remote Authentication Dial-In User Service (RADIUS)
[1]
remote installation
[1]
roaming clients
[1]
role-based administration
[1]
[2]
user accounts
[1]
user roles
[1]
rootkit detection
[1]
scan actions
[1]
spyware/grayware
[1]
virus/malware
[1]
scan cache
[1]
scan criteria
CPU usage
[1]
file compression
[1]
files to scan
[1]
schedule
[1]
user activity on files
[1]
scan exclusions
[1]
[2]
directories
[1]
file extensions
[1]
files
[1]
scan method
[1]
default
[1]
Scan Now
[1]
scan privileges
[1]
scan types
[1]
[2]
scheduled assessments
[1]
Scheduled Scan
[1]
postpone
[1]
reminder
[1]
resume
[1]
skip and stop
[1]
[2]
stop automatically
[1]
SCV Editor
[1]
SecureClient
[1]
[2]
integrating with OfficeScan
[1]
Policy Servers
[1]
SCV Editor
[1]
Secure Configuration Verification
[1]
Security Compliance
[1]
components
[1]
enforcing
[1]
enforcing update
[1]
installation
[1]
logs
[1]
outside server management
[1]
[2]
scan
[1]
scheduled assessments
[1]
services
[1]
settings
[1]
Security Information Center
[1]
security patches
[1]
security posture
[1]
security risks
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
phish attacks
[1]
protection from
[1]
spyware/grayware
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
server logs
Active Directory logs
[1]
Apache server logs
[1]
client grouping logs
[1]
Client Packager logs
[1]
component update logs
[1]
Control Manager MCP Agent logs
[1]
debug logs
[1]
Device Control logs
[1]
local installation/upgrade logs
[1]
outside server management logs
[1]
remote installation/upgrade logs
[1]
role-based administration logs
[1]
Security Compliance logs
[1]
ServerProtect Migration Tool debug logs
[1]
Virtual Desktop Support logs
[1]
Virus Scan Engine debug logs
[1]
VSEncrypt debug logs
[1]
web reputation logs
[1]
ServerProtect
[1]
Server Tuner
[1]
server update
component duplication
[1]
logs
[1]
manual update
[1]
proxy settings
[1]
scheduled update
[1]
update methods
[1]
service restart
[1]
Smart Feedback
[1]
smart protectection
[1]
smart protection
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
environment
[1]
File Reputation Services
[1]
[2]
pattern files
[1]
[2]
[3]
[4]
[5]
Smart Scan Agent Pattern
[1]
Smart Scan Pattern
[1]
update process
[1]
Web Blocking List
[1]
Smart Feedback
[1]
Smart Protection Network
[1]
Smart Protection Server
[1]
source
[1]
[2]
sources
[1]
[2]
[3]
comparison
[1]
IPv6 support
[1]
locations
[1]
protocols
[1]
volume of threats
[1]
Web Reputation Services
[1]
[2]
Smart Protection Network
[1]
[2]
Smart Protection Server
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
best practices
[1]
installation
[1]
integrated
[1]
[2]
[3]
[4]
[5]
standalone
[1]
[2]
update
[1]
[2]
smart scan
[1]
[2]
[3]
switching from conventional scan
[1]
Smart Scan Agent Pattern
[1]
[2]
Smart Scan Pattern
[1]
[2]
SMB protocol
[1]
spyware/grayware
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
adware
[1]
dialers
[1]
guarding against
[1]
hacking tools
[1]
joke programs
[1]
password cracking applications
[1]
potential threats
[1]
remote access tools
[1]
restoring
[1]
spyware
[1]
spyware/grayware scan
actions
[1]
approved list
[1]
results
[1]
Spyware Active-monitoring Pattern
[1]
Spyware Pattern
[1]
Spyware Scan Engine
[1]
SSL Certificate
[1]
[2]
[3]
standalone server
[1]
standalone Smart Protection Server
[1]
ptngrowth.ini
[1]
storage devices
advanced permissions
[1]
[2]
permissions
[1]
summary
dashboard
[1]
[2]
[3]
[4]
updates
[1]
summary dashboard
components and programs
[1]
Summary dashboard
[1]
[2]
[3]
[4]
[5]
predefined tabs
[1]
predefined widgets
[1]
product license status
[1]
tabs
[1]
user accounts
[1]
widgets
[1]
Support Intelligence System
[1]
[2]
suspicious files
[1]
synchronization
[1]
SYN Flood
[1]
system and application channels
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
CD/DVD
[1]
peer-to-peer (P2P)
[1]
printer
[1]
removable storage
[1]
synchronization software
[1]
Windows clipboard
[1]
system requirements
Policy Server
[1]
Update Agent
[1]
tabs
[1]
Teardrop
[1]
technical support
[1]
templates
[1]
[2]
[3]
[4]
[5]
[6]
condition statements
[1]
customized
[1]
[2]
[3]
logical operators
[1]
predefined
[1]
Terminal Access Controller Access Control System (TACACS+)
[1]
test scan
[1]
test virus
[1]
third-party security software
[1]
Tiny Fragment Attack
[1]
TMPerftool
[1]
TMTouch.exe
[1]
token variable
[1]
Too Big Fragment
[1]
Top 10 Security Risk Statistics
[1]
touch tool
[1]
TrendLabs
[1]
Trend Micro
contact information
[1]
Knowledge Base
[1]
Security Information Center
[1]
TrendLabs
[1]
Trojan horse program
[1]
[2]
[3]
troubleshooting
Plug-in Manager
[1]
troubleshooting resources
[1]
uninstallation
[1]
Data Protection
[1]
from the web console
[1]
Plug-in Manager
[1]
using the uninstallation program
[1]
unreachable clients
[1]
update
Smart Protection Server
[1]
[2]
Update Agent
[1]
[2]
[3]
analytical report
[1]
assigning
[1]
component duplication
[1]
standard update source
[1]
system requirements
[1]
update methods
[1]
update methods
clients
[1]
OfficeScan server
[1]
Update Agent
[1]
Update Now
[1]
updates
[1]
[2]
clients
[1]
enforcing
[1]
integrated Smart Protection Server
[1]
[2]
OfficeScan server
[1]
Update Agent
[1]
update source
clients
[1]
OfficeScan server
[1]
Update Agents
[1]
URL Filtering Engine
[1]
USB devices
approved list
[1]
configuring
[1]
user accounts
[1]
Summary dashboard
[1]
user role
administrator
[1]
guest user
[1]
Trend Power User
[1]
VBScript virus
[1]
VDI
[1]
logs
[1]
VDI Pre-scan Template Generation Tool
[1]
Virtual Desktop Support
[1]
virus/malware
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
ActiveX malicious code
[1]
boot sector virus
[1]
COM and EXE file infector
[1]
Java malicious code
[1]
joke program
[1]
macro virus
[1]
packer
[1]
probable virus/malware
[1]
test virus
[1]
Trojan horse program
[1]
types
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
VBScript, JavaScript or HTML virus
[1]
worm
[1]
virus/malware scan
global settings
[1]
results
[1]
Virus Cleanup Engine
[1]
Virus Cleanup Template
[1]
Virus Encyclopedia
[1]
Virus Pattern
[1]
[2]
[3]
Virus Scan Driver
[1]
Virus Scan Engine
[1]
Vulnerability Scanner
[1]
[2]
computer description retrieval
[1]
DHCP settings
[1]
effectiveness
[1]
ping settings
[1]
product query
[1]
supported protocols
[1]
Web Blocking List
[1]
[2]
web console
[1]
[2]
[3]
[4]
[5]
[6]
about
[1]
banner
[1]
logon account
[1]
password
[1]
requirements
[1]
URL
[1]
web install page
[1]
[2]
[3]
webmail
[1]
web reputation
[1]
[2]
[3]
[4]
[5]
logs
[1]
policies
[1]
web server information
[1]
web threats
[1]
widgets
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
available
[1]
Client Connectivity
[1]
Client Updates
[1]
Digital Asset Control - Detections Over Time
[1]
Digital Asset Control - Top Detections
[1]
File Reputation Threat Map
[1]
OfficeScan and Plug-ins Mashup
[1]
Outbreaks
[1]
Security Risk Detections
[1]
Web Reputation Top Threatened Users
[1]
Web Reputation Top Threat Sources
[1]
wildcards
[1]
device control
[1]
file attributes
[1]
Windows clipboard
[1]
Windows Server Core
[1]
available client features
[1]
commands
[1]
supported installation methods
[1]
worm
[1]
Search
Toggle search result highlighting
PGP Encryption
OfficeScan
monitors data to be encrypted by PGP encryption software.
OfficeScan
checks the data before encryption proceeds.
For a list of supported PGP encryption software, see:
http://docs.trendmicro.com/en-us/enterprise/officescan.aspx