Trend Micro Smart Protection Server
Trend Micro Smart Protection Server
without notice. Before installing and using the software, please review the readme files, release notes, and the latest version of the applicable user documentation, which are available from the Trend Micro website at: http://download center.trendmicro.com/ Trend Micro, the Trend Micro t-ball logo, TrendLabs, OfficeScan, and Smart Protection Network are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright 2008 -2010. Trend Micro Incorporated. All rights reserved. Document Part No.: APEM24462 Release Date: August 2010 Document Version No.: 1.0 Product Name and Version No.: Trend Micro Smart Protection Server 2.0 Protected by U.S. Patent No.: (Patents Pending)
iii
The user documentation for Trend Micro Smart Protection Server is intended to introduce the main features of the software and installation instructions for your production environment. You should read through it prior to installing or using the software. Detailed information about how to use specific features within the software are available in the online help file and the Knowledge Base at the Trend Micro website. http://esupport.trendmicro.com Trend Micro is always seeking to improve its documentation. Your feedback is always welcome. Please evaluate this documentation on the following site: http://www.trendmicro.com/download/documentation/rating.asp
iv
Contents
Contents
Preface
Smart Protection Server Documentation ........................................................ x Audience ............................................................................................................... x Document Conventions ................................................................................... xi
Configuring Manual Updates .................................................................... 2-8 Configuring Scheduled Updates ............................................................... 2-8 Updating Pattern Files ............................................................................... 2-9 Updating Program Files ............................................................................. 2-9 Performing Updates .............................................................................. 2-9 Configuring an Update Source ...............................................................2-11 Specifying an Update Source .............................................................2-12 Administrative Tasks ....................................................................................2-12 Using SNMP Service ................................................................................2-12 Configuring SNMP Service ................................................................2-12 Downloading the MIB file .................................................................2-13 Configuring Proxy Settings .....................................................................2-16 Specifying Proxy Settings ...................................................................2-16 Downloading System Information for Support ..................................2-17 Downloading the System Information File .....................................2-17 Changing the Product Console Password .................................................2-17
vi
Contents
SNMP Trap Notifications ........................................................................ 3-9 Configuring SNMP Trap Notifications ............................................. 3-9
Glossary
vii
viii
Preface
Preface
Welcome to the Trend Micro Smart Protection Server Administrators Guide. This document contains information about product settings. Topics include: Smart Protection Server Documentation on page x Audience on page x Document Conventions on page xi
ix
Audience
The Smart Protection Server documentation is written for IT managers and administrators. The documentation assumes that the reader has in-depth knowledge of computer networks. The documentation does not assume the reader has any knowledge of virus/malware prevention or spam prevention technology.
Preface
Document Conventions
To help you locate and interpret information easily, the Smart Protection Server documentation uses the following conventions.
TABLE P-1.
Document conventions
C ONVENTION
ALL CAPITALS
D ESCRIPTION
Acronyms, abbreviations, and names of certain commands and keys on the keyboard Menus and menu commands, command buttons, tabs, options, and tasks References to other documentation or new technology components Examples, sample command lines, program code, web URL, file name, and program output Configuration notes
Bold
Italics
Monospace
Note:
Recommendations Tip:
WARNING!
xi
xii
Chapter 1
1-1
1-2
cloud. By off loading the storage of these virus/malware signatures to the cloud, Trend Micro is able to provide better protection to customers against the future volume of emerging security risks.
These two network-based solutions host the majority of the virus/malware pattern definitions and web reputation scores. Trend Micro Smart Protection Network and Smart Protection Server make these definitions available to other endpoints on the network for verifying potential threats. Queries are only sent to Smart Protection Servers if the risk of the file or URL cannot be determined by the endpoint. Endpoints leverage file reputation and web reputation technology to perform queries against Smart Protection Servers and Trend Micro Smart Protection Network as part of their regular system protection activities. In this solution, agents send identification information, determined by Trend Micro technology, to Smart Protection Servers for queries. Agents never send the entire file when using file reputation technology. The risk of the file is determined using identification information.
1-3
Pattern Update Process Pattern updates are a response to security threats. Smart Protection Network and Smart Protection Servers download the Smart Scan Pattern file from ActiveUpdate servers. Trend Micro products that support Smart Protection Servers download Smart Scan Agent Patterns from ActiveUpdate servers. Endpoints within your intranet download Smart Scan Agent Pattern files from Trend Micro products that support Smart Protection Servers. External endpoints are endpoints that are outside of the intranet and unable to connect to Smart Protection Servers or Trend Micro products that support Smart Protection Servers.
1-4
Intranet
Internet Endpoints
Smart Scan Pattern Smart Scan Agent Pattern Web Blocking List
FIGURE 1-1.
The Query Process Endpoints that are currently in your intranet use Smart Protection Servers for queries. Endpoints that are currently not in your intranet can connect to Trend Micro Smart Protection Network for queries. While a network connection is required for utilizing Smart Protection Servers, endpoints without access to network connection still benefit from Trend Micro technology. Smart Scan Agent Pattern and scan technology that reside on endpoints protect endpoints that do not have access to a network connection.
1-5
Agents installed on endpoints first perform scanning on the endpoint. If the agent cannot determine the risk of the file or URL, the agent verifies the risk by sending a query to a Smart Protection Server. If Smart Protection Server cannot verify the risk of the file or URL, Smart Protection Server sends a query to Smart Protection Network.
TABLE 1-2.
Protection behaviors based on access to intranet
L OCATION
Access to intranet
Advanced filtering technology enables the agent to "cache" the query result. This improves scan performance and eliminates the need to send the same query to Smart Protection Servers more than once. An agent that cannot verify a files risk locally and cannot connect to any Smart Protection Servers after several attempts will flag the file for verification and temporarily allow access to the file. When connection to a Smart Protection Server is restored, all the files that have been flagged are re-scanned. Then, the appropriate scan action is performed on files that have been confirmed as a threat to your network.
1-6
Tip: Install multiple Smart Protection Servers to ensure the continuity of protection in the event that connection to a Smart Protection Server is unavailable.
Intranet
Internet Endpoints
FIGURE 1-2.
Query process
1-7
Whats New
Table 1-3 is a list of new features in this release of Smart Protection Server:
TABLE 1-3.
Whats new in this release
N EW F EATURE
Web Reputation Widgets Smart Protection
D ESCRIPTION
Additional widgets have been added for Web Reputation. This version of Smart Protection Server includes Web Reputation and Smart Feedback. This version of Smart Protection Server includes logs for monitoring activity. This version of Smart Protection Server includes notifications for events.
Logs
Notifications
1-8
1-9
TABLE 1-4.
1-10
1-11
1-12
Chapter 2
2-1
Main Menu
Work Area
FIGURE 2-3.
Summary Screen
2-2
TABLE 2-5.
D ESCRIPTION
Displays customized information about Smart Protection Servers, traffic, and detections when you add widgets. Provides options for configuring reputation services, an approved/block URL list, and Smart Feedback. Provides options for configuring scheduled updates, manual program updates, program package uploads, and the update source. Provides options for querying logs and log maintenance. Provides options to configure SNMP service, notifications, proxy settings, and collecting diagnostic information for troubleshooting.
Smart Protection
Updates
Logs
Administration
1. 2. 3.
Open a web browser and type the URL indicated on the initial CLI banner after installation. Type admin for the user name and the password in the corresponding fields. Click Log on.
2-3
File Reputation
Enable File Reputation to support queries from endpoints. Configuring File Reputation
To enable File Reputation:
Navigation Path: Smart Protection > Reputation Services 1. Navigate to the File Reputation Tab.
2. 3.
Select the Enable File Reputation Service check box. Click Save. The Server Address can now be used for File Reputation queries by other Trend Micro products that support Smart Protection Servers.
2-4
Web Reputation
Enable Web Reputation to support URL queries from endpoints. Configuring Web Reputation
To enable Web Reputation:
Navigation Path: Smart Protection > Reputation Services > Web Reputation 1. Navigate to the Web Reputation tab.
2. 3. 4. 5. 6.
Select the Enable Web Reputation Service check box. (Optional) Click Advanced Settings to display additional Web Reputation settings. (Optional) Specify the priority of Approved/Blocked URL List when filtering URLs. (Optional) Select Use only local resources, do not send queries to Smart Protection Network to keep all queries within the local intranet. Click Save.
2-5
Navigation Path: Smart Protection > Approved/Blocked URL List 1. Click Add. The Add rule screen displays.
2. 3.
Select the Enable this rule check box. Select one of the following: URL: to specify a URL and apply to all of the URLs subsites or only one page. URL with keyword: to specify a string and use regular expressions. Click Test to view the results of applying this rule to the most common 20 URLs and the previous days top 100 URLs in the Web Access Log.
2-6
4.
Select one of the following: All endpoints: to apply to all endpoints. Specify a range: to apply to a range of IP addresses, domain names, and computer names.
5. 6.
Navigation Path: Smart Protection > Smart Feedback 1. Select Enable Trend Micro Smart Feedback.
2. 3. 4.
Select your industry. Click Edit Proxy Settings to navigate to the Proxy Settings screen if your network uses a proxy server and proxy server settings were not previously configured. Click Save.
2-7
Updating
The effectiveness of Smart Protection Server depends upon using the latest pattern files and components. Trend Micro releases new versions of the Smart Scan Pattern files hourly.
Tip: Trend Micro recommends updating components immediately after installation.
Navigation Path: Updates 1. 2. Click Pattern or Program from the drop down menu. Click Update Now or Save and Update Now to apply updates immediately.
Navigation Path: Updates 1. 2. 3. Click Pattern or Program from the drop down menu. Specify the update schedule. Click Save.
2-8
Performing Updates
There are three ways to update the program file: scheduled updates, manual updates, and by uploading the component.
2-9
Navigation Path: Updates > Program 1. Select Enable scheduled updates and select the update schedule.
2.
Select one of the following update methods: Download only: Select this check box to download program files without installing them. A message appears on the web product console when program file updates are available for installation. Update automatically after download: Select this check box to automatically install program file updates once the updates have been downloaded. Do not automatically update programs that require a restart or reboot: Select this check box to receive a prompt on the web product console if the update requires a restart or reboot. Program updates that do not require a restart or reboot will be installed automatically.
3.
Click Save.
2-10
Navigation Path: Updates > Program 1. Select one of the following update methods: Download only: Select this check box to download program files without installing them. A message appears on the web product console when program file updates are available for installation. Update automatically after download: Select this check box to automatically install program file updates once the updates have been downloaded. Do not automatically update programs that require a restart or reboot: Select this check box to receive a prompt on the web product console if the update requires a restart or reboot. Program updates that do not require a restart or reboot will be installed automatically.
2.
Navigation Path: Updates > Program 1. Click Browse... to locate the program file for manual program updates.
Note: Locate the program file that you downloaded from the Trend Micro website or obtained from Trend Micro.
2. 3.
2-11
Navigation Path: Updates > Source > File Reputation tab | Web Reputation tab 1. 2. Select Trend Micro ActiveUpdate Server or select Other update source and type a URL. Click Save.
Administrative Tasks
Administrative tasks allow you to configure SNMP Service settings, notifications, proxy server settings, or download diagnostic information.
2-12
Navigation Path: Administration > SNMP Service 1. Select the Enable SNMP Service check box.
2. 3.
Specify a Community name. Select the Enable IP restriction check box to prevent unauthorized access to the SNMP service. Classless Inter-Domain Routing (CIDR) is not supported for IP restriction. Specify an IP address. Specify a subnet mask. Click Save.
4. 5. 6.
Navigation Path: Administration > SNMP Service 1. 2. Click Smart Protection Server MIB to download the MIB file. A confirmation prompt displays. Click Save. The Save As screen displays.
2-13
3. 4.
The following table provides a description of the Smart Protection Server MIB.
TABLE 2-6.
Description of Smart Protection Server MIB
O BJECT N AME
Trend-MIB:: TBLVersion Trend-MIB:: TBLLastSuccessfulUpdate Trend-MIB:: LastUpdateError
D ESCRIPTION
Returns the current Smart Scan Pattern version. Returns the date and time of the last successful Smart Scan Pattern update. Returns the status of the last Smart Scan Pattern update. 0 Last pattern update was successful. <error code> - Last pattern update was unsuccessful.
1.3.6.1.4.1.6101 .1.2.1.3
1.3.6.1.4.1.6101 .1.2.1.4
Returns an error message if the last Smart Scan Pattern update was unsuccessful. Returns the current Web Blocking List version. Returns the date and time of the last successful Web Blocking List update.
2-14
TABLE 2-6.
O BJECT N AME
Trend-MIB:: WCSLastUpdateError
D ESCRIPTION
Returns the status of the last Web Blocking List update. 0 Last pattern update was successful. <error code> - Last pattern update was unsuccessful.
1.3.6.1.4.1.6101 .1.2.1.8
Returns an error message if the last Web Blocking List update was unsuccessful. Returns the status of file reputation query. 0 File reputation query is behaving as expected. <error code> - File reputation query is not behaving as expected.
1.3.6.1.4.1.6101 .1.2.2.2
Trend-MIB:: WCSLastVerifyError
1.3.6.1.4.1.6101 .1.2.2.3
Returns the status of web reputation query. 0 Web reputation query is behaving as expected. <error code> - Web reputation query is not behaving as expected.
2-15
Navigation Path: Administration > Proxy Settings 1. Select the Use a proxy server for updates check box.
2. 3. 4. 5. 6.
Select HTTP, SOCKS4,or SOCKS5 for the Proxy protocol. Type the server name or IP address. Type the port number. If your proxy server requires credentials, type the User ID and Password. Click Save.
2-16
Navigation Path: Administration > Support 1. 2. 3. 4. Click Start. The download progress screen appears. Click Save when the prompt for the downloaded file appears. Specify the location and file name. Click Save.
2-17
1.
2. 3. 4. 5.
Type the new password. Type the new password a second time to confirm the password.
2-18
Chapter 3
3-1
Smart Protection Server supports both HTTP and HTTPS protocols for File Reputation service connections and HTTP protocol for Web Reputation service connections. HTTPS provides a more secure connection while HTTP uses less bandwidth. Smart Protection Server addresses are displayed on the Command Line Interface (CLI) console banner.
FIGURE 3-4.
Summary Screen
To view customized information, add widgets to this screen. Drag and drop widgets to change the display order.
3-2
Using Tabs
Customize and manage widgets by adding and configuring tabs. Up to 30 tabs can be added.
To add a new tab:
Navigation Path: Summary 1. 2. 3. Click New Tab from the work area. Specify the Title. Select the Layout.
Note: The tab layout can be changed by clicking Tab Settings.
4.
Click Save.
Using Widgets
Widgets allow you to customize the information displayed on the Summary screen. New widgets can be added to the web console. Widgets can be dragged and dropped to customize the order in which they display. Available widget packages can be downloaded and updated by using the Program Update screen. After updating the widget package, the new widget can be added from the Summary screen.
Adding Widgets
Select from a list of available widgets to add to each tab.
To add widgets:
Navigation Path: Summary 1. 2. 3. Click Add widgets from the work area. Select the widgets that you want to add. Click Add and Reload.
3-3
1. 2. 3.
Select the check box for the Smart Protection Server to add to the information displayed in the widget. Click Save. The widget automatically refreshes and displays the information of the selected scan servers.
Smart Protection Server Addresses are used with Trend Micro products that manage endpoints. Server Addresses are used for configuring endpoint connections to Smart Protection Servers.
Note:
3-4
Logs
Use logs to monitor the status of Smart Protection Server. To view log information, perform a query.
Navigation Path: Logs > Web Access Log 1. 2. Specify the search criteria. Click Display Log.
Update Log
The Update Log screen displays information about pattern or program file updates. A brief description of the available options is below. Date Range: Select the date range that the update took place. Type: Select the type of update to display.
Navigation Path: Logs > Update Log 1. 2. Specify the search criteria by selecting a date range or type. Click Display Log.
Log Maintenance
Perform log maintenance to delete logs that are no longer needed.
3-5
Navigation Path: Logs > Log Maintenance 1. 2. 3. 4. Select the log types to purge. Select to delete all logs or logs older than a specified number of days. Select a purge schedule or click Purge Now. Click Save.
Configuring Notifications
You can configure Smart Protection Server to send email message or Simple Network Management Protocol (SNMP) trap notifications to designated individuals when there is a status change in services or updates.
Email Notifications
Configure email notification settings to notify administrators through email messages when there is a status change in services or updates.
3-6
Navigation Path: Administration > Notifications 1. Click the Email tab. The tab for email notifications appears.
3-7
2.
Select the Services check box or select from the following check boxes: File Reputation Status Change: Select to send a notification for status changes and specify the recipient, subject, and message. Web Reputation Status Change: Select to send a notification for status changes and specify the recipient, subject, and message. Pattern Update Status Change: Select to send a notification for status changes and specify the recipient, subject, and message. Program Update Download was Unsuccessful: Select to send a notification for this event and specify the recipient, subject, and message. Program Update Available: Select to send a notification for this event and specify the recipient, subject, and message. Program Update Status: Select to send a notification for this event and specify the recipient, subject, and message. Program Update Restarted Smart Protection Server or Related Services: Select to send a notification for this event and specify the recipient, subject, and message.
3.
4. 5. 6. 7.
Type the SMTP server IP address in the SMTP server field. Type the SMTP port number. Type an email address in the From field. All email notifications will show this address in the From field of email messages. Click Save.
3-8
Navigation Path: Administration > Notifications 1. Click the SNMP Trap tab. The tab for SNMP trap notifications appears.
2.
Select the Services check box or select from the following: File Reputation Status Change: Select to send a notification for status changes and specify the message. Web Reputation Status Change: Select to send a notification for status changes and specify the message. Pattern Update Status Change: Select to send a notification for status changes and specify the message.
3. 4. 5.
Type the SNMP trap server IP address. Type the SNMP community name. Click Save.
3-9
3-10
Chapter 4
4-1
1. 2. 3. 4. 5.
4-2
Product build version Virtualization platform (VMware or Hyper-V) and version Exact text of the error message, if any Steps to reproduce the problem Collect system information from the web console.
TrendLabs
Trend Micro TrendLabsSM is a global network of virus prevention and Web threat research and product support centers providing continuous 24/7 coverage to Trend Micro customers worldwide. Staffed by a team of more than 250 engineers and skilled support personnel, the TrendLabs dedicated service centers worldwide ensure rapid response to any virus outbreak or urgent customer support issue, anywhere in the world. The TrendLabs modern headquarters has earned ISO 9002 certification for its quality management procedures in 2000 - one of the first antivirus research and support facilities to be so accredited. Trend Micro believes TrendLabs is the leading service and support team in the antivirus industry. For more information about TrendLabs, visit: http://www.trendmicro.com/en/security/trendlabs/overview.htm
Known Issues
Known issues document unexpected product behavior that might require a temporary work around. Trend Micro recommends always checking the Readme file for information about system requirements and known issues that could affect installation or performance. Readme files also contain a description of whats new in a particular release, and other helpful information. The latest known issues and possible workarounds can also be found in the Trend Micro Knowledge Base: http://esupport.trendmicro.com
4-3
Hot Fix: a work-around or solution to customer-reported issues. Trend Micro develops and releases hot fixes to specific customers only. Security Patch: a single hot fix or group of hot fixes suitable for deployment to all customers Patch: a group of security patches suitable for deployment to all customers Service Pack: significant feature enhancements that upgrade the product
Your vendor or support provider may contact you when these items become available. Check the Trend Micro website for information on new hot fix, patch, and service pack releases: http://www.trendmicro.com/download All releases include a readme file that contains installation, deployment, and configuration information. Read the readme file carefully before performing installation.
4-4
Appendix A
A-1
List of Commands
This section describes the Command Line Interface (CLI) commands that you can use in the product to perform monitoring, debugging, troubleshooting, and configuration tasks. Log on to the CLI through the virtual machine with your admin account. CLI commands allow administrators to perform configuration tasks and to perform debug and troubleshooting functions. The CLI interface also provides additional commands to monitor critical resources and functions. To access the CLI interface, you will need to have the administrator account and password.
TABLE A-1.
Command Line Interface (CLI) Commands
C OMMAND
configure date
S YNTAX
configure date <date> <time>
D ESCRIPTION
Configure date and save to CMOS date DATE_FIELD [DATE_FIELD] time TIME_FIELD [TIME_FIELD]
configure dns
Configure DNS settings dns1 IP_ADDR Primary DNS server dns2 IP_ADDR Secondary DNS server []
configure hostname
Configure the hostname hostname HOSTNAME Hostname or FQDN Configure system locale to German Configure system locale to English Configure system locale to Spanish
A-2
TABLE A-1.
C OMMAND
configure locale fr_FR configure locale ja_JP configure locale pl_PL configure locale ru_RU configure locale zh_CN configure locale zh_TW configure ip dhcp
S YNTAX
configure locale fr_FR
D ESCRIPTION
Configure system locale to French Configure system locale to Japanese Configure system locale to Polish Configure system locale to Russian Configure system locale to Chinese(Simplified) Configure system locale to Chinese(Traditional) Configure the default Ethernet interface to use DHCP vlan VLAN_ID VLan ID [1-4094], default none VLan: [0]
configure ip static
Configure the default Ethernet interface to use the static IP configuration Configure account password user USER The user name for which you want to change the password. The user could be admin, 'root', or any user in the Smart Protection Server's Administrator group.
configure password
A-3
TABLE A-1.
C OMMAND
configure service
S YNTAX
configure service interface <ifname> configure timezone Africa Cairo configure timezone Africa Harare configure timezone Africa Nairobi configure timezone America Anchorage
D ESCRIPTION
Configure the default server settings Configure timezone to Africa/Cairo location. Configure timezone to Africa/Harare location. Configure timezone to Africa/Nairobi location Configure timezone to America/Anchorage location Configure timezone to America/Bogota location Configure timezone to America/Buenos_Aires location Configure timezone to America/Caracas location Configure timezone to America/Chicago location Configure timezone to America/Chihuahua location Configure timezone to America/Denver location Configure timezone to America/Godthab location
configure timezone Africa Cairo configure timezone Africa Harare configure timezone Africa Nairobi configure timezone America Anchorage
configure timezone America Bogota configure timezone America Buenos_Aires configure timezone America Caracas configure timezone America Chicago configure timezone America Chihuahua
configure timezone America Caracas configure timezone America Chicago configure timezone America Chihuahua
A-4
TABLE A-1.
C OMMAND
configure timezone America Lima configure timezone America Los_Angeles configure timezone America Mexico_City
S YNTAX
configure timezone America Lima configure timezone America Los_Angeles
D ESCRIPTION
Configure timezone to America/Lima location Configure timezone to America/Los_Angeles location Configure timezone to America/Mexico_City location Configure timezone to America/New_York location Configure timezone to America/Noronha Configure timezone to America/Phoenix Configure timezone to America/Santiago Configure timezone to America/St_Johns Configure timezone to America/Tegucigalpa Configure timezone to Asia/Almaty location Configure timezone to Asia/Baghdad location Configure timezone to Asia/Baku location
configure timezone America Noronha configure timezone America Phoenix configure timezone America Santiago configure timezone America St_Johns configure timezone America Tegucigalpa configure timezone Asia Almaty configure timezone Asia Baghdad configure timezone Asia Baku
configure timezone America Noronha configure timezone America Phoenix configure timezone America Santiago configure timezone America St_Johns configure timezone America Tegucigalpa configure timezone Asia Almaty configure timezone Asia Baghdad configure timezone Asia Baku
A-5
TABLE A-1.
C OMMAND
configure timezone Asia Bangkok configure timezone Asia Calcutta configure timezone Asia Colombo configure timezone Asia Dhaka configure timezone Asia Hong_Kong configure timezone Asia Irkutsk configure timezone Asia Jerusalem configure timezone Asia Kabul configure timezone Asia Karachi configure timezone Asia Katmandu configure timezone Asia Krasnoyarsk configure timezone Asia Kuala_Lumpur
S YNTAX
configure timezone Asia Bangkok configure timezone Asia Calcutta configure timezone Asia Colombo configure timezone Asia Dhaka configure timezone Asia Hong_Kong configure timezone Asia Irkutsk configure timezone Asia Jerusalem configure timezone Asia Kabul configure timezone Asia Karachi configure timezone Asia Katmandu configure timezone Asia Krasnoyarsk configure timezone Asia Kuala_Lumpur
D ESCRIPTION
Configure timezone to Asia/Bangkok location Configure timezone to Asia/Calcutta location Configure timezone to Asia/Colombo location Configure timezone to Asia/Dhaka location Configure timezone to Asia/Hong_Kong location Configure timezone to Asia/Irkutsk location Configure timezone to Asia/Jerusalem location Configure timezone to Asia/Kabul location Configure timezone to Asia/Karachi location Configure timezone to Asia/Katmandu location Configure timezone to Asia/Krasnoyarsk location Configure timezone to Asia/Kuala_Lumpur location Configure timezone to Asia/Kuwait location
A-6
TABLE A-1.
C OMMAND
configure timezone Asia Magadan configure timezone Asia Manila configure timezone Asia Muscat configure timezone Asia Rangoon configure timezone Asia Seoul configure timezone Asia Shanghai configure timezone Asia Singapore configure timezone Asia Taipei configure timezone Asia Tehran configure timezone Asia Tokyo configure timezone Asia Yakutsk configure timezone Atlantic Azores configure timezone Australia Adelaide
S YNTAX
configure timezone Asia Magadan configure timezone Asia Manila configure timezone Asia Muscat configure timezone Asia Rangoon configure timezone Asia Seoul configure timezone Asia Shanghai configure timezone Asia Singapore configure timezone Asia Taipei configure timezone Asia Tehran configure timezone Asia Tokyo configure timezone Asia Yakutsk configure timezone Atlantic Azores configure timezone Australia Adelaide
D ESCRIPTION
Configure timezone to Asia/Magadan location Configure timezone to Asia/Manila location Configure timezone to Asia/Muscat location Configure timezone to Asia/Rangoon location Configure timezone to Asia/Seoul location Configure timezone to Asia/Shanghai location Configure timezone to Asia/Singapore location Configure timezone to Asia/Taipei location Configure timezone to Asia/Tehran location Configure timezone to Asia/Tokyo location Configure timezone to Asia/Yakutsk location Configure timezone to Atlantic/ Configure timezone to Australia/Adelaide location
A-7
TABLE A-1.
C OMMAND
configure timezone Australia Brisbane
S YNTAX
configure timezone Australia Brisbane
D ESCRIPTION
Configure timezone to Australia/Brisbane location Configure timezone to Australia/Darwin location Configure timezone to Australia/Hobart location Configure timezone to Australia/Melbourne location Configure timezone to Australia/ Configure timezone to Europe/Amsterdam location Configure timezone to Europe/Athens location Configure timezone to Europe/Belgrade location Configure timezone to Europe/Berlin location Configure timezone to Europe/Brussels location Configure timezone to Europe/Bucharest location Configure timezone to Europe/Dublin location
configure timezone Australia Darwin configure timezone Australia Hobart configure timezone Australia Melbourne
configure timezone Australia Darwin configure timezone Australia Hobart configure timezone Australia Melbourne
configure timezone Europe Athens configure timezone Europe Belgrade configure timezone Europe Berlin configure timezone Europe Brussels configure timezone Europe Bucharest configure timezone Europe Dublin
configure timezone Europe Athens configure timezone Europe Belgrade configure timezone Europe Berlin configure timezone Europe Brussels configure timezone Europe Bucharest configure timezone Europe Dublin
A-8
TABLE A-1.
C OMMAND
configure timezone Europe Moscow configure timezone Europe Paris configure timezone Pacific Auckland configure timezone Pacific Fiji configure timezone Pacific Guam configure timezone Pacific Honolulu configure timezone Pacific Kwajalein configure timezone Pacific Midway configure timezone US Alaska configure timezone US Arizona configure timezone US Central configure timezone US East-Indiana configure timezone US Eastern
S YNTAX
configure timezone Europe Moscow configure timezone Europe Paris configure timezone Pacific Auckland configure timezone Pacific Fiji configure timezone Pacific Guam configure timezone Pacific Honolulu configure timezone Pacific Kwajalein configure timezone Pacific Midway configure timezone US Alaska configure timezone US Arizona configure timezone US Central configure timezone US East-Indiana configure timezone US Eastern
D ESCRIPTION
Configure timezone to Europe/Moscow location Configure timezone to Europe/Paris location Configure timezone to Pacific/Auckland location Configure timezone to Pacific/Fiji location Configure timezone to Pacific/Guam location Configure timezone to Pacific/Honolulu location Configure timezone to Pacific/Kwajalein location Configure timezone to Pacific/Midway location Configure timezone to US/Alaska location Configure timezone to US/Arizona location Configure timezone to US/Central location Configure timezone to US/East-Indiana location Configure timezone to US/Eastern location
A-9
TABLE A-1.
C OMMAND
configure timezone US Hawaii configure timezone US Mountain configure timezone US Pacific disable adhoc-query disable lwcs-accesslog
S YNTAX
configure timezone US Hawaii configure timezone US Mountain configure timezone US Pacific disable adhoc-query disable lwcs-accesslog
D ESCRIPTION
Configure timezone to US/Hawaii location Configure timezone to US/Mountain location Configure timezone to US/Pacific location Disable Web Access Log Disable lwcs_access.log to write to Smart Protection Server: /var/log/lighttpd/ folder Disable the sshd daemon Enable administrative commands Enable Web Access Log Enable Hyper-V Linux Integration Components on Smart Protection Server Enable lwcs_access.log to write to Smart Protection Server: /var/log/lighttpd/ folder Enable the sshd daemon Exit the session Display an overview of the CLI syntax.
enable lwcs-accesslog
enable lwcs-accesslog
A-10
TABLE A-1.
C OMMAND
history
S YNTAX
history [limit]
D ESCRIPTION
Display the current session's command line history Reboot this machine after a specified delay or immediately time UNIT Time in minutes to reboot this machine [0]
reboot
reboot [time]
Display current date/time Display network hostname. Display network interface information Display network address. Display network DNS servers. Display network gateway Display network routing table Display network timezone Display current system uptime Display endpoint connection addresses for File Reputation Service
show interfaces
show interfaces
A-11
TABLE A-1.
C OMMAND
show url management show url WebReputationService
S YNTAX
show url management
D ESCRIPTION
Display web console URL
Display endpoint connection addresses for Web Reputation Service Shut down this machine after a specified delay or immediately time UNIT Time in minutes to shutdown this machine [0]
shutdown
shutdown [time]
A-12
Glossary
Glossary
This glossary describes special terms used in the product documentation set.
TABLE G-1.
Glossary of Terms
TERM
activate
E XPLANATION
To enable your software after completion of the registration process. Trend Micro products will not be operable until product activation is complete. Activate during installation or after installation (in the management console) on the Product License screen. ActiveUpdate is a function common to many Trend Micro products. Connected to the Trend Micro update website, ActiveUpdate provides up-to-date downloads of virus pattern files, scan engines, and program files via the Internet or the Trend Micro Total Solution CD. Refers to a networking address (see IP address) or an email address, which is the string of characters that specify the source or destination of an email message. Refers to system administrator"the person in an organization who is responsible for activities such as setting up new hardware and software, allocating user names and passwords, monitoring disk space and other IT resources, performing backups, and managing network security. A user name and password that has administrator-level privileges. Computer programs designed to detect and clean computer viruses.
ActiveUpdate
address
administrator
GL-1
TABLE G-1.
TERM
authentication
E XPLANATION
The verification of the identity of a person or a process. Authentication ensures that digital data transmissions are delivered to the intended receiver. Authentication also assures the receiver of the integrity of the message and its source (where or whom it came from). The simplest form of authentication requires a user name and password to gain access to a particular account. Authentication protocols can also be based on secret-key encryption, such as the Data Encryption Standard (DES) algorithm, or on public-key systems using digital signatures. Also see public-key encryption and digital signature.
client
A computer system or process that requests a service of another computer system or process (a "server") using some kind of protocol and accepts the server's responses. A client is part of a client-server software architecture. Selecting options for how your Trend Micro product will function, for example, selecting whether to quarantine or delete a virus-infected email message. A value that pre-populates a field in the management console interface. A default value represents a logical choice and is provided for convenience. Use default values as-is, or change them. A group of computers sharing a common database and security policy.
configuration
default
(administrative) domain
GL-2
Glossary
TABLE G-1.
TERM
domain name
E XPLANATION
The full name of a system, consisting of its local host name and its domain name, for example, tellsitall.com. A domain name should be sufficient to determine a unique Internet address for any host on the Internet. This process, called "name resolution", uses the Domain Name System (DNS). Data that has been downloaded, for example, from a website via HTTP. To transfer data or code from one computer to another. Downloading often refers to transfer from a larger "host" system (especially a server or mainframe) to a smaller "client" system. Frequently Asked QuestionsA list of questions and answers about a specific topic. An element of data, such as an email message or HTTP download. The kind of data stored in a file. Most operating systems use the file name extension to determine the file type. The file type is used to choose an appropriate icon to represent the file in a user interface, and the correct application with which to view, edit, run, or print the file. A category of software that may be legitimate, unwanted, or malicious. Unlike threats such as viruses, worms, and Trojans, grayware does not infect, replicate, or destroy data, but it may violate your privacy. Examples of grayware include spyware, adware, and remote access tools.
download (noun)
download (verb)
FAQ
file
file type
spyware/grayware
GL-3
TABLE G-1.
TERM
GUI
E XPLANATION
Graphical User InterfaceThe use of pictures rather than just words to represent the input and output of a program. This contrasts with a command line interface where communication is by exchange of strings of text. One or more rigid magnetic disks rotating about a central axle with associated read/write heads and electronics, used to read and write hard disks or floppy disks, and to store data. Most hard disks are permanently connected to the drive (fixed disks) though there are also removable disks. Hypertext Transfer ProtocolThe client-server TCP/IP protocol used on the World Wide Web for the exchange of HTML documents. It conventionally uses port 80. Hypertext Transfer Protocol SecureA variant of HTTP used for handling secure transactions. A computer connected to a network. A client-server hypertext information retrieval system, based on a series of networks connected with routers. The Internet is a modern information system and a widely accepted medium for advertising, online sales, and services, as well as university and many other research networks. The World Wide Web is the most familiar aspect of the Internet. An Internet standard protocol that defines a basic unit of data called a datagram. A datagram is used in a connectionless, best-effort, delivery system. The Internet protocol defines how information gets passed between systems across the Internet.
HTTP
HTTPS
host Internet
GL-4
Glossary
TABLE G-1.
TERM
intranet
E XPLANATION
Any network which provides similar services within an organization to those provided by the Internet outside it, but which is not necessarily connected to the Internet. Internet ProtocolSee IP address. Internet address for a device on a network, typically expressed using dot notation such as 123.123.123.123. Also called a router, a gateway is a program or a special-purpose device that transfers IP datagrams from one network to another until the final destination is reached. Information technology, to include hardware, software, networking, telecommunications, and user support. Java is a general-purpose programming language developed by Sun Microsystems. A Java file contains Java code. Java supports programming for the Internet in the form of platform-independent Java "applets." (An applet is a program written in Java programming language that can be included in an HTML page. When you use a Java-technology enabled browser to view a page that contains an applet, the applets code is transferred to your system and is executed by the browsers Java Virtual Machine.) Virus code written or embedded in Java. Also see Java file.
IP IP address
IP gateway
IT
Java file
GL-5
TABLE G-1.
TERM
JavaScript virus
E XPLANATION
JavaScript is a simple programming language developed by Netscape that allows web developers to add dynamic content to HTML pages displayed in a browser using scripts. Javascript shares some features of Sun Microsystems Java programming language, but was developed independently. A JavaScript virus is a virus that is targeted at these scripts in the HTML code. This enables the virus to reside in web pages and download to a users desktop through the users browser. Also see VBscript virus.
Kilobyte1024 bytes of memory. Authorization by law to use a Trend Micro product. A reference from some point in one hypertext document to some point in another document or another place in the same document. Links are usually distinguished by a different color or style of text, such as underlined blue text. When you activate the link, for example, by clicking on it with a mouse, the browser displays the target of the link. Any network technology that interconnects resources within an office environment, usually at high speeds, such as Ethernet. A local area network is a short-distance network used to link a group of computers together within a building. 10BaseT Ethernet is the most commonly used form of LAN. A hardware device called a hub serves as the common wiring point, enabling data to be sent from one machine to another over the network. LANs are typically limited to distances of less than 500 meters and provide low-cost, high-bandwidth networking capabilities within a small geographical area.
GL-6
Glossary
TABLE G-1.
TERM
malware (malicious software)
E XPLANATION
Programming or files that are developed for the purpose of doing harm, such as viruses, worms, and Trojans. The user interface for your Trend Micro product. Also known as the product console. Millions of bits per seconda measure of bandwidth in data communications. Megabyte1024 kilobytes of data. Complex attacks that take advantage of multiple entry points and vulnerabilities in enterprise networks, such as the Nimda or Code Red threats. A standard for translating secure IP addresses to temporary, external, registered IP address from the address pool. This allows Trusted networks with privately assigned IP addresses to have access to the Internet. This also means that you dont have to get a registered IP address for every machine in your network. A type of virus that uses network protocols, such as TCP, FTP, UDP, HTTP, and email protocols to replicate. Network viruses often do not alter system files or modify the boot sectors of hard disks. Instead, they infect the memory of client machines, forcing them to flood the network with traffic, which can cause slowdowns or even complete network failure.
management console
Mbps
network virus
GL-7
TABLE G-1.
TERM
notification (Also see action and target)
E XPLANATION
A message that is forwarded to one or more of the following: - system administrator - sender of a message - recipient of a message, file download, or file transfer The purpose of the notification is to communicate that a prohibited action has taken place, or was attempted, such as a virus being detected in an attempted HTTP file download. The software which handles tasks such as the interface to peripheral hardware, scheduling tasks, and allocating storage. In this documentation, the term also refers to the software that presents a window system and graphical user interface. A variable, such as a range of values (a number from 1 to 10). The pattern file, as referred to as the Official Pattern Release (OPR), is the latest compilation of patterns for identified viruses. It is guaranteed to have passed a series of critical tests to ensure that you get optimum protection from the latest virus threats. This pattern file is most effective when used with the latest scan engine. A logical channel or channel endpoint in a communications system, used to distinguish between different logical channels on the same network interface on the same computer. Each application program has a unique port number associated with it. A process providing a cache of items available on other servers which are presumably slower or more expensive to access.
operating system
parameter
port
proxy
GL-8
Glossary
TABLE G-1.
TERM
proxy server
E XPLANATION
A World Wide Web server which accepts URLs with a special prefix, used to fetch documents from either a local cache or a remote server, then returns the URL to the requester. To examine items in a file in sequence to find those that meet a particular criteria. The module that performs antivirus scanning and detection in the host product to which it is integrated. A physical portion of a disk. (Also see partition, which is a logical portion of a disk.) Secure Socket Layer (SSL), is a protocol designed by Netscape for providing data security layered between application protocols (such as HTTP, Telnet, or FTP) and TCP/IP. This security protocol provides data encryption, server authentication, message integrity, and optional client authentication for a TCP/IP connection. A program which provides some service to other (client) programs. The connection between client and server is normally by means of message passing, often over a network, and uses some protocol to encode the client's requests and the server's responses. The server may run continuously (as a daemon), waiting for requests to arrive, or it may be invoked by some higher-level daemon which controls a number of specific servers. A computer peripheral device that is used by more than one person, thus increasing the risk of exposure to viruses. See virus signature.
scan
scan engine
sector
server
shared drive
signature
GL-9
TABLE G-1.
TERM
SNMP
E XPLANATION
Simple Network Management ProtocolA protocol that supports monitoring of devices attached to a network for conditions that merit administrative attention. Data flowing between the Internet and your network, both incoming and outgoing. A communications protocol which allows computers with different operating systems to communicate with each other. Controls how data is transferred between computers on the Internet. An event that causes an action to take place. For example, your Trend Micro product detects a virus in an email message. This may trigger the message to be placed in quarantine, and a notification to be sent to the system administrator, message sender, and message recipient. Used by IntelliScan, a virus scanning technology, to identify the type of information in a file by examining the file headers, regardless of the file name extension (which could be misleading). Universal Resource LocatorA standard way of specifying the location of an object, typically a web page, on the Internet, for example, www.trendmicro.com. The URL maps to an IP address using DNS. A VIP address maps traffic received at one IP address to another address based on the destination port number in the packet header.
traffic
trigger
true-file type
URL
GL-10
Glossary
TABLE G-1.
TERM
Virtual Local Area Network (VLAN)
E XPLANATION
A logical (rather than physical) grouping of devices that constitute a single broadcast domain. VLAN members are not identified by their location on a physical subnetwork but through the use of tags in the frame headers of their transmitted data. VLANs are described in the IEEE 802.1Q standard. A VPN is an easy, cost-effective and secure way for corporations to provide telecommuters and mobile professionals local dial-up access to their corporate network or to another Internet Service Provider (ISP). Secure private connections over the Internet are more cost-effective than dedicated private lines. VPNs are possible because of technologies and standards such as tunneling and encryption. A virtual router is the component of Screen OS that performs routing functions. By default, Trend Micro GateLock supports two virtual routers: Untrust-VR and Trust-VR. A virtual system is a subdivision of the main system that appears to the user to be a stand-alone entity. Virtual systems reside separately from each other in the same Trend Micro GateLock remote appliance; each one can be managed by its own virtual system administrator.
virtual router
virtual system
GL-11
TABLE G-1.
TERM
virus
E XPLANATION
A computer virus is a program a piece of executable code that has the unique ability to infect. Like biological viruses, computer viruses can spread quickly and are often difficult to eradicate. In addition to replication, some computer viruses share another commonality: a damage routine that delivers the virus payload. While payloads may only display messages or images, they can also destroy files, reformat your hard drive, or cause other damage. Even if the virus does not contain a damage routine, it can cause trouble by consuming storage space and memory, and degrading the overall performance of your computer.
Web
The World Wide Web, also called the web or the Internet. A server process running at a website which sends out web pages in response to HTTP requests from remote browsers. A general-purpose computer designed to be used by one person at a time and which offers higher performance than normally found in a personal computer, especially with respect to graphics, processing power and the ability to carry out several tasks at the same time.
Web server
GL-12
Index
A
Administrators Guide P-x Approved/Blocked URL List 2-6 Audience P-x
M
management 1-9 MIB file 2-122-13
N
network 1-9 notification 3-8
C
CLI 2-3 Command Line Interface A-1 continuity of protection 1-3, 1-7
O
Online Help P-x
D
design a secure password 2-17 diagnostic information 2-17 Document Conventions P-xi documentation 4-2
P
password 2-17 pattern 1-3, 1-9 program file 3-5 protocols 3-2 proxy server 2-16 proxy settings 2-16
F
File Reputation 1-10, 2-4
H
HTTP 3-2 HTTPS 3-2
R
Readme File P-x Readme file 4-3
I
Installation and Upgrade Guide P-x intranet 1-6
S
search criteria 3-5 server information 3-4 Smart Feedback 2-3, 2-7 Smart Protection Network 1-3, 1-10 Smart Protection Server 1-21-4, 2-8, 3-4 Smart Scan Agent Pattern 1-4 Smart Scan Pattern 1-4, 2-8
K
Knowledge Base 4-24-3
IX-1
SMTP 3-8 SNMP 2-13 spyware 1-9 summary 2-3, 3-2 support 4-2
V
virus/malware 1-3 viruses/malware 1-9 volume of threats 1-2
W
Web Access Log 3-5 Web Blocking List 2-8 web console 2-13 Web Reputation 1-11, 2-4 Web reputation 1-11 widget 3-4 widgets 3-4 worms 1-9
T
tabs 3-3 technical support 4-2 Trend Micro Smart Protection Network 1-21-4 TrendLabs 4-3 Trojans 1-9
U
updates 3-5 URL 2-3, 2-6
IX-2