Osce 10.6 sp3 Ag
Osce 10.6 sp3 Ag
Osce 10.6 sp3 Ag
without notice. Before installing and using the software, please review the readme files, release notes, and the latest version of the applicable user documentation, which are available from the Trend Micro Web site at: http://docs.trendmicro.com/en-us/enterprise/officescan.aspx Trend Micro, the Trend Micro t-ball logo, OfficeScan, Control Manager, Damage Cleanup Services, eManager, InterScan, Network VirusWall, ScanMail, ServerProtect, and TrendLabs are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright 2013. Trend Micro Incorporated. All rights reserved. Document Part No. OSEM105883_130313 Release Date: July 2013 Document Version No.: 1.0 Product Name and Version No.: OfficeScan 10.6 Service Pack 3 Protected by U.S. Patent No.: 5,951,698
The user documentation for Trend Micro OfficeScan 10.6 Service Pack 3 is intended to introduce the main features of the software and installation instructions for your production environment. You should read through it prior to installing or using the software. Detailed information about how to use specific features within the software are available in the online help file and the Knowledge Base at Trend Micro Web site. Trend Micro is always seeking to improve its documentation. Your feedback is always welcome. Please evaluate this documentation on the following site: http://www.trendmicro.com/download/documentation/rating.asp
Table of Contents
Preface
Preface ................................................................................................................. ix OfficeScan Documentation .............................................................................. x Audience .............................................................................................................. x Document Conventions ................................................................................... xi Terminology ...................................................................................................... xii
ii
Table of Contents
OfficeScan Server Updates ......................................................................... 6-14 Integrated Smart Protection Server Updates ........................................... 6-26 OfficeScan Client Updates .......................................................................... 6-26 Update Agents ............................................................................................... 6-50 Component Update Summary .................................................................... 6-58
iii
iv
Table of Contents
Firewall Policies and Profiles ...................................................................... 12-7 Firewall Privileges ....................................................................................... 12-22 Global Firewall Settings ............................................................................. 12-24 Firewall Violation Notifications for OfficeScan Client Users ............. 12-26 Firewall Logs ............................................................................................... 12-27 Firewall Violation Outbreaks .................................................................... 12-29 Testing the OfficeScan Firewall ............................................................... 12-30
vi
Table of Contents
The Policy Server .......................................................................................... 16-9 Policy Server System Requirements ........................................................ 16-19 Cisco Trust Agent (CTA) Requirements ................................................ 16-21 Supported Platforms and Requirements ................................................. 16-21 Policy Server for NAC Deployment ....................................................... 16-23
vii
Installing the OfficeScan Client Using an OfficeScan Client Package ................................................................................................................... B-4 OfficeScan Client Features on Windows Server Core ............................. B-6 Windows Server Core Commands .............................................................. B-7
viii
Preface
Preface
Welcome to the Trend Micro OfficeScan Administrators Guide. This document discusses getting started information, client installation procedures, and OfficeScan server and client management. Topics in this chapter:
OfficeScan Documentation on page x Audience on page x Document Conventions on page xi Terminology on page xii
ix
OfficeScan Documentation
OfficeScan documentation includes the following:
TABLE 1. OfficeScan Documentation DOCUMENTATION
Installation and Upgrade Guide Administrators Guide Help
DESCRIPTION
A PDF document that discusses requirements and procedures for installing the OfficeScan server, and upgrading the server and clients A PDF document that discusses getting started information, client installation procedures, and OfficeScan server and client management HTML files compiled in WebHelp or CHM format that provide "how to's", usage advice, and field-specific information. The Help is accessible from the OfficeScan server, client, and Policy Server consoles, and from the OfficeScan Master Setup. Contains a list of known issues and basic installation steps. It may also contain late-breaking product information not found in the Help or printed documentation An online database of problem-solving and troubleshooting information. It provides the latest information about known product issues. To access the Knowledge Base, go to the following website: http://esupport.trendmicro.com
Readme file
Knowledge Base
Download the latest version of the PDF documents and readme at: http://docs.trendmicro.com/en-us/enterprise/officescan.aspx
Audience
OfficeScan documentation is intended for the following users:
OfficeScan Administrators: Responsible for OfficeScan management, including OfficeScan server and OfficeScan client installation and management. These users are expected to have advanced networking and server management knowledge.
Preface
Cisco NAC administrators: Responsible for designing and maintaining security systems with Cisco NAC servers and Cisco networking equipment. They are assumed to have experience with this equipment. End users: Users who have the OfficeScan client installed on their computers. The computer skill level of these individuals ranges from beginner to power user.
Document Conventions
To help you locate and interpret information easily, the OfficeScan documentation uses the following conventions:
TABLE 2. Document Conventions CONVENTION
ALL CAPITALS Bold Italics Networked Computers > Client Management
DESCRIPTION
Acronyms, abbreviations, and names of certain commands and keys on the keyboard Menus and menu commands, command buttons, tabs, options, and tasks References to other documentation or new technology components A "breadcrumb" found at the start of procedures that helps users navigate to the relevant web console screen. Multiple breadcrumbs means that there are several ways to get to the same screen. Indicates that the text inside the angle brackets should be replaced by actual data. For example, C:\Program Files \<file_name> can be C:\Program Files\sample.jpg. Provides configuration notes or recommendations
<Text>
Note
Tip
xi
CONVENTION
WARNING!
DESCRIPTION
Provides warnings about activities that may harm computers on your network
Terminology
The following table provides the official terminology used throughout the OfficeScan documentation:
TABLE 3. OfficeScan Terminology TERMINOLOGY
OfficeScan client Client computer Client user (or user) Server Server computer Administrator (or OfficeScan administrator) Console
DESCRIPTION
The OfficeScan client program The computer where the OfficeScan client is installed The person managing the OfficeScan client on the client computer The OfficeScan server program The computer where the OfficeScan server is installed The person managing the OfficeScan server The user interface for configuring and managing OfficeScan server and client settings The console for the OfficeScan server program is called "web console", while the console for the OfficeScan client program is called "client console".
The collective term for virus/malware, spyware/grayware, and web threats Includes Antivirus, Damage Cleanup Services, and Web Reputation and Anti-spywareall of which are activated during OfficeScan server installation
xii
Preface
TERMINOLOGY
OfficeScan service
DESCRIPTION
Services hosted through Microsoft Management Console (MMC). For example, ofcservice.exe, the OfficeScan Master Service. Includes the OfficeScan client, Cisco Trust Agent, and Plug-In Manager Responsible for scanning, detecting, and taking actions against security risks The folder on the computer that contains the OfficeScan client files. If you accept the default settings during installation, you will find the installation folder at any of the following locations:
C:\Program Files\Trend Micro\OfficeScan Client C:\Program Files\Trend Micro (x86)\OfficeScan Client
Program Components
Client installation folder
The folder on the computer that contains the OfficeScan server files. If you accept the default settings during installation, you will find the installation folder at any of the following locations:
C:\Program Files\Trend Micro\OfficeScan C:\Program Files\Trend Micro (x86)\OfficeScan
For example, if a particular file is found under \PCCSRV on the server installation folder, the full path to the file is:
C:\Program Files\Trend Micro\OfficeScan\PCCSRV \<file_name>.
An OfficeScan client that has been configured to use smart scan An OfficeScan client that has been configured to use conventional scan
xiii
TERMINOLOGY
Dual-stack
DESCRIPTION
An entity that has both IPv4 and IPv6 addresses. For example:
A dual-stack endpoint is a computer with both IPv4 and IPv6 addresses. A dual-stack client refers to a client installed on a dual-stack endpoint. A dual-stack Update Agent distributes updates to clients. A dual-stack proxy server, such as DeleGate, can convert between IPv4 and IPv6 addresses.
An entity that only has an IPv4 address An entity that only has an IPv6 address Native OfficeScan features and plug-in programs delivered through Plug-In Manager
xiv
Part I
Introduction and Getting Started
Chapter 1
Introducing OfficeScan
This chapter introduces Trend Micro OfficeScan and provides an overview of its features and capabilities. Topics in this chapter:
About OfficeScan on page 1-2 New in this Release on page 1-2 Key Features and Benefits on page 1-14 The OfficeScan Server on page 1-17 The OfficeScan Client on page 1-18 Integration with Trend Micro Products and Services on page 1-19
1-1
About OfficeScan
Trend Micro OfficeScan protects enterprise networks from malware, network viruses, web-based threats, spyware, and mixed threat attacks. An integrated solution, OfficeScan consists of the OfficeScan client program that resides at the endpoint and a server program that manages all clients. The OfficeScan client guards the computer and reports its security status to the server. The server, through the web-based management console, makes it easy to set coordinated security policies and deploy updates to every client. OfficeScan is powered by the Trend Micro Smart Protection Network, a next generation cloud-client infrastructure that delivers security that is smarter than conventional approaches. Unique in-the-cloud technology and a lighter-weight client reduce reliance on conventional pattern downloads and eliminate the delays commonly associated with desktop updates. Businesses benefit from increased network bandwidth, reduced processing power, and associated cost savings. Users get immediate access to the latest protection wherever they connectwithin the company network, from home, or on the go.
1-2
Introducing OfficeScan
DESCRIPTION
OfficeScan clients create and upload encrypted forensic data files to the server allowing companies to track and record the specific Data Loss Prevention incidents that occur on the network. OfficeScan generates a hash value for each forensic file for verification and integrity purposes. Through integration with Control Manager, security officers can view the exact digital asset that caused each incident and take appropriate measures. For details, see Forensic Folder and DLP Database on page 3-8.
Administrators can create multiple rules for a single policy. Each rule can contain multiple templates and administrators can assign specific actions depending on the type of digital asset identified or the channel through which the transmission occurred. Global exceptions apply to all rules in a given policy, avoiding the need to copy settings. For details, see Data Loss Prevention Policies on page 10-3.
Logs display more detailed records about each Data Loss Prevention incident. Details not only include the rules that triggered the incident, but also the exact template that identified the digital asset. For details, see Data Loss Prevention Logs on page 10-49.
Device Control can now monitor Bluetooth adaptors and Wireless NICs. For details, see the Data Protection Lists document at http:// docs.trendmicro.com/en-us/enterprise/officescan.aspx.
1-3
FEATURE
Extended DLP channel support
DESCRIPTION
Data Loss Prevention can now monitor the following:
126.com Webmail 139 Webmail 163.com Webmail Tencent QQ (files sent using instant messaging) Tencent QQ Webmail SINA Webmail Sohu Webmail
For details, see the Data Protection Lists document at http:// docs.trendmicro.com/en-us/enterprise/officescan.aspx.
DESCRIPTION
OfficeScan can automatically detect any known C&C server through use of the Trend Micro Smart Protection Network Global Intelligence list. Web Reputation Services checks all URLs against both the traditional malicious list, and the new Global Intelligence C&C server list. Administrators that have integrated a Smart Protection Server with Deep Discovery Advisor can also check the risk level of suspicious network connections using the Virtual Analyzer C&C server list. The Virtual Analyzer generates this list based on data received from connected Trend Micro products ensuring very company-specific protection. For details, see Command & Control Contact Alert Services on page 11-2.
1-4
Introducing OfficeScan
FEATURE
C&C IP list
DESCRIPTION
The C&C IP list works in conjunction with the Network Content Inspection Engine (NCIE) to detect network connections with known C&C servers. NCIE detects C&C server contact through any network channel. For details, see Command & Control Contact Alert Services on page 11-2.
OfficeScan C&C Contact Alert Services provides standard and outbreak notifications that keep administrators and users informed about any known or potential advanced persistent threat or C&C callbacks originating from the network. The C&C Callback Events widget provides administrators with a quick view of all callbacks from the network, the targets of the attacks, the risk level of the attack, and the callback address. For details, see C&C Callback Events Widget on page 2-24.
Scan Enhancements
This OfficeScan version also provides the following scan enhancements.
TABLE 1-3. Scan Enhancements SCAN TYPE
Behavior Monitoring
DESCRIPTION
Behavior Monitoring works in conjunction with Web Reputation Services to verify the prevalence of files downloaded through HTTP channels or email applications. After detecting a "newly encountered" file, administrators can choose to prompt users before executing the file. Trend Micro classifies a program as newly encountered based on the number of file detections or historical age of the file as determined by the Smart Protection Network. For details, see Configuring Global Behavior Monitoring Settings on page 8-7.
1-5
SCAN TYPE
Virus Scan Performance
DESCRIPTION
The OfficeScan Virus Scan Engine (VSAPI 9.713 or later) has been updated with a deferred scanning feature to improve file copying performance. For details, see Enable Deferred Scanning on File Operations on page 7-67.
Reduced memory consumption Incremental pattern updates, which greatly reduce bandwidth consumption
Rollback Enhancements
The version of OfficeScan simplifies the procedure required to rollback the OfficeScan server and clients. During OfficeScan installation, administrators can choose to back up the server files which can then be used to roll back the server and clients to the previously installed version. For detailed rollback instructions, refer to OfficeScan Rollback on page D-1.
1-6
Introducing OfficeScan
This version of OfficeScan also provides support for server installations on Windows Server 2012. This version of OfficeScan provides support for Internet Explorer 10.
Note Clients operating using the Windows UI mode receive limited support. For details, see Windows 8 and Windows Server 2012 Support on page C-1.
DESCRIPTION
Real-time scanning now verifies the file signature of an MSI installation package before proceeding with an installation. Once OfficeScan receives verification that the file signature is trusted, real-time scan allows the installation to proceed without further file scanning.
VDI Enhancement
This version of OfficeScan enhances the smart scan update feature for virtual environments. When a large number of smart scan clients request a pattern update, the server now places the client requests in a queue until the server can send a response. As each client completes the update, the server prompts the next client in the queue to begin updating.
1-7
Windows Store App support on the Windows UI and desktop application support HTTPS support using Internet Explorer 10
HTTPS support using Chrome versions 19, 20, 21, and 22 Updated Gmail support Microsoft Office 2013 support
Windows Server 2008 Windows 7 Windows Vista with SP1 (or later)
1-8
Introducing OfficeScan
Data Loss Prevention and Device Control support for 64-bit versions of Windows platforms Over 100 new pre-configured Data Loss Prevention templates and data identifiers
Microsoft Hyper-V Support: Administrators can now manage virtual clients using the Microsoft Hyper-V Server in addition to VMware vCenter server and the Citrix XenServer.
1-9
Non-persistent Environment Enhancement: OfficeScan now identifies virtual clients by Media Access Control (MAC) address. This prevents OfficeScan from assigning multiple globally unique identifiers (GUIDs) to the same client in nonpersistent environments.
For details, see Trend Micro Virtual Desktop Support on page 14-70.
Data Protection The Data Protection module provides Data Loss Prevention and expands the range of devices monitored by Device Control. Plug-in Manager manages the installation and licensing of the Data Protection module. For more information, see Data Protection Installation on page 3-2.
1-10
Introducing OfficeScan
DETAILS
Data Loss Prevention safeguards an organizations digital assets against accidental or deliberate leakage. Data Loss Prevention allows you to:
Identify the digital assets to protect Create policies that limit or prevent the transmission of digital assets through common transmission channels, such as email and external devices Enforce compliance to established privacy standards
For more information, see About Data Loss Prevention on page 10-2. Device Control OfficeScan out-of-the-box has a Device Control feature that regulates access to USB storage devices, CD/DVD, floppy disks, and network drives. Device Control that is part of the Data Protection module expands the range of devices by regulating access to the following devices:
Imaging devices Modems Ports (COM and LPT) Infrared devices PCMCIA cards Print screen key IEEE 1394 interface
Plug-in Manager 2.0 Plug-in Manager 2.0 installs with the OfficeScan server. This Plug-in Manager version delivers widgets. Widgets provide a quick visual reference for the OfficeScan features and plug-in solutions that you deem most vital to your business. Widgets are available in the
1-11
OfficeScan servers Summary dashboard, which replaces the Summary screen in previous OfficeScan versions. For more information, see The Summary Dashboard on page 2-5.
IPv6 Support The OfficeScan server and clients can now be installed on IPv6 computers. In addition, new versions of Control Manager and Smart Protection Server now support IPv6 to provide seamless integration with the OfficeScan server and clients. For more information, see IPv6 Support for OfficeScan Server and Clients on page A-2.
Cache Files for Scans The OfficeScan client now builds cache files, which contain information about safe files that have been scanned previously and files that Trend Micro deems trustworthy. Cache files provide a quick reference during on-demand scans, thus reducing the usage of system resources. On-demand scans (Manual Scan, Scheduled Scan, and Scan Now) are now more efficient, providing up to 40% improvement to speed performance. For more information, see Cache Settings for Scans on page 7-60.
Startup Enhancement When a computer starts, the OfficeScan client will postpone the loading of some client services if CPU usage is more than 20%. When CPU usage is below the limit, the client starts to load the services. Services include:
OfficeScan NT Firewall OfficeScan Data Protection Service Trend Micro Unauthorized Change Prevention Service
Damage Cleanup Services Enhancement Damage Cleanup Services can now run in advanced cleanup mode to stop activities by rogue security software, also known as FakeAV. The client also uses advanced
1-12
Introducing OfficeScan
cleanup rules to proactively detect and stop applications that exhibit FakeAV behavior. You can choose the cleanup mode when you configure virus/malware scan actions for Manual Scan, Real-time Scan, Scheduled Scan, and Scan Now. For more information, see Damage Cleanup Services on page 7-40.
Web Reputation HTTPS Support Clients can now scan HTTPS traffic for web threats. You can configure this feature when you create a web reputation policy. For more information, see Web Reputation Policies on page 11-5.
Important
HTTPS scanning only supports Windows 8 or Windows 2012 platforms operating in desktop mode. After enabling HTTPS scanning for the first time on OfficeScan clients running Internet Explorer 9 or 10, users must enable the TmIEPlugInBHO Class addon in the browser pop-up window before HTTPS scanning is operational.
Windows Server Core 2008 Support The OfficeScan client can now be installed on Windows Server Core 2008. Users can use the command line interface to launch the client console and check the endpoints protection status. For more information, see Windows Server Core 2008/2012 Support on page B-2.
Smart scan clients now run Outlook Mail Scan in smart scan mode. In previous versions, smart scan clients run Outlook Mail Scan in conventional scan mode. Logs and notifications for spyware/grayware detections now show the user name logged on to the computer at the time of detection. In the spyware/grayware logs, if the second level scan result is "Passed", the first level scan result is now "Further action required" instead of "No action
1-13
required". With this enhancement, you can now take additional measures such as cleaning spyware/grayware that you consider harmful.
Client Self-protection is now a granular setting that you can configure in the client tree. You can now configure all clients to send heartbeat messages to the OfficeScan server. In the previous version, only clients in unreachable networks send heartbeat messages. For more information, see Unreachable Clients on page 14-41. When exporting client tree settings to a .dat file, all settings, will now be exported. In previous versions, only scan settings and client privileges/other settings are exported. For more information on exporting settings, see Importing and Exporting Client Settings on page 14-51. When using the Client Mover tool, you can now specify the client tree subdomain to which the client will be grouped after it moves to its new parent server. For more information, see Client Mover on page 14-21.
Plug-In Manager and Plug-in Solutions Plug-In Manager facilitates the installation, deployment, and management of plugin solutions. Administrators can install two kinds of plug-in solutions:
Centralized Management A web-based management console gives administrators transparent access to all clients and servers on the network. The web console coordinates automatic deployment of security policies, pattern files, and software updates on every client
1-14
Introducing OfficeScan
and server. And with Outbreak Prevention Services, it shuts down infection vectors and rapidly deploys attack-specific security policies to prevent or contain outbreaks before pattern files are available. OfficeScan also performs real-time monitoring, provides event notification, and delivers comprehensive reporting. Administrators can perform remote administration, set customized policies for individual desktops or groups, and lock client security settings.
Security Risk Protection OfficeScan protects computers from security risks by scanning files and then performing a specific action for each security risk detected. An overwhelming number of security risks detected over a short period of time signals an outbreak. To contain outbreaks, OfficeScan enforces outbreak prevention policies and isolates infected computers until they are completely risk-free. OfficeScan uses smart scan to make the scanning process more efficient. This technology works by off-loading a large number of signatures previously stored on the local computer to Smart Protection Sources. Using this approach, the system and network impact of the ever-increasing volume of signature updates to endpoint systems is significantly reduced. For information about smart scan and how to deploy it to clients, see Scan Methods on page 7-7.
Damage Cleanup Services Damage Cleanup Services cleans computers of file-based and network viruses, and virus and worm remnants (Trojans, registry entries, viral files) through a fullyautomated process. To address the threats and nuisances posed by Trojans, Damage Cleanup Services does the following:
Detects and removes live Trojans Kills processes that Trojans create Repairs system files that Trojans modify Deletes files and applications that Trojans drop
Because Damage Cleanup Services runs automatically in the background, it is not necessary to configure it. Users are not even aware when it runs. However,
1-15
OfficeScan may sometimes notify the user to restart their computer to complete the process of removing a Trojan.
Web Reputation Web reputation technology proactively protects client computers within or outside the corporate network from malicious and potentially dangerous websites. Web reputation breaks the infection chain and prevents downloading of malicious code. Verify the credibility of websites and pages by integrating OfficeScan with the Smart Protection Server or the Trend Micro Smart Protection Network.
OfficeScan Firewall The OfficeScan firewall protects clients and servers on the network using stateful inspections and high performance network virus scans. Create rules to filter connections by application, IP address, port number, or protocol, and then apply the rules to different groups of users.
Data Loss Prevention Data Loss Prevention safeguards an organizations digital assets against accidental or deliberate leakage. Data Loss Prevention allows administrators to:
Identify the digital assets to protect Create policies that limit or prevent the transmission of digital assets through common transmission channels, such as email messages and external devices Enforce compliance to established privacy standards
Device Control Device Control regulates access to external storage devices and network resources connected to computers. Device Control helps prevent data loss and leakage and, combined with file scanning, helps guard against security risks.
Behavior Monitoring Behavior Monitoring constantly monitors clients for unusual modifications to the operating system or on installed software.
1-16
Introducing OfficeScan
OfficeScan provides seamless integration of the Cisco Trust Agent, enabling the most effective policy enforcement within a Cisco Self-Defending Network. OfficeScan also includes a Policy Server for automated communication with Cisco Access Control Servers. When integrated with Trend Micro Network VirusWall or any Network Admission Control (NAC) device, OfficeScan can check clients trying to enter the network and then remedy, redirect, restrict, deny, or permit access. If a computer is vulnerable or becomes infected, OfficeScan can automatically isolate it and its network segments until all computers update or cleanup is complete.
Installs, monitors, and manages OfficeScan clients Downloads most of the components needed by clients. The OfficeScan server downloads components from the Trend Micro ActiveUpdate server and then distributes them to clients.
Note Some components are downloaded by smart protection sources. See Smart Protection Sources on page 4-5 for details.
1-17
The OfficeScan server is capable of providing real-time, bidirectional communication between the server and clients. Manage the clients from a browser-based web console, which administrators can access from virtually anywhere on the network. The server communicates with the client (and the client with the server) through Hypertext Transfer Protocol (HTTP).
1-18
Introducing OfficeScan
malware detection, client startup, client shutdown, start of a scan, and completion of an update.
DESCRIPTION
Provides all the components that the OfficeScan client needs to protect clients from security threats Provides File Reputation Services and Web Reputation Services to clients. Smart Protection Network is hosted by Trend Micro. Provides the same File Reputation Services and Web Reputation Services offered by Smart Protection Network. A standalone Smart Protection Server is intended to localize the service to the corporate network to optimize efficiency. Note An integrated Smart Protection Server is installed with the OfficeScan server. It has the same functions as its standalone counterpart but has limited capacity.
VERSION
Not applicable
Not applicable
2.5 (recommended)
2.0
1-19
PRODUCT/ SERVICE
Control Manager
DESCRIPTION
A software management solution that provides the ability to control antivirus and content security programs from a central locationregardless of the platform or the physical location of the program.
VERSION
6.0 (recommended)
Deep Discovery provides network-wide monitoring powered by custom sandboxing and relevant real-time intelligence to enable early attack detection, enable rapid containment, and deliver custom security updates that immediately improve protection against further attack.
1-20
Chapter 2
The Web Console on page 2-2 The Summary Dashboard on page 2-5 Active Directory Integration on page 2-32 The OfficeScan Client Tree on page 2-35 OfficeScan Domains on page 2-48
2-1
Manage clients installed on networked computers Group clients into logical domains for simultaneous configuration and management Set scan configurations and initiate manual scan on a single or multiple networked computers Configure notifications about security risks on the network and view logs sent by clients Configure outbreak criteria and notifications Delegate web console administration tasks to other OfficeScan administrators by configuring roles and user accounts Ensure that clients comply with security guidelines
Note The web console does not support Windows 8 or Windows Server 2012 in Windows UI mode.
2-2
300MHz Intel Pentium processor or equivalent 128MB of RAM At least 30MB of available disk space Monitor that supports 1024 x 768 resolution at 256 colors or higher Microsoft Internet Explorer 7.0 or higher
On the web browser, type one of the following in the address bar based on the type of OfficeScan server installation:
TABLE 2-1. OfficeScan Web Console URLs INSTALLATION TYPE
Without SSL on a default site Without SSL on a virtual site
URL
http://<OfficeScan server FQDN or IP address>/OfficeScan http://<OfficeScan server FQDN or IP address>:<HTTP port number>/ OfficeScan https://<OfficeScan server FQDN or IP address>/OfficeScan https://<OfficeScan server FQDN or IP address>/OfficeScan
Note If you upgraded from a previous version of OfficeScan, web browser and proxy server cache files may prevent the OfficeScan web console from loading properly. Clear the cache memory on the browser and on any proxy servers located between the OfficeScan server and the computer you use to access the web console.
Logon Account
During OfficeScan server installation, Setup creates a root account and prompts you to type the password for this account. When opening the web console for the first time,
2-3
type "root" as the user name and the root account password. If you forget the password, contact your support provider for help in resetting the password. Define user roles and set up user accounts to allow other users to access the web console without using the root account. When users log on to the console, they can use the user accounts you have set up for them. For more information, see Role-based Administration on page 13-2.
<account name>: Click the account name (for example, root) to modify details for the account, such as the password. Log Off: Logs you off from the web console Help (
Whats New: Opens a page with a list of new features included in the current product release Contents and Index: Opens the OfficeScan Server Help Knowledge Base: Opens the Trend Micro Knowledge Base, where you can view FAQs and updated product information, access customer support, and register OfficeScan Security Info: Displays the Trend Micro Security Information page, where you can read about the latest security risks Sales: Displays the Trend Micro sales web page, where you can contact your regional sales representative
2-4
Support: Displays the Trend Micro support web page, where you can submit questions and find answers to common questions about Trend Micro products About: Provides an overview of the product, instructions to check component version details, and a link to the Support Intelligence System. For details, see Support Intelligence System on page 18-2.
2-5
Reminders about the license status display during the following instances:
60 days before a license expires During the products grace period. The duration of the grace period varies by region. Please verify the grace period with your Trend Micro representative. When the license expires and grace period elapses. During this time, you will not be able to obtain technical support or perform component updates. The scan engines will still scan computers using out-of-date components. These out-of-date components may not be able to protect you completely from the latest security risks.
14 days before a license expires When the license expires. During this time, OfficeScan disables component updates, scanning, and all client features.
If you have obtained an Activation Code, renew a license by going to Administration > Product License.
2-6
OfficeScan server and clients Plug-in solutions and their client-side agents Trend Micro Smart Protection Network
Note Enable Smart Feedback to display data from Smart Protection Network. For details about Smart Feedback, see Smart Feedback on page 13-47.
Tabs provide a container for widgets. The Summary dashboard supports up to 30 tabs.
2-7
STEPS
Click the add icon on top of the dashboard. A new screen displays.
2.
Title: The name of the tab Layout: Choose from the available layouts Auto-fit: Enable auto-fit if you selected a layout with ) and each box will contain several boxes (such as only one widget. Auto-fit adjusts a widget to fit the size of a box.
Click Save. Click Tab Settings on the top right corner of the tab. A new screen displays.
Modify the tab name, layout, and auto-fit settings. Click Save.
Use drag-and-drop to change a tabs position. Click the delete icon next to the tab title.
2-8
STEPS
section of the screen to switch between the Detailed view and Summary view.
To the left of the screen are widget categories. Select a category to narrow down the selections. Use the search text box on top of the screen to search for a specific widget.
Click Add.
Use drag-and-drop to move a widget to a different location within the tab. Resize a widget on a multi-column tab by pointing the cursor to the right edge of the widget and then moving the cursor to the left or right. 1. 2. Click the edit icon ( Type the new title. Note For some widgets, such as OfficeScan and Plug-ins Mashup, widget-related items can be modified. 3. Click Save. ). ). ). A new screen appears.
2-9
DESCRIPTION
This tab contains the same information found in the Summary screen in previous OfficeScan versions. In this tab, you can view the overall security risk protection of the OfficeScan network. You can also take action on items that require immediate intervention, such as outbreaks or outdated components. This tab shows which clients are running the OfficeScan client and plugin solutions. Use this tab to assess the overall security status of clients. This tab contains information from Trend Micro Smart Protection Network, which provides File Reputation Services and Web Reputation Services to OfficeScan clients.
WIDGETS
Client Connectivity Widget on page 2-13 Security Risk Detections Widget on page 2-16 Outbreaks Widget on page 2-17 Client Updates Widget on page 2-19
Web Reputation Top Threat Sources Widget on page 2-27 Web Reputation Top Threatened Users Widget on page 2-28 File Reputation Threat Map Widget on page 2-29
Available Widgets
The following widgets are available in this release:
2-10
AVAILABILITY
Available out-of-the-box For details, see Client Connectivity Widget on page 2-13.
Available out-of-the-box For details, see Security Risk Detections Widget on page 2-16.
Outbreaks
Client Updates
Available out-of-the-box For details, see Client Updates Widget on page 2-19.
Available out-of-the-box but only shows data from OfficeScan clients Data from the following plug-in solutions are available after activating each solution:
For details, see OfficeScan and Plug-ins Mashup Widget on page 2-20. Top Data Loss Preventions Incidents Available after activating OfficeScan Data Protection For details, see Top Data Loss Preventions Incidents Widget on page 2-21. Available after activating OfficeScan Data Protection For details, see Data Loss Prevention Incidents Over Time Widget on page 2-23. Available out-of-the-box For details, see Web Reputation Top Threat Sources Widget on page 2-27.
2-11
WIDGET NAME
Web Reputation Top Threatened Users
AVAILABILITY
Available out-of-the-box For details, see Web Reputation Top Threatened Users Widget on page 2-28. Available out-of-the-box For details, see File Reputation Threat Map Widget on page 2-29.
Available out-of-the-box For details, see C&C Callback Events Widget on page 2-24.
IDF - Alert Status IDF - Computer Status IDF - Network Events History IDF - System Events History
Available after activating Intrusion Defense Firewall. See the IDF documentation for details about these widgets.
2-12
2-13
To display only clients using a particular scan method, click All and then select the scan method.
The table breaks down online smart scan clients by connection status with Smart Protection Servers.
2-14
Note Only online clients can report their connection status with Smart Protection Servers. If clients are disconnected from a Smart Protection Server, restore the connection by performing the steps in Smart Protection Sources are Unavailable on page 14-38.
Each Smart Protection Server is a clickable URL that, when clicked, launches the servers console. If there are several Smart Protection Servers, click MORE. A new screen opens, showing all the Smart Protection Servers.
View all the Smart Protection Servers to which clients connect and the number of clients connected to each server. Clicking the number opens the client tree where you can manage client settings. Launch a servers console by clicking the link for the server
2-15
2-16
If the number of infected computers is 1 or more, you can click the number to view the infected computers in a client tree. You can initiate tasks on the clients on these computers or change their settings.
Outbreaks Widget
The Outbreaks widget provides the status of any current security risk outbreaks and the last outbreak alert.
View outbreak details by clicking the date/time link of the alert. Reset the status of the outbreak alert information and immediately enforce outbreak prevention measures when OfficeScan detects an outbreak. For details on enforcing outbreak prevention measures, see Outbreak Prevention Policies on page 7-97.
2-17
Click View Top 10 Security Risk Statistics to view the most prevalent security risks, the computers with the most number of security risks, and the top infection sources. A new screen appears.
View detailed information about a security risk by clicking the security risk name. View the overall status of a particular computer by clicking the computer name. View security risk logs for the computer by clicking View corresponding to a computer name.
2-18
View the current version for each component. View the number of clients with outdated components under the Outdated column. If there are clients that need to be updated, click the number link to start the update. For each program, view the clients that have not been upgraded by clicking the number link corresponding to the program.
Note To upgrade Cisco Trust Agent, go to Cisco NAC > Agent Deployment.
2-19
These plug-in programs must be activated for the mashup widget to display data. Upgrade the plug-in programs if newer versions are available. In this widget, you can:
) on the Choose the columns that display in the client tree. Click the edit icon ( top right corner of the widget and then select the columns in the screen that displays.
2-20
DESCRIPTION
The endpoints domain in the OfficeScan client tree The OfficeScan clients connectivity with its parent OfficeScan server The number of viruses and malware detected by the OfficeScan client The number of spyware and grayware detected by the OfficeScan client Indicates whether the endpoint is a virtual machine See the IDF documentation for details about these columns and the data that they show.
Double-click data in the table. If you double-click OfficeScan data, the OfficeScan client tree displays. If you double-click plug-in program data (except data in the VDI Support column), the plug-in programs main screen displays. Use the search feature to find individual endpoints. You can type a full or partial host name.
2-21
This widget shows the number of digital asset transmissions, regardless of the action (block or pass).
To view data: 1. Select a time period for the detections. Choose from:
Today: Detections in the last 24 hours, including the current hour 1 Week: Detections in the last 7 days, including the current day 2 Weeks: Detections in the last 14 days, including the current day 1 Month: Detections in the last 30 days, including the current day
2.
User: Users that transmitted digital assets the most number of times Channel: Channels most often used to transmit digital assets Template: Digital asset templates that triggered the most detections
2-22
Computer: Computers that transmitted digital assets the most number of times
Note This widget shows a maximum of 10 users, channels, templates, or computers.
To view data, select a time period for the detections. Choose from:
Today: Detections in the last 24 hours, including the current hour 1 Week: Detections in the last 7 days, including the current day
2-23
2 Weeks: Detections in the last 14 days, including the current day 1 Month: Detections in the last 30 days, including the current day
Compromised host: Displays the most recent C&C information per targeted endpoint
2-24
DESCRIPTION
The name of the endpoint targeted by the C&C attack The number of callback addresses that the endpoint attempted to contact The last callback address that the endpoint attempted to contact The number of times the targeted endpoint attempted to contact the callback address Note Click the hyperlink to open the C&C Callback Logs screen and view more detailed information.
Callback address: Displays the most recent C&C information per C&C callback address
DESCRIPTION
The address of C&C callbacks originating from the network
2-25
COLUMN
C&C Risk Level Compromised Hosts Latest Compromised Host Callbacks Attempts
DESCRIPTION
The risk level of the callback address determined by either the Global Intelligence or Virtual Analyzer list The number of endpoints that the callback address targeted The name of the endpoint that last attempted to contact the C&C callback address The number of attempted callbacks made to the address from the network Note Click the hyperlink to open the C&C Callback Logs screen and view more detailed information.
2-26
2-27
2-28
2-29
Domain structures Manual Scan settings* Scheduled Scan settings* Real-time Scan settings* Scan now settings* Web Reputation settings* Approved URL list* Behavior Monitoring settings* Device Control settings* Data Loss Prevention settings* Privileges and other settings*
Additional service settings* Spyware/Grayware approved list* Global client settings Computer location Firewall policies and profiles Smart protection sources Server update schedule Client update source and schedule Notifications Proxy settings OfficeScan Client Port and Client_LocalServer_Port in the ofcscan.ini file
Note
Settings with an asterisk (*) retain the configurations at both the root and domain level. The tool does not back up the OfficeScan client listings of the OfficeScan server; only the domain structures. OfficeScan client only migrates features available on the older version of the OfficeScan client server. For features that are not available on the older server, OfficeScan client applies the default settings.
2-30
Procedure 1. 2. On the OfficeScan server computer, navigate to <Server installation folder>\PCCSRV \Admin\Utility\ServerMigrationTool. Double-click ServerMigrationTool.exe to start the Server Migration Tool. The Server Migration Tool opens. 3. To export the settings from the source OfficeScan server: a. Specify the destination folder using the Browse button.
Note The default name of the export package is OsceMigrate.zip.
b.
c. 4.
To import the settings to the destination OfficeScan server: a. b. Locate the export package using the Browse button. Click Import. A warning message appears. c. Click Yes to proceed.
2-31
A confirmation message appears. 5. 6. Verify that the server contains all the previous OfficeScan version settings. Move the old OfficeScan clients to the new server. For details about moving OfficeScan clients, see Moving an OfficeScan Client to Another Domain or OfficeScan Server on page 2-57 or Client Mover on page 14-21.
Role-based administration: Assign specific administrative responsibilities to users by granting them access to the product console using their Active Directory accounts. For details, see Role-based Administration on page 13-2. Custom client groups: Use Active Directory or IP addresses to manually group clients and map them to domains in the OfficeScan client tree. For details, see Automatic Client Grouping on page 2-50. Outside server management: Ensure that computers in the network that are not managed by the OfficeScan server comply with your companys security guidelines. For details, see Security Compliance for Unmanaged Endpoints on page 14-65.
Manually or periodically synchronize the Active Directory structure with the OfficeScan server to ensure data consistency. For details, see Synchronizing Data with Active Directory Domains on page 2-34.
2-32
domain\username username@domain
c. 4.
Click Save.
Click the ( ) button to add more domains. If necessary, specify domain credentials for any of the added domains. Click the ( ) button to delete domains.
5. 6.
Specify encryption settings if you specified domain credentials. As a security measure, OfficeScan encrypts the domain credentials you specified before saving them to the database. When OfficeScan synchronizes data with any of the specified domains, it will use an encryption key to decrypt the domain credentials. a. b. Go to the Encryption Settings for Domain Credentials section. Type an encryption key that does not exceed 128 characters.
2-33
c.
Specify a file to which to save the encryption key. You can choose a popular file format, such as .txt. Type the file's full path and name, such as C: \AD_Encryption\EncryptionKey.txt.
WARNING! If the file is removed or the file path changes, OfficeScan will not be able to synchronize data with all of the specified domains.
7.
Save: Save the settings only. Because synchronizing data may strain network resources, you can choose to save the settings only and synchronize at a later time, such as during non-critical business hours. Save and Synchronize: Save the settings and synchronize data with the Active Directory domains.
8.
Schedule periodic synchronizations. For details, see Synchronizing Data with Active Directory Domains on page 2-34.
2-34
4.
Click Save.
2-35
The client tree displays in the main frame when you access certain functions from the main menu.
DESCRIPTION
Root
2-36
ICON
Update agent
DESCRIPTION
Smart scan available OfficeScan client Smart scan unavailable OfficeScan client Smart scan available update agent Smart scan unavailable update agent
Click the root domain icon ( ) to select all domains and clients. When you select the root domain icon and then choose a task above the client tree, a screen for configuring settings displays. On the screen, choose from the following general options:
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configure the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
From the right panel, select the first domain, press and hold the SHIFT key, and then click the last domain or client in the range.
2-37
To select a range of non-contiguous domains or clients, from the right panel, press and hold the CTRL key and then click the domains or clients that you want to select. Search for a client to manage by specifying the client name in the Search for computers text box. The domain with a list of all the clients in that domain displays, with the specified client name highlighted. To go to the next client, click Search again. For more search options, click Advanced Search.
Note IPv6 or IPv4 addresses cannot be specified when searching for specific clients. Use Advanced Search to search by IPv4 or IPv6 address. For details, see Advanced Search Options on page 2-39.
After selecting a domain, the client tree table expands to show the clients belonging to the domain and all the columns containing relevant information for each client. To view only a set of related columns, select an item in the client tree view.
View all: Shows all columns Update view: Shows all the components and programs Antivirus view: Shows antivirus components Anti-spyware view: Shows anti-spyware components Data protection view: Shows the status of the Data Protection module on clients Firewall view: Shows firewall components Smart protection view: Shows the scan method used by clients (conventional or smart scan) and smart protection components Update Agent view: Shows information for all Update Agents managed by the OfficeScan server
Rearrange columns by dragging the column titles to different positions in the client tree. OfficeScan automatically saves the new column positions. Sort clients based on column information by clicking the column name.
2-38
).
View client statistics below the client tree, such as the total number of clients, number of smart scan clients, and number of conventional scan clients.
Basic: Includes basic information about computers such as IP address, operating system, domain, MAC address, scan method, and web reputation status
Searching by IPv4 address range requires a portion of an IP address starting with the first octet. The search returns all computers with IP addresses containing that entry. For example, typing 10.5 returns all computers in the IP address range 10.5.0.0 to 10.5.255.255. Searching by IPv6 address range requires a prefix and length. Searching by MAC address requires a MAC address range in hexadecimal notation, for example, 000A1B123C12.
Component versions: Select the check box next to the component name, narrow down the criteria by selecting Earlier than or Earlier than and including, and type a version number. The current version number displays by default. Status: Includes client settings
Click Search after specifying the search criteria. A list of computer names that meet the criteria appears in the client tree.
2-39
allow you to perform specific tasks, such as configuring client settings or initiating client tasks. To perform any of the tasks, first select the task target (either the root domain which will apply settings to all clients, one or several domains, or one or several clients) and then select a menu item. The following screens display the client tree:
Client Management Screen on page 2-40 Outbreak Prevention Screen on page 2-43 Component Update for Networked Computers Screen on page 2-44 Rollback Screen on page 2-45 Security Risk Logs for Networked Computers Screen on page 2-46 Agent Deployment Screen on page 2-48
2-40
TASK
View detailed client information. For details, see Viewing OfficeScan Client Information on page 14-50.
Run Scan Now on client computers. For details, see Initiating Scan Now on page 7-23. Uninstall the client. For details, see Uninstalling the OfficeScan Client from the Web Console on page 5-69. Restore spyware/grayware components. For details, see Restoring Spyware/Grayware on page 7-48.
2-41
MENU BUTTON
Settings
TASK
Configure scan settings. For details, see the following topics:
Scan Methods on page 7-7 Manual Scan on page 7-17 Real-time Scan on page 7-14 Scheduled Scan on page 7-19 Scan Now on page 7-21
Configure web reputation settings. For details, see Web Reputation Policies on page 11-5. Configure Behavior Monitoring settings. For details, see Behavior Monitoring on page 8-2. Configure Device Control settings. For details, see Device Control on page 9-2. Configure Data Loss Prevention policies. For details, see Data Loss Prevention Policy Configuration on page 10-40. Assign clients as Update Agents. For details, see Update Agent Configuration on page 6-51. Configure client privileges and other settings. For details, see Configuring Client Privileges and Other Settings on page 14-84. Enable or disable OfficeScan client services. For details, see OfficeScan Client Services on page 14-6. Configure the spyware/grayware approved list. For details, see Spyware/Grayware Approved List on page 7-46. Import and export client settings. For details, see Importing and Exporting Client Settings on page 14-51.
2-42
MENU BUTTON
Logs View the following logs:
TASK
Virus/Malware logs (for details, see Viewing Virus/Malware Logs on page 7-81) Spyware/Grayware logs (for details, see Viewing Spyware/ Grayware Logs on page 7-88) Firewall logs (for details, see Firewall Logs on page 12-27) Web reputation logs (for details, see Web Reputation Logs on page 11-18) C&C Callback logs (for details, see Viewing C&C Callback Logs on page 11-19.) Behavior Monitoring logs (for details, see Behavior Monitoring Logs on page 8-12) Device Control logs (for details, see Device Control Logs on page 9-17)
Delete logs. For details, see Log Management on page 13-33. Manage Client Tree Export Manage the client tree. For details, see Client Grouping Tasks on page 2-55. Export a list of clients to a comma-separated value (.csv) file.
2-43
Specify and activate outbreak prevention settings in the Outbreak Prevention screen. For details, see Configuring Security Risk Outbreak Prevention on page 7-96.
2-44
Initiate manual update in the Component Update for Networked Computers screen. For details, see OfficeScan Client Manual Updates on page 6-41.
Rollback Screen
To view this screen, navigate to Updates > Rollback. Click Synchronize with Server.
2-45
Roll back client components in the Rollback screen. For details, see Rolling Back Components for OfficeScan Clients on page 6-48.
2-46
View and manage logs in the Security Risk Logs for Networked Computers screen.
Perform the following tasks: 1. View logs that clients send to the server. For details, see:
Viewing Virus/Malware Logs on page 7-81 Viewing Spyware/Grayware Logs on page 7-88 Viewing Firewall Logs on page 12-28 Viewing Web Reputation Logs on page 11-18 Viewing C&C Callback Logs on page 11-19 Viewing Behavior Monitoring Logs on page 8-13 Viewing Device Control Logs on page 9-17
2-47
2.
OfficeScan Domains
A domain in OfficeScan is a group of clients that share the same configuration and run the same tasks. By grouping clients into domains, you can configure, manage, and apply
2-48
the same configuration to all domain members. For more information on client grouping, see Client Grouping on page 2-49.
Client Grouping
Use Client Grouping to manually or automatically create and manage domains on the OfficeScan client tree. There are two ways to group clients into domains.
TABLE 2-11. Client Grouping Methods METHOD
Manual
CLIENT GROUPING
NetBIOS domain Active Directory domain DNS domain
DESCRIPTIONS
Manual client grouping defines the domain to which a newly installed client should belong. When the client appears in the client tree, you can move it to another domain or to another OfficeScan server. Manual client grouping also allows you to create, manage, and remove domains in the client tree. For details, see Manual Client Grouping on page 2-49.
Automatic
Automatic client grouping uses rules to sort clients in the client tree. After you define the rules, you can access the client tree to manually sort the clients or allow OfficeScan to automatically sort them when specific events occur or at scheduled intervals. For details, see Automatic Client Grouping on page 2-50.
2-49
the domain name does not exist, OfficeScan adds the domain to the client tree, groups the client under that domain, and then applies the root settings to the domain and client.
3.
Click Save.
What to do next Manage domains and the clients grouped under them by performing the following tasks:
Add a domain Delete a domain or client Rename a domain Move a client to another domain
2-50
Clients apply only one rule at a time. Prioritize rules so that if a client satisfies more than one rule, the rule with the highest priority applies.
If you selected Active Directory, see the configuration instructions in Defining a Client Grouping Rule by Active Directory Domains on page 2-52. If you selected IP Address, see the configuration instructions in Defining a Client Grouping Rule by IP Addresses on page 2-54.
5.
If you created more than one rule, prioritize the rules by performing these steps: a. b. Select a rule. Click an arrow under the Grouping Priority column to move the rule up or down the list. The ID number of the rule changes to reflect the new position.
6.
To use the rules during client sorting: a. b. Select the check boxes for the rules that you want to use. Ensure that the rules are enabled. Under the Status column, a green check ) should appear. If a red "x" mark icon ( ) appears, mark icon ( clicking the icon enables the rule and changes the icon to green.
2-51
Note If you do not select the check box for a rule or if you disable a rule, the rule will not be used when sorting clients in the client tree. For example, if the rule dictates that a client should move to a new domain, the client will not move and stays in its current domain.
7.
Specify a sorting schedule in the Scheduled Domain Creation section. a. b. Select Enable scheduled domain creation. Specify the schedule under Schedule-based Domain Creation.
8.
Save and Create Domain Now: Choose this option if you specified new domains in Defining a Client Grouping Rule by IP Addresses on page 2-54, step 7 or in Defining a Client Grouping Rule by Active Directory Domains on page 2-52, step 7. Save: Choose this option if you did not specify new domains or want to create the new domains only when client sorting runs.
Note Client sorting will not start after completing this step.
2-52
4.
Click Add and then select Active Directory. A new screen appears.
5. 6. 7. 8.
Select Enable grouping. Specify a name for the rule. Under Active Directory source, select the Active Directory domain(s) or subdomains. Under Client tree, select an existing OfficeScan domain to which the Active Directory domains map. If the desired OfficeScan domain does not exist, perform the following steps: a. Mouseover on a particular OfficeScan domain and click the add domain icon. In the example below, the new domain will be added under the root OfficeScan domain.
b. c. 9.
Type the domain name in the text box provided. Click the check mark next to the text box. The new domain is added and is automatically selected.
(Optional) Select Duplicate Active Directory structure into OfficeScan client tree. This option duplicates the hierarchy of the selected Active Directory domains to the selected OfficeScan domain.
2-53
A single IPv4 or IPv6 address An IPv4 address range An IPv6 prefix and length
Note If a dual-stack clients IPv4 and IPv6 addresses belong to two separate client groups, the client will be grouped under the IPv6 group. If IPv6 is disabled on the clients host machine, the client will move to the IPv4 group.
8.
Select the OfficeScan domain to which the IP address or IP address ranges maps. If the domain does not exist, do the following: a. Mouseover anywhere on the client tree and click the add domain icon.
2-54
b. c. 9.
Type the domain in the text box provided. Click the check mark next to the text box. The new domain is added and is automatically selected.
Click Save.
Add a domain. See Adding a Domain on page 2-55 for details. Delete a domain or client. See Deleting a Domain or Client on page 2-56 for details. Rename a domain. See Renaming a Domain on page 2-57 for details. Move a client to another domain or another OfficeScan server. See Moving an OfficeScan Client to Another Domain or OfficeScan Server on page 2-57 for details. Delete a domain or a client. See Deleting a Domain or Client on page 2-56 for details.
Adding a Domain
Procedure 1. 2. Navigate to Networked Computers > Client Management. Click Manage Client Tree > Add Domain.
2-55
3. 4.
Type a name for the domain you want to add. Click Add. The new domain appears in the client tree.
5.
(Optional) Create subdomains. a. b. c. Select the parent domain. Click Manage Client Tree > Add domain. Type the subdomain name.
3. 4.
Click Manage Client Tree > Remove Domain/Client. To delete an empty domain, click Remove Domain/Client. If the domain has clients and you click Remove Domain/Client, the OfficeScan server will re-create the domain and group all clients under that domain the next time clients connect to the OfficeScan server. You can perform the following tasks before deleting the domain: a. b. Move clients to other domains. To move clients to other domains, drag and drop clients to the destination domains. Delete all clients.
5.
2-56
Note Deleting a client from the client tree does not remove the OfficeScan client from the client computer. The OfficeScan client can still perform server-independent tasks, such as updating components. However, the server is unaware of the existence of the client and will therefore not deploy configurations or send notifications to the client.
Renaming a Domain
Procedure 1. 2. 3. 4. 5. Navigate to Networked Computers > Client Management. Select a domain in the client tree. Click Manage Client Tree > Rename Domain. Type a new name for the domain. Click Rename. The new domain name appears in the client tree.
2-57
5.
Select Move selected client(s) to another OfficeScan Server. Type the server name or IPv4/IPv6 address and HTTP port number.
6.
Click Move.
2-58
Chapter 3
Data Protection Installation on page 3-2 Data Protection License on page 3-4 Deployment of Data Protection to Clients on page 3-5 Forensic Folder and DLP Database on page 3-8 Uninstalling Data Protection on page 3-14
3-1
Data Loss Prevention (DLP): Prevents unauthorized transmission of digital assets Device Control: Regulates access to external devices
Note OfficeScan out-of-the-box has a Device Control feature that regulates access to commonly used devices such as USB storage devices. Device Control that is part of the Data Protection module expands the range of monitored devices. For a list of monitored devices, see Device Control on page 9-2.
Data Loss Prevention and Device Control are native OfficeScan features but are licensed separately. After you install the OfficeScan server, these features are available but are not functional and cannot be deployed to clients. Installing Data Protection means downloading a file from the ActiveUpdate server or a custom update source, if one has been set up. When the file has been incorporated into the OfficeScan server, you can activate the Data Protection license to enable the full functionality of its features. Installation and activation are performed from Plug-in Manager.
Important
You do not need to install the Data Protection module if the standalone Trend Micro Data Loss Prevention software is already installed and running on endpoints. The Data Protection module can be installed on a pure IPv6 Plug-In Manager. However, only the Device Control feature can be deployed to pure IPv6 clients. The Data Loss Prevention feature does not work on pure IPv6 clients.
3-2
2.
On the Plug-in Manager screen, go to the OfficeScan Data Protection section and click Download. The size of the file to be downloaded displays beside the Download button. Plug-In Manager stores the downloaded file to <Server installation folder>\PCCSRV
\Download\Product. Note If Plug-In Manager is unable to download the file, it automatically re-downloads after 24 hours. To manually trigger Plug-In Manager to download the file, restart the OfficeScan Plug-In Manager service from the Microsoft Management Console.
3.
Monitor the download progress. You can navigate away from the screen during the download. If you encounter problems downloading the file, check the server update logs on the OfficeScan web console. On the main menu, click Logs > Server Update Logs. After Plug-In Manager downloads the file, OfficeScan Data Protection displays in a new screen.
Note If OfficeScan Data Protection does not display, see the reasons and solutions in Troubleshooting Plug-In Manager on page 15-9.
4.
To install OfficeScan Data Protection immediately, click Install Now, or to install at a later time, perform the following: a. b. c. Click Install Later. Open the Plug-in Manager screen. Go to the OfficeScan Data Protection section and click Install.
5.
Read the license agreement and accept the terms by clicking Agree. The installation starts.
3-3
6.
Monitor the installation progress. After the installation, the OfficeScan Data Protection version displays.
3-4
4.
Status: Displays either "Activated", "Not Activated" or "Expired". Version: Displays either "Full" or "Evaluation" version. Activation of both the full and evaluation versions displays only as "Full". Seats: Displays how many OfficeScan clients can install the Data Protection module License expires on: If Data Protection has multiple licenses, the latest expiration date displays. For example, if the license expiration dates are 12/31/2011 and 06/30/2011, 12/31/2011 displays. Activation code: Displays the Activation Code Reminders: Depending on your current license version, Data Protection displays reminders about the license expiration date either during the grace period (full versions only), or when the license expires.
Note The duration of the grace period varies by region. Please verify the grace period with your Trend Micro representative. If you do not renew the license, Data Loss Prevention and Device Control still work but you will no longer be eligible for technical support.
5. 6.
Click View detailed license online to view information about your license on the Trend Micro website. To update the screen with the latest license information, click Update Information.
3-5
Important
By default, the module is disabled on Windows Server 2003, Windows Server 2008, and Windows Server 2012 to prevent impacting the performance of the host machine. If you want to enable the module, monitor the systems performance constantly and take the necessary action when you notice a drop in performance.
Note You can enable or disable the module from the web console. For details, see OfficeScan Client Services on page 14-6.
If the Trend Micro Data Loss Prevention software already exists on the endpoint, OfficeScan will not replace it with the Data Protection module. Only Device Control can be deployed to pure IPv6 clients. Data Loss Prevention does not work on pure IPv6 clients. Online clients install the Data Protection module immediately. Offline and roaming clients install the module when they become online. Users must restart their computers to finish installing Data Loss Prevention drivers. Inform users about the restart ahead of time. Trend Micro recommends enabling debug logging to help you troubleshoot deployment issues. For details, see Data Protection Debug Logs on page 10-55.
Select a specific domain to deploy the module to all existing and future clients under the domain. Select a specific client to deploy the module only to that client.
3-6
3.
Click Settings > DLP Settings. Click Settings > Device Control Settings.
Note If you deploy from Settings > DLP Settings and the Data Protection module was deployed successfully, Data Loss Prevention drivers will be installed. If the drivers are installed successfully, a message displays, informing users to restart their computers to finish installing the drivers. If the message does not display, there might be problems installing the drivers. If you enabled debug logging, check the debug logs for details about driver installation problems.
4.
A message displays, indicating the number of client that have not installed the module. Click Yes to start the deployment.
Note If you click No (or if the module was not deployed to one or several client for some reason), the same message displays when you click Settings > DLP Settings or Settings > Device Control Settings again.
Clients start to download the module from the server. 5. Check if the module was deployed to clients. a. b. c. In the client tree, select a domain. In the client tree view, select Data protection view or View all. Check the Data Protection Status column. The deployment status can be any of the following:
Running: The module was deployed successfully and its features have been enabled. Requires restart: Data Loss Prevention drivers have not been installed because users have not restarted their computers. If the drivers are not installed, Data Loss Prevention will not be functional.
3-7
Stopped: The service for the module has not been started or the target computer has been shut down normally. To start the Data Protection service, navigate to Networked Computers > Client Management > Settings > Additional Service Settings and enable Data Protection Services. Cannot install: There was a problem deploying the module to the client. You will need to re-deploy the module from the client tree. Cannot install (Data Loss Prevention already exists): The Trend Micro Data Loss Prevention software already exists on the endpoint. OfficeScan will not replace it with the Data Protection module. Not installed: The module has not been deployed to the client. This status displays if you chose not to deploy the module to the client or if the clients status is offline or roaming during deployment.
The encrypted forensic files contain highly sensitive data and administrators should exercise caution when granting access to these files. OfficeScan integrates with Control Manager to provide Control Manager users with the DLP Incident Reviewer or DLP Compliance Officer roles the ability to access the data within the encrypted files. For details about the DLP roles and access to the forensic file data in Control Manager, see the Control Manager Administrators Guide 6.0 Patch 2 or later.
3-8
The following table outlines the server settings available in the <Server installation folder> \PCCSRV\Private\ofcserver.ini file located on the OfficeScan server.
TABLE 3-1. Forensic Folder Server Settings in PCCSRV\Private\ofcserver.ini OBJECTIVE
Enabling the user-defined forensic folder location
INI SETTING
[INI_IDLP_SECTION]
EnableUserDefinedUploadFolder
VALUES
0: Disable (default) 1: Enable
3-9
OBJECTIVE
Configuring the userdefined forensic folder location
INI SETTING
[INI_IDLP_SECTION]
UserDefinedUploadFolder
VALUES
Default value: <Please replace this value with customer defined folder path. For example: C: \VolumeData \OfficeScanDlpFor ensicData> User-defined value: Must be the physical location of a drive on the server machine
Note
The default location of the forensic folder is: <Server installation folder>\PCCSRV
\Private\DLPForensicData
The user-defined forensic folder location must be a physical drive (internal or external) on the server machine. OfficeScan does not support mapping a network drive location. 0: Disable 1: Enable (default)
[INI_IDLP_SECTION]
ForensicDataPurgeEnable
3-10
OBJECTIVE
Configuring the time frequency of the forensic data file purge check
INI SETTING
[INI_IDLP_SECTION]
ForensicDataPurgeCheckFrequency
VALUES
1: Monthly, on the first day of the month at 00:00 2: Weekly (default), every Sunday at 00:00 3: Daily, every day at 00:00 4: Hourly, every hour at HH:00
Note
Administrators must enable the ForensicDataPurgeEnable setting before OfficeScan applies this setting. OfficeScan only deletes data files that have passed the expiry date specified in the
ForensicDataExpiredPeriodInDays
setting. Configuring the length of time to store forensic data files on the server Configuring the time frequency of the forensic file disk space check [INI_IDLP_SECTION]
ForensicDataExpiredPeriodInDays
Default value (in days): 180 Minimum value: 1 Maximum value: 3650
[INI_SERVER_DISK_THRESHOLD]
MonitorFrequencyInSecond
Note If the available disk space in the forensic data folder is less than the value configured for the
InformUploadOnDiskFreeSpaceInGb
3-11
OBJECTIVE
Configuring the upload frequency of the forensic file disk space check
INI SETTING
[INI_SERVER_DISK_THRESHOLD]
IsapiCheckCountInRequest
VALUES
Default value (in number of files): 200
Note If the available disk space in the forensic data folder is less than the value configured for the
InformUploadOnDiskFreeSpaceInGb
setting, OfficeScan records an event log on the web console. Configuring the minimum disk space value that triggers a limited disk space notification [INI_SERVER_DISK_THRESHOLD]
InformUploadOnDiskFreeSpaceInGb
Note If the available disk space in the forensic data folder is less than the value configured, OfficeScan records an event log on the web console. [INI_SERVER_DISK_THRESHOLD]
RejectUploadOnDiskFreeSpaceInGb
Configuring the minimum space available to upload forensic data files from clients
Note If the available disk space in the forensic data folder is less than the value configured, OfficeScan clients do not upload forensic data files to the server and OfficeScan records an event log on the web console.
The following table outlines the OfficeScan client settings available in the <Server installation folder>\PCCSRV\ofcscan.ini file located on the OfficeScan server.
3-12
INI SETTING
UploadForensicDataEnable
VALUES
0: Disable 1: Enable (default)
UploadForensicDataSizeLimitInMb
Default value (in MB): 10 Minimum value: 1 Maximum value: 2048 Default value (in days): 180 Minimum value: 1 Maximum value: 3650
Note The OfficeScan client only sends files that are less than this size to the server.
ForensicDataKeepDays
Note The OfficeScan client deletes forensic data files that have passed the expiry date specified every day at 11:00 am.
ForensicDataDelayUploadFrequenceInMinute s
Note OfficeScan clients that are unable to upload forensic files to the server automatically try to resend the files using the specified time interval.
Maximum value: 60
3-13
To locate the customized forensic folder location, see Configuring the user-defined forensic folder location on page 3-10.
2. 3. 4.
Copy the folder to a new location. To manually backup the forensic data database, navigate to <Server installation folder>\PCCSRV\Private. Copy the DLPForensicDataTracker.db file to a new location.
All Data Loss Prevention configurations, settings, and logs are removed from the OfficeScan server. All Device Control configurations and settings provided by the Data Protection module are removed from the server. The Data Protection module is removed from clients. Client computers must be restarted to remove Data Protection completely. Data Loss Prevention policies will no longer be enforced on clients. Device Control will no longer monitor access to the following devices:
Bluetooth adapters COM and LPT ports IEEE 1394 interface Imaging devices
3-14
Infrared devices Modems PCMCIA card Print screen key Wireless NICs
Reinstall the Data Protection module anytime. After reinstallation, activate the license using a valid Activation Code.
3-15
Part II
Protecting Networked Computers
Chapter 4
About Trend Micro Smart Protection on page 4-2 Smart Protection Services on page 4-3 Smart Protection Sources on page 4-5 Smart Protection Pattern Files on page 4-7 Setting Up Smart Protection Services on page 4-12 Using Smart Protection Services on page 4-30
4-1
4-2
Micro is able to provide better protection to customers against the future volume of emerging security risks.
File Reputation Services: File Reputation Services off-loads a large number of anti-malware signatures that were previously stored on client computers to smart protection sources. For details, see File Reputation Services on page 4-3. Web Reputation Services: Web Reputation Services allows local smart protection sources to host URL reputation data that were previously hosted solely by Trend Micro. Both technologies ensure smaller bandwidth consumption when updating patterns or checking a URLs validity. For details, see Web Reputation Services on page 4-4. Smart Feedback: Trend Micro continues to harvest information anonymously sent from Trend Micro products worldwide to proactively determine each new threat. For details, see Smart Feedback on page 4-4.
4-3
Smart Feedback
Trend Micro Smart Feedback provides continuous communication between Trend Micro products and its 24/7 threat research centers and technologies. Each new threat identified through every single customer's routine reputation check automatically updates all Trend Micro threat databases, blocking any subsequent customer encounters of a given threat. By continuously processing the threat intelligence gathered through its extensive global network of customers and partners, Trend Micro delivers automatic, real-time protection against the latest threats and provides "better together" security, much like an automated neighborhood watch that involves the community in the protection of others. Because the gathered threat information is based on the reputation of the communication source, not on the content of the specific communication, the privacy of a customer's personal or business information is always protected. Samples of information sent to Trend Micro:
4-4
You can terminate your participation to the program anytime from the web console.
Tip You do not need to participate in Smart Feedback to protect your computers. Your participation is optional and you may opt out at any time. Trend Micro recommends that you participate in Smart Feedback to help provide better overall protection for all Trend Micro customers.
4-5
Integrated Smart Protection Server: The OfficeScan Setup program includes an integrated Smart Protection Server that installs on the same computer where the OfficeScan server is installed. After the installation, manage settings for this server from the OfficeScan web console. The integrated server is intended for small-scale deployments of OfficeScan, in which the number of clients does not exceed 3,000. For larger deployments, the standalone Smart Protection Server is required. Standalone Smart Protection Server: A standalone Smart Protection Server installs on a VMware or Hyper-V server. The standalone server has a separate management console and is not managed from the OfficeScan web console.
4-6
Purpose
Administration
4-7
Note Smart scan clients are OfficeScan clients that administrators have configured to use File Reputation Services. Clients that do not use File Reputation Services are called conventional scan clients.
Smart scan clients use the Smart Scan Agent Pattern when scanning for security risks. If the pattern cannot determine the risk of the file, another pattern, called Smart Scan Pattern, is leveraged.
Clients subject to web reputation policies verify a websites reputation against the Web Blocking List by sending web reputation queries to a smart protection source. The client correlates the reputation data received from the smart protection source with the web reputation policy enforced on the computer. Depending on the policy, the client will either allow or block access to the site.
4-8
4-9
access a website. Advanced filtering technology enables the client to "cache" the query results. This eliminates the need to send the same query more than once. Clients that are currently in your intranet can connect to a Smart Protection Server to query the Smart Scan Pattern or Web Blocking List. Network connection is required to connect to the Smart Protection Server. If more than one Smart Protection Server has been set up, administrators can determine the connection priority.
Tip Install several Smart Protection Servers to ensure the continuity of protection in the event that connection to a Smart Protection Server is unavailable.
Clients that are currently not in your intranet can connect to Trend Micro Smart Protection Network for queries. Internet connection is required to connect to the Smart Protection Network.
4-10
Clients without access to the network or the Internet still benefit from protection provided by the Smart Scan Agent Pattern and the cache containing previous query results. The protection is reduced only when a new query is necessary and the client, after repeated attempts, is still unable to reach any smart protection source. In this case, a client flags the file for verification and temporarily allows access to the file. When connection to a smart protection source is restored, all the files that have been flagged are re-scanned. Then, the appropriate scan action is performed on files that have been confirmed as a threat. The following table summarizes the extent of protection based on the clients location.
TABLE 4-2. Protection Behaviors Based on Location LOCATION
Access to the intranet
Without access to the intranet but with connection to Smart Protection Network
Without access to the intranet and without connection to Smart Protection Network
4-11
Smart Protection Server Installation on page 4-12 Integrated Smart Protection Server Management on page 4-17 Smart Protection Source List on page 4-23 Client Connection Proxy Settings on page 4-30 Trend Micro Network VirusWall Installations on page 4-30
4-12
Enable the integrated server and configure settings for the server. For details, see Integrated Smart Protection Server Management on page 4-17. If the integrated server and OfficeScan client exist on the same server computer, consider disabling the OfficeScan firewall. The OfficeScan firewall is intended for client computer use and may affect performance when enabled on server computers. For instructions on disabling the firewall, see Enabling or Disabling the OfficeScan Firewall on page 12-6.
Note Consider the effects of disabling the firewall and ensure that it adheres to your security plans. Tip Install the integrated Smart Protection Server after completing the OfficeScan installation by using the Integrated Smart Protection Server Tool on page 4-13.
Scan configurations for all scan types (Manual, Real-time, Scheduled, Scan Now) Web reputation settings Behavior Monitoring settings
4-13
Device Control settings Data Loss Prevention settings Privileges and other settings Additional service settings Spyware/grayware approved list
Global client settings Computer location Firewall policies and profiles Smart protection sources Server update schedule Client update source and schedule Notifications Proxy settings
Procedure 1. 2. Open a command prompt and navigate to the <Server installation folder>\PCCSRV \Admin\Utility\ISPSInstaller directory where ISPSInstaller.exe is located. Run ISPSInstaller.exe using one of the following commands:
TABLE 4-3. Installer Options COMMAND
ISPSInstaller.exe /i
DESCRIPTION
Installs the integrated Smart Protection Server using default port settings. For details on the default port settings, see the table below.
4-14
COMMAND
ISPSInstaller.exe /i /f: [port number] /s:[port number] /w:[port number]
DESCRIPTION
Installs the integrated Smart Protection Server using the ports specified, where:
reputation port
/s:[port number] represents the HTTPS
reputation port Note An unspecified port is automatically assigned the default value.
ISPSInstaller.exe /u
TABLE 4-4. Ports for the Integrated Smart Protection Servers Reputation
Services
Apache web server with SSL enabled Apache web server with SSL disabled IIS default website with SSL enabled IIS default website with SSL disabled IIS virtual website with SSL enabled
4-15
8082
3.
After the installation completes, open the OfficeScan web console and verify the following:
Open the Microsoft Management Console (by typing services.msc in the Start menu) and check that the Trend Micro Local Web Classification Server and Trend Micro Smart Scan Server are listed with a Started status. Open Windows Task Manager. In the Processes tab, check that
iCRCService.exe and LWCSService.exe are running,
On the OfficeScan web console, check that the menu item Smart Protection > Integrated Server appears.
Avoid performing Manual Scans and Scheduled Scans simultaneously. Stagger the scans in groups. Avoid configuring all clients from performing Scan Now simultaneously. Customize Smart Protection Servers for slower network connections, about 512Kbps, by making changes to the ptngrowth.ini file.
4-16
3. 4.
Save the ptngrowth.ini file. Restart the lighttpd service by typing the following command from the Command Line Interface (CLI):
3. 4.
Save the ptngrowth.ini file. Restart the Trend Micro Smart Protection Server service.
Enabling the integrated servers File Reputation Services and Web Reputation Services
4-17
Recording the integrated servers addresses Updating the integrated servers components Configuring the integrated servers Approved/Blocked URL List Configuring the Virtual Analyzer C&C List settings
For details, see Configuring Integrated Smart Protection Server Settings on page 4-20.
Enabling the Integrated Servers File Reputation Services and Web Reputation Services
For clients to send scan and web reputation queries to the integrated server, File Reputation Services and Web Reputation Services must be enabled. Enabling these services also allows the integrated server to update components from the ActiveUpdate server. These services are automatically enabled if you chose to install the integrated server during the OfficeScan server installation. If you disable the services, be sure that you have installed standalone Smart Protection Servers to which clients can send queries. For details, see Configuring Integrated Smart Protection Server Settings on page 4-20.
4-18
Tip Clients managed by another OfficeScan server can also connect to this integrated server. On the other OfficeScan servers web console, add the integrated servers address to the Smart Protection Source list.
For details, see Configuring Integrated Smart Protection Server Settings on page 4-20.
Smart Scan Pattern: Clients verify potential threats against the Smart Scan Pattern by sending scan queries to the integrated server. Web Blocking List: Clients subject to web reputation policies verify a websites reputation against the Web Blocking List by sending web reputation queries to the integrated server.
You can manually update these components or configure an update schedule. The integrated server downloads the components from the ActiveUpdate server.
Note A pure IPv6 integrated server cannot update directly from Trend Micro ActiveUpdate Server. A dual-stack proxy server that can convert IP addresses, such as DeleGate, is required to allow the integrated server to connect to the ActiveUpdate server.
For details, see Configuring Integrated Smart Protection Server Settings on page 4-20.
4-19
integrated server has been assigned as a smart protection source). If the URL is found in the integrated servers approved/blocked URL list, the integrated server notifies the client to allow or block the URL.
Note The blocked URL list has a higher priority than the Web Blocking List.
To add URLs to the integrated servers approved/blocked list, import a list from a standalone Smart Protection Server. It is not possible to add URLs manually. For details, see Configuring Integrated Smart Protection Server Settings on page 4-20.
4-20
5. 6.
Record the integrated servers addresses found under the Server Address column. To update the integrated servers components:
View the current versions of the Smart Scan Pattern and Web Blocking List. If an update is available, click Update Now. The update result displays on top of the screen. To update the pattern automatically: a. b. c. d. Select Enable scheduled updates. Choose whether to update hourly or every 15 minutes. Select an update source under File Reputation Services. The Smart Scan Pattern will be updated from this source. Select an update source under Web Reputation Services. The Web Blocking List will be updated from this source.
Note
If you choose the ActiveUpdate server as the update source, ensure that the server has Internet connection and, if you are using a proxy server, test if Internet connection can be established using the proxy settings. See Proxy for OfficeScan Server Updates on page 6-17 for details. If you choose a custom update source, set up the appropriate environment and update resources for this update source. Also ensure that there is a functional connection between the server computer and this update source. If you need assistance setting up an update source, contact your support provider.
7.
To configure the integrated servers Approved/Blocked List: a. b. Click Import to populate the list with URLs from a pre-formatted .csv file. You can obtain the .csv file from a standalone Smart Protection Server. If you have an existing list, click Export to save the list to a .csv file.
4-21
8.
Note
Contact the Deep Discovery Advisor administrator to obtain the server name or IP address, port number, and a valid API key. This version of OfficeScan only supports Deep Discovery Advisor 3.0 and later.
To configure the Deep Discovery Advisor server's Virtual Analyzer connection: a. Type the server name or IP address of the Deep Discovery Advisor server.
Note The server name supports FQDN formats and the IP address supports IPv4 format. The server address only supports HTTPS protocol.
b. c.
Type the API key. Click Register to connect to the Deep Discovery Advisor server.
Note Administrators can test the connection to the server before registering to the server.
d.
Select Enable Virtual Analyzer C&C list to allow OfficeScan to use the custom C&C list analyzed by the local Deep Discovery Advisor server.
Note The Enable Virtual Analyzer C&C list option is only available after establishing a successful connection to the Deep Discovery Advisor server.
Administrators can manually synchronize with the Deep Discovery Advisor at any time by clicking the Sync Now button. 9. Click Save.
4-22
Similarly, a pure IPv4 client cannot send queries to pure IPv6 Smart Protection Servers. A dual-stack proxy server that can convert IP addresses, such as DeleGate, is required to allow clients to connect to the sources.
4-23
LOCATION
Internal
4-24
Note Specify the host name if there are IPv4 and IPv6 clients connecting to the Smart Protection Server.
7.
Select File Reputation Services. Clients send scan queries using the HTTP or HTTPS protocol. HTTPS allows for a more secure connection while HTTP uses less bandwidth. a. If you want clients to use HTTP, type the servers listening port for HTTP requests. If you want clients to use HTTPS, select SSL and type the servers listening port for HTTPS requests. Click Test Connection to check if connection to the server can be established.
Tip The listening ports form part of the server address. To obtain the server address: For the integrated server, open the OfficeScan web console and go to Smart Protection > Integrated Server. For the standalone server, open the standalone server's console and go to the Summary screen.
b.
8.
Select Web Reputation Services. Clients send web reputation queries using the HTTP protocol. HTTPS is not supported. a. b. Type the servers listening port for HTTP requests. Click Test Connection to check if connection to the server can be established.
9.
10. Add more servers by repeating the previous steps. 11. On top of the screen, select Order or Random.
4-25
Order: Clients pick servers in the order in which they appear on the list. If you select Order, use the arrows under the Order column to move servers up and down the list. Random: Clients pick servers randomly.
Tip Because the integrated Smart Protection Server and the OfficeScan server run on the same computer, the computers performance may reduce significantly during peak traffic for the two servers. To reduce the traffic directed to the OfficeScan server computer, assign a standalone Smart Protection Server as the primary smart protection source and the integrated server as a backup source.
If you have exported a list from another server and want to import it to this screen, click Import and locate the .dat file. The list loads on the screen. To export the list to a .dat file, click Export and then click Save. To refresh the service status of servers, click Refresh. Click the server name to do one of the following:
To view or edit server information. View the full server address for Web Reputation Services or File Reputation Services.
For the integrated Smart Protection Server, the servers configuration screen displays. For standalone Smart Protection Servers and the integrated Smart Protection Server of another OfficeScan server, the console logon screen displays.
To delete an entry, select the check box for the server and click Delete.
4-26
7.
In the Proxy Setting section, specify proxy settings clients will use to connect to the Smart Protection Servers. a. b. c. Select Use a proxy server for client and Smart Protection Server communication. Specify the proxy server name or IPv4/IPv6 address, and port number. If the proxy server requires authentication, type the user name and password.
8.
In the Custom Smart Protection Server List, add the Smart Protection Servers. a. Specify the Smart Protection Servers host name or IPv4/IPv6 address. If you specify an IPv6 address, enclose it in parentheses.
4-27
Note Specify the host name if there are IPv4 and IPv6 clients connecting to the Smart Protection Server.
b.
Select File Reputation Services. Clients send scan queries using the HTTP or HTTPS protocol. HTTPS allows for a more secure connection while HTTP uses less bandwidth. i. If you want clients to use HTTP, type the servers listening port for HTTP requests. If you want clients to use HTTPS, select SSL and type the servers listening port for HTTPS requests. Click Test Connection to check if connection to the server can be established.
Tip The listening ports form part of the server address. To obtain the server address: For the integrated server, open the OfficeScan web console and go to Smart Protection > Integrated Server. For the standalone server, open the standalone server's console and go to the Summary screen.
ii.
c.
Select Web Reputation Services. Clients send web reputation queries using the HTTP protocol. HTTPS is not supported. i. ii. Type the servers listening port for HTTP requests. Click Test Connection to check if connection to the server can be established.
d. e. f.
Click Add to the List. Add more servers by repeating the previous steps. Select Order or Random.
Order: Clients pick servers in the order in which they appear on the list. If you select Order, use the arrows under the Order column to move servers up and down the list.
4-28
g.
To refresh the service status of servers, click Refresh. To open the console of a Smart Protection Server, click Launch console.
For the integrated Smart Protection Server, the servers configuration screen displays. For standalone Smart Protection Servers and the integrated Smart Protection Server of another OfficeScan server, the console logon screen displays. ).
9.
Click Save. The screen closes. The list you just added appears as an IP range link under the IP Range table.
10. Repeat step 4 to step 8 to add more custom lists. 11. Perform miscellaneous tasks in the screen.
To modify a list, click the IP range link and then modify the settings in the screen that opens. To export the list to a .dat file, click Export and then click Save. If you have exported a list from another server and want to import it to this screen, click Import and locate the .dat file. The list loads on the screen.
4-29
Install a hot fix (build 1047 for Network VirusWall Enforcer 2500 and build 1013 for Network VirusWall Enforcer 1200). Update the OPSWAT engine to version 2.5.1017 to enable the product to detect a clients scan method.
4-30
Note For instructions on setting up the smart protection environment, see Setting Up Smart Protection Services on page 4-12.
To benefit from protection provided by File Reputation Services, clients must use the scan method called smart scan. For details about smart scan and how to enable smart scan on clients, see Scan Methods on page 7-7. To allow OfficeScan clients to use Web Reputation Services, configure web reputation policies. For details, see Web Reputation Policies on page 11-5.
Note Settings for scan methods and web reputation policies are granular. Depending on your requirements, you can configure settings that will apply to all clients or configure separate settings for individual clients or client groups.
For instructions on configuring Smart Feedback, see Smart Feedback on page 13-47.
4-31
Chapter 5
OfficeScan Client Fresh Installations on page 5-2 Installation Considerations on page 5-2 Deployment Considerations on page 5-10 Migrating to the OfficeScan Client on page 5-61 Post-installation on page 5-65 OfficeScan Client Uninstallation on page 5-68
5-1
Installation Considerations
Before installing clients, consider the following:
OfficeScan client features: Some client features are not available on certain Windows platforms. IPv6 support: The OfficeScan client can be installed on dual-stack or pure IPv6 clients. However:
Some of the Windows operating systems to which the OfficeScan client can be installed do not support IPv6 addressing. For some of the installation methods, there are special requirements to install the OfficeScan client successfully.
OfficeScan client IP addresses: For clients with both IPv4 and IPv6 addresses, you can choose which IP address will be used when the client registers to the server. Exception lists: Ensure that exception lists for the following features have been configured properly:
Behavior Monitoring: Add critical computer applications to the Approved Programs list to prevent the OfficeScan client from blocking these applications. For more information, see Behavior Monitoring Exception List on page 8-5.
5-2
Web Reputation: Add websites that you consider safe to the Approved URL List to prevent the OfficeScan client from blocking access to the websites. For more information, see Web Reputation Policies on page 11-5.
SERVER 2008/ SERVER 2012/ SERVER CORE 2008 SERVER CORE 2012
Yes Yes
Manual Scan, Realtime Scan, and Scheduled Scan Component update (manual and scheduled update) Update Agent Web reputation
Yes
Yes
Yes
Yes Yes but disabled by default during server installation and limited support for Windows UI mode Yes Yes but disabled by default during server installation and Application Filtering not supported
5-3
SERVER 2008/ SERVER 2012/ SERVER CORE 2008 SERVER CORE 2012
Yes (32-bit) but disabled by default Yes (64-bit) but disabled by default Yes (32-bit) but disabled by default Yes (64-bit) but disabled by default Yes Yes Yes (64-bit) but disabled by default Yes (64-bit) but disabled by default
Behavior Monitoring
Yes
Services File protection Yes (32-bit) but disabled by default No (64-bit) Yes (32-bit) but disabled by default Yes (64-bit) but disabled by default Yes (32-bit) No (64-bit) Yes No Yes Yes No Yes Yes No Yes Yes (32-bit) but disabled by default Yes (64-bit) but disabled by default Yes (32-bit) but disabled by default Yes (64-bit) but disabled by default No No Yes (64-bit) but disabled by default Yes (64-bit) but disabled by default
Data Protection (including Data Protection for Device Control) Microsoft Outlook mail scan POP3 mail scan Support for Cisco NAC Client Plug-in Manager
5-4
SERVER 2008/ SERVER 2012/ SERVER CORE 2008 SERVER CORE 2012
Yes (Server) No (Server Core) Yes
Roaming mode
SecureClient support
No
No
Smart Feedback
Yes
Yes
Yes
VISTA
WINDOWS 7
Yes
WINDOWS 8
Yes
Yes
Yes
Yes
Yes
Yes Yes
Yes Yes
Yes Yes
Yes Yes but only limited support for Windows UI mode Yes Yes but Application Filtering not supported
Yes Yes
Yes Yes
Yes Yes
5-5
FEATURE
Behavior Monitoring
VISTA
Yes (32-bit) Yes (64-bit) Vista 64-bit support requires SP1 or SP2
WINDOWS 7
Yes (32-bit) Yes (64-bit)
WINDOWS 8
Yes (32-bit) Yes (64-bit)
Yes (32-bit) Yes (64-bit) Vista 64-bit support requires SP1 or SP2
Yes
Yes
Yes
Yes
Services File protection Yes (32-bit) No (64-bit) Yes (32-bit) Yes (64-bit) Vista 64-bit support requires SP1 or SP2 Yes (32-bit) Yes (64-bit) Yes (32-bit) No (64-bit) Yes (32-bit) Yes (64-bit) No Yes (32-bit) Yes (64-bit) No Yes (32-bit) in desktop mode Yes (64-bit) in desktop mode No Yes (32-bit) Yes (64-bit) Yes (32-bit) Yes (64-bit)
Data Protection (including Data Protection for Device Control) Microsoft Outlook mail scan
5-6
FEATURE
POP3 mail scan Support for Cisco NAC Client Plug-in Manager Roaming mode SecureClient support Yes Yes Yes Yes
VISTA
WINDOWS 7
Yes No Yes Yes No
WINDOWS 8
Yes No Yes Yes No
Smart Feedback
Yes
Yes
Yes
Yes
Operating System
The OfficeScan client can only be installed on the following operating systems that support IPv6 addressing:
Windows Vista (all editions) Windows Server 2008 (all editions) Windows 7 (all editions) Windows Server 2012 (all editions) Windows 8 (all editions)
5-7
http://docs.trendmicro.com/en-us/enterprise/officescan.aspx
Installation Methods
All of the OfficeScan client installation methods can be used to install the OfficeScan client on pure IPv6 or dual-stack clients. For some installation methods, there are special requirements to install the OfficeScan client successfully. It is not possible to migrate ServerProtect to the OfficeScan client using the ServerProtect Normal Server Migration Tool because the tool does not support IPv6 addressing.
TABLE 5-3. Installation Methods and IPv6 Support INSTALLATION METHOD
Web install page and browser-based installation
REQUIREMENTS/CONSIDERATIONS
The URL to the installation page includes the OfficeScan servers host name or its IP address.
If you are installing to a pure IPv6 client, the server must be dual-stack or pure IPv6 and its host name or IPv6 address must be part of the URL. For dual-stack clients, the IPv6 address that displays in the installation status screen depends on the option selected in the Preferred IP Address section of Networked Computers > Global Client Settings. Client Packager When running the packager tool, you will need to choose whether to assign Update Agent privileges to the client. Remember that a pure IPv6 Update Agent can distribute updates only to pure IPv6 or dual-stack clients. A pure IPv6 server cannot install the OfficeScan client on pure IPv4 endpoints. Similarly, a pure IPv4 server cannot install the OfficeScan client on pure IPv6 endpoints.
5-8
Client IP Addresses
An OfficeScan server installed in an environment that supports IPv6 addressing can manage the following OfficeScan clients:
An OfficeScan server installed on a pure IPv6 host machine can manage pure IPv6 clients. An OfficeScan server installed on a dual-stack host machine and has been assigned both IPv4 and IPv6 addresses can manage pure IPv6, dual-stack, and pure IPv4 clients.
After you install or upgrade clients, the clients register to the server using an IP address.
Pure IPv6 clients register using their IPv6 address. Pure IPv4 clients register using their IPv4 address. Dual-stack clients register using either their IPv4 or IPv6 address. You can choose the IP address that these clients will use.
Configuring the IP Address that Dual-stack Clients Use When Registering to the Server
This setting is only available on dual-stack OfficeScan servers and is applied only by dual-stack clients. Procedure 1. 2. 3. Navigate to Networked Computers > Global Client Settings. Go to the Preferred IP Address section. Choose from the following options:
IPv4 only: Clients use their IPv4 address. IPv4 first, then IPv6: Clients use their IPv4 address first. If the client cannot register using its IPv4 address, it uses its IPv6 address. If registration is unsuccessful using both IP addresses, the client retries using the IP address priority for this selection.
5-9
IPv6 first, then IPv4: Clients use their IPv6 address first. If the client cannot register using its IPv6 address, it uses its IPv4 address. If registration is unsuccessful using both IP addresses, the client retries using the IP address priority for this selection.
4.
Click Save.
Deployment Considerations
This section provides a summary of the different OfficeScan client installation methods to perform a fresh installation of the OfficeScan client. All installation methods require local administrator rights on the target computers. If you are installing clients and want to enable IPv6 support, read the guidelines in OfficeScan Client Installation and IPv6 Support on page 5-7.
TABLE 5-4. Deployment Considerations for Installation DEPLOYMENT CONSIDERATIONS INSTALLATION METHOD/ OPERATING SYSTEM SUPPORT WAN DEPLOY
MENT
CENTRALL
Y
MANAGED
No
REQUI IT RESOU
RES RCE
MASS
DEPLOYM ENT
BANDWIDTH CONSUMED
High
Web install page Supported on all operating systems except Windows Server Core 2008 and Windows 8/ Server 2012/ Server Core 2012 in Windows UI mode
No
Yes
No
No
5-10
CENTRALL
Y
MANAGED
No
REQUI IT RESOU
RES RCE
MASS
DEPLOYM ENT
BANDWIDTH CONSUMED
High, if installations start at the same time
From the Initiate Browser-based Installation page Supported on all operating systems Note Not supported on Windows 8 or Windows Server 2012 operating in Windows UI mode. UNC-based Installations Supported on all operating systems
No
Yes
Yes
No
No
No
Yes
Yes
No
5-11
CENTRALL
Y
MANAGED
Yes
REQUI IT RESOU
RES RCE
MASS
DEPLOYM ENT
BANDWIDTH CONSUMED
High
From the Remote Installation page Supported on all operating systems except:
No
No
Yes
No
Windows Vista Home Basic and Home Premium Editions Windows XP Home Edition Windows 7 Home Basic/ Home Premium Windows 8 (basic versions) No No Yes Yes No High, if installations start at the same time Low, if scheduled
Login Script Setup Supported on all operating systems Client Packager Supported on all operating systems
No
No
Yes
Yes
No
5-12
CENTRALL
Y
MANAGED
Yes
REQUI IT RESOU
RES RCE
MASS
DEPLOYM ENT
BANDWIDTH CONSUMED
Low, if scheduled
Client Packager (MSI package deployed through Microsoft SMS) Supported on all operating systems Client Packager (MSI package deployed through Active Directory) Supported on all operating systems Client disk image Supported on all operating systems
Yes
Yes/No
Yes
Yes
Yes
Yes
Yes/No
Yes
Yes
No
No
No
Yes
No
Low
5-13
CENTRALL
Y
MANAGED
Yes
REQUI IT RESOU
RES RCE
MASS
DEPLOYM ENT
BANDWIDTH CONSUMED
High
Trend Micro Vulnerability Scanner (TMVS) Supported on all operating systems except:
No
No
Yes
No
Windows Vista Home Basic and Home Premium Editions Windows XP Home Edition Windows 8 (basic versions)
5-14
CENTRALL
Y
MANAGED
Yes
REQUI IT RESOU
RES RCE
MASS
DEPLOYM ENT
BANDWIDTH CONSUMED
High
No
No
Yes
No
Windows Vista Home Basic and Home Premium Editions Windows XP Home Edition Windows 7 Home Basic/ Home Premium Windows 8 (basic versions)
Windows Server 2003 with Internet Information Server (IIS) 6.0 or Apache 2.0.x Windows Server 2008 with Internet Information Server (IIS) 7.0 Windows Server 2008 R2 with Internet Information Server (IIS) 7.5 Windows Server 2012 with Internet Information Server (IIS) 8.0
5-15
To install from the web install page, you need the following:
Internet Explorer with the security level set to allow ActiveX controls. The required versions are as follows:
6.0 on Windows XP and Windows Server 2003 7.0 on Windows Vista and Windows Server 2008 8.0 on Windows 7 10.0 on Windows 8 and Windows Server 2012
Send the following instructions to users to install the OfficeScan client from the web install page. To send an OfficeScan client installation notification through email, see Initiating a Browser-based Installation on page 5-18.
2.
If installing to a computer running Windows XP, Vista, Server 2008, 7, 8, or Server 2012, perform the following steps: a. Launch Internet Explorer and add the OfficeScan server URL (such as
https://<OfficeScan server name>:4343/officescan) to the list
of trusted sites. In Windows XP Home, access the list by going to Tools > Internet Options > Security tab, selecting the Trusted Sites icon, and clicking Sites.
5-16
b.
Modify the Internet Explorer security setting to enable Automatic prompting for ActiveX controls. On Windows XP, go to Tools > Internet Options > Security tab, and click Custom level.
3.
4. 5.
Click the link on the logon page. In the new screen that displays, click Install Now to start installing the OfficeScan client. The OfficeScan client installation starts. Allow ActiveX control installation when prompted. The OfficeScan client icon appears in the Windows system tray after installation.
Note For a list of icons that display on the system tray, see OfficeScan Client Icons on page 14-24.
Browser-based Installation
Set up an email message that instructs users on the network to install the OfficeScan client. Users click the OfficeScan client installer link provided in the email to start the installation. Before you install OfficeScan clients:
Check the OfficeScan client installation requirements. Identify which computers on the network currently do not have protection against security risks. Perform the following tasks:
5-17
Run the Trend Micro Vulnerability Scanner. This tool analyzes computers for installed antivirus software based on an IP address range you specify. For details, see Vulnerability Scanner Usage on page 5-37. Run Security Compliance. For details, see Security Compliance for Unmanaged Endpoints on page 14-65.
a.
5-18
b.
For remote desktop installations using AutoPcc.exe: a. b. Open a Remote Desktop Connection (Mstsc.exe) in console mode. This forces the AutoPcc.exe installation to run in session 0. Navigate to the \\<server computer name>\ofscan directory and execute AutoPcc.exe.
Procedure 1. If running Windows Vista, Windows 7, Windows 8 (Pro, Enterprise), or Windows Server 2012, perform the following steps: a. b. c. d. Enable a built-in administrator account and set the password for the account. Disable simple file sharing on the endpoint. Click Start > Programs > Administrative Tools > Windows Firewall with Advanced Security. For Domain Profile, Private Profile, and Public Profile, set the firewall state to "Off".
5-19
e.
Open Microsoft Management Console (click Start > Run and type
services.msc) and start the Remote Registry and Remote Procedure
Call services. When installing the OfficeScan client, use the built-in administrator account and password. 2. 3. In the web console, go to Networked Computers > Client Installation > Remote. Select the target computers.
The Domains and Computers list displays all the Windows domains on the network. To display computers under a domain, double-click the domain name. Select a computer, and then click Add. If you have a specific computer name in mind, type the computer name in the field on top of the page and click Search.
OfficeScan prompts you for the target computers user name and password. Use an administrator account user name and password to continue. 4. Type the user name and password, and then click Log in. The target computer appears in the Selected Computers table. 5. 6. Repeat steps 3 and 4 to add more computers. Click Install when you are ready to install the OfficeScan client to target computers. A confirmation box appears. 7. Click Yes to confirm that you want to install the OfficeScan client to the target computers. A progress screen appears as the program files copy to each target computer. When OfficeScan completes the installation to a target computer, the computer name disappears in the Selected Computers list and appears in the Domains and Computers list with a red check mark. When all target computers appear with red check marks in the Domains and Computers list, you have completed remote installation.
5-20
Note If you install to multiple computers, OfficeScan records any unsuccessful installation in the logs (for details, see Fresh Installation Logs on page 18-16), but it will not postpone the other installations. You do not have to supervise the installation after you click Install. Check the logs later to see the installation results.
The computer must be run in Mstsc.exe /console mode. This forces the AutoPcc.exe installation to run in session 0. Map a drive to the "ofcscan" folder and execute AutoPcc.exe from that point.
5-21
Where:
computer.
"ofcscan" is the OfficeScan shared folder name on the server. "autopcc" is the link to the autopcc executable file that installs the OfficeScan client.
Windows Server 2003: \\Windows 2003 server\system drive \windir\sysvol\domain\scripts\ofcscan.bat Windows Server 2008: \\Windows 2008 server\system drive \windir\sysvol\domain\scripts\ofcscan.bat Windows Server 2012: \\Windows 2012 server\system drive \windir\sysvol\domain\scripts\ofcscan.bat
5-22
The Login Script Setup utility loads. The console displays a tree showing all domains on the network. 2. Locate the server whose login script you want to modify, select it, and then click Select. Ensure that the server is a primary domain controller and that you have administrator access to the server. Login Script Setup prompts you for a user name and password. 3. Type the user name and password. Click OK to continue. The User Selection screen appears. The Users list shows the profiles of users that log on to the server. The Selected users list shows the user profiles whose login script you want to modify. 4. 5. 6. 7. 8. To modify the login script for a user profile, select the user profile from the Users list, and then click Add. To modify the login script of all users, click Add All. To exclude a user profile that you previously selected, select the name from the Selected users list, and click Delete. To reset your choices, click Delete All. Click Apply when all target user profiles are in the Selected users list. A message informs you that you have modified the server login scripts successfully. 9. Click OK. Login Script Setup returns to its initial screen. 10. To modify the login scripts of other servers, repeat steps 2 to 4. 11. To close Login Script Setup, click Exit.
5-23
Client Packager is especially useful when deploying the OfficeScan client or components to clients in low-bandwidth remote offices. OfficeScan clients installed using Client Packager report to the server where the package was created. Client Packager requires the following:
350MB free disk space Windows Installer 2.0 (to run an MSI package)
DESCRIPTION
Select Setup to create the package as an executable file. The package installs the OfficeScan client program with the components currently available on the server. If the target computer has an earlier OfficeScan client version installed, running the executable file upgrades the client. Select Update to create a package that contains the components currently available on the server. The package will be created as an executable file. Use this package if there are issues updating components on a client computer.
Update
5-24
PACKAGE TYPE
MSI
DESCRIPTION
Select MSI to create a package that conforms to the Microsoft Installer Package format. The package also installs the OfficeScan client program with the components currently available on the server. If the target computer has an earlier OfficeScan client version installed, running the MSI file upgrades the client.
4.
Configure the following settings (some settings are only available if you select a particular package type):
Windows Operating System Type on page 5-26 Scan Method on page 5-26 Silent Mode on page 5-28 Disable Prescan on page 5-28 Force Overwrite with Latest Version on page 5-28 Update Agent Capabilities on page 5-28 Outlook Mail Scan on page 5-29 Check Point SecureClient Support on page 5-30 Components on page 5-30
5.
Next to Source file, ensure that the location of the ofcscan.ini file is correct. To modify the path, click ( ) to browse for the ofcscan.ini file. By default, this file is in the <Server installation folder>\PCCSRV folder of the OfficeScan server. In Output file, click ( ), specify where you want to create the OfficeScan client package, and type the package file name (for example, ClientSetup.exe). Click Create. After Client Packager creates the package, the message Package created successfully appears. Locate the package in the directory that you specified in the previous step.
6. 7.
5-25
8.
2.
If you have users who will install the .exe package on computers running Windows Vista, Server 2008, 7, 8, or Server 2012, instruct them to right-click the .exe file and select Run as administrator. If you created an .msi file, deploy the package by performing the following tasks:
3.
Use Active Directory or Microsoft SMS. See Deploying an MSI Package Using Active Directory on page 5-30 or Deploying an MSI Package Using Microsoft SMS on page 5-32.
4.
Launch the MSI package from a command prompt window to install the OfficeScan client silently to a remote computer running Windows XP, Vista, Server 2008, 7, 8, or Server 2012.
Scan Method
Select the scan method for the package. See Scan Methods on page 7-7 for details. The components included in the package depend on the scan method you have selected. For details on the components available for each scan method, see OfficeScan Client Updates on page 6-26.
5-26
Before selecting the scan method, take note of the following guidelines to help you deploy the package efficiently:
If you will use the package to upgrade a client to this OfficeScan version, check the domain level scan method on the web console. On the console, go to Networked Computers > Client Management, select the client tree domain to which the client belongs, and click Settings > Scan Settings > Scan Methods. The domain level scan method should be consistent with the scan method for the package. If you will use the package to perform a fresh installation of the OfficeScan client, check the client grouping setting. On the web console, go to Networked Computers > Client Grouping. If the client grouping is by NetBIOS, Active Directory, or DNS domain, check the domain to which the target computer belongs. If the domain exists, check the scan method configured for the domain. If the domain does not exist, check the root level scan method (select the root domain icon ( ) in the client tree and click Settings > Scan Settings > Scan Methods). The domain or root level scan method should be consistent with the scan method for the package. If the client grouping is by custom client groups, check the Grouping Priority and Source.
If the target computer belongs to a particular source, check the corresponding Destination. The destination is the domain name that appears in the client tree. The client will apply the scan method for that domain after the installation.
5-27
If you will use the package to update components on a client using this OfficeScan version, check the scan method configured for the client tree domain to which the client belongs. The domain level scan method should be consistent with the scan method for the package.
Silent Mode
This option creates a package that installs on the client computer in the background, unnoticeable to the client and without showing an installation status window. Enable this option if you plan to deploy the package remotely to the target computer.
Disable Prescan
This option applies only for fresh installations. If the target computer does not have the OfficeScan client installed, the package first scans the computer for security risks before installing the OfficeScan client. If you are certain that the target computer is not infected with security risks, disable prescan. If prescan is enabled, Setup scans for virus/malware in the most vulnerable areas of the computer, which include the following:
Boot area and boot directory (for boot viruses) Windows folder Program files folder
5-28
You can allow the Update Agent to perform the following tasks:
If you assign Update Agent privileges to an OfficeScan client: 1. 2. 3. Keep in mind that if the package will be deployed to a pure IPv6 client, the Update Agent can distribute updates only to pure IPv6 or dual-stack clients. Use the Scheduled Update Configuration Tool to enable and configure scheduled updates for the agent. For details, see Update Methods for Update Agents on page 6-57. The OfficeScan server that manages the Update Agent will not be able to synchronize or deploy the following settings to the agent:
Update Agent privilege Client scheduled update Updates from Trend Micro ActiveUpdate server Updates from other update sources
Therefore, deploy the OfficeScan client package only to computers that will not be managed by an OfficeScan server. Afterwards, configure the Update Agent to get its updates from an update source other than an OfficeScan server, such as a custom update source. If you want the OfficeScan server to synchronize settings with the Update Agent, do not use Client Packager and choose a different OfficeScan client installation method instead.
5-29
Components
Select the components and features to include in the package.
For details about components, see OfficeScan Components and Programs on page 6-2. The Data Protection module will only be available if you install and activate Data Protection. For details about Data Protection, see Using Data Loss Prevention on page 10-1.
For Windows Server 2003 and lower versions: a. b. c. Open the Active Directory console. Right-click the Organizational Unit (OU) where you want to deploy the MSI package and click Properties. In the Group Policy tab, click New.
5-30
For Windows Server 2008 and Windows Server 2008 R2: a. b. c. Open the Group Policy Management Console. Click Start > Control Panel > Administrative Tools > Group Policy Management. In the console tree, expand Group Policy Objects in the forest and domain containing the GPO that you want to edit. Right-click the GPO that you want to edit, and then click Edit. This opens the Group Policy Object Editor.
For Windows Server 2012: a. b. c. Open the Group Policy Management Console. Click Server Management > Tools > Group Policy Management. In the console tree, expand Group Policy Objects in the forest and domain containing the GPO that you want to edit. Right-click the GPO that you want to edit, and then click Edit. This opens the Group Policy Object Editor.
2.
Choose between Computer Configuration and User Configuration, and open Software Settings below it.
Tip Trend Micro recommends using Computer Configuration instead of User Configuration to ensure successful MSI package installation regardless of which user logs on to the computer.
3. 4. 5.
Below Software Settings, right-click Software installation, and then select New and Package. Locate and select the MSI package. Select a deployment method and then click OK.
Assigned: The MSI package is automatically deployed the next time a user logs on to the computer (if you selected User Configuration) or when the computer restarts (if you selected Computer Configuration). This method does not require any user intervention.
5-31
Published: To run the MSI package, inform users to go to Control Panel, open the Add/Remove Programs screen, and select the option to add/install programs on the network. When the OfficeScan client MSI package displays, users can proceed to install the OfficeScan client.
Local: The SMS server and the OfficeScan server are on the same computer. Remote: The SMS server and the OfficeScan server are on different computers.
"Unknown" appears in the Run Time column of the SMS console. If the installation was unsuccessful, the installation status may still show that the installation is complete on the SMS program monitor. For instructions on how to check if the installation was successful, see Post-installation on page 5-65.
The following instructions apply if you use Microsoft SMS 2.0 and 2003.
5-32
The Package Definition screen appears. 5. Click Browse. The Open screen appears. 6. Browse and select the MSI package file created by Client Packager, and then click Open. The MSI package name appears on the Package Definition screen. The package shows "OfficeScan client" and the program version. 7. Click Next. The Source Files screen appears. 8. Click Always obtain files from a source directory, and then click Next. The Source Directory screen appears, displaying the name of the package you want to create and the source directory. 9. Click Local drive on site server.
10. Click Browse and select the source directory containing the MSI file. 11. Click Next. The wizard creates the package. When it completes the process, the name of the package appears on the SMS Administrator console.
2. 3.
5-33
4. 5.
On the Tree tab, click Packages. On the Action menu, click New > Package From Definition. The Welcome screen of the Create Package From Definition Wizard appears.
6.
7.
8. 9.
Browse for the MSI package file. The file is on the shared folder you created. Click Next. The Source Files screen appears.
10. Click Always obtain files from a source directory, and then click Next. The Source Directory screen appears. 11. Click Network path (UNC name). 12. Click Browse and select the source directory containing the MSI file (the shared folder you created). 13. Click Next. The wizard creates the package. When it completes the process, the name of the package appears on the SMS Administrator console.
5-34
3.
4. 5.
Click Distribute an existing package, and then click the name of the Setup package you created. Click Next. The Distribution Points screen appears.
6.
Select a distribution point to which you want to copy the package, and then click Next. The Advertise a Program screen appears.
7.
Click Yes to advertise the OfficeScan client Setup package, and then click Next. The Advertisement Target screen appears.
8.
Click Browse to select the target computers. The Browse Collection screen appears.
9.
10. Click OK. The Advertisement Target screen appears again. 11. Click Next. The Advertisement Name screen appears. 12. In the text boxes, type a name and your comments for the advertisement, and then click Next. The Advertise to Subcollections screen appears. 13. Choose whether to advertise the package to subcollections. Choose to advertise the program only to members of the specified collection or to members of subcollections. 14. Click Next. The Advertisement Schedule screen appears.
5-35
15. Specify when to advertise the OfficeScan client Setup package by typing or selecting the date and time.
Note If you want Microsoft SMS to stop advertising the package on a specific date, click Yes. This advertisement should expire, and then specify the date and time in the Expiration date and time list boxes.
16. Click Next. The Assign Program screen appears. 17. Click Yes, assign the program, and then click Next. Microsoft SMS creates the advertisement and displays it on the SMS Administrator console. 18. When Microsoft SMS distributes the advertised program (that is, the OfficeScan client program) to target computers, a screen displays on each target computer. Instruct users to click Yes and follow the instructions provided by the wizard to install the OfficeScan client to their computers.
5-36
2. 3.
Copy ImgSetup.exe from <Server installation folder>\PCCSRV\Admin\Utility \ImgSetup to this computer. Run ImgSetup.exe on this computer. This creates a RUN registry key under HKEY_LOCAL_MACHINE.
4. 5.
Create a disk image of the OfficeScan client using the disk imaging software. Restart the clone.
ImgSetup.exe automatically starts and creates one new GUID value. The OfficeScan client reports this new GUID to the server and the server creates a new record for the new OfficeScan client.
WARNING! To avoid having two computers with the same name in the OfficeScan database, manually change the computer name or domain name of the cloned OfficeScan client.
Network Administration on page 5-38 Network Topology and Architecture on page 5-38 Software/Hardware Specifications on page 5-39 Domain Structure on page 5-39 Network Traffic on page 5-40 Network Size on page 5-40
5-37
Network Administration
TABLE 5-6. Network Administration SETUP
Administration with strict security policy Administrative responsibility distributed across different sites Centralized administration Outsource service Users administer their own computers
Multiple locations with high speed connection Multiple locations with low speed connection Remote and isolated computers
5-38
Software/Hardware Specifications
TABLE 5-8. Software/Hardware Specifications SETUP
Windows NT-based operating systems Mixed operating systems
Domain Structure
TABLE 5-9. Domain Structure SETUP
Microsoft Active Directory
Workgroup
Peer-to-peer
5-39
Network Traffic
TABLE 5-10. Network Traffic SETUP
LAN connection 512 Kbps T1 connection and higher Dialup
Network Size
TABLE 5-11. Network Size SETUP
Very large enterprise
The OfficeScan server or another security software is installed on the target host machine. The remote computer runs Windows XP Home, Windows Vista Home Basic, Windows Vista Home Premium, Windows 7 Home Basic, Windows 7 Home Premium, or Windows 8 (basic versions).
5-40
Note You can install the OfficeScan client to the target host machine using the other installation methods discussed in Deployment Considerations on page 5-10.
Before using Vulnerability Scanner to install the OfficeScan client, perform the following steps:
For Windows Vista (Business, Enterprise, or Ultimate Edition) or Windows 7 (Professional, Enterprise, Ultimate Edition), Windows 8 (Pro, Enterprise), Windows Server 2012 (Standard): 1. 2. 3. 4. Enable a built-in administrator account and set the password for the account. Click Start > Programs > Administrative Tools > Windows Firewall with Advanced Security. For Domain Profile, Private Profile, and Public Profile, set the firewall state to "Off". Open Microsoft Management Console (click Start > Run and type services.msc) and start the Remote Registry service. When installing the OfficeScan client, use the built-in administrator account and password.
For Windows XP Professional (32-bit or 64-bit version): 1. 2. Open Windows Explorer and click Tools > Folder Options. Click the View tab and disable Use simple file sharing (Recommended).
5-41
DETAILS
Administrators can run vulnerability scans on demand. Administrators can run vulnerability scans on host machines requesting IP addresses from a DHCP server. Vulnerability Scanner listens on port 67, which is the DHCP servers listening port for DHCP requests. If it detects a DHCP request from a host machine, vulnerability scan runs on the machine. Note Vulnerability Scanner is unable to detect DHCP requests if you launched it on Windows Server 2008, Windows 7, Windows 8, or Windows Server 2012.
After Vulnerability Scanner runs, it displays the status of the OfficeScan client on the target host machines. The status can be any of the following:
Normal: The OfficeScan client is up and running and is working properly Abnormal: The OfficeScan client services are not running or the client does not have real-time protection Not installed: The TMListen service is missing or the OfficeScan client has not been installed Unreachable: Vulnerability Scanner was unable to establish connection with the host machine and determine the status of the OfficeScan client
5-42
The Trend Micro Vulnerability Scanner console appears. To run vulnerability scan on another computer running Windows Server 2003, Server 2008, Vista, 7, 8 , or Server 2012: a. b. c. On the OfficeScan server computer, navigate to <Server installation
folder>\PCCSRV\Admin\Utility.
Copy the TMVS folder to the other computer. On the other computer, open the TMVS folder and then double-click TMVS.exe. The Trend Micro Vulnerability Scanner console appears.
Note You cannot launch the tool from Terminal Server.
2. 3.
Go to the Manual Scan section. Type the IP address range of the computers you want to check. a. Type an IPv4 address range.
Note Vulnerability Scanner can only query an IPv4 address range if it runs on a pure IPv4 or dual-stack host machine. Vulnerability Scanner only supports a class B IP address range, for example, 168.212.1.1 to 168.212.254.254.
b.
For an IPv6 address range, type the IPv6 prefix and length.
Note Vulnerability Scanner can only query an IPv6 address range if it runs on a pure IPv6 or dual-stack host machine.
4.
5.
5-43
a.
Ping settings: Vulnerability Scan can "ping" the IP addresses specified in the previous step to check if they are currently in use. If a target host machine is using an IP address, Vulnerability Scanner can determine the host machines operating system. For details, see Ping Settings on page 5-56. Method for retrieving computer descriptions: For host machines that respond to the "ping" command, Vulnerability Scanner can retrieve additional information about the host machines. For details, see Method for Retrieving Computer Descriptions on page 5-53. Product query: Vulnerability Scanner can check for the presence of security software on the target host machines. For details, see Product Query on page 5-50. OfficeScan server settings: Configure these settings if you want Vulnerability Scanner to automatically install OfficeScan client to unprotected host machines. These settings identify the OfficeScan clients parent server and the administrative credentials used to log on to the host machines. For details, see OfficeScan Server Settings on page 5-58.
Note Certain conditions may prevent the installation of the OfficeScan client to the target host machines. For details, see Guidelines When Installing the OfficeScan Client Using Vulnerability Scanner on page 5-40.
b.
c.
d.
e.
Notifications: Vulnerability Scanner can send the vulnerability scan results to OfficeScan administrators. It can also display notifications on unprotected host machines. For details, see Notifications on page 5-54. Save results: In addition to sending the vulnerability scan results to administrators, Vulnerability Scan can also save the results to a .csv file. For details, see Vulnerability Scan Results on page 5-56.
f.
6.
7.
Click Start. The vulnerability scan results appear in the Results table under the Manual Scan tab.
5-44
Note MAC address information does not display in the Results table if the computer runs Windows Server 2008 or Windows Server 2012.
8.
To save the results to a comma-separated value (CSV) file, click Export, locate the folder where you want to save the file, type the file name, and click Save.
DESCRIPTION
Specify the thread number for DHCP mode. The minimum is 3, the maximum is 100. The default value is 3. This is the delay time in seconds before checking the requesting computer for installed antivirus software. The minimum is 0 (do not wait) and the maximum is 600. The default value is 60.
LogReport=x
0 disables logging, 1 enables logging. Vulnerability Scanner sends the results of the scan to the OfficeScan server. Logs display in the System Event Logs screen on the web console.
OsceServer=x OsceServerPort=x
This is the OfficeScan server's IP address or DNS name. This is the web server port on the OfficeScan server.
2.
appears.
5-45
a. b. c.
Copy the TMVS folder to the other computer. On the other computer, open the TMVS folder and then double-click TMVS.exe. The Trend Micro Vulnerability Scanner console appears.
Note You cannot launch the tool from Terminal Server.
3.
Under the Manual Scan section, click Settings. The Settings screen appears.
4.
Configure the following settings: a. Product query: Vulnerability Scanner can check for the presence of security software on the target host machines. For details, see Product Query on page 5-50. OfficeScan server settings: Configure these settings if you want Vulnerability Scanner to automatically install the OfficeScan client to unprotected host machines. These settings identify the OfficeScan clients parent server and the administrative credentials used to log on to the host machines. For details, see OfficeScan Server Settings on page 5-58.
Note Certain conditions may prevent the installation of the OfficeScan client to the target host machines. For details, see Guidelines When Installing the OfficeScan Client Using Vulnerability Scanner on page 5-40.
b.
c.
Notifications: Vulnerability Scanner can send the vulnerability scan results to OfficeScan administrators. It can also display notifications on unprotected host machines. For details, see Notifications on page 5-54.
5-46
d.
Save results: In addition to sending the vulnerability scan results to administrators, Vulnerability Scan can also save the results to a .csv file. For details, see Vulnerability Scan Results on page 5-56.
5.
6.
7.
Click Start. Vulnerability Scanner begins listening for DHCP requests and performing vulnerability checks on computers as they log on to the network.
8.
To save the results to a comma-separated value (CSV) file, click Export, locate the folder where you want to save the file, type the file name, and click Save.
5-47
2. 3.
Go to the Scheduled Scan section. Click Add/Edit. The Scheduled Scan screen appears.
4.
Configure the following settings: a. b. Name: Type a name for the scheduled vulnerability scan. IP address range: Type the IP address range of the computers you want to check. i. Type an IPv4 address range.
Note Vulnerability Scanner can only query an IPv4 address range if it runs on a pure IPv4 or dual-stack host machine that has an available IPv4 address. Vulnerability Scanner only supports a class B IP address range, for example, 168.212.1.1 to 168.212.254.254.
ii.
For an IPv6 address range, type the IPv6 prefix and length.
Note Vulnerability Scanner can only query an IPv6 address range if it runs on a pure IPv6 or dual-stack host machine that has an available IPv6 address.
c. d.
Schedule: Specify the start time using the 24-hour clock format and then select how often the scan will run. Choose from daily, weekly, or monthly. Settings: Select which set of vulnerability scan settings to use.
Select Use current settings if you have configured and want to use manual vulnerability scan settings. For details about manual vulnerability scan settings, see Running a Manual Vulnerability Scan on page 5-42.
5-48
If you did not specify manual vulnerability scan settings or if you want to use another set of settings, select Modify settings and then click Settings. The Settings screen appears. You can configure the following settings and then click OK:
Ping settings: Vulnerability Scan can "ping" the IP addresses specified in step 4b to check if they are currently in use. If a target host machine is using an IP address, Vulnerability Scanner can determine the host machines operating system. For details, see Ping Settings on page 5-56. Method for retrieving computer descriptions: For host machines that respond to the "ping" command, Vulnerability Scanner can retrieve additional information about the host machines. For details, see Method for Retrieving Computer Descriptions on page 5-53. Product query: Vulnerability Scanner can check for the presence of security software on the target host machines. For details, see Product Query on page 5-50. OfficeScan server settings: Configure these settings if you want Vulnerability Scanner to automatically install the OfficeScan client to unprotected host machines. These settings identify the OfficeScan clients parent server and the administrative credentials used to log on to the host machines. For details, see OfficeScan Server Settings on page 5-58.
Note Certain conditions may prevent the installation of the OfficeScan client to the target host machines. For details, see Guidelines When Installing the OfficeScan Client Using Vulnerability Scanner on page 5-40.
Notifications: Vulnerability Scanner can send the vulnerability scan results to OfficeScan administrators. It can also display notifications on unprotected host machines. For details, see Notifications on page 5-54.
5-49
Save results: In addition to sending the vulnerability scan results to administrators, Vulnerability Scan can also save the results to a .csv file. For details, see Vulnerability Scan Results on page 5-56.
5.
Click OK. The Scheduled Scan screen closes.The scheduled vulnerability scan you created appears under the Scheduled Scan section. If you enabled notifications, Vulnerability Scanner sends you the scheduled vulnerability scan results.
6.
To execute the scheduled vulnerability scan immediately, click Run Now. The vulnerability scan results appear in the Results table under the Scheduled Scan tab.
Note MAC address information does not display in the Results table if the computer runs Windows Server 2008 or Windows Server 2012.
7.
To save the results to a comma-separated value (CSV) file, click Export, locate the folder where you want to save the file, type the file name, and click Save.
Product Query
Vulnerability Scanner can check for the presence of security software on clients. The following table discusses how Vulnerability Scanner checks security products:
5-50
DESCRIPTION
Vulnerability Scanner uses RPC endpoint to check if
SPNTSVC.exe is running. It returns information including
operating system, and Virus Scan Engine, Virus Pattern and product versions. Vulnerability Scanner cannot detect the ServerProtect Information Server or the ServerProtect Management Console. ServerProtect for Linux If the target computer does not run Windows, Vulnerability Scanner checks if it has ServerProtect for Linux installed by trying to connect to port 14942. Vulnerability Scanner uses the OfficeScan client port to check if the OfficeScan client is installed. It also checks if the TmListen.exe process is running. It retrieves the port number automatically if executed from its default location. If you launched Vulnerability Scanner on a computer other than the OfficeScan server, check and then use the other computer's communication port. PortalProtect Vulnerability Scanner loads the web page http:// localhost:port/PortalProtect/index.html to check for product installation. ScanMail for Microsoft Exchange Vulnerability Scanner loads the web page http:// ipaddress:port/scanmail.html to check for ScanMail installation. By default, ScanMail uses port 16372. If ScanMail uses a different port number, specify the port number. Otherwise, Vulnerability Scanner cannot detect ScanMail. InterScan family Vulnerability Scanner loads each web page for different products to check for product installation.
OfficeScan client
5-51
PRODUCT
Trend Micro Internet Security (PC-cillin) McAfee VirusScan ePolicy Orchestrator
DESCRIPTION
Vulnerability Scanner uses port 40116 to check if Trend Micro Internet Security is installed. Vulnerability Scanner sends a special token to TCP port 8081, the default port of ePolicy Orchestrator for providing connection between the server and client. The computer with this antivirus product replies using a special token type. Vulnerability Scanner cannot detect the standalone McAfee VirusScan. Vulnerability Scanner sends a special token to UDP port 2967, the default port of Norton Antivirus Corporate Edition RTVScan. The computer with this antivirus product replies using a special token type. Since Norton Antivirus Corporate Edition communicates by UDP, the accuracy rate is not guaranteed. Furthermore, network traffic may influence UDP waiting time.
Vulnerability Scanner detects products and computers using the following protocols:
RPC: Detects ServerProtect for NT UDP: Detects Norton AntiVirus Corporate Edition clients TCP: Detects McAfee VirusScan ePolicy Orchestrator ICMP: Detects computers by sending ICMP packets HTTP: Detects OfficeScan clients DHCP: If it detects a DHCP request, Vulnerability Scanner checks if antivirus software has already been installed on the requesting computer.
Product query settings are a subset of vulnerability scan settings. For details about vulnerability scan settings, see Vulnerability Scan Methods on page 5-41. Procedure 1. To specify product query settings from Vulnerability Scanner (TMVS.exe):
5-52
a. b.
c. d. e. f.
Go to the Product query section. Select the products to check. Click Settings next to a product name and then specify the port number that Vulnerability Scanner will check. Click OK. The Settings screen closes.
2.
To set the number of computers that Vulnerability Scanner simultaneously checks for security software: a. b. Navigate to <Server installation folder>\PCCSRV\Admin\Utility\TMVS and open TMVS.ini using a text editor such as Notepad. To set the number of computers checked during manual vulnerability scans, change the value for ThreadNumManual. Specify a value between 8 and 64. For example, type ThreadNumManual=60 if you want Vulnerability Scanner to check 60 computers at the same time. c. To set the number of computers checked during scheduled vulnerability scans, change the value for ThreadNumSchedule. Specify a value between 8 and 64. For example, type ThreadNumSchedule=50 if you want Vulnerability Scanner to check 50 computers at the same time. d. Save TMVS.ini.
5-53
Quick retrieval: Retrieves only the computer name Normal retrieval: Retrieves both domain and computer information
Retrieval settings are a subset of vulnerability scan settings. For details about vulnerability scan settings, see Vulnerability Scan Methods on page 5-41. Procedure 1. 2. Launch TMVS.exe. Click Settings. The Settings screen appears. 3. 4. 5. 6. Go to the Method for retrieving computer descriptions section. Select Normal or Quick. If you selected Normal, select Retrieve computer descriptions when available. Click OK. The Settings screen closes.
Notifications
Vulnerability Scanner can send the vulnerability scan results to OfficeScan administrators. It can also display notifications on unprotected host machines.
Configuring Notification Settings
Notification settings are a subset of vulnerability scan settings. For details about vulnerability scan settings, see Vulnerability Scan Methods on page 5-41. Procedure 1. Launch TMVS.exe.
5-54
2.
3. 4.
Go to the Notifications section. To automatically send the Vulnerability Scan results to yourself or to other administrators in your organization: a. b. c. d. e. Select Email results to the system administrator. Click Configure to specify email settings. In To, type the email address of the recipient. In From, type the email address of the sender. In SMTP server, type the SMTP server address. For example, type smtp.company.com. The SMTP server information is required. f. g. In Subject, type a new subject for the message or accept the default subject. Click OK.
5.
To inform users that their computers do not have security software installed: a. b. c. d. Select Display a notification on unprotected computers. Click Customize to configure the notification message. In the Notification Message screen, type a new message or accept the default message. Click OK.
6.
5-55
Vulnerability scan results settings are a subset of vulnerability scan settings. For details about vulnerability scan settings, see Vulnerability Scan Methods on page 5-41. Procedure 1. 2. Launch TMVS.exe. Click Settings. The Settings screen appears. 3. 4. 5. Go to the Save results section. Select Automatically save the results to a CSV file. To change the default folder for saving the CSV file: a. b. c. 6. Click Browse. Select a target folder on the computer or on the network. Click OK.
Ping Settings
Use "ping" settings to validate the existence of a target machine and determine its operating system. If these settings are disabled, Vulnerability Scanner scans all the IP addresses in the specified IP address range even those that are not used on any host machine thereby making the scanning attempt longer than it should be.
5-56
Ping settings are a subset of vulnerability scan settings. For details about vulnerability scan settings, see Vulnerability Scan Methods on page 5-41. Procedure 1. To specify ping settings from Vulnerability Scanner (TMVS.exe): a. b. Launch TMVS.exe. Click Settings. The Settings screen appears. c. d. e. f. Go to the Ping settings section. Select Allow Vulnerability Scanner to ping computers on your network to check their status. In the Packet size and Timeout fields, accept or modify the default values. Select Detect the type of operating system using ICMP OS fingerprinting. If you select this option, Vulnerability Scanner determines if a host machine runs Windows or another operating system. For host machines running Windows, Vulnerability Scanner can identify the version of Windows. g. Click OK. The Settings screen closes. 2. To set the number of computers that Vulnerability Scanner simultaneously pings: a. b. Navigate to <Server installation folder>\PCCSRV\Admin\Utility\TMVS and open TMVS.ini using a text editor such as Notepad. Change the value for EchoNum. Specify a value between 1 and 64. For example, type EchoNum=60 if you want Vulnerability Scanner to ping 60 computers at the same time.
5-57
c.
Save TMVS.ini.
Vulnerability Scanner installs the OfficeScan client to unprotected target machines. Server settings allow Vulnerability Scanner to identify the OfficeScan clients parent server and the administrative credentials to use when logging on to the target machines.
Note Certain conditions may prevent the installation of the OfficeScan client to the target host machines. For details, see Guidelines When Installing the OfficeScan Client Using Vulnerability Scanner on page 5-40.
OfficeScan server settings are a subset of vulnerability scan settings. For details about vulnerability scan settings, see Vulnerability Scan Methods on page 5-41. Procedure 1. 2. Launch TMVS.exe. Click Settings. The Settings screen appears. 3. 4. 5. 6. Go to the OfficeScan server settings section. Type the OfficeScan server name and port number. Select Auto-install OfficeScan client on unprotected computers. To configure the administrative credentials: a. Click Install to Account.
5-58
b. c. 7. 8.
In the Account Information screen, type a user name and password. Click OK.
Select Send logs to the OfficeScan server. Click OK. The Settings screen closes.
The OfficeScan server is installed on the computer. The computer runs Windows XP Home, Windows Vista Home Basic, Windows Vista Home Premium, Windows 7 Starter, Windows 7 Home Basic, Windows 7 Home Premium, and Windows 8 (basic versions). If you have computers running these platforms, choose another installation method. See Deployment Considerations on page 5-10 for details.
3.
If the target computer runs Windows Vista (Business, Enterprise, or Ultimate Edition) Windows 7 (Professional, Enterprise, or Ultimate Edition), Windows 8 (Pro, Enterprise), or Windows Server 2012 (Standard), perform the following steps on the computer: a. b. Enable a built-in administrator account and set the password for the account. Disable the Windows firewall.
5-59
c. d. e.
Click Start > Programs > Administrative Tools > Windows Firewall with Advanced Security. For Domain Profile, Private Profile, and Public Profile, set the firewall state to "Off". Open Microsoft Management Console (click Start > Run and type
services.msc) and start the Remote Registry service. When installing the
OfficeScan client, use the built-in administrator account and password. 4. If there are Trend Micro or third-party endpoint security programs installed on the computer, check if OfficeScan can automatically uninstall the software and replace it with the OfficeScan client. For a list of client security software that OfficeScan automatically uninstalls, open the following files in <Server installation folder> \PCCSRV\Admin. You can open these files using a text editor such as Notepad.
tmuninst.ptn tmuninst_as.ptn
If the software on the target computer is not included in the list, manually uninstall it first. Depending on the uninstallation process of the software, the computer may or may not need to restart after uninstallation.
If an earlier OfficeScan client version is already installed on a computer and you click Install, the installation will be skipped and the client will not be upgraded to this version. To upgrade the client, a setting must be disabled. a. b. Go to Networked Computers > Client Management. Click the Settings > Privileges and Other Settings > Other Settings tab.
5-60
c. 3. 4.
Disable the option Clients can update components but not upgrade the client program or deploy hot fixes.
Specify the administrator logon account for each computer and click Log on. OfficeScan starts installing the client on the target computer. View the installation status.
tmuninst.ptn tmuninst_as.ptn
If the software on the target computer is not included in the list, manually uninstall it first. Depending on the uninstallation process of the software, the computer may or may not need to restart after uninstallation.
If automatic client migration is successful but a user encounters problems with the OfficeScan client right after installation, restart the computer.
5-61
If the OfficeScan installation program proceeded to install the OfficeScan client but was unable to uninstall the other security software, there will be conflicts between the two software. Uninstall both software, and then install the OfficeScan client using any of the installation methods discussed in Deployment Considerations on page 5-10.
The remote client only has an IPv6 address. The migration tool does not support IPv6 addressing. The remote client cannot use the NetBIOS protocol. Ports 455, 337, and 339 are blocked. The remote client cannot use the RPC protocol. The Remote Registry Service stops.
5-62
Note The ServerProtect Normal Server Migration Tool does not uninstall the Control Manager agent for ServerProtect. For instructions on how to uninstall the agent, refer to the ServerProtect and/or Control Manager documentation.
2.
4.
Windows Network tree: Displays a tree of domains on the network. To select computers using this method, click the domains on which to search for client computers. Information Server name: Search by Information Server name. To select computers by this method, type the name of an Information Server on the network in the text box. To search for multiple Information Servers, insert a semicolon ";" between server names. Certain Normal Server name: Search by Normal Server name. To select computers by this method, type the name of a Normal Server on the network in the text box. To search for multiple Normal Servers, enter a semicolon ";" between server names.
5-63
IP range search: Search by a range of IP addresses. To select computers by this method, type a range of class B IP addresses under IP range.
Note If a DNS server on the network does not respond when searching for clients, the search stops responding. Wait for the search to time out.
5.
Select Restart after installation to automatically restart the target computers after migration. A restart is required for the migration to complete successfully. If you do not select this option, manually restart the computers after migration.
6.
Click Search. The search results appear under ServerProtect Normal Servers.
7.
Click the computers on which to perform the migration. a. b. c. To select all computers, click Select All. To clear all computers, click Unselect All. To export the list to a comma-separated value (CSV) file, click Export to CSV.
8.
If logging on to the target computers requires a user name and password, do the following: a. b. Select the Use group account/password check box. Click Set Logon Account. The Enter Administration Information window appears. c. Type the user name and password.
Note Use the local/domain administrator account to log on to the target computer. If you log on with insufficient privileges, such as "Guest" or "Normal user", you will not be able to perform installation.
5-64
d. e. 9.
Click OK. Click Ask again if logon is unsuccessful to be able to type the user name and password again during the migration process if you are unable to log on.
Click Migrate.
10. If you did not select the Restart after installation option, restart the target computers to complete the migration.
Post-installation
After completing the installation, verify the following:
OfficeScan Client Shortcut on page 5-66 Programs List on page 5-66 OfficeScan Client Services on page 5-66 OfficeScan Client Installation Logs on page 5-67
5-65
Programs List
OfficeScan client is listed on the Add/Remove Programs list on the client computers Control Panel.
OfficeScan NT Listener (TmListen.exe) OfficeScan NT RealTime Scan (NTRtScan.exe) OfficeScan NT Proxy Service (TmProxy.exe)
Note The OfficeScan NT Proxy Service does not exist on Windows 8 or Windows Server 2012 platforms.
5-66
OfficeScan NT Firewall (TmPfw.exe); if the firewall was enabled during installation Trend Micro Unauthorized Change Prevention Service (TMBMSRV.exe)
%windir% for all installation methods except MSI package installation %temp% for the MSI package installation method
Component Updates
Update OfficeScan client components to ensure that clients have the most up-to-date protection from security risks. You can run manual client updates from the web console or instruct users to run "Update Now" from their computers.
5-67
3. 4.
Save the file as EICAR.com to a temp directory. OfficeScan immediately detects the file. To test other computers on the network, attach the EICAR.com file to an email message and send it to one of the computers.
Tip Trend Micro recommends packaging the EICAR file using compression software (such as WinZip) and then performing another test scan.
Uninstalling the OfficeScan Client from the Web Console on page 5-69 Running the OfficeScan Client Uninstallation Program on page 5-71
If the OfficeScan client also has a Cisco Trust Agent (CTA) installation, uninstalling the OfficeScan client program may or may not remove the agent. This depends on the settings you configured when you deployed the agent. For more information, see Cisco Trust Agent Deployment on page 16-27.
5-68
If the Cisco Trust Agent exists after you uninstall the OfficeScan client, manually remove it from the Add/Remove Programs screen. If the OfficeScan client cannot be uninstalled using the above methods, manually uninstall the OfficeScan client. For details, see Manually Uninstalling the OfficeScan Client on page 5-71.
5-69
Click Settings > Privileges and Other Settings. On the Privileges tab, go to the Uninstallation section. To allow uninstallation without a password, select Allow the user to uninstall the OfficeScan client. If a password is required, select Require a password for the user to uninstall the OfficeScan client, type the password, and then confirm it. If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
6.
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
5-70
If prompted, type the uninstallation password. OfficeScan notifies the user of the uninstallation progress and completion. The user does not need to restart the client computer to complete the uninstallation.
For Windows 8 and Windows Server 2012, switch to desktop mode to unload the OfficeScan client. Disable the password on computers where the OfficeScan client will be unloaded. For details, see Configuring Client Privileges and Other Settings on page 14-84.
5-71
3.
If the unload password was not specified, stop the following services from Microsoft Management Console:
OfficeScan NT Listener OfficeScan NT Firewall OfficeScan NT RealTime Scan OfficeScan NT Proxy Service
Note The OfficeScan NT Proxy Service does not exist on Windows 8 or Windows Server 2012 platforms.
4.
On Windows 8 and Windows Server 2012: a. b. Switch to desktop mode. Move the mouse cursor to the bottom right corner of the screen and click Start from the menu that appears. The Home screen appears. c. d. Right-click Trend Micro OfficeScan. Click Unpin from Start.
On all other Windows platforms: Click Start > Programs, right-click Trend Micro OfficeScan Client, and click Delete.
5.
5-72
WARNING! The next steps require you to delete registry keys. Making incorrect changes to the registry can cause serious system problems. Always make a backup copy before making any registry changes. For more information, refer to the Registry Editor Help.
6.
HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro
If there are other Trend Micro products installed on the computer, delete the following keys only:
HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro\NSC HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro\OfcWatchDog
HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro\PCcillinNTCorp
7.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows \CurrentVersion\Uninstall\OfficeScanNT
5-73
8.
Delete all instances of the following registry keys in the following locations:
Locations:
Keys:
tmtdi
5-74
Note tmtdi does not exist on Windows 8 or Windows Server 2012 platforms.
VSApiNt tmlwf (for Windows Vista/Server 2008/7/8/Server 2012 computers) tmwfp (for Windows Vista/Server 2008/7/8/Server 2012 computers) tmactmon TMBMServer TMebc tmevtmgr tmeevw (for Windows 8/Server 2012) tmusa (for Windows 8/Server 2012)
9.
10. Click Start > Settings > Control Panel and double-click System.
Note For Windows 8 and Windows Server 2012 systems, skip this step.
11. Click the Hardware tab and then click Device Manager.
Note For Windows 8 and Windows Server 2012 systems, skip this step.
13. Expand Non-Plug and Play Drivers and then uninstall the following devices (for Windows XP/Vista/7/Server 2003/Server 2008):
5-75
tmcomm tmactmon tmevtmgr Trend Micro Filter Trend Micro PreFilter Trend Micro TDI Driver Trend Micro VSAPI NT Trend Micro Unauthorized Change Prevention Service Trend Micro WFP Callout Driver (For Windows Vista/Server 2008/7 computers)
14. Manually delete Trend Micro drivers using a command line editor (Windows 8/ Server 2012 only) using the following commands:
sc delete tmcomm sc delete tmactmon sc delete tmevtmgr sc delete tmfilter sc delete tmprefilter sc delete tmwfp sc delete vsapint sc delete tmeevw sc delete tmusa sc delete tmebc
5-76
Note Run the command line editor using administrator privileges (for example, right-click cmd.exe and click Run as administrator) to ensure the commands execute successfully.
15. Uninstall the Common Firewall Driver. a. b. c. Right-click My Network Places and click Properties. Right-click Local Area Connection and click Properties. On the General tab, select Trend Micro Common Firewall Driver and click Uninstall.
Note The following steps only apply to Windows Vista/Server 2008/7/8/Server 2012 operating systems. Clients using all other operating systems skip to step 15.
d. e. f. g.
Right-click Network and click Properties. Click Manage network connections. Right-click Local Area Connection and click Properties. On the Networking tab, select Trend Micro NDIS 6.0 Filter Driver and click Uninstall.
16. Restart the client computer. 17. If there are no other Trend Micro products installed on the computer, delete the Trend Micro installation folder (typically, C:\Program Files\Trend Micro). For 64-bit computers, the installation folder can be found under C: \Program Files (x86)\Trend Micro. 18. If there are other Trend Micro products installed, delete the following folders:
5-77
The BM folder under the Trend Micro installation folder (typically, C: \Program Files\Trend Micro\BM for 32-bit systems and C:\Program Files (x86)\Trend Micro\BM for 64-bit systems)
5-78
Chapter 6
OfficeScan Components and Programs on page 6-2 Update Overview on page 6-11 OfficeScan Server Updates on page 6-14 Integrated Smart Protection Server Updates on page 6-26 OfficeScan Client Updates on page 6-26 Update Agents on page 6-50 Component Update Summary on page 6-58
6-1
Antivirus Components on page 6-2 Damage Cleanup Services Components on page 6-5 Anti-spyware Components on page 6-5 Firewall Components on page 6-6 Web Reputation Component on page 6-7 Behavior Monitoring Components on page 6-7 Programs on page 6-8 C&C Contact Alert Service Component on page 6-11
Antivirus Components
Antivirus components consist of the following patterns, drivers, and engines:
Virus Patterns on page 6-3 Virus Scan Engine on page 6-3 Virus Scan Driver on page 6-4 IntelliTrap Pattern on page 6-5 IntelliTrap Exception Pattern on page 6-5
6-2
Virus Patterns
The virus pattern available on a client computer depends on the scan method the client is using. For information about scan methods, see Scan Methods on page 7-7.
TABLE 6-1. Virus Patterns SCAN METHOD
Conventional Scan
PATTERN IN USE
The Virus Pattern contains information that helps OfficeScan identify the latest virus/malware and mixed threat attacks. Trend Micro creates and releases new versions of the Virus Pattern several times a week, and any time after the discovery of a particularly damaging virus/ malware. Trend Micro recommends scheduling automatic updates at least hourly, which is the default setting for all shipped products.
Smart Scan
When in smart scan mode, OfficeScan clients use two lightweight patterns that work together to provide the same protection provided by conventional anti-malware and anti-spyware patterns. A smart protection source hosts the Smart Scan Pattern. This pattern is updated hourly and contains majority of the pattern definitions. Smart scan clients do not download this pattern. Clients verify potential threats against the pattern by sending scan queries to the smart protection source. The client update source (the OfficeScan server or a custom update source) hosts the Smart Scan Agent Pattern. This pattern is updated daily and contains all the other pattern definitions not found on the Smart Scan Pattern. Clients download this pattern from the update source using the same methods for downloading other OfficeScan components. For more information about Smart Scan Pattern and Smart Scan Agent Pattern, see Smart Protection Pattern Files on page 4-7.
6-3
Malware on page 7-2. The scan engine also detects controlled viruses that are developed and used for research. Rather than scanning every byte of every file, the engine and pattern file work together to identify the following:
Tell-tale characteristics of the virus code The precise location within a file where the virus resides
OfficeScan removes viruses/malware upon detection and restores the integrity of the file.
Incorporation of new scanning and detection technologies into the software Discovery of a new, potentially harmful virus/malware that the scan engine cannot handle Enhancement of the scanning performance Addition of file formats, scripting languages, encoding, and/or compression formats
6-4
Note This component does not display on the console. To check its version, navigate to <Server installation folder>\PCCSRV\Pccnt\Drv. Right-click the .sys file, select Properties, and go to the Version tab.
IntelliTrap Pattern
The IntelliTrap pattern (for details, see IntelliTrap on page E-6 ). Pattern detects realtime compression files packed as executable files.
Virus Cleanup Engine on page 6-5 Virus Cleanup Template on page 6-5
Anti-spyware Components
Anti-spyware components consist of the following engine and patterns:
6-5
Spyware Pattern on page 6-6 Spyware Scan Engine on page 6-6 Spyware Active-monitoring Pattern on page 6-6
Spyware Pattern
The Spyware Pattern identifies spyware/grayware in files and programs, modules in memory, Windows registry and URL shortcuts.
Firewall Components
The Firewall components consist of the following driver and pattern:
Common Firewall Driver on page 6-6 Common Firewall Pattern on page 6-7
6-6
Behavior Monitoring Detection Pattern on page 6-7 Behavior Monitoring Driver on page 6-8 Behavior Monitoring Core Service on page 6-8 Behavior Monitoring Configuration Pattern on page 6-8 Digital Signature Pattern on page 6-8 Policy Enforcement Pattern on page 6-8
6-7
Provides rootkit detection Regulates access to external devices Protects files, registry keys, and services
Programs
OfficeScan makes use of the following programs and product updates:
OfficeScan Client Program on page 6-9 Cisco Trust Agent on page 6-9
6-8
Hot Fix on page E-5 Patch on page E-9 Security Patch on page E-11 Service Pack on page E-11
Your vendor or support provider may contact you when these items become available. Check the Trend Micro website for information on new hot fix, patch, and service pack releases: http://www.trendmicro.com/download All releases include a readme file that contains installation, deployment, and configuration information. Read the readme file carefully before performing installation.
6-9
can query this information for multiple clients using logistics software such as Microsoft SMS, LANDesk, or BigFix.
Note This feature does not record hot fixes and patches that are deployed only to the server.
This feature is available starting in OfficeScan 8.0 Service Pack 1 with patch 3.1.
Clients upgraded from version 8.0 Service Pack 1 with patch 3.1 or later record installed hot fixes and patches for version 8.0 and later. Clients upgraded from versions earlier than 8.0 Service Pack 1 with patch 3.1 record installed hot fixes and patches for version 10.0 and later.
6-10
C&C IP List
The C&C IP list works in conjunction with the Network Content Inspection Engine (NCIE) to detect network connections with known C&C servers. NCIE detects C&C server contact through any network channel. OfficeScan logs all connection information to servers in the C&C IP list for evaluation.
Update Overview
All component updates originate from the Trend Micro ActiveUpdate server. When updates are available, the OfficeScan server and smart protection sources (Smart Protection Server or Smart Protection Network) download the updated components. There are no component download overlaps between the OfficeScan server and smart protection sources because each one downloads a specific set of components.
Note You can configure both the OfficeScan server and Smart Protection Server to update from a source other than the Trend Micro ActiveUpdate server. To do this, you need to set up a custom update source. If you need assistance setting up this update source, contact your support provider.
6-11
performance. To address this issue, OfficeScan has an Update Agent feature that allows certain clients to share the task of distributing updates to other clients. The following table describes the different component update options for the OfficeScan server and clients, and recommendations on when to use them:
TABLE 6-2. Server-Client Update Options UPDATE OPTION
ActiveUpdate server > Server > Client
DESCRIPTION
The OfficeScan server receives updated components from the Trend Micro ActiveUpdate server (or other update source) and initiates component update on clients. The OfficeScan server receives updated components from the ActiveUpdate server (or other update source) and initiates component update on clients. Clients acting as Update Agents then notify clients to update components. Update Agents receive updated components directly from the ActiveUpdate server (or other update source) and notifies clients to update components.
RECOMMENDATION
Use this method if there are no lowbandwidth sections between the OfficeScan server and clients.
If there are low-bandwidth sections between the OfficeScan server and clients, use this method to balance the traffic load on the network.
Use this method only if you experience problems updating Update Agents from the OfficeScan server or from other Update Agents. Under most circumstances, Update Agents receive updates faster from the OfficeScan server or from other Update Agents than from an external update source.
6-12
UPDATE OPTION
ActiveUpdate server > Client
DESCRIPTION
OfficeScan clients receive updated components directly from the ActiveUpdate server (or other update source).
RECOMMENDATION
Use this method only if you experience problems updating clients from the OfficeScan server or from Update Agents. Under most circumstances, clients receive updates faster from the OfficeScan server or from Update Agents than from an external update source.
The following table describes the update process for smart protection sources.
TABLE 6-3. Smart Protection Source Update Process UPDATE PROCESS
ActiveUpdate server > Smart Protection Network ActiveUpdate server > Smart Protection Server
DESCRIPTION
The Trend Micro Smart Protection Network receives updates from the Trend Micro ActiveUpdate server. Smart scan clients that are not connected to the corporate network send queries to the Trend Micro Smart Protection Network. A Smart Protection Server (integrated or standalone) receives updates from the Trend Micro ActiveUpdate server. Smart protection clients that are connected to the corporate network send queries to the Smart Protection Server.
6-13
UPDATE PROCESS
Smart Protection Network > Smart Protection Server
DESCRIPTION
A Smart Protection Server (integrated or standalone) receives updates from the Trend Micro Smart Protection Network. Smart protection clients that are connected to the corporate network send queries to the Smart Protection Server.
Antivirus Smart Scan Agent Pattern Virus Pattern IntelliTrap Pattern IntelliTrap Exception Pattern Virus Scan Engine (32-bit) Virus Scan Engine (64-bit) Anti-spyware Spyware Pattern Spyware Active-monitoring Pattern Spyware Scan Engine (32-bit) Spyware Scan Engine (64-bit) Yes Yes Yes Yes Yes No Yes Yes No Yes Yes Yes Yes Yes Yes No Yes Yes Yes Yes
6-14
Damage Cleanup Services Virus Cleanup Template Virus Cleanup Engine (32-bit) Virus Cleanup Engine (64-bit) Firewall Common Firewall Pattern Behavior Monitoring Components Behavior Monitoring Detection Pattern (32-bit) Behavior Monitoring Driver (32-bit) Behavior Monitoring Core Service (32-bit) Behavior Monitoring Detection Pattern (64-bit) Behavior Monitoring Driver (64-bit) Behavior Monitoring Core Service (64-bit) Behavior Monitoring Configuration Pattern Policy Enforcement Pattern Digital Signature Pattern C&C Contact Alert Service C&C IP List Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
6-15
To allow the server to deploy the updated components to clients, enable automatic client update. For details, see OfficeScan Client Automatic Updates on page 6-35. If automatic client update is disabled, the server downloads the updates but does not deploy them to the clients. A pure IPv6 OfficeScan server cannot distribute updates directly to pure IPv4 clients. Similarly, a pure IPv4 OfficeScan server cannot distribute updates directly to pure IPv6 clients. A dual-stack proxy server that can convert IP addresses, such as DeleGate, is required to allow the OfficeScan server to distribute update to the clients. Trend Micro releases pattern files regularly to keep client protection current. Since pattern file updates are available regularly, OfficeScan uses a mechanism called component duplication that allows faster downloads of pattern files. See OfficeScan Server Component Duplication on page 6-19 for more information. If you use a proxy server to connect to the Internet, use the correct proxy settings to download updates successfully. On the web consoles Summary, add the Client Updates widget to view the current versions of components and determine the number of clients with updated and outdated components.
6-16
Note If you do not specify a deployment schedule or event-triggered update settings in Updates > Networked Computers > Automatic Update, the server will download the updates but will not notify clients to update.
Trend Micro ActiveUpdate Server Control Manager 5.5 Control Manager 5.0
Note IPv6 support for Control Manager starts in version 5.5 SP1.
Similarly, a pure IPv4 OfficeScan server cannot update directly from pure IPv6 custom update sources. A dual-stack proxy server that can convert IP addresses, such as DeleGate, is required to allow the server to connect to the update sources.
6-17
6-18
Note The OfficeScan server uses component duplication when downloading components from the update source. See OfficeScan Server Component Duplication on page 6-19 for details.
3.
Click Save.
Virus Pattern Smart Scan Agent Pattern Virus Cleanup Template IntelliTrap Exception Pattern Spyware Pattern Spyware Active-monitoring pattern
6-19
1.
The OfficeScan server compares its current full pattern version with the latest version on the ActiveUpdate server. If the difference between the two versions is 14 or less, the server only downloads the incremental pattern that accounts for the difference between the two versions.
Note If the difference is more than 14, the server automatically downloads the full version of the pattern file and 14 incremental patterns.
The difference between versions 171 and 175 is 2. In other words, the server does not have versions 173 and 175. The server downloads incremental pattern 171.175. This incremental pattern accounts for the difference between versions 171 and 175.
2.
The server merges the incremental pattern with its current full pattern to generate the latest full pattern. To illustrate based on the example:
On the server, OfficeScan merges version 171 with incremental pattern 171.175 to generate version 175.
6-20
The server has 1 incremental pattern (171.175) and the latest full pattern (version 175).
3.
The server generates incremental patterns based on the other full patterns available on the server. If the server does not generate these incremental patterns, clients that missed downloading earlier incremental patterns automatically download the full pattern file, which will consequently generate more network traffic. To illustrate based on the example:
Because the server has pattern versions 169, 167, 165, 163, 161, 159, it can generate the following incremental patterns: 169.175, 167.175, 165.175, 163.175, 161.175, 159.175
The server does not need to use version 171 because it already has the incremental pattern 171.175. The server now has 7 incremental patterns: 171.175, 169.175, 167.175, 165.175, 163.175, 161.175, 159.175
The server keeps the last 7 full pattern versions (versions 175, 171, 169, 167, 165, 163, 161). It removes any older version (version 159).
4.
The server compares its current incremental patterns with the incremental patterns available on the ActiveUpdate server. The server downloads the incremental patterns it does not have. To illustrate based on the example:
The ActiveUpdate server has 14 incremental patterns: 173.175, 171.175, 169.175, 167.175, 165.175, 163.175, 161.175, 159.175, 157.175, 155.175, 153.175, 151.175, 149.175, 147.175
The OfficeScan server has 7 incremental patterns: 171.175, 169.175, 167.175, 165.175, 163.175, 161.175, 159.175
The OfficeScan server downloads an additional 7 incremental patterns: 173.175, 157.175, 155.175, 153.175, 151.175, 149.175, 147.175
6-21
The server now has all the incremental patterns available on the ActiveUpdate server.
5.
The latest full pattern and the 14 incremental patterns are made available to clients.
A reliable Internet connection so that it can download the latest components from the Trend Micro ActiveUpdate server. Without Internet connection, the only way for the update source to have the latest components is if you obtain the components yourself from Trend Micro and then copy them into the update source. A functional connection with the OfficeScan server. Configure proxy settings if there is a proxy server between the OfficeScan server and the update source. For details, see Proxy for OfficeScan Server Updates on page 6-17. Enough disk space for downloaded components
2.
Point the OfficeScan server to the new update source. For details, see OfficeScan Server Update Sources on page 6-16.
6-22
3.
Identify the components that the server deploys to clients. For a list of deployable components, see OfficeScan Client Updates on page 6-26.
Tip One of the ways to determine if a component is being deployed to clients is by going to the Update Summary screen on the web console (Updates > Summary). In this screen, the update rate for a component that is being deployed will always be larger than 0%.
4.
Determine how often to download the components. Pattern files are updated frequently (some on a daily basis) so it is a good practice to update them regularly. For engines and drivers, you can ask your support provider to notify you of critical updates. On the update source: a. b. Connect to the ActiveUpdate server. The servers URL depends on your OfficeScan version. Download the following items:
5.
The server.ini file. This file contains information about the latest components. The components you identified in step 3.
c. 6. 7.
Run a manual update of the OfficeScan server. For details, see Manually Updating the OfficeScan Server on page 6-24. Repeat step 5 to step 6 each time you need to update components.
6-23
automatic client update is disabled, the server downloads the updates but does not deploy them to the clients. Update methods include:
Manual server update: When an update is critical, perform manual update so the server can obtain the updates immediately. See Manually Updating the OfficeScan Server on page 6-24 for details. Scheduled server update: The OfficeScan server connects to the update source during the scheduled day and time to obtain the latest components. See Scheduling Updates for the OfficeScan Server on page 6-24 for details.
Navigating to Updates > Server > Manual Update. Clicking Update Server Now on the web consoles main menu.
2. 3.
Select the components to update. Click Update. The server downloads the updated components.
6-24
Procedure 1. 2. 3. 4. Navigate to Updates > Server > Scheduled Update. Select Enable scheduled update of the OfficeScan server. Select the components to update. Specify the update schedule. For daily, weekly, and monthly updates, the period of time is the number of hours during which OfficeScan will perform the update. OfficeScan updates at any given time during this time period. 5. Click Save.
6-25
Antivirus Smart Scan Agent Pattern Virus Pattern IntelliTrap Pattern IntelliTrap Exception Pattern Virus Scan Engine (32-bit) Virus Scan Engine (64-bit) Anti-spyware No Yes Yes Yes Yes Yes Yes No Yes Yes Yes Yes
6-26
Spyware Pattern Spyware Active-monitoring Pattern Spyware Scan Engine (32-bit) Spyware Scan Engine (64-bit) Damage Cleanup Services Virus Cleanup Template Virus Cleanup Engine (32-bit) Virus Cleanup Engine (64-bit) Firewall Common Firewall Pattern Behavior Monitoring Components Behavior Monitoring Detection Pattern (32-bit) Behavior Monitoring Driver (32-bit) Behavior Monitoring Core Service (32-bit) Behavior Monitoring Detection Pattern (64-bit) Behavior Monitoring Driver (64-bit) Behavior Monitoring Core Service (64-bit) Behavior Monitoring Configuration Pattern
Yes
Yes
6-27
Policy Enforcement Pattern Digital Signature Pattern C&C Contact Alert Service C&C IP List
Yes
Yes
A pure IPv4 OfficeScan server A pure IPv4 Update Agent Any pure IPv4 custom update source Trend Micro ActiveUpdate Server
Similarly, a pure IPv4 client cannot update directly from pure IPv6 update sources, such as a pure IPv6 OfficeScan server or Update Agent. A dual-stack proxy server that can convert IP addresses, such as DeleGate, is required to allow the clients to connect to the update sources.
6-28
If the OfficeScan server is unreachable, clients will not have a backup source and will therefore remain outdated. To update clients that cannot reach the OfficeScan server, Trend Micro recommends using Client Packager. Use this tool to create a package with the latest components available on the server and then run the package on clients.
Note The clients IP address (IPv4 or IPv6) determines if connection to the OfficeScan server can be established. For details about IPv6 support for client updates, see IPv6 Support for OfficeScan Client Updates on page 6-28.
If you configure OfficeScan clients to update directly from the OfficeScan server, the update process proceeds as follows: 1. 2. The OfficeScan client obtains updates from the OfficeScan server. If unable to update from the OfficeScan server, the OfficeScan client tries connecting directly to the Trend Micro ActiveUpdate server if the option Clients download updates from the Trend Micro ActiveUpdate Server is enabled in Networked Computers > Client Management, click Settings > Privileges and Other Settings > Other Settings (tab) > Update Settings.
6-29
Note Only components can be updated from the ActiveUpdate server. Domain settings, programs and hot fixes can only be downloaded from the OfficeScan server or Update Agents. You can speed up the update process by configuring OfficeScan clients to only download pattern files from the ActiveUpdate server. For more information, see ActiveUpdate Server as the OfficeScan Client Update Source on page 6-34.
6-30
Note Ensure that the OfficeScan clients can connect to the update source using their IP addresses. For example, if you specified an IPv4 address range, the update source must have an IPv4 address. If you specified an IPv6 prefix and length, the update source must have an IPv6 address. For details about IPv6 support for client updates, see OfficeScan Client Update Sources on page 6-28.
5. 6.
Click Save. Perform miscellaneous tasks in the screen. a. Select any of the following settings. For details on how these settings work, see OfficeScan Client Update Process on page 6-29.
Update Agents update components, domain settings, and client programs and hot fixes, only from the OfficeScan server Update components from the OfficeScan server if all customized sources are unavailable or not found Update domain settings from the OfficeScan server if all customized sources are unavailable or not found Update client programs and hot fixes from the OfficeScan server if all customized sources are unavailable or not found
b.
If you specified at least one Update Agent as source, click Update Agent Analytical Report to generate a report that highlights the update status of clients. For details about the report, see Update Agent Analytical Report on page 6-57. Edit an update source by clicking the IP address range link. Modify the settings in the screen that displays and click Save. Remove an update source from the list by selecting the check box and clicking Delete. To move an update source, click the up or down arrow. You can only move one source at a time.
c. d. e. 7.
6-31
After you have set up and saved the customized update source list, the update process proceeds as follows: 1. 2. 3. An OfficeScan client updates from the first source on the list. If unable to update from the first source, the OfficeScan client updates from the second source, and so on. If unable to update from all sources, the OfficeScan client checks the following settings on the Update Source screen:
TABLE 6-7. Additional Settings for Custom Update Sources SETTING
Update Agents update components, domain settings, and client programs and hot fixes, only from the OfficeScan server
DESCRIPTION
If this setting is enabled, Update Agents update directly from the OfficeScan server and disregard the Customized Update Source List. If disabled, Update Agents apply the customized update source settings configured for normal clients.
6-32
SETTING
Clients update the following items from the OfficeScan server if all customized sources are unavailable or not found: Components
DESCRIPTION
If this setting is enabled, the client updates components from the OfficeScan server. If disabled, the client then tries connecting directly to the Trend Micro ActiveUpdate server if any of the following is true:
In Networked Computers > Client Management, click Settings > Privileges and Other Settings > Other Settings (tab) > Update Settings, the option Clients download updates from the Trend Micro ActiveUpdate Server is enabled. The ActiveUpdate server is not included in the Customized Update Source List. Note Only components can be updated from the ActiveUpdate server. Domain settings, programs and hot fixes can only be downloaded from the OfficeScan server or Update Agents. You can speed up the update process by configuring clients to only download pattern files from the ActiveUpdate server. For more information, see ActiveUpdate Server as the OfficeScan Client Update Source on page 6-34.
Clients update the following items from the OfficeScan server if all customized sources are unavailable or not found: Domain settings Clients update the following items from the OfficeScan server if all customized sources are unavailable or not found: Client programs and hot fixes
If this setting is enabled, the client updates domain-level settings from the OfficeScan server.
If this setting enabled, the client updates programs and hot fixes from the OfficeScan server.
6-33
4.
If unable to update from all possible sources, the client quits the update process.
Automatic client updates: Client update runs automatically when certain events occur or based on a schedule. For details, see OfficeScan Client Automatic Updates on page 6-35.
6-34
Manual client updates: When an update is critical, use manual update to immediately notify clients to perform component update. For details, see OfficeScan Client Manual Updates on page 6-41. Privilege-based updates: Users with update privileges have greater control over how the OfficeScan client on their computers gets updated. For details, see Update Privileges and Other Settings for OfficeScan Clients on page 6-43.
Event-triggered Updates
The server can notify online clients to update components after it downloads the latest components, and offline clients when they restart and then connect to the server. Optionally initiate Scan Now (manual scan) on OfficeScan client computers after the update.
6-35
DESCRIPTION
The server notifies clients to update as soon as it completes an update. Frequently updated clients only need to download incremental patterns, thus reducing the time it takes to complete the update (see OfficeScan Server Component Duplication on page 6-19 for details about incremental patterns). However, updating frequently may adversely affect the servers performance, especially if you have a large number of clients updating at the same time. If you have clients on roaming mode and you want these clients to update as well, select Include roaming and offline client(s). See OfficeScan Client Roaming Privilege on page 14-19 for details about roaming mode.
Let clients initiate component update when they restart and connect to the OfficeScan server (roaming clients are excluded) Perform Scan Now after updating (excluding roaming clients)
A client that missed an update immediately downloads components when it establishes connection with the server. A client may miss an update if it is offline or if the computer where it is installed is not up and running.
The server notifies clients to scan after an event-triggered update. Consider enabling this option if a particular update is a response to a security risk that has already spread within the network.
Note If the OfficeScan server is unable to successfully send an update notification to clients after it downloads components, it automatically resends the notification after 15 minutes. The server continues to send update notifications up to a maximum of five times until the client responds. If the fifth attempt is unsuccessful, the server stops sending notifications. If you select the option to update components when clients restart and then connect to the server, component update will still proceed.
6-36
Schedule-based Updates
Running scheduled updates is a privilege. You need to first select OfficeScan clients that will have the privilege and these OfficeScan clients will then run updates based on the schedule.
Note To use schedule-based update with Network Address Translation, see Configuring Scheduled OfficeScan Client Updates with NAT on page 6-39.
Initiate component update on clients immediately after the OfficeScan server downloads a new component Let clients initiate component update when they restart and connect to the OfficeScan server (roaming clients are excluded) Perform Scan Now after updating (excluding roaming clients)
3.
Select how often clients with scheduled update privilege will perform scheduled update.
If you have granted clients scheduled update privilege, proceed to the next step. If you have not granted clients scheduled update privilege, perform the following steps first: Go to Networked Computers > Client Management. In the client tree, select the clients that you want to have the privilege. Click Settings > Privileges and Other Settings.
a. b. c.
6-37
Option 1: On the Privileges tab, go to the Component Update Privileges section. You will see the Enable scheduled update option. Option 2: On the Other Settings tab, go to the Update Settings section. You will see another Enable scheduled update option.
Note If you want to give client users the ability to enable or disable scheduled update on the OfficeScan client console, enable options 1 and 2. After you save the settings, updates will run on the client computer as scheduled. Scheduled updates will only stop running when a client user right-clicks the OfficeScan client icon on the system tray and selects Disable scheduled update. If you want scheduled update to always run and prevent client users from disabling scheduled update, disable option 1 and enable option 2.
d. 4.
Configure the schedule. a. If you select Minute(s) or Hour(s), you have the option to Update client configurations only once per day. If you do not select this option, the OfficeScan client retrieves both the updated components and any updated configuration files available on the server at the interval specified. If you select this option, OfficeScan updates only the components at the interval specified, and the configuration files once per day.
Tip Trend Micro often updates components; however, OfficeScan configuration settings probably change less frequently. Updating the configuration files with the components requires more bandwidth and increases the time OfficeScan needs to complete the update. For this reason, Trend Micro recommends updating OfficeScan client configurations only once per day.
b.
If you select Daily or Weekly, specify the time of the update and the time period the OfficeScan server will notify clients to update components. For example, if the start time is 12pm and the time period is 2 hours, OfficeScan randomly notifies all online clients to update components from 12pm until 2pm. This setting prevents all online clients from simultaneously connecting
6-38
to the server at the specified start time, significantly reducing the amount of traffic directed to the server. 5. Click Save.
Offline clients will not be notified. Offline clients that become online after the time period expires can still update components if you selected Let clients initiate component when they restart. under Event-triggered Update. Otherwise, they update components on the next schedule or if you initiate manual update.
OfficeScan clients appear offline on the web console. The OfficeScan server is not able to successfully notify clients of updates and configuration changes.
Work around these issues by deploying updated components and configuration files from the server to the OfficeScan client with a scheduled update as described below. Procedure
Before installing the OfficeScan client on client computers: a. b. Configure the client update schedule in the Schedule-based Update section of Updates > Networked Computers > Automatic Update. Grant clients the privilege to enable scheduled update in Networked Computers > Client Management, click Settings > Privileges and Other Settings > Privileges (tab) > Component Update Privileges.
If OfficeScan clients already exist on client computers: a. Grant clients the privilege to perform "Update Now" in Networked Computers > Client Management, click Settings > Privileges and Other Settings > Privileges (tab) > Component Update Privileges.
6-39
b.
Instruct users to manually update components on the client computer (by right-clicking the OfficeScan client icon in the system tray and clicking "Update Now") to obtain the updated configuration settings.
When OfficeScan clients update, they will receive both the updated components and the configuration files.
Procedure 1. 2. 3. Record the client tree domain names and update schedules. Navigate to <Server installation folder>\PCCSRV\Admin\Utility \DomainScheduledUpdate. Copy the following files to <Server installation folder>\PCCSRV:
DomainSetting.ini dsu_convert.exe
4. 5.
Open DomainSetting.ini using a text editor such as Notepad. Specify a client tree domain and then configure the update schedule for the domain. Repeat this step to add more domains.
Note Detailed configuration instructions are provided in the .ini file.
6-40
6. 7. 8.
Save DomainSetting.ini. Open a command prompt and change to the directory of the PCCSRV folder. Type the following command and press Enter.
dsuconvert.exe DomainSetting.ini
9.
On the web console, navigate to Networked Computers > Global Client Settings.
6-41
2.
The components currently available on the OfficeScan server and the date these components were last updated display on top of the screen. Ensure the components are up-to-date before notifying clients to update.
Note Manually update any outdated components on the server. See OfficeScan Client Manual Updates on page 6-41 for details.
3.
To update only clients with outdated components: a. b. Click Select clients with outdated components. (Optional) Select Include roaming and offline client(s):
To update roaming clients with functional connection to the server. To update offline clients when they become online.
c.
4.
To update the clients of your choice: a. b. c. d. Select Manually select clients. Click Select. In the client tree, click the root domain icon ( select specific domains or clients. Click Initiate Component Update. ) to include all clients or
6-42
Note The server starts notifying each client to download updated components. To check the notification status, go to the Updates > Summary screen.
6-43
A pure IPv6 client cannot update directly from the Trend Micro ActiveUpdate Server. A dual-stack proxy server that can convert IP addresses, such as DeleGate, is required to allow the clients to connect to the ActiveUpdate server.
Clients Can Update Components but not Upgrade the Client Program or Deploy Hot Fixes
This option allows component updates to proceed but prevents hot fix deployment and OfficeScan client upgrade. If you do not select this option, all clients simultaneously connect to the server to upgrade or install a hot fix. This may significantly affect server performance if you have a large number of clients. If you select this option, plan how to minimize the impact of OfficeScan client upgrade or hot fix deployment on the server and then execute your plan.
Click Settings > Privileges and Other Settings. On the Privileges tab, go to the Component Update Privileges section. Select the following options:
6. 7.
Click the Other Settings tab and go to the Update Settings section. Select the following options:
6-44
Enable scheduled update Clients can update components but not upgrade the client program or deploy hot fixes
8.
If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
6-45
TABLE 6-9. Proxy Settings Used During OfficeScan client Component Updates UPDATE METHOD
Automatic client update
USAGE
OfficeScan clients will first use automatic proxy settings to update components. If automatic proxy settings are not enabled, internal proxy settings will be used. If both are disabled, clients will not use any proxy settings.
2.
3.
Update Now
1.
OfficeScan clients will first use automatic proxy settings to update components. If automatic proxy settings are not enabled, user-configured proxy settings will be used. If both are disabled, or if automatic proxy settings are disabled and client users do not have the required privilege, clients will not use any proxy when updating components.
2.
3.
6-46
3.
Show the alert icon on the windows taskbar if the virus pattern file is not updated after __ day(s): An alert icon displays on the Windows task bar to remind users to update a Virus Pattern that has not been updated within the specified number of days. To update the pattern, use any of the update methods discussed in OfficeScan Client Update Methods on page 6-34. All clients managed by the server will apply this setting.
Display a notification message if the client computer needs to restart to load a kernel mode driver: After installing a hot fix or an upgrade package that contains a new version of a kernel mode driver, the drivers previous version may still exist on the computer. The only way to unload the previous version and load the new one is to restart the computer. After restarting the computer, the new version automatically installs and no further restart is necessary. The notification message displays immediately after a client computer installs the hot fix or upgrade package.
4.
Click Save.
To keep the size of logs from occupying too much space on the hard disk, manually delete logs or configure a log deletion schedule. For more information about managing logs, see Log Management on page 13-33.
6-47
Procedure 1. 2. Navigate to Logs > Networked Computer Logs > Component Update. To view the number of client updates, click View under the Progress column. In the Component Update Progress screen that displays, view the number of clients updated for every 15-minute interval and the total number of clients updated. To view clients that have updated the Virus Pattern, click View under the Details column. To save logs to a comma-separated value (CSV) file, click Export to CSV. Open the file or save it to a specific location.
3. 4.
6-48
OfficeScan uses different scan engines for clients running 32-bit and 64-bit platforms. You need to roll back these scan engines separately. The rollback procedure for all types of scan engines is the same. Procedure 1. 2. Navigate to Updates > Rollback Click Synchronize with Server under the appropriate section. a. b. c. 3. In the client tree that displays, click the root domain icon ( clients or select specific domains or clients. Click Rollback. Click View Update Logs to check the result or Back to return to the Rollback screen. ) to include all
If an older version pattern file exists on the server, click Rollback Server and Client Versions to roll back the pattern file for both the OfficeScan client and the server.
6-49
3. 4.
Open a command prompt and go to the location of the Touch Tool. Type the following:
TmTouch.exe <destination file name> <source file name>
Where:
<destination file name> is the name of the hot fix file whose time
to replicate
Note If you do not specify a source file name, the tool sets the destination file time stamp to the system time of the computer. Use the wild card character (*) for the destination file, but not for the source file name.
5.
To check if the time stamp changed, type dir in the command prompt, or check the files properties from Windows Explorer.
Update Agents
To distribute the task of deploying components, domain settings, or client programs and hot fixes to OfficeScan clients, assign some OfficeScan clients to act as Update Agents, or update sources for other clients. This helps ensure that clients receive updates in a timely manner without directing a significant amount of network traffic to the OfficeScan server. If the network is segmented by location and the network link between segments experiences a heavy traffic load, assign at least one Update Agent on each location.
6-50
http://docs.trendmicro.com/en-us/enterprise/officescan.aspx
3. 4.
Click Settings > Update Agent Settings. Select the items that Update Agents can share.
6-51
5.
Click Save.
5.
Click Save.
6-52
A pure IPv4 OfficeScan server Any pure IPv4 custom update source Trend Micro ActiveUpdate server
Similarly, a pure IPv4 Update Agent cannot update directly from pure IPv6 update sources, such as a pure IPv6 OfficeScan server. A dual-stack proxy server that can convert IP addresses, such as DeleGate, is required to allow the Update Agent to connect to the update sources.
In Networked Computers > Client Management, click Settings > Privileges and Other Settings > Other Settings > Update Settings, the option Clients download updates from the Trend Micro ActiveUpdate Server is enabled. The ActiveUpdate server is the first entry in the Customized Update Source List.
Tip Place the ActiveUpdate server at the top of the list only if you experience problems updating from the OfficeScan server. When Update Agents update directly from the ActiveUpdate server, significant bandwidth is consumed between the network and the Internet.
3.
If unable to update from all possible sources, the Update Agent quits the update process.
6-53
After you have set up and saved the list, the update process proceeds as follows: 1. 2. 3. The Update Agent updates from the first entry on the list. If unable to update from the first entry, the agent updates from the second entry, and so on. If unable to update from all entries, the agent checks the following options:
Update components from the OfficeScan server if all customized sources are not available or not found: If enabled, the agent updates from the OfficeScan server. If the option is disabled, the agent then tries connecting directly to the Trend Micro ActiveUpdate server if any of the following are true:
Note You can only update components from the Active Update server. Domain settings, programs and hot fixes can only be downloaded from the server or Update Agents.
In Networked Computers > Client Management, click Settings > Privileges and Other Settings > Other Settings > Update Settings,
6-54
the option Clients download updates from the Trend Micro ActiveUpdate Server is enabled.
The ActiveUpdate server is not included in the Customized Update Source List.
Update domain settings from the OfficeScan server if all customized sources are not available or not found: If enabled, the agent updates from the OfficeScan server. Update client programs and hot fixes from the OfficeScan server if all customized sources are not available or not found: If enabled, the agent updates from the OfficeScan server.
4.
If unable to update from all possible sources, the Update Agent quits the update process.
The update process is different if the option Update agent: always update from standard update source (OfficeScan server) is enabled and the OfficeScan server notifies the agent to update components. The process is as follows: 1. 2. The agent updates directly from the OfficeScan server and disregards the update source list. If unable to update from the server, the agent tries connecting directly to the Trend Micro ActiveUpdate server if any of the following are true:
In Networked Computers > Client Management, click Settings > Privileges and Other Settings > Other Settings > Update Settings, the option Clients download updates from the Trend Micro ActiveUpdate Server is enabled. The ActiveUpdate server is the first entry in the Customized Update Source List.
Tip Place the ActiveUpdate server at the top of the list only if you experience problems updating from the OfficeScan server. When OfficeScan clients update directly from the ActiveUpdate server, significant bandwidth is consumed between the network and the Internet.
6-55
3.
If unable to update from all possible sources, the Update Agent quits the update process.
2. 3.
The Update Agent merges the incremental pattern it downloaded with its current full pattern to generate the latest full pattern. The Update Agent downloads all the remaining incremental patterns on the update source.
6-56
4.
The latest full pattern and all the incremental patterns are made available to clients.
6-57
Note This report includes all Update Agents. If you have delegated the task of managing one or several domains to other administrators, they will also see Update Agents belonging to the domains that they are not managing.
OfficeScan exports the Update Agent Analytical Report to a comma-separated value (.csv) file. This report contains the following information:
OfficeScan client computer IP address Client tree path Update source If clients download the following from Update Agents:
For details on generating the report, see Customized Update Sources for OfficeScan Clients on page 6-30.
6-58
Note To view component updates on the integrated Smart Protection Server, go to Smart Protection > Integrated Server.
Number of clients notified to update components. Number of clients not yet notified but already in the notification queue. To cancel the notification to these clients, click Cancel Notification.
Components
In the Update Status table, view the update status for each component that the OfficeScan server downloads and distributes. For each component, view its current version and the last update date. Click the number link to view clients with out-of-date components. Manually update clients with out-ofdate components.
6-59
Chapter 7
About Security Risks on page 7-2 Scan Methods on page 7-7 Scan Types on page 7-13 Settings Common to All Scan Types on page 7-26 Scan Privileges and Other Settings on page 7-49 Global Scan Settings on page 7-64 Security Risk Logs on page 7-81 Security Risk Notifications on page 7-74
7-1
Joke program: A virus-like program that often manipulates the appearance of things on a computer monitor. Probable virus/malware: Suspicious files that have some of the characteristics of virus/malware. For details, see the Trend Micro Virus Encyclopedia: http://www.trendmicro.com/vinfo/virusencyclo/
Rootkit: A program (or collection of programs) that installs and executes code on a system without end user consent or knowledge. It uses stealth to maintain a persistent and undetectable presence on the machine. Rootkits do not infect machines, but rather, seek to provide an undetectable environment for malicious code to execute. Rootkits are installed on systems via social engineering, upon execution of malware, or simply by browsing a malicious website. Once installed, an attacker can perform virtually any function on the system to include remote access, eavesdropping, as well as hide processes, files, registry keys and communication channels. Trojan horse: This type of threat often uses ports to gain access to computers or executable programs. Trojan horse programs do not replicate but instead reside on systems to perform malicious acts, such as opening ports for hackers to enter. A
7-2
Traditional antivirus solutions can detect and remove viruses but not Trojans, especially those already running on the system.
Virus: A program that replicates. To do so, the virus needs to attach itself to other program files and execute whenever the host program executes, including:
ActiveX malicious code: Code that resides on web pages that execute ActiveX controls. Boot sector virus: A virus that infects the boot sector of a partition or a disk. COM and EXE file infector: An executable program with .com or .exe extension. Java malicious code: Operating system-independent virus code written or embedded in Java. Macro virus: A virus encoded as an application macro and often included in a document. Network Virus: A virus spreading over a network is not, strictly speaking, a network virus. Only some virus/malware types, such as worms, qualify as network viruses. Specifically, network viruses use network protocols, such as TCP, FTP, UDP, HTTP, and email protocols to replicate. They often do not alter system files or modify the boot sectors of hard disks. Instead, network viruses infect the memory of client computers, forcing them to flood the network with traffic, which can cause slowdowns and even complete network failure. Because network viruses remain in memory, they are often undetectable by conventional file I/O based scanning methods. The OfficeScan firewall works with the Common Firewall Pattern to identify and block network viruses. See About the OfficeScan Firewall on page 12-2 for details.
Packer: A compressed and/or encrypted Windows or Linux executable program, often a Trojan horse program. Compressing executables makes packer more difficult for antivirus products to detect. Test virus: An inert file that acts like a real virus and is detectable by virusscanning software. Use test viruses, such as the EICAR test script, to verify that your antivirus installation scans properly.
7-3
VBScript, JavaScript or HTML virus: A virus that resides on web pages and downloaded through a browser. Worm: A self-contained program or set of programs able to spread functional copies of itself or its segments to other computer systems, often through email. Others: Virus/Malware not categorized under any of the other virus/malware types.
Types of Spyware/Grayware
Spyware: Gathers data, such as account user names and passwords, and transmits them to third parties. Adware: Displays advertisements and gathers data, such as user web surfing preferences, used for targeting advertisements at the user through a web browser. Dialer: Changes computer Internet settings and can force a computer to dial preconfigured phone numbers through a modem. These are often pay-per-call or international numbers that can result in a significant expense for your organization. Joke program: Causes abnormal computer behavior, such as closing and opening the CD-ROM tray and displaying numerous message boxes.
7-4
Hacking tool: Helps hackers enter computers. Remote access tool: Helps hackers remotely access and control computers. Password cracking application: Helps hackers decipher account user names and passwords. Others: Other types of potentially malicious programs.
Reduced Computer Performance: To perform their tasks, spyware/grayware applications often require significant CPU and system memory resources. Increased Web Browser-related Crashes: Certain types of grayware, such as adware, often display information in a browser frame or window. Depending on how the code in these applications interacts with system processes, grayware can sometimes cause browsers to crash or freeze and may even require a computer restart. Reduced User Efficiency: By needing to close frequently occurring pop-up advertisements and deal with the negative effects of joke programs, users become unnecessarily distracted from their main tasks. Degradation of Network Bandwidth: Spyware/Grayware applications often regularly transmit the data they collect to other applications running on or outside the network.
7-5
Loss of Personal and Corporate Information: Not all data spyware/grayware applications collect is as innocuous as a list of websites users visit. Spyware/ Grayware can also collect user credentials, such as those used to access online banking accounts and corporate networks. Higher Risk of Legal Liability: If computer resources on the network are hijacked, hackers may be able to utilize client computers to launch attacks or install spyware/grayware on computers outside the network. The participation of network resources in these types of activities could leave an organization legally liable to damages incurred by other parties.
Configure all types of scans (Manual Scan, Real-time Scan, Scheduled Scan, and Scan Now) to scan for and remove spyware/grayware files and applications. See Scan Types on page 7-13 for more information. Educate your client users to do the following:
Read the End User License Agreement (EULA) and included documentation of applications they download and install on their computers. Click No to any message asking for authorization to download and install software unless client users are certain both the creator of the software and the website they view are trustworthy. Disregard unsolicited commercial email (spam), especially if the spam asks users to click a button or hyperlink.
Configure web browser settings that ensure a strict level of security. Trend Micro recommends requiring web browsers to prompt users before installing ActiveX controls. If using Microsoft Outlook, configure the security settings so that Outlook does not automatically download HTML items, such as pictures sent in spam messages.
7-6
Do not allow the use of peer-to-peer file-sharing services. Spyware and other grayware applications may be masked as other types of files your users may want to download, such as MP3 music files. Periodically examine the installed software on your agent computers and look for applications that may be spyware or other grayware. Keep your Windows operating systems updated with the latest patches from Microsoft. See the Microsoft website for details.
Scan Methods
OfficeScan clients can use one of two scan methods when scanning for security risks. The scan methods are smart scan and conventional scan.
Smart Scan Clients that use smart scan are referred to as smart scan clients in this document. Smart scan clients benefit from local scans and in-the-cloud queries provided by File Reputation Services.
Conventional Scan Clients that do not use smart scan are called conventional scan clients. A conventional scan client stores all OfficeScan components on the client computer and scans all files locally.
7-7
upgrade. If you upgrade from OfficeScan 10, which supports smart scan and conventional scan, all upgraded clients that use smart scan continue to use smart scan and all clients using conventional scan continue to use conventional scan.
CONVENTIONAL SCAN
Available in this OfficeScan version and all earlier OfficeScan versions The conventional scan client performs scanning on the local computer.
SMART SCAN
Available starting in OfficeScan 10
Scanning behavior
The smart scan client performs scanning on the local computer. If the client cannot determine the risk of the file during the scan, the client verifies the risk by sending a scan query to a smart protection source. The client "caches" the scan query result to improve the scan performance.
All components available on the update source, except the Smart Scan Agent Pattern OfficeScan server
All components available on the update source, except the Virus Pattern and Spyware Activemonitoring Pattern OfficeScan server
7-8
Click Settings > Scan Settings > Scan Methods. Select Conventional scan or Smart scan. If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
7-9
Consider switching during off-peak hours to ensure the download process finishes within a short amount of time. Also consider switching when no client is scheduled to update from the server. Also temporarily disable "Update Now" on clients and re-enable it after the clients have switched to smart scan. 3. Client tree settings Scan method is a granular setting that can be set on the root, domain, or individual client level. When switching to conventional scan, you can:
Create a new client tree domain and assign conventional scan as its scan method. Any client you move to this domain will use conventional scan. When you move the client, enable the setting Apply settings of new domain to selected clients. Select a domain and configure it to use conventional scan. Smart scan clients belonging to the domain will switch to conventional scan. Select one or several smart scan clients from a domain and then switch them to conventional scan.
Note Any changes to the domains scan method overrides the scan method you have configured for individual clients.
DETAILS
Smart scan clients cannot report Smart Scan Pattern and Smart Scan Agent Pattern information to the Policy Server.
7-10
CONSIDERATION
Product license
DETAILS
To use smart scan, ensure that you have activated the licenses for the following services and that the licenses are not expired:
OfficeScan server
Ensure that clients can connect to the OfficeScan server. Only online clients will be notified to switch to smart scan. Offline clients get notified when they become online. Roaming clients are notified when they become online or, if the client has scheduled update privileges, when scheduled update runs. Also verify that the OfficeScan server has the latest components because smart scan clients need to download the Smart Scan Agent Pattern from the server. To update components, see OfficeScan Server Updates on page 6-14.
Switching a relatively small number of clients at a time allows efficient use of OfficeScan server resources. The OfficeScan server can perform other critical tasks while clients change their scan methods. When switching to smart scan for the first time, clients need to download the full version of the Smart Scan Agent Pattern from the OfficeScan server. The Smart Scan Pattern is only used by smart scan clients. Consider switching during off-peak hours to ensure the download process finishes within a short amount of time. Also consider switching when no client is scheduled to update from the server. Also temporarily disable "Update Now" on clients and re-enable it after the clients have switched to smart scan.
Timing
7-11
CONSIDERATION
Client tree settings
DETAILS
Scan method is a granular setting that can be set on the root, domain, or individual client level. When switching to smart scan, you can:
Create a new client tree domain and assign smart scan as its scan method. Any client you move to this domain will use smart scan. When you move the client, enable the setting Apply settings of new domain to selected clients. Select a domain and configure it to use smart scan. Conventional scan clients belonging to the domain will switch to smart scan. Select one or several conventional scan clients from a domain and then switch them to smart scan. Note Any changes to the domains scan method overrides the scan method you have configured for individual clients.
7-12
CONSIDERATION
IPv6 support
DETAILS
Smart scan clients send scan queries to smart protection sources. A pure IPv6 smart scan client cannot send queries directly to pure IPv4 sources, such as:
Smart Protection Server 2.0 (integrated or standalone) Note IPv6 support for Smart Protection Server starts in version 2.5.
Similarly, a pure IPv4 smart scan client cannot send queries to pure IPv6 Smart Protection Servers. A dual-stack proxy server that can convert IP addresses, such as DeleGate, is required to allow smart scan clients to connect to the sources.
Scan Types
OfficeScan provides the following scan types to protect OfficeScan client computers from security risks:
TABLE 7-3. Scan Types SCAN TYPE
Real-time Scan
DESCRIPTION
Automatically scans a file on the computer as it is received, opened, downloaded, copied, or modified See Real-time Scan on page 7-14 for details.
Manual Scan
A user-initiated scan that scans a file or a set of files requested by the user See Manual Scan on page 7-17 for details.
7-13
SCAN TYPE
Scheduled Scan
DESCRIPTION
Automatically scans files on the computer based on the schedule configured by the administrator or end user See Scheduled Scan on page 7-19 for details.
Scan Now
An administrator-initiated scan that scans files on one or several target computers See Scan Now on page 7-21 for details.
Intensive scanning
An automatically initiated scan that provides heightened scanning for probable malware on computers determined to be high risks See Intensive Scanning on page 7-24 for details.
Real-time Scan
Real-time Scan is a persistent and ongoing scan. Each time a file is received, opened, downloaded, copied, or modified, Real-time Scan scans the file for security risks. If OfficeScan detects no security risk, the file remains in its location and users can proceed to access the file. If OfficeScan detects a security risk or a probable virus/malware, it displays a notification message, showing the name of the infected file and the specific security risk.
Note To modify the notification message, open the web console and go to Notifications > Client User Notifications.
Configure and apply Real-time Scan settings to one or several clients and domains, or to all clients that the server manages.
7-14
2. 3. 4.
In the client tree, click the root domain icon ( specific domains or clients.
Click Settings > Scan Settings > Real-time Scan Settings. On the Target tab, select the following options:
5.
User Activity on Files on page 7-26 Files to Scan on page 7-26 Scan Settings on page 7-27 Scan Exclusions on page 7-29
6.
7-15
REFERENCE
Primary action (select one):
Use ActiveAction on page 7-36 Use the Same Action for all Virus/Malware Types on page 7-37 Use a Specific Action for Each Virus/Malware Type on page 7-37 Note For details about the different actions, see Virus/ Malware Scan Actions on page 7-34.
Quarantine Directory on page 7-38 Back Up Files Before Cleaning on page 7-39 Damage Cleanup Services on page 7-40 Display a Notification Message When Virus/Malware is Detected on page 7-41 Display a Notification Message When Probable Virus/Malware is Detected on page 7-41
Spyware/Grayware action
Primary action:
7.
If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
7-16
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
Manual Scan
Manual Scan is an on-demand scan and starts immediately after a user runs the scan on the OfficeScan client console. The time it takes to complete scanning depends on the number of files to scan and the OfficeScan client computer's hardware resources. Configure and apply Manual Scan settings to one or several clients and domains, or to all clients that the server manages.
Click Settings > Scan Settings > Manual Scan Settings. On the Target tab, configure the following:
Files to Scan on page 7-26 Scan Settings on page 7-27 CPU Usage on page 7-28 Scan Exclusions on page 7-29
5.
7-17
REFERENCE
Primary action (select one):
Use ActiveAction on page 7-36 Use the Same Action for all Virus/Malware Types on page 7-37 Use a Specific Action for Each Virus/Malware Type on page 7-37 Note For details about the different actions, see Virus/ Malware Scan Actions on page 7-34.
Quarantine Directory on page 7-38 Back Up Files Before Cleaning on page 7-39 Damage Cleanup Services on page 7-40
Spyware/Grayware action
Primary action:
6.
If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
7-18
Scheduled Scan
Scheduled Scan runs automatically on the appointed date and time. Use Scheduled Scan to automate routine scans on the client and improve scan management efficiency. Configure and apply Scheduled Scan settings to one or several clients and domains, or to all clients that the server manages.
Click Settings > Scan Settings > Scheduled Scan Settings. On the Target tab, select the following options:
5.
Schedule on page 7-29 Files to Scan on page 7-26 Scan Settings on page 7-27 CPU Usage on page 7-28 Scan Exclusions on page 7-29
7-19
6.
REFERENCE
Primary action (select one):
Use ActiveAction on page 7-36 Use the Same Action for all Virus/Malware Types on page 7-37 Use a Specific Action for Each Virus/Malware Type on page 7-37 Note For details about the different actions, see Virus/ Malware Scan Actions on page 7-34.
Quarantine Directory on page 7-38 Back Up Files Before Cleaning on page 7-39 Damage Cleanup Services on page 7-40 Display a Notification Message When Virus/Malware is Detected on page 7-41 Display a Notification Message When Probable Virus/Malware is Detected on page 7-41
Spyware/Grayware action
Primary action:
7.
If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
7-20
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
Scan Now
Scan Now is initiated remotely by an OfficeScan administrator through the web console and can be targeted to one or several client computers. Configure and apply Scan Now settings to one or several clients and domains, or to all clients that the server manages.
Click Settings > Scan Settings > Scan Now Settings. On the Target tab, select the following options:
5.
7-21
Files to Scan on page 7-26 Scan Settings on page 7-27 CPU Usage on page 7-28 Scan Exclusions on page 7-29
6.
REFERENCE
Primary action (select one):
Use ActiveAction on page 7-36 Use the Same Action for all Virus/Malware Types on page 7-37 Use a Specific Action for Each Virus/Malware Type on page 7-37 Note For details about the different actions, see Virus/ Malware Scan Actions on page 7-34.
Quarantine Directory on page 7-38 Back Up Files Before Cleaning on page 7-39 Damage Cleanup Services on page 7-40
Spyware/Grayware action
Primary action:
7.
If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings.
7-22
Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
The server sends a notification to the clients. 6. 7. Check the notification status and see if there are clients that did not receive the notification. Click Select Un-notified Computers and then Initiate Scan Now to immediately resend the notification to un-notified clients. Example: Total number of clients: 50
7-23
UN-NOTIFIED CLIENTS
15 clients 5 clients + another 5 clients not included in the manual selection
8.
Click Stop Notification to prompt OfficeScan to stop notifying clients currently being notified. Clients already notified and in the process of scanning will ignore this command. For clients already in the process of scanning, click Stop Scan Now to notify them to stop scanning.
9.
Intensive Scanning
OfficeScan automatically initiates intensive scanning during a manual scan when OfficeScan detects a specified number of malware threats on the client computer. The OfficeScan client restarts scanning the endpoint using a heightened level of threat detection. The intensive scan detects more probable malware than the on-demand scans.
Note Intensive scanning requires more system resources than normal on-demand scans.
7-24
4. 5. 6.
Save the file. Go to Networked Computers > Global Client Settings. Click Save. OfficeScan deploys the updated setting to all OfficeScan clients.
7-25
Scan Criteria
Specify which files a particular scan type should scan using file attributes such as file type and extension. Also specify conditions that will trigger scanning. For example, configure Real-time Scan to scan each file after it is downloaded to the computer.
Scan files being created/modified: Scans new files introduced into the computer (for example, after downloading a file) or files being modified Scan files being retrieved: Scans files as they are opened Scan files being created/modified and retrieved
For example, if the third option is selected, a new file downloaded to the computer will be scanned and stays in its current location if no security risk is detected. The same file will be scanned when a user opens the file and, if the user modified the file, before the modifications are saved.
Files to Scan
Select from the following options:
All scannable files: Scan all files File types scanned by IntelliScan: Only scan files known to potentially harbor malicious code, including files disguised by a harmless extension name. See IntelliScan on page E-6 for details.
7-26
Files with certain extensions: Only scan files whose extensions are included in the file extension list. Add new extensions or remove any of the existing extensions.
Scan Settings
Select one or more of the following options:
Scan floppy disk during system shutdown: Scans any floppy disk for boot viruses before shutting down the computer. This prevents any virus/malware from executing when a user reboots the computer from the disk. Scan hidden folders: Allows OfficeScan to detect and then scan hidden folders on the computer during Manual Scan Scan network drive: Scans network drives or folders mapped to the OfficeScan client computer during Manual Scan or Real-time Scan. Scan the boot sector of the USB storage device after plugging in: Automatically scans only the boot sector of a USB storage device every time the user plugs it in (Real-time Scan). Scan compressed files: Allows OfficeScan to scan up to a specified number of compression layers and skip scanning any excess layers. OfficeScan also cleans or deletes infected files within compressed files. For example, if the maximum is two layers and a compressed file to be scanned has six layers, OfficeScan scans two layers and skips the remaining four. If a compressed file contains security threats, OfficeScan cleans or deletes the file.
Note OfficeScan treats Microsoft Office 2007 files in Office Open XML format as compressed files. Office Open XML, the file format for Office 2007 applications, uses ZIP compression technologies. If you want files created using these applications to be scanned for viruses/malware, you need to enable scanning of compressed files.
Scan OLE objects: When a file contains multiple Object Linking and Embedding (OLE) layers, OfficeScan scans the specified number of layers and ignores the remaining layers.
7-27
All OfficeScan clients managed by the server check this setting during Manual Scan, Real-time Scan, Scheduled Scan, and Scan Now. Each layer is scanned for virus/malware and spyware/grayware. For example: The number of layers you specify is 2. Embedded within a file is a Microsoft Word document (first layer), within the Word document is a Microsoft Excel spreadsheet (second layer), and within the spreadsheet is an .exe file (third layer). OfficeScan will scan the Word document and Excel spreadsheet, and skip the .exe file.
Detect exploit code in OLE files: OLE Exploit Detection heuristically identifies malware by checking Microsoft Office files for exploit code.
Note The specified number of layers is applicable to both Scan OLE objects and Detect exploit code options.
Enable IntelliTrap: Detects and removes virus/malware on compressed executable files. This option is available only for Real-time Scan. See IntelliTrap on page E-6 for details. Scan boot area: Scans the boot sector of the client computers hard disk for virus/ malware during Manual Scan, Scheduled Scan and Scan Now
CPU Usage
OfficeScan can pause after scanning one file and before scanning the next file. This setting is used during Manual Scan, Scheduled Scan, and Scan Now. Select from the following options:
High: No pausing between scans Medium: Pause between file scans if CPU consumption is higher than 50%, and do not pause if 50% or lower Low: Pause between file scans if CPU consumption is higher than 20%, and do not pause if 20% or lower
7-28
If you choose Medium or Low, when scanning is launched and CPU consumption is within the threshold (50% or 20%), OfficeScan will not pause between scans, resulting in faster scanning time. OfficeScan uses more CPU resource in the process but because CPU consumption is optimal, computer performance is not drastically affected. When CPU consumption begins to exceed the threshold, OfficeScan pauses to reduce CPU usage, and stops pausing when consumption is within the threshold again. If you choose High, OfficeScan does not check the actual CPU consumption and scans files without pausing.
Schedule
Configure how often (daily, weekly, or monthly) and what time Scheduled Scan will run. For monthly Scheduled Scans, you can choose either a particular day of a month or a day of a week and the order of its occurrence.
A particular day of a month: Select between the 1st and 31st day. If you selected the 29th, 30th, or 31st day and a month does not have this day, OfficeScan runs Scheduled Scan on the last day of the month. Therefore:
If you selected 29, Scheduled Scan runs on February 28 (except on a leap year) and on the 29th day of all the other months. If you selected 30, Scheduled Scan runs on February 28 or 29, and on the 30th day of all the other months. If you selected 31, Scheduled Scan runs on February 28 or 29, April 30, June 30, September 30, November 30, and on the 31st day of all the other months.
A day of a week and the order of its occurrence: A day of a week occurs four or five times a month. For example, there are typically four Mondays in a month. Specify a day of a week and the order in which it occurs during a month. For example, choose to run Scheduled Scan on the second Monday of each month. If you choose the fifth occurrence of a day and it does not exist during a particular month, the scan runs on the fourth occurrence.
Scan Exclusions
Configure scan exclusions to increase the scanning performance and skip scanning files causing false alarms. When a particular scan type runs, OfficeScan checks the scan
7-29
exclusion list to determine which files on the computer will be excluded from both virus/malware and spyware/grayware scanning. When you enable scan exclusion, OfficeScan will not scan a file under the following conditions:
The file is found under a specific directory (or any of its sub-directories). The file name matches any of the names in the exclusion list. The file extension matches any of the extensions in the exclusion list.
Tip For a list of products that Trend Micro recommends excluding from Real-Time scans, go to: http://esupport.trendmicro.com/solution/en-US/1059770.aspx
Wildcard Exceptions
Scan exclusion lists for files and directories support the use of wildcard characters. Use the "?" character to replace one character and "*" to replace several characters. Use wildcard characters cautiously. Using the wrong character might exclude incorrect files or directories. For example, C:\* would exclude the entire C:\ drive.
TABLE 7-9. Scan Exclusions Using Wildcard Characters VALUE
c:\director*\fil \*.txt
EXCLUDED
c:\directory\fil\doc.txt c:\directories\fil\files \document.txt
NOT EXCLUDED
c:\directory\file\ c:\directories\files\ c:\directory\file\doc.txt c:\directories\files \document.txt
c:\director? \file\*.txt
c:\directory\file \doc.txt
c:\directories\file \document.txt
7-30
VALUE
c:\director? \file\?.txt
EXCLUDED
c:\directory\file\1.txt
NOT EXCLUDED
c:\directory\file\doc.txt c:\directories\file \document.txt
c:\*.txt
All .txt files in the C:\ directory Not supported Not supported
All other file types in the C:\ directory Not supported Not supported
[] *.*
You can also choose Exclude directories where Trend Micro products are installed. If you select this option, OfficeScan automatically excludes the directories of the following Trend Micro products from scanning:
<Server installation folder> ScanMail for Microsoft Exchange (all versions except version 7). If you use version 7, add the following folders to the exclusion list:
ScanMail eManager 3.11, 5.1, 5.11, 5.12 ScanMail for Lotus Notes eManager NT
7-31
InterScan Web Security Suite InterScan Web Protect InterScan FTP VirusWall InterScan Web VirusWall InterScan E-mail VirusWall InterScan NSAPI Plug-in InterScan eManager 3.5x IM Security
If you have a Trend Micro product NOT included in the list, add the product directories to the scan exclusion list. Also configure OfficeScan to exclude Microsoft Exchange 2000/2003 directories by going to the Scan Settings section of Networked Computers > Global Client Settings. If you use Microsoft Exchange 2007 or later, manually add the directory to the scan exclusion list. Refer to the following site for scan exclusion details: http://technet.microsoft.com/en-us/library/bb332342.aspx When you configure the file list, choose from the following options:
Retains client computer's exclusion list: This is the default selection. If you make changes to the exclusion list and this option is enabled, you will not be able to save the changes. This option is provided to prevent overwriting a clients existing exclusion list accidentally. If you want to deploy the changes you made, select any of the other options. Overwrites the client computer's exclusion list: This option removes the entire exclusion list on the client and replaces it with the list you just configured. If you choose this option, OfficeScan displays a warning. To proceed, you must click OK in the message window. Adds path to the client computer's exclusion list: This option adds the items in the list you just configured to the clients existing exclusion list. If an item already exists in the clients exclusion list, the client ignores the item.
7-32
Removes path from the client computer's exclusion list: The client removes an item in its exclusion list if it matches an item in the list you just configured.
Retains client computer's exclusion list: This is the default selection. If you make changes to the exclusion list and this option is enabled, you will not be able to save the changes. This option is provided to prevent overwriting a clients existing exclusion list accidentally. If you want to deploy the changes you made, select any of the other options. Overwrites the client computer's exclusion list: This option removes the entire exclusion list on the client and replaces it with the list you just configured. If you choose this option, OfficeScan displays a warning. To proceed, you must click OK in the message window. Adds path to the client computer's exclusion list: This option adds the items in the list you just configured to the clients existing exclusion list. If an item already exists in the clients exclusion list, the client ignores the item. Removes path from the client computer's exclusion list: The client removes an item in its exclusion list if it matches an item in the list you just configured.
7-33
For Manual Scan, Scheduled Scan, and Scan Now, use a question mark (?) or asterisk (*) as a wildcard character.
Scan Actions
Specify the action OfficeScan performs when a particular scan type detects a security risk. OfficeScan has a different set of scan actions for virus/malware and spyware/ grayware.
7-34
DESCRIPTION
OfficeScan deletes the infected file. OfficeScan renames and then moves the infected file to a temporary quarantine directory on the client computer located in <Client installation folder>\Suspect. The OfficeScan client then sends quarantined files to the designated quarantine directory. See Quarantine Directory on page 7-38 for details. The default quarantine directory is on the OfficeScan server, under <Server installation folder>\PCCSRV\Virus. OfficeScan encrypts quarantined files sent to this directory. If you need to restore any of the quarantined files, use the VSEncrypt tool. For information on using this tool, see Server Tuner on page 13-44.
Clean
OfficeScan cleans the infected file before allowing full access to the file. If the file is uncleanable, OfficeScan performs a second action, which can be one of the following actions: Quarantine, Delete, Rename, and Pass. To configure the second action, go to Networked Computers > Client Management. Click Settings > Scan Settings > {Scan Type} > Action tab. This action can be performed on all types of malware except probable virus/malware.
Rename
OfficeScan changes the infected file's extension to "vir". Users cannot open the renamed file initially, but can do so if they associate the file with a certain application. The virus/malware may execute when opening the renamed infected file.
Pass
OfficeScan can only use this scan action when it detects any type of virus during Manual Scan, Scheduled Scan, and Scan Now. OfficeScan cannot use this scan action during Real-time Scan because performing no action when an attempt to open or execute an infected file is detected will allow virus/malware to execute. All the other scan actions can be used during Real-time Scan.
7-35
ACTION
Deny Access
DESCRIPTION
This scan action can only be performed during Real-time Scan. When OfficeScan detects an attempt to open or execute an infected file, it immediately blocks the operation. Users can manually delete the infected file.
Use ActiveAction
Different types of virus/malware require different scan actions. Customizing scan actions requires knowledge about virus/malware and can be a tedious task. OfficeScan uses ActiveAction to counter these issues. ActiveAction is a set of pre-configured scan actions for viruses/malware. If you are not familiar with scan actions or if you are not sure which scan action is suitable for a certain type of virus/malware, Trend Micro recommends using ActiveAction. Using ActiveAction provides the following benefits:
ActiveAction uses scan actions that are recommended by Trend Micro. You do not have to spend time configuring the scan actions. Virus writers constantly change the way virus/malware attack computers. ActiveAction settings are updated to protect against the latest threats and the latest methods of virus/malware attacks.
Note ActiveAction is not available for spyware/grayware scan.
The following table illustrates how ActiveAction handles each type of virus/malware:
7-36
TABLE 7-11. Trend Micro Recommended Scan Actions Against Viruses and Malware REAL-TIME SCAN FIRST ACTION
Quarantine Quarantine Clean Deny Access Quarantine Clean Deny Access or userconfigured action
VIRUS/MALWARE TYPE
SECOND ACTION
Delete Delete Quarantine N/A N/A Quarantine N/A
SECOND ACTION
Delete Delete Quarantine N/A N/A Quarantine N/A
Joke program Trojan horse program Virus Test virus Packer Others Probable virus/ malware
For probable virus/malware, the default action is "Deny Access" during Real-time Scan and "Pass" during Manual Scan, Scheduled Scan, and Scan Now. If these are not your preferred actions, you can change them to Quarantine, Delete, or Rename.
7-37
For all virus/malware types except probable virus/malware, all scan actions are available. If you choose "Clean" as the first action, select a second action that OfficeScan performs if cleaning is unsuccessful. If the first action is not "Clean", no second action is configurable. For probable virus/malware, all scan actions, except "Clean", are available.
Quarantine Directory
If the action for an infected file is "Quarantine", the OfficeScan client encrypts the file and moves it to a temporary quarantine folder located in <Client installation folder> \SUSPECT and then sends the file to the designated quarantine directory.
Note You can restore encrypted quarantined files in case you need to access them in the future. For details, see Restoring Encrypted Files on page 7-41.
Accept the default quarantine directory, which is located on the OfficeScan server computer. The directory is in URL format and contains the servers host name or IP address.
If the server is managing both IPv4 and IPv6 clients, use the host name so that all clients can send quarantined files to the server. If the server only has or is identified by its IPv4 address, only pure IPv4 and dualstack clients can send quarantined files to the server. If the server only has or is identified by its IPv6 address, only pure IPv6 and dualstack clients can send quarantined files to the server.
You can also specify an alternative quarantine directory by typing the location in URL, UNC path, or absolute file path format. Clients should be able to connect to this alternative directory. For example, the alternative directory should have an IPv6 address if it will receive quarantined files from dual-stack and pure IPv6 clients. Trend Micro recommends designating a dual-stack alternative directory, identifying the directory by its host name, and using UNC path when typing the directory. Refer to the following table for guidance on when to use URL, UNC path, or absolute file path:
7-38
ACCEPTED FORMAT
URL UNC path
EXAMPLE
http:// <osceserver> \\<osceserver>\ ofcscan\Virus
NOTES
This is the default directory. Configure settings for this directory, such as the size of the quarantine folder. For details, see Quarantine Manager on page 13-43. Ensure that clients can connect to this directory. If you specify an incorrect directory, the OfficeScan client keeps the quarantined files on the SUSPECT folder until a correct quarantine directory is specified. In the server's virus/ malware logs, the scan result is "Unable to send the quarantined file to the designated quarantine folder". If you use UNC path, ensure that the quarantine directory folder is shared to the group "Everyone" and that you assign read and write permission to this group.
A directory on another OfficeScan server computer (if you have other OfficeScan servers on the network) Another computer on the network A different directory on the OfficeScan client
UNC path
\\<computer_ name>\temp
Absolute path
C:\temp
7-39
When Manual Scan, Scheduled Scan, or Scan Now runs, the OfficeScan client triggers Damage Cleanup Services first and then proceeds with virus/malware scanning. During virus/malware scanning, the client may trigger Damage Cleanup Services again if cleanup is required. During Real-time Scan, the OfficeScan client first performs virus/malware scanning and then triggers Damage Cleanup Services if cleanup is required.
You can select the type of cleanup that Damage Cleanup Services runs:
Standard cleanup: The OfficeScan client performs any of the following actions during standard cleanup:
Detects and removes live Trojans Kills processes that Trojans create Repairs system files that Trojans modify Deletes files and applications that Trojans drop
Advanced cleanup: In addition to the standard cleanup actions, the OfficeScan client stops activities by rogue security software, also known as FakeAV. The OfficeScan client also uses advanced cleanup rules to proactively detect and stop applications that exhibit FakeAV behavior.
Note While providing proactive protection, advanced cleanup also results in a high number of false-positives.
Damage Cleanup Services does not run cleanup on probable virus/malware unless you select the option Run cleanup when probable virus/malware is detected. You can only select this option if the action on probable virus/malware is not Pass or Deny
7-40
Access. For example, if the OfficeScan client detects probable virus/malware during Real-time Scan and the action is quarantine, the OfficeScan client first quarantines the infected file and then runs cleanup if necessary. The cleanup type (standard or advanced) depends on your selection.
OfficeScan provides a tool that decrypts and then restores the file in case you need to retrieve information from it. OfficeScan can decrypt and restore the following files:
7-41
TABLE 7-13. Files that OfficeScan can Decrypt and Restore FILE
Quarantined files on the client computer
DESCRIPTION
These files are found in the <Client installation folder>
\SUSPECT\Backup folder and are automatically purged after 7
days. These files are also uploaded to the designated quarantine directory on the OfficeScan server. Quarantined files on the designated quarantine directory Backed up encrypted files By default, this directory is located on the OfficeScan server computer. For details, see Quarantine Directory on page 7-38. These are the backup of infected files that OfficeScan was able to clean. These files are found in the <Client installation folder>\Backup folder. To restore these files, users need to move them to the <Client installation folder>\SUSPECT \Backup folder. OfficeScan only backs up and encrypts files before cleaning if you select Backup files before cleaning in Networked Computers > Client Management > Settings > Scan Settings > {Scan Type} > Action tab.
WARNING! Restoring an infected file may spread the virus/malware to other files and computers. Before restoring the file, isolate the infected computer and move important files on this computer to a backup location.
If the file is on the OfficeScan client computer: a. b. Open a command prompt and navigate to <Client installation folder>. Run VSEncode.exe by typing the following:
VSEncode.exe /u
7-42
This parameter opens a screen with a list of files found under <Client
installation folder>\SUSPECT\Backup.
c. d. e.
Select a file to restore and click Restore. The tool can only restore one file at a time. In the screen that opens, specify the folder where to restore the file. Click Ok. The file is restored to the specified folder.
Note It might be possible for OfficeScan to scan the file again and treat it as infected as soon as the file is restored. To prevent the file from being scanned, add it to the scan exclusion list. See Scan Exclusions on page 7-29 for details.
f.
If the file is on the OfficeScan server or a custom quarantine directory: a. If the file is on the OfficeScan server computer, open a command prompt and navigate to <Server installation folder>\PCCSRV\Admin\Utility \VSEncrypt. If the file is on a custom quarantine directory, navigate to <Server installation folder>\PCCSRV\Admin\Utility and copy the VSEncrypt folder to the computer where the custom quarantine directory is located. b. Create a text file and then type the full path of the files you want to encrypt or decrypt. For example, to restore files in C:\My Documents\Reports, type C: \My Documents\Reports\*.* in the text file. Quarantined files on the OfficeScan server computer are found under <Server installation folder>\PCCSRV\Virus. c. d. Save the text file with an INI or TXT extension. For example, save it as ForEncryption.ini on the C: drive. Open a command prompt and navigate to the directory where the
VSEncrypt folder is located.
7-43
e.
Where:
<location of the INI or TXT file> is the path of the INI or TXT file you created (for example, C:\ForEncryption.ini).
f.
DESCRIPTION
For example, type VSEncode [/d] [/debug] to decrypt files in the Suspect folder and create a debug log. When you decrypt or encrypt a file, OfficeScan creates the decrypted or encrypted file in the same folder. Before decrypting or encrypting a file, ensure that it is not locked.
7-44
DESCRIPTION
OfficeScan terminates processes or delete registries, files, cookies, and shortcuts. After cleaning spyware/grayware, OfficeScan clients back up spyware/ grayware data, which you can restore if you consider the spyware/ grayware safe to access. See Restoring Spyware/Grayware on page 7-48 for details.
Pass
OfficeScan performs no action on detected spyware/grayware components but records the spyware/grayware detection in the logs. This action can only be performed during Manual Scan, Scheduled Scan, and Scan Now. During Real-time Scan, the action is "Deny Access". OfficeScan will not perform any action if the detected spyware/grayware is included in the approved list. See Spyware/Grayware Approved List on page 7-46 for details.
Deny Access
OfficeScan denies access (copy, open) to the detected spyware/grayware components. This action can only be performed during Real-time Scan. During Manual Scan, Scheduled Scan, and Scan Now, the action is "Pass".
7-45
To modify the notification message, go to Notifications > Client User Notifications, click the Spyware/Grayware tab.
Networked Computers > Client Management Logs > Networked Computer Logs > Security Risks ) to include all clients or select
2. 3. 4. 5. 6.
In the client tree, click the root domain icon ( specific domains or clients.
Click Logs > Spyware/Grayware Logs or View Logs > Spyware/Grayware Logs. Specify the log criteria and then click Display Logs. Select logs and click Add to Approved List. Apply the approved spyware/grayware only to the selected client computers or to certain domain(s).
7-46
7.
Click Save. The selected clients apply the setting and the OfficeScan server adds the spyware/grayware to the approved list found in Networked Computers > Client Management > Settings > Spyware/Grayware Approved List.
Note OfficeScan can accommodate a maximum of 1024 spyware/grayware in the approved list.
Click Settings > Spyware/Grayware Approved List. On the Spyware/Grayware names table, select a spyware/grayware name. To select multiple names, hold the Ctrl key while selecting.
You can also type a keyword in the Search field and click Search. OfficeScan refreshes the table with the names that match the keyword.
5.
6. 7.
To remove names from the approved list, select the names and click Remove. To select multiple names, hold the Ctrl key while selecting. If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings.
7-47
Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
Restoring Spyware/Grayware
After cleaning spyware/grayware, OfficeScan clients back up spyware/grayware data. Notify an online client to restore backed up data if you consider the data harmless. Choose the spyware/grayware data to restore based on the backup time.
Note OfficeScan client users cannot initiate spyware/grayware restore and are not notified about which backup data the client was able to restore.
Procedure 1. 2. Navigate to Networked Computers > Client Management. In the client tree, open a domain and then select a client.
Note Only one client at a time can perform spyware/grayware restore.
3. 4.
Click Tasks > Spyware/Grayware Restore. To view the items to restore for each data segment, click View. A new screen displays. Click Back to return to the previous screen.
5. 6.
Select the data segments that you want to restore. Click Restore. OfficeScan notifies you of the restoration status. Check the spyware/grayware restore logs for a full report. See Viewing Spyware/Grayware Restore Logs on page 7-90 for details.
7-48
Users can configure Manual Scan, Scheduled Scan, and Real-time Scan settings. For details, see Scan Type Privileges on page 7-49. Users can postpone, stop, or skip Scheduled Scan. For details, see Scheduled Scan Privileges and Other Settings on page 7-52. Users enable scanning of Microsoft Outlook and POP3 email messages for virus/ malware. For details, see Mail Scan Privileges and Other Settings on page 7-58. The OfficeScan client can use cache settings to improve its scan performance. For details, see Cache Settings for Scans on page 7-60.
Click Settings > Privileges and Other Settings. On the Privileges tab, go to the Scan Privileges section. Select the scan types that users are allowed to configure.
7-49
6.
If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
7-50
3.
Manual Scan settings: Files to Scan, Scan Settings, CPU Usage, Scan Exclusions, Scan Actions
7-51
Real-time Scan settings: User Activity on Files, Files to Scan, Scan Settings, Scan Exclusions, Scan Actions Scheduled Scan settings: Schedule, Files to Scan, Scan Settings, CPU Usage, Scan Exclusions, Scan Actions
4.
Click OK.
Postpone Scheduled Scan before it runs and then specify the postpone duration. Scheduled Scan can only be postponed once. If Scheduled Scan is in progress, users can stop scanning and restart it later. Users then specify the amount of time that should elapse before scanning restarts. When scanning restarts, all previously scanned files are scanned again. Scheduled Scan can be stopped and then restarted only once.
Note The minimum postpone duration/elapsed time users can specify is 15 minutes. The maximum is 12 hours and 45 minutes, which you can reduce by going to Networked Computers > Global Client Settings. In the Scheduled Scan Settings section, modify the Postpone Scheduled Scan for up to __ hours and __ minutes setting.
7-52
Click Settings > Privileges and Other Settings. On the Privileges tab, go to the Scheduled Scan Privileges section. Select the following options:
6. 7.
Click the Other Settings tab and go to the Scheduled Scan Settings section. Select Display a notification before a scheduled scan occurs. When you enable this option, a notification message displays on the client computer minutes before Scheduled Scan runs. Users are notified of the scan schedule (date and time) and their Scheduled Scan privileges, such as postponing, skipping, or stopping Scheduled Scan.
7-53
Note The number of minutes is configurable. To configure the number of minutes, go to Networked Computers > Global Client Settings. In the Scheduled Scan Settings section, modify the Remind users of the Scheduled Scan __ minutes before it runs setting.
8.
If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
If Scheduled Scan has not started: a. Right-click the OfficeScan client icon on the system tray and select Scheduled Scan Advanced Settings.
7-54
FIGURE 7-2. Scheduled Scan Advanced Settings option Note Users do not need to perform this step if the notification message is enabled and is set to display minutes before Scheduled Scan runs. For details about the notification message, see Scheduled Scan Privilege Notification on page 7-53.
b.
On the notification window that displays, select from the following options:
Postpone scanning for __ hours and __ minutes. Skip this Scheduled Scan. The next Scheduled Scan runs on <date> at <time>.
7-55
If Scheduled Scan is in progress: a. b. Right-click the OfficeScan client icon on the system tray and select Scheduled Scan Advanced Settings. On the notification window that displays, select from the following options:
Stop scanning. Restart the scan after __ hours and __ minutes. Stop scanning. The next Scheduled Scan runs on <date> at <time>.
7-56
7-57
The following table describes the Outlook mail scan and POP3 mail scan programs.
7-58
Must be enabled by administrators from the web console before users can use it Note To enable POP3 Mail Scan, see Granting Mail Scan Privileges and Enabling POP3 Mail Scan on page 7-60.
Action against viruses/malware configurable from the OfficeScan client console but not from the web console
Manual Scan Scanning only occurs when users click Scan Now from the Mail Scan tab on the OfficeScan client console.
Real-time Scan Scanning is done as email messages are retrieved from the POP3 mail server.
Scan results
Information about detected security risks available after scanning is complete Scan results not logged on the OfficeScan client consoles Logs screen Scan results not sent to the server
Information about detected security risks available after scanning is complete Scan results not logged on the OfficeScan client consoles Logs screen Scan results not sent to the server
Other details
None
Shares the OfficeScan NT Proxy Service (TMProxy.exe) with the web reputation feature
7-59
Click Settings > Privileges and Other Settings. On the Privileges tab, go to the Mail Scan Privileges section. Select Display the Mail Scan tab on the client console. Click the Other Settings tab and go to the POP3 Email Scan Settings section. Select Scan POP3 email. If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
7-60
Clients build the digital signature cache file according to a schedule, which is configurable from the web console. Clients do this to:
Add the cache for new files that were introduced to the system since the last cache file was built Remove the cache for files that have been modified or deleted from the system
During the cache building process, clients check the following folders for trustworthy files and then adds the caches for these files to the digital signature cache file:
%PROGRAMFILES% %WINDIR%
The cache building process does not affect a computers performance because clients use minimal system resources during the process. Clients are also able to resume a cache building task that was interrupted for some reason (for example, when the host machine is powered off or when a wireless computers AC adapter is unplugged).
7-61
It is possible that a severely outdated pattern file may have treated an infected, unmodified file as threat-free. If the cache does not expire, the infected file remains in the system until it is modified and detected by Real-time Scan. If a cached file was modified and Real-time Scan is not functional during the file modification, the cache needs to expire so that the modified file can be scanned for threats.
The number of caches added to the on-demand scan cache file depends on the scan type and its scan target. For example, the number of caches may be less if the OfficeScan client only scanned 200 of the 1,000 files in a computer during Manual Scan. If on-demand scans are run frequently, the on-demand scan cache file reduces the scanning time significantly. In a scan task where all caches are not expired, scanning that usually takes 12 minutes can be reduced to 1 minute. Reducing the number of days a file must remain unmodified and extending the cache expiration usually improve the performance. Since files must remain unmodified for a relatively short period of time, more caches can be added to the cache file. The caches also expire longer, which means that more files are skipped from scans.
7-62
If on-demand scans are seldom run, you can disable the on-demand scan cache since caches would have expired when the next scan runs.
Click Settings > Privileges and Other Settings. Click the Other Settings tab and go to the Cache Settings for Scans section. Configure settings for the digital signature cache. a. b. Select Enable the digital signature cache. In Build the cache every __ days, specify how often the client builds the cache.
6.
Configure settings for the on-demand scan cache. a. b. c. Select Enable the on-demand scan cache. In Add the cache for safe files that are unchanged for __ days, specify the number of days a file must remain unchanged before it is cached. In The cache for each safe file expires within __ days, specify the maximum number of days a cache remains in the cache file.
Note To prevent all caches added during a scan from expiring on the same day, caches expire randomly within the maximum number of days you specified. For example, if 500 caches were added to the cache today and the maximum number of days you specified is 10, a fraction of the caches will expire the next day and the majority will expire on the succeeding days. On the 10th day, all caches that remain will expire.
7-63
7.
If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
A particular scan setting can apply to all clients that the server manages or only to clients with certain scan privileges. For example, if you configure the postpone Scheduled Scan duration, only clients with the privilege to postpone Scheduled Scan will use the setting. A particular scan setting can apply to all or only to a particular scan type. For example, on computers with both the OfficeScan server and OfficeScan client installed, you can exclude the OfficeScan server database from scanning. However, this setting applies only during Real-time Scan. A particular scan setting can apply when scanning for either virus/malware or spyware/grayware, or both. For example, assessment mode only applies during spyware/grayware scanning.
7-64
Scan Settings Section on page 7-65 Scheduled Scan Settings Section on page 7-71 Virus/Malware Log Bandwidth Settings Section on page 7-73
3.
Click Save.
Configure Scan Settings for Large Compressed Files on page 7-65 Add Manual Scan to the Windows Shortcut Menu on OfficeScan client Computers on page 7-66 Exclude the OfficeScan Server Database Folder from Real-time Scan on page 7-66 Exclude Microsoft Exchange Server Folders and Files from Scans on page 7-67 Enable Deferred Scanning on File Operations on page 7-67 Clean/Delete Infected Files Within Compressed Files on page 7-68 Enable Assessment Mode on page 7-70 Scan for Cookies on page 7-71
Do not scan files in the compressed file if the size exceeds __ MB: OfficeScan does not scan any file that exceeds the limit.
7-65
In a compressed file, scan only the first __ files: After decompressing a compressed file, OfficeScan scans the specified number of files and ignores any remaining files, if any.
Add Manual Scan to the Windows Shortcut Menu on OfficeScan client Computers
When this setting is enabled, all OfficeScan clients managed by the server add a Scan with OfficeScan Client option to the right-click menu in Windows Explorer. When users right-click a file or folder on the Windows desktop or in Windows Explorer and select the option, Manual Scan scans the file or folder for virus/malware and spyware/ grayware.
7-66
Tip Enable this setting to prevent database corruption that may occur during scanning.
For Microsoft Exchange 2007 or later folders, you need to manually add the folders to the scan exclusion list. For scan exclusion details, see the following website: http://technet.microsoft.com/en-us/library/bb332342.aspx See Scan Exclusions on page 7-29 for steps in configuring the scan exclusion list.
7-67
"Clean" or "Delete" is the action OfficeScan is set to perform. Check the action OfficeScan performs on infected files by going to Networked Computers > Client Management > Settings > Scan Settings > {Scan Type} > Action tab. You enable this setting. Enabling this setting may increase computer resource usage during scanning and scanning may take longer to complete. This is because OfficeScan needs to decompress the compressed file, clean/delete infected files within the compressed file, and then re-compress the file. The compressed file format is supported. OfficeScan only supports certain compressed file formats, including ZIP and Office Open XML, which uses ZIP compression technologies. Office Open XML is the default format for Microsoft Office 2007 applications such as Excel, PowerPoint, and Word.
Note Contact your support provider for a complete list of supported compressed file formats.
For example, Real-time Scan is set to delete files infected with a virus. After Real-time Scan decompresses a compressed file named abc.zip and detects an infected file 123.doc within the compressed file, OfficeScan deletes 123.doc and then recompresses abc.zip, which is now safe to access. The following table describes what happens if any of the conditions is not met.
7-68
TABLE 7-17. Compressed File Scenarios and Results STATUS OF "CLEAN/ DELETE
INFECTED FILES WITHIN COMPRESSED FILES"
ACTION OFFICESCAN IS
SET TO PERFORM
COMPRESSED FILE
FORMAT
RESULT
Enabled
Clean or Delete
Not supported Example: def.rar contains an infected file 123.doc. Supported/Not supported Example: abc.zip contains an infected file 123.doc.
OfficeScan encrypts def.rar but does not clean, delete, or perform any other action on 123.doc.
Disabled
Clean or Delete
OfficeScan does not clean, delete, or perform any other action on both abc.zip and 123.doc.
7-69
ACTION OFFICESCAN IS
SET TO PERFORM
COMPRESSED FILE
FORMAT
RESULT
Enabled/ Disabled
Not Clean or Delete (in other words, any of the following: Rename, Quarantine, Deny Access or Pass)
OfficeScan performs the configured action (Rename, Quarantine, Deny Access or Pass) on abc.zip, not 123.doc. If the action is: Rename: OfficeScan renames
abc.zip to abc.vir, but does not rename 123.doc.
Quarantine: OfficeScan quarantines abc.zip (123.doc and all non-infected files are quarantined). Pass: OfficeScan performs no action on both abc.zip and 123.doc but logs the virus detection. Deny Access: OfficeScan denies access to abc.zip when it is opened (123.doc and all noninfected files cannot be opened).
7-70
For example, detected spyware/grayware that you do not consider a security risk can be added to the spyware/grayware approved list.. When in assessment mode, OfficeScan performs the following scan actions:
Pass: During Manual Scan, Scheduled Scan and Scan Now Deny Access: During Real-time Scan
Note Assessment mode overrides any user-configured scan action. For example, even if you choose "Clean" as the scan action during Manual Scan, "Pass" remains as the scan action when the client is on assessment mode.
Remind Users of the Scheduled Scan __ Minutes Before it Runs on page 7-72 Postpone Scheduled Scan for up to __ Hours and __ Minutes on page 7-72 Automatically Stop Scheduled Scan When Scanning Lasts More Than __ Hours and __ Minutes on page 7-72 Skip Scheduled Scan When a Wireless Computer's Battery Life is Less Than __ % and its AC Adapter is Unplugged on page 7-72 Resume a Missed Scheduled Scan on page 7-73
7-71
Postpone Scheduled Scan before it runs and then specify the postpone duration. If Scheduled Scan is in progress, users can stop scanning and restart it later. Users then specify the amount of time that should elapse before scanning restarts. When scanning restarts, all previously scanned files are scanned again. The maximum postpone duration/elapsed time users can specify is 12 hours and 45 minutes, which you can reduce by specifying the number of hour(s) and/or minute(s) in the fields provided.
Automatically Stop Scheduled Scan When Scanning Lasts More Than __ Hours and __ Minutes
OfficeScan stops scanning when the specified amount of time is exceeded and scanning is not yet complete. OfficeScan immediately notifies users of any security risk detected during scanning.
Skip Scheduled Scan When a Wireless Computer's Battery Life is Less Than __ % and its AC Adapter is Unplugged
OfficeScan immediately skips scanning when Scheduled Scan launches if it detects that a wireless computer's battery life is running low and its AC adapter is not connected to
7-72
any power source. If battery life is low but the AC adapter is connected to a power source, scanning proceeds.
Same time next day: If OfficeScan is running at the exact same time next day, scanning is resumed. __ minutes after the computer starts: OfficeScan resumes scanning a number of minutes after the user turns on the computer. The number of minutes is between 10 and 120.
Note Users can postpone or skip a resumed Scheduled Scan if the administrator enabled this privilege. For details, see Scheduled Scan Privileges and Other Settings on page 7-52.
Enable OfficeScan Clients to Create a Single Virus/Malware Log Entry for Recurring Detections of the Same Virus/ Malware Within an Hour
OfficeScan consolidates virus log entries when detecting multiple infections from the same virus/malware over a short period of time. OfficeScan may detect a single virus/ malware multiple times, quickly filling the virus/malware log and consuming network bandwidth when the OfficeScan client sends log information to the server. Enabling this feature helps reduce both the number of virus/malware log entries made and the
7-73
amount of network bandwidth OfficeScan clients consume when they report virus log information to the server.
7-74
2.
In the Criteria tab: a. b. Go to the Virus/Malware and Spyware/Grayware sections. Specify whether to send notifications when OfficeScan detects virus/malware and spyware/grayware, or only when the action on these security risks is unsuccessful.
3.
In the Email tab: a. b. c. Go to the Virus/Malware Detections and Spyware/Grayware Detections sections. Select Enable notification via email. Select Send notifications to users with client tree domain permissions. You can use Role-based Administration to grant client tree domain permissions to users. If a detection occurs on an OfficeScan client belonging to a specific domain, the email will be sent to the email addresses of the users with domain permissions. See the following table for examples:
TABLE 7-18. Client Tree Domains and Permissions CLIENT TREE DOMAIN
Domain A
Domain B
root admin_jane
If an OfficeScan client belonging to Domain A detects a virus, the email will be sent to [email protected], [email protected], and [email protected]. If an OfficeScan client belonging to Domain B detects spyware, the email will be sent to [email protected] and [email protected].
7-75
Note If you enable this option, all users with domain permissions must have a corresponding email address. The email notification will not be sent to users without an email address. Users and email addresses are configured from Administration > User Accounts.
d. e.
Select Send notifications to the following email address(es) and then type the email addresses. Accept or modify the default subject and message. You can use token variables to represent data in the Subject and Message fields.
TABLE 7-19. Token Variables for Security Risk Notifications VARIABLE
Virus/Malware detections %v %s %i %c %m %p %y %e %r %a %n Virus/Malware name Computer with virus/malware IP address of the computer MAC address of the computer Domain of the computer Location of virus/malware Date and time of virus/malware detection Virus Scan Engine version Virus Pattern version Action performed on the security risk Name of the user logged on to the infected computer
DESCRIPTION
7-76
VARIABLE
%m %y %n %T Domain of the computer
DESCRIPTION
Date and time of spyware/grayware detection Name of the user logged on to the computer at the time of detection Spyware/Grayware and scan result
4.
In the Pager tab: a. b. c. Go to the Virus/Malware Detections and Spyware/Grayware Detections sections. Select Enable notification via pager. Type the message.
5.
In the SNMP Trap tab: a. b. c. Go to the Virus/Malware Detections and Spyware/Grayware Detections sections. Select Enable notification via SNMP trap. Accept or modify the default message. You can use token variables to represent data in the Message field. See Table 7-19: Token Variables for Security Risk Notifications on page 7-76 for details.
6.
In the NT Event Log tab: a. b. c. Go to the Virus/Malware Detections and Spyware/Grayware Detections sections. Select Enable notification via NT Event Log. Accept or modify the default message. You can use token variables to represent data in the Message field. See Table 7-19: Token Variables for Security Risk Notifications on page 7-76 for details.
7.
Click Save.
7-77
Immediately after Real-time Scan and Scheduled Scan detect virus/malware and spyware/grayware. Enable the notification message and optionally modify its content. If a client computer restart is necessary to finish cleaning infected files. For Realtime Scan, the message displays after a particular security risk has been scanned. For Manual Scan, Scheduled Scan, and Scan Now, the message displays once and only after OfficeScan finishes scanning all the scan targets.
Click Settings > Scan Settings > Real-time Scan Settings or Settings > Scan Settings > Scheduled Scan Settings. Click the Action tab. Select the following options:
Display a notification message on the client computer when virus/ malware is detected Display a notification message on the client computer when probable virus/malware is detected
6.
If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
7-78
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
High: The OfficeScan client was unable to handle critical malware Medium: The OfficeScan client was unable to handle malware Low: The OfficeScan client was able to resolve all threats
b. 4.
To display a notification message if virus/malware originated from the client user's computer: a. b. c. Select the check box under Virus/Malware Infection Source. Specify an interval for sending notifications. Optionally modify the default notification message.
7-79
Note This notification message displays only if you enable Windows Messenger Service. Check the status of this service in the Services screen (Control Panel > Administrative Tools > Services > Messenger).
5.
Click Save.
Click Settings > Privileges and Other Settings. Click the Other Settings tab and go to the Restart Notification section. Select Display a notification message if the client computer needs to restart to finish cleaning infected files.
7-80
6.
If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
Logs > Networked Computer Logs > Security Risks Networked Computers > Client Management ) to include all clients or select
2. 3.
In the client tree, click the root domain icon ( specific domains or clients.
Click Logs > Virus/Malware Logs or View Logs > Virus/Malware Logs.
7-81
4. 5.
Specify the log criteria and then click Display Logs. View logs. Logs contain the following information:
Date and time of virus/malware detection Infected computer Virus/Malware name Infection source Infected file Scan type that detected the virus/malware Scan results
Note For more information on scan results, see Virus/Malware Scan Results on page 7-82.
IP address MAC address Log details (Click View to see the details.)
6.
To save logs to a comma-separated value (CSV) file, click Export to CSV. Open the file or save it to a specific location. The CSV file contains the following information:
All information in the logs User name logged on to the computer at the time of detection
Deleted
7-82
First action is Delete and the infected file was deleted. First action is Clean but cleaning was unsuccessful. Second action is Delete and the infected file was deleted.
Quarantined
First action is Quarantine and the infected file was quarantined. First action is Clean but cleaning was unsuccessful. Second action is Quarantine and the infected file was quarantined.
Renamed
First action is Rename and the infected file was renamed. First action is Clean but cleaning was unsuccessful. Second action is Rename and the infected file was renamed.
Access denied
First action is Deny Access and access to the infected file was denied when the user attempted to open the file. First action is Clean but cleaning was unsuccessful. Second action is Deny Access and access to the infected file was denied when the user attempted to open the file. Probable Virus/Malware was detected during Real-time Scan. Real-time Scan may deny access to files infected with a boot virus even if the scan action is Clean (first action) and Quarantine (second action). This is because attempting to clean a boot virus may damage the Master Boot Record (MBR) of the infected computer. Run Manual Scan so OfficeScan can clean or quarantine the file.
Passed
First action is Pass. OfficeScan did not perform any action on the infected file.
7-83
First action is Clean but cleaning was unsuccessful. Second action is Pass so OfficeScan did not perform any action on the infected file.
Passed a potential security risk This scan result only displays when OfficeScan detects "probable virus/malware" during Manual Scan, Scheduled Scan, and Scan Now. Refer to the following page on the Trend Micro online Virus Encyclopedia for information about probable virus/malware and how to submit suspicious files to Trend Micro for analysis. http://www.trendmicro.com/vinfo/virusencyclo/default5.asp? VName=POSSIBLE_VIRUS&VSect=Sn
Unable to clean or quarantine the file Clean is the first action. Quarantine is the second action, and both actions were unsuccessful. Solution: See Unable to quarantine the file/Unable to rename the file on page 7-84.
Unable to clean or delete the file Clean is the first action. Delete is the second action, and both actions were unsuccessful. Solution: See Unable to delete the file on page 7-85.
Unable to clean or rename the file Clean is the first action. Rename is the second action, and both actions were unsuccessful. Solution: See Unable to quarantine the file/Unable to rename the file on page 7-84.
Unable to quarantine the file/Unable to rename the file Explanation 1 The infected file may be locked by another application, is executing, or is on a CD. OfficeScan will quarantine/rename the file after the application releases the file or after it has been executed. Solution
7-84
For infected files on a CD, consider not using the CD as the virus may infect other computers on the network. Explanation 2 The infected file is in the Temporary Internet Files folder of the client computer. Since the computer downloads files while you are browsing, the web browser may have locked the infected file. When the web browser releases the file, OfficeScan will quarantine/rename the file. Solution: None
Unable to delete the file Explanation 1 The infected file may be contained in a compressed file and the Clean/Delete infected files within compressed files setting in Networked Computers > Global Client Settings is disabled. Solution Enable the Clean/Delete infected files within compressed files option. When enabled, OfficeScan decompresses a compressed file, cleans/deletes infected files within the compressed file, and then re-compresses the file.
Note Enabling this setting may increase computer resource usage during scanning and scanning may take longer to complete.
Explanation 2 The infected file may be locked by another application, is executing, or is on a CD. OfficeScan will delete the file after the application releases the file or after it has been executed. Solution For infected files on a CD, consider not using the CD as the virus may infect other computers on the network. Explanation 3
7-85
The infected file is in the Temporary Internet Files folder of the OfficeScan client computer. Since the computer downloads files while you are browsing, the web browser may have locked the infected file. When the web browser releases the file, OfficeScan will delete the file. Solution: None
Unable to send the quarantined file to the designated quarantine folder Although OfficeScan successfully quarantined a file in the \Suspect folder of the OfficeScan client computer, it cannot send the file to the designated quarantine directory. Solution Determine which scan type (Manual Scan, Real-time Scan, Scheduled Scan, or Scan Now) detected the virus/malware and then check the quarantine directory specified in Networked Computers > Client Management > Settings > {Scan Type} > Action tab. If the quarantine directory is on the OfficeScan server computer or is on another OfficeScan server computer: 1. 2. Check if the client can connect to the server. If you use URL as the quarantine directory format: a. b. Ensure that the computer name you specify after "http://" is correct. Check the size of the infected file. If it exceeds the maximum file size specified in Administration > Quarantine Manager, adjust the setting to accommodate the file. You may also perform other actions such as deleting the file. Check the size of the quarantine directory folder and determine whether it has exceeded the folder capacity specified in Administration > Quarantine Manager. Adjust the folder capacity or manually delete files in the quarantine directory.
c.
3.
If you use UNC path, ensure that the quarantine directory folder is shared to the group "Everyone" and that you assign read and write permission to this group. Also check if the quarantine directory folder exists and if the UNC path is correct.
7-86
If the quarantine directory is on another computer on the network (You can only use UNC path for this scenario): 1. 2. 3. 4. Check if the OfficeScan client can connect to the computer. Ensure that the quarantine directory folder is shared to the group "Everyone" and that you assign read and write permission to this group. Check if the quarantine directory folder exists. Check if the UNC path is correct.
If the quarantine directory is on a different directory on the OfficeScan client computer (you can only use absolute path for this scenario), check if the quarantine directory folder exists.
Unable to clean the file Explanation 1 The infected file may be contained in a compressed file and the Clean/Delete infected files within compressed files setting in Networked Computers > Global Client Settings is disabled. Solution Enable the Clean/Delete infected files within compressed files option. When enabled, OfficeScan decompresses a compressed file, cleans/deletes infected files within the compressed file, and then re-compresses the file.
Note Enabling this setting may increase computer resource usage during scanning and scanning may take longer to complete.
Explanation 2 The infected file is in the Temporary Internet Files folder of the OfficeScan client computer. Since the computer downloads files while you are browsing, the web browser may have locked the infected file. When the web browser releases the file, OfficeScan will clean the file. Solution: None
7-87
Explanation 3 The file may be uncleanable. For details and solutions, see Uncleanable File on page E-16.
Logs > Networked Computer Logs > Security Risks Networked Computers > Client Management ) to include all clients or select
2. 3. 4. 5.
In the client tree, click the root domain icon ( specific domains or clients.
Click Logs > Spyware/Grayware Logs or View Logs > Spyware/Grayware Logs. Specify the log criteria and then click Display Logs. View logs. Logs contain the following information:
Date and time of spyware/grayware detection Affected computer Spyware/Grayware name Scan type that detected the spyware/grayware Details about the spyware/grayware scan results (if scan action was performed successfully or not). See Spyware/Grayware Scan Results on page 7-89 for details. IP address MAC address
7-88
6. 7.
Add spyware/grayware you consider harmless to the spyware/grayware approved list. To save logs to a comma-separated value (CSV) file, click Export to CSV. Open the file or save it to a specific location. The CSV file contains the following information:
All information in the logs User name logged on to the computer at the time of detection
Successful, No Action Required This is the first level result if the scan action was successful. The second level result can be any of the following:
Cleaned: OfficeScan terminated processes or deleted registries, files, cookies and shortcuts. Access denied: OfficeScan denied access (copy, open) to the detected spyware/grayware components.
Further Action Required This is the first level result if the scan action was unsuccessful. The second level results will have at least one of the following messages:
Passed: OfficeScan did not perform any action but logged the spyware/ grayware detection for assessment. Solution: Add spyware/grayware that you consider safe to the spyware/ grayware approved list.
7-89
Spyware/Grayware unsafe to clean: This message displays if the Spyware Scan Engine attempts to clean any single folder and the following criteria are met:
Items to clean exceed 250MB. The operating system uses the files in the folder. The folder may also be necessary for normal system operation. The folder is a root directory (such as C: or F:)
Spyware/Grayware scan stopped manually. Please perform a complete scan: A user stopped scanning before it was completed. Solution: Run a Manual Scan and wait for the scan to finish.
Spyware/Grayware cleaned, restart required. Please restart the computer: OfficeScan cleaned spyware/grayware components but a computer restart is required to complete the task. Solution: Restart the computer immediately.
Spyware/Grayware cannot be cleaned: Spyware/Grayware was detected on a CD-ROM or network drive. OfficeScan cannot clean spyware/grayware detected on these locations. Solution: Manually remove the infected file.
Spyware/Grayware scan result unidentified. Please contact Trend Micro technical support: A new version of the Spyware Scan Engine provides a new scan result that OfficeScan has not been configured to handle. Solution: Contact your support provider for help in determining the new scan result.
7-90
Information about which spyware/grayware backup data was restored, the affected computer, and the restore result available in the logs. Procedure 1. 2. 3. Navigate to Logs > Networked Computer Logs > Spyware/Grayware Restore. Check the Result column to see if OfficeScan successfully restored the spyware/ grayware data. To save logs to a comma-separated value (CSV) file, click Export to CSV. Open the file or save it to a specific location.
Scan Logs
When Manual Scan, Scheduled Scan, or Scan Now runs, the OfficeScan client creates a scan log that contains information about the scan. You can view the scan log by accessing the OfficeScan client console. Clients do not send the scan log to the server. Scan logs show the following information:
Date and time OfficeScan started scanning Date and time OfficeScan stopped scanning Scan status
Completed: The scan was completed without problems. Stopped: The user stopped the scan before it can be completed. Stopped Unexpectedly: The scan was interrupted by the user, system, or an unexpected event. For example, the OfficeScan Real-time Scan service might have terminated unexpectedly or the user performed a forced restart of the client.
7-91
Number of infected files Number of unsuccessful actions Number of successful actions Virus Pattern version Smart Scan Agent Pattern version Spyware Pattern version
Enabling OfficeScan to monitor the network for suspicious activity Blocking critical client computer ports and folders Sending outbreak alert messages to clients Cleaning up infected computers
Virus/Malware outbreak Spyware/Grayware outbreak Firewall Violations outbreak Shared folder session outbreak
Define an outbreak by the number of detections and the detection period. An outbreak is triggered when the number of detections within the detection period is exceeded.
7-92
OfficeScan comes with a set of default notification messages that inform you and other OfficeScan administrators of an outbreak. You can modify the notifications and configure additional notification settings to suit your requirements.
Note OfficeScan can send security risk outbreak notifications through email, pager, SNMP trap, and Windows NT Event logs. For shared folder session outbreaks, OfficeScan sends notifications through email. Configure settings when OfficeScan sends notifications through these channels. For details, see Administrator Notification Settings on page 13-29.
OfficeScan sends a notification message when the number of detections is exceeded. For example, under the Virus/Malware section, if you specify 10 unique sources, 100 detections, and a time period of 5 hours, OfficeScan sends the notification when 10 different clients have reported a total of 101 security risks within a 5-hour period. If all instances are detected on only one client within a 5hour period, OfficeScan does not send the notification.
7-93
3.
In the Criteria tab: a. b. c. Go to the Shared Folder Sessions section. Select Monitor shared folder sessions on your network. In Shared folder sessions recorded, click the number link to view the computers with shared folders and the computers accessing the shared folders. Specify the number of shared folder sessions and the detection period.
d.
OfficeScan sends a notification message when the number of shared folder sessions is exceeded. 4. In the Email tab: a. b. c. d. Go to the Virus/Malware Outbreaks, Spyware/Grayware Outbreaks, and Shared Folder Session Outbreaks sections. Select Enable notification via email. Specify the email recipients. Accept or modify the default email subject and message. You can use token variables to represent data in the Subject and Message fields.
TABLE 7-20. Token Variables for Security Risk Outbreak Notifications VARIABLE
Virus/Malware outbreaks %CV %CC Total number of viruses/malware detected Total number of computers with virus/malware
DESCRIPTION
Spyware/Grayware outbreaks %CV %CC Total number of spyware/grayware detected Total number of computers with spyware/grayware
7-94
VARIABLE
%S %T %M
DESCRIPTION
Number of shared folder sessions Time period when shared folder sessions accumulated Time period, in minutes
e.
Select additional virus/malware and spyware/grayware information to include in the email. You can include the client/domain name, security risk name, date and time of detection, path and infected file, and scan result. Accept or modify the default notification messages.
f. 5.
In the Pager tab: a. b. c. Go to the Virus/Malware Outbreaks and Spyware/Grayware Outbreaks sections. Select Enable notification via pager. Type the message.
6.
In the SNMP Trap tab: a. b. c. Go to the Virus/Malware Outbreaks and Spyware/Grayware Outbreaks sections. Select Enable notification via SNMP trap. Accept or modify the default message. You can use token variables to represent data in the Message field. See Table 7-20: Token Variables for Security Risk Outbreak Notifications on page 7-94 for details.
7.
In the NT Event Log tab: a. b. c. Go to the Virus/Malware Outbreaks and Spyware/Grayware Outbreaks sections. Select Enable notification via NT Event Log. Accept or modify the default message. You can use token variables to represent data in the Message field. See Table 7-20: Token Variables for Security Risk Outbreak Notifications on page 7-94 for details.
7-95
8.
Click Save.
Limiting/Denying Access to Shared Folders on page 7-97 Blocking Vulnerable Ports on page 7-98 Denying Write Access to Files and Folders on page 7-100
5. 6.
Select the policies you want to enforce. Select the number of hours outbreak prevention will stay in effect. The default is 48 hours. You can manually restore network settings before the outbreak prevention period expires.
WARNING! Do not allow outbreak prevention to remain in effect indefinitely. To block or deny access to certain files, folders, or ports indefinitely, modify computer and network settings directly instead of using OfficeScan.
7.
7-96
Note To configure OfficeScan to notify you during an outbreak, go to Notifications > Administrator Notifications > Outbreak Notifications.
8.
Click Start Outbreak Notification. The outbreak prevention measures you selected display in a new window.
9.
Back in the Outbreak Prevention client tree, check the Outbreak Prevention column. A check mark appears on computers applying outbreak prevention measures.
Server events (initiating outbreak prevention and notifying clients to enable outbreak prevention) OfficeScan client event (enabling outbreak prevention)
Limiting/Denying Access to Shared Folders on page 7-97 Blocking Vulnerable Ports on page 7-98 Denying Write Access to Files and Folders on page 7-100
7-97
Procedure 1. 2. 3. 4. 5. Navigate to Networked Computers > Outbreak Prevention. In the client tree, click the root domain icon ( specific domains or clients. Click Start Outbreak Prevention. Click Limit/Deny access to shared folders. Select from the following options:
Allow read access only: Limits access to shared folders Deny Full Access
Note The read access only setting does not apply to shared folders already configured to deny full access.
6.
7.
Click Start Outbreak Notification. The outbreak prevention measures you selected display in a new window.
7-98
Procedure 1. 2. 3. 4. 5. 6. Navigate to Networked Computers > Outbreak Prevention. In the client tree, click the root domain icon ( specific domains or clients. Click Start Outbreak Prevention. Click Block Ports. Select whether to Block trusted port. Select the ports to block under the Blocked Ports column. a. If there are no ports in the table, click Add. In the screen that opens, select the ports to block and click Save.
All ports (including ICMP): Blocks all ports except the trusted port. If you also want to block the trusted port, select the Block trusted port check box in the previous screen. Commonly used ports: Select at least one port number for OfficeScan to save the port blocking settings. Trojan ports: Blocks ports commonly used by Trojan horse programs. See Trojan Port on page E-13 for details. A port number or port range: Optionally specify the direction of the traffic to block and some comments, such as the reason for blocking the ports you specified. Ping protocol (Reject ICMP): Click if you only want to block ICMP packets, such as ping requests.
b. c. d. 7.
To edit settings for the blocked port(s), click the port number. In the screen that opens, modify the settings and click Save. To remove a port from the list, select the check box next to the port number and click Delete.
Click Save.
7-99
The Outbreak Prevention Settings screen displays again. 8. Click Start Outbreak Notification. The outbreak prevention measures you selected display in a new window.
6.
Specify the files to protect in the protected directories. Select all files or files based on specific file extensions. For file extensions, specify an extension that is not in the list, type it in the text box, and then click Add. To protect specific files, under Files to Protect, type the full file name and click Add. Click Save. The Outbreak Prevention Settings screen displays again.
7. 8.
7-100
9.
Click Start Outbreak Notification. The outbreak prevention measures you selected display in a new window.
Server events (initiating outbreak prevention and notifying OfficeScan clients to enable outbreak prevention) OfficeScan client event (enabling outbreak prevention)
7-101
7.
After disabling outbreak prevention, scan networked computers for security risks to ensure that the outbreak has been contained.
7-102
Chapter 8
Behavior Monitoring on page 8-2 Behavior Monitoring Privileges on page 8-10 Behavior Monitoring Notifications for OfficeScan Client Users on page 8-11 Behavior Monitoring Logs on page 8-12
8-1
Behavior Monitoring
Behavior Monitoring constantly monitors endpoints for unusual modifications to the operating system or on installed software. Behavior Monitoring protects endpoints through Malware Behavior Blocking and Event Monitoring. Complementing these two features are a user-configured exception list and the Certified Safe Software Service.
Important Behavior Monitoring does not support Windows XP or Windows 2003 64-bit platforms. Behavior Monitoring does support Windows Vista 64-bit platforms with SP1 or later. By default, Behavior Monitoring is disabled on all versions of Windows Server 2003, Windows Server 2008, and Windows Server 2012. Before enabling Behavior Monitoring on these server platforms, read the guidelines and best practices outlined in OfficeScan Client Services on page 14-6.
Event Monitoring
Event Monitoring provides a more generic approach to protecting against unauthorized software and malware attacks. It monitors system areas for certain events, allowing
8-2
administrators to regulate programs that trigger such events. Use Event Monitoring if you have specific system protection requirements that are above and beyond what is provided by Malware Behavior Blocking. The following table provides a list of monitored system events.
TABLE 8-1. Monitored System Events EVENTS
Duplicated System File
DESCRIPTION
Many malicious programs create copies of themselves or other malicious programs using file names used by Windows system files. This is typically done to override or replace system files, avoid detection, or discourage users from deleting the malicious files. The Hosts file matches domain names with IP addresses. Many malicious programs modify the Hosts file so that the web browser is redirected to infected, non-existent, or fake websites. Suspicious behavior can be a specific action or a series of actions that is rarely carried out by legitimate programs. Programs exhibiting suspicious behavior should be used with caution. Spyware/grayware programs often install unwanted Internet Explorer plugins, including toolbars and Browser Helper Objects. Many virus/malware change Internet Explorer settings, including the home page, trusted websites, proxy server settings, and menu extensions. Modifications in Windows Security Policy can allow unwanted applications to run and change system settings. Many malicious programs configure Windows so that all applications automatically load a program library (DLL). This allows the malicious routines in the DLL to run every time an application starts. Many malicious programs modify Windows shell settings to associate themselves to certain file types. This routine allows malicious programs to launch automatically if users open the associated files in Windows Explorer. Changes to Windows shell settings can also allow malicious programs to track the programs used and start alongside legitimate applications.
New Internet Explorer Plugin Internet Explorer Setting Modification Security Policy Modification Program Library Injection
Shell Modification
8-3
EVENTS
New Service
DESCRIPTION
Windows services are processes that have special functions and typically run continuously in the background with full administrative access. Malicious programs sometimes install themselves as services to stay hidden. Certain Windows system files determine system behavior, including startup programs and screen saver settings. Many malicious programs modify system files to launch automatically at startup and control system behavior. The Windows Firewall policy determines the applications that have access to the network, the ports that are open for communication, and the IP addresses that can communicate with the computer. Many malicious programs modify the policy to allow themselves to access to the network and the Internet. Many malicious programs perform various actions on built-in Windows processes. These actions can include terminating or modifying running processes. Malicious applications usually add or modify autostart entries in the Windows registry to automatically launch every time the computer starts.
When Event Monitoring detects a monitored system event, it performs the action configured for the event. The following table lists possible actions that administrators can take on monitored system events.
8-4
DESCRIPTION
OfficeScan always allows programs associated with an event but records this action in the logs for assessment. This is the default action for all monitored system events. Note This option is not supported for Program Library Injections on 64-bit systems.
OfficeScan always allows programs associated with an event. OfficeScan prompts users to allow or deny programs associated with an event and add the programs to the exception list If the user does not respond within a certain time period, OfficeScan automatically allows the program to run. The default time period is 30 seconds. To modify the time period, see Configuring Global Behavior Monitoring Settings on page 8-7. Note This option is not supported for Program Library Injections on 64-bit systems.
Deny
OfficeScan always blocks programs associated with an event and records this action in the logs. When a program is blocked and notifications are enabled, OfficeScan displays a notification on the OfficeScan client computer. For details about notifications, see Behavior Monitoring Notifications for OfficeScan Client Users on page 8-11.
8-5
Approved Programs: Programs in this list can be run. An approved program will still be checked by other OfficeScan features (such as file-based scanning) before it is finally allowed to run. Blocked Programs: Programs in this list can never be started. To configure this list, Event Monitoring should be enabled.
Configure the exception list from the web console. You can also grant users the privilege to configure their own exception list from the OfficeScan client console. For details, see Behavior Monitoring Privileges on page 8-10.
Configuring Malware Behavior Blocking, Event Monitoring, and the Exception List
Procedure 1. 2. 3. 4. 5. Navigate to Networked Computers > Client Management. In the client tree, click the root domain icon ( specific domains or clients. ) to include all clients or select
Click Settings > Behavior Monitoring Settings. Select Enable Malware Behavior Blocking. Configure Event Monitoring settings. a. b. Select Enable Event Monitoring. Choose the system events to monitor and select an action for each of the selected events. For information about monitored system events and actions, see Event Monitoring on page 8-2.
6.
Configure the exception list. a. Under Enter Program Full Path, type the full path of the program to approve or block. Separate multiple entries with semicolons (;). The exception list supports wildcards and UNC paths. Click Approve Programs or Block Programs.
b.
8-6
c.
To remove a blocked or approved program from the list, click the trash bin icon ( ) next to the program.
Note OfficeScan accepts a maximum of 100 approved programs and 100 blocked programs.
7.
If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
Procedure 1. 2. 3. Navigate to Networked Computers > Global Client Settings. Go to the Behavior Monitoring Settings section. Configure the following settings as required:
8-7
OPTION
Automatically allow program if client does not respond within __ seconds
DESCRIPTION
This setting only works if Event Monitoring is enabled and the action for a monitored system event is "Ask when necessary". This action prompts a user to allow or deny programs associated with the event. If the user does not respond within a certain time period, OfficeScan automatically allows the program to run. For details, see Event Monitoring on page 8-2. The Certified Safe Software Service queries Trend Micro datacenters to verify the safety of a program detected by either Malware Behavior Blocking or Event Monitoring. Enable Certified Safe Software Service to reduce the likelihood of false positive detections. Note Ensure that OfficeScan clients have the correct proxy settings (for details, see OfficeScan Client Proxy Settings on page 14-46) before enabling Certified Safe Software Service. Incorrect proxy settings, along with an intermittent Internet connection, can result in delays or failure to receive a response from Trend Micro datacenters, causing monitored programs to appear unresponsive. In addition, pure IPv6 OfficeScan clients cannot query directly from Trend Micro datacenters. A dual-stack proxy server that can convert IP addresses, such as DeleGate, is required to allow the OfficeScan clients to connect to the Trend Micro datacenters.
8-8
OPTION
Prompt users before executing newly encountered programs downloaded through HTTP or email applications (Server platforms excluded)
DESCRIPTION
Behavior Monitoring works in conjunction with Web Reputation Services to verify the prevalence of files downloaded through HTTP channels or email applications. After detecting a "newly encountered" file, administrators can choose to prompt users before executing the file. Trend Micro classifies a program as newly encountered based on the number of file detections or historical age of the file as determined by the Smart Protection Network. Note
Administrators must enable Web Reputation Services on the client to allow OfficeScan to scan HTTP traffic before this prompt can display. For Windows 7/Vista/XP systems, this prompt only supports ports 80, 81, and 8080. OfficeScan matches the file names downloaded through email applications during the execution process. If the file name has been changed, the user does not receive a prompt.
4.
Click Save.
8-9
8-10
2. 3. 4. 5. 6.
In the client tree, click the root domain icon ( specific domains or clients.
Click Settings > Privileges and Other Settings. On the Privileges tab, go to the Behavior Monitoring Privileges section. Select Display the Behavior Monitoring tab on the client console. If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
8-11
4. 5. 6.
Click the Other Settings tab and go to the Behavior Monitoring Settings section. Select Display a notification when a program is blocked. If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
8-12
To keep the size of logs from occupying too much space on the hard disk, manually delete logs or configure a log deletion schedule. For more information about managing logs, see Log Management on page 13-33.
Click Logs > Behavior Monitoring Logs or View Logs > Behavior Monitoring Logs. Specify the log criteria and then click Display Logs. View logs. Logs contain the following information:
Date/Time unauthorized process was detected Computer where unauthorized process was detected Computers domain Violation, which is the event monitoring rule violated by the process Action performed when violation was detected Event, which is the type of object accessed by the program Risk level of the unauthorized program Program, which is the unauthorized program Operation, which is the action performed by the unauthorized program Target, which is the process that was accessed
8-13
6.
To save logs to a comma-separated value (CSV) file, click Export to CSV. Open the file or save it to a specific location.
4.
Specify the value in seconds. For example, to change the log period to 2 hours, change the value to 7200.
5. 6. 7. 8.
Save the file. Go to Networked Computers > Global Client Settings. Click Save without changing any settings. Restart the client.
8-14
Chapter 9
Device Control on page 9-2 Permissions for Storage Devices on page 9-3 Permissions for Non-storage Devices on page 9-10 Modifying Device Control Notifications on page 9-16 Device Control Logs on page 9-17
9-1
Device Control
Device Control regulates access to external storage devices and network resources connected to computers. Device Control helps prevent data loss and leakage and, combined with file scanning, helps guard against security risks. You can configure Device Control policies for internal and external clients. OfficeScan administrators typically configure a stricter policy for external clients. Policies are granular settings in the OfficeScan client tree. You can enforce specific policies to client groups or individual clients. You can also enforce a single policy to all clients. After you deploy the policies, clients use the location criteria you have set in the Computer Location screen (see Computer Location on page 14-2) to determine their location and the policy to apply. Clients switch policies each time the location changes. Important:
By default, Device Control is disabled on all versions of Windows Server 2003, Windows Server 2008, and Windows Server 2012. Before enabling Device Control on these server platforms, read the guidelines and best practices outlined in OfficeScan Client Services on page 14-6. The types of devices that OfficeScan can monitor depends on whether the Data Protection license is activated. Data Protection is a separately licensed module and must be activated before you can use it. For details about the Data Protection license, see Data Protection License on page 3-4.
TABLE 9-1. Device Types DATA PROTECTION ACTIVATED
Storage Devices CD/DVD Floppy disks Network drives Monitored Monitored Monitored Monitored Monitored Monitored
9-2
Monitored
Not monitored Not monitored Not monitored Not monitored Not monitored Not monitored Not monitored Not monitored Not monitored
For a list of supported device models, see the Data Protection Lists document at: http://docs.trendmicro.com/en-us/enterprise/officescan.aspx
Allow access to USB storage devices, CD/DVD, floppy disks, and network drives. You can grant full access to these devices or limit the level of access. Configure the list of approved USB storage devices. Device Control allows you to block access to all USB storage devices, except those that have been added to the list of approved devices. You can grant full access to the approved devices or limit the level of access.
9-3
INCOMING FILES
Permitted operations: Save, Move, Copy This means that a file can be saved, moved, and copied to the device. Permitted operations: Save, Move, Copy
Modify
Permitted operations: Copy, Move, Open, Save, Delete Prohibited operations: Execute
Permitted operations: Copy, Open, Execute Prohibited operations: Save, Move, Delete
Read
Permitted operations: Copy, Open Prohibited operations: Save, Move, Delete, Execute
Prohibited operations: All operations The device and the files it contains are visible to the user (for example, from Windows Explorer).
Prohibited operations: All operations The device and the files it contains are not visible to the user (for example, from Windows Explorer).
The file-based scanning function in OfficeScan complements and may override the device permissions. For example, if the permission allows a file to be opened but OfficeScan detects that the file is infected with malware, a specific scan action will be
9-4
performed on the file to eliminate the malware. If the scan action is Clean, the file opens after it is cleaned. However, if the scan action is Delete, the file is deleted.
Tip Device Control for Data Protection supports all 64-bit platforms. For Unauthorized Change Prevention monitoring on systems that OfficeScan does not support (for details, see Device Control 64-bit Support for Unauthorized Change Prevention on page 1-9), set the device permission to Block to limit access to these devices.
You can keep the permissions limited but grant advanced permissions to certain programs on the storage devices and on the local computer. To define programs, configure the following program lists.
9-5
DESCRIPTION
This list contains local programs and programs on storage devices that have read and write access to the devices. An example of a local program is Microsoft Word (winword.exe), which is usually found in C:\Program Files\Microsoft Office \Office. If the permission for USB storage devices is "List device content only" but "C:
\Program Files\Microsoft Office \Office\winword.exe" is included in this
VALID INPUTS
Program path and name For details, see Specifying a Program Path and Name on page 9-8.
list:
A user will have read and write access to any file on the USB storage device that is accessed from Microsoft Word. A user can save, move, or copy a Microsoft Word file to the USB storage device. Program path and name or Digital Signature Provider For details, see Specifying a Program Path and Name on page 9-8 or Specifying a Digital Signature Provider on page 9-7.
This list contains programs on storage devices that users or the system can execute. For example, if you want to allow users to install software from a CD, add the installation program path and name, such as "E:\Installer\Setup.exe", to this list.
There are instances when you need to add a program to both lists. Consider the data lock feature in a USB storage device, which, if enabled, prompts users for a valid user name and password before the device can be unlocked. The data lock feature uses a program on the device called "Password.exe", which must be allowed to execute so that users can unlock the device successfully. "Password.exe" must also have read and write access to the device so that users can change the user name or password.
9-6
Each program list on the user interface can contain up to 100 programs. If you want to add more programs to a program list, you will need to add them to the ofcscan.ini file, which can accommodate up to 1,000 programs. For instructions on adding programs to the ofcscan.ini file, see Adding Programs to the Device Control Lists Using ofcscan.ini on page 9-15.
WARNING! Programs added to the ofcscan.ini file will be deployed to the root domain and will overwrite programs on individual domains and clients.
9-7
Signature Provider by checking the properties of a program (for example, by rightclicking the program and selecting Properties).
FIGURE 9-1. Digital Signature Provider for the OfficeScan client program
(PccNTMon.exe)
9-8
Note Wildcards cannot be used to represent folder names. The exact name of a folder must be specified.
MATCHED DATA
The "Password.exe" file located directly under any drive Any file in C:\Program Files that has a file extension Any file in C:\Program Files that has a file extension Any .exe file in C:\Program Files that has 3 characters starting with the letter "a" and ending with the letter "c" Any file located directly under the C:\ drive, with or without file extensions
REASON
?? represents two characters and drive letters only have a single alphabetic character. * represents multi-character data and drive letters only have a single alphabetic character. Wildcards cannot be used to represent folder names. The exact name of a folder must be specified.
9-9
If you are on the External Clients tab, you can apply settings to internal clients by selecting Apply all settings to internal clients. If you are on the Internal Clients tab, you can apply settings to external clients by selecting Apply all settings to external clients.
7. 8.
Choose to allow or block the AutoRun function (autorun.inf) on USB storage devices. Configure settings for storage devices. a. b. Select a permission for each storage device. For details about permissions, see Permissions for Storage Devices on page 9-3. If the permission for USB storage devices is Block, configure a list of approved devices. Users can access these devices and you can control the
9-10
level of access using permissions. See Configuring an Approved List of USB Devices on page 9-12. 9. For each non-storage device, select Allow or Block.
10. If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
Procedure 1. Click Advanced permissions and notifications. A new screen opens. 2. Below Programs with read and write access to storage devices, type a program path and file name and then click Add. Digital Signature Provider is not accepted.
9-11
3. 4.
Below Programs on storage devices that are allowed to execute, type the program path and name or the Digital Signature Provider and then click Add. Select Display a notification message on the client computer when OfficeScan detects unauthorized device access.
Unauthorized device access refers to prohibited device operations. For example, if the device permission is "Read", users will not be able to save, move, delete, or execute a file on the device. For a list of prohibited device operations based on permissions, see Permissions for Storage Devices on page 9-3. You can modify the notification message. For details, see Modifying Device Control Notifications on page 9-16.
5.
Click Back.
4.
Select the permission for the device. For details about permissions, see Permissions for Storage Devices on page 9-3.
9-12
5. 6.
To add more devices, click the plus (+) icon. Click < Back.
9-13
2. 3. 4. 5. 6.
In the client tree, click the root domain icon ( specific domains or clients. Click Settings > Device Control Settings.
Click the External Clients tab to configure settings for external clients or the Internal Clients tab to configure settings for internal clients. Select Enable Device Control. Apply settings as follows:
If you are on the External Clients tab, you can apply settings to internal clients by selecting Apply all settings to internal clients. If you are on the Internal Clients tab, you can apply settings to external clients by selecting Apply all settings to external clients.
7. 8. 9.
Choose to allow or block the AutoRun function (autorun.inf) on USB storage devices. Select a permission for each storage device. For details about permissions, see Permissions for Storage Devices on page 9-3. Configure advanced permissions and notifications if the permission for a storage device is any of the following: Modify, Read and execute, Read, or List device content only. See Configuring Advanced Permissions on page 9-11.
10. If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
9-14
Procedure 1. 2. 3. On the OfficeScan server computer, navigate to <Server installation folder>\PCCSRV. Open ofcscan.ini using a text editor. To add programs with read and write access to storage devices: a. Locate the following lines:
[DAC_APPROVED_LIST] Count=x
b. c.
Replace "x" with the number of programs in the program list. Below "Count=x", add programs by typing the following:
Item<number>=<program path and name or Digital Signature Provider>
For example:
[DAC_APPROVED_LIST] Count=3 Item0=C:\Program Files\program.exe Item1=?:\password.exe Item2=Microsoft Corporation
4.
To add programs on storage devices that are allowed to execute: a. Locate the following lines:
9-15
[DAC_EXECUTABLE_LIST] Count=x
b. c.
Replace "x" with the number of programs in the program list. Below "Count=x", add programs by typing the following:
Item<number>=<program path and name or Digital Signature Provider>
For example:
[DAC_EXECUTABLE_LIST] Count=3 Item0=?:\Installer\Setup.exe Item1=E:\*.exe Item2=Trend Micro, Inc.
5. 6. 7.
Save and close the ofcscan.ini file. Open the OfficeScan web console and go to Networked Computers > Global Client Settings. Click Save to deploy the program lists to all clients.
9-16
3. 4.
Modify the default messages in the text box provided. Click Save.
Click Logs > Device Control Logs or View Logs > Device Control Logs. Specify the log criteria and then click Display Logs. View logs. Logs contain the following information:
Date/Time unauthorized access was detected Computer where external device is connected or where network resource is mapped Computer domain where external device is connected or where network resource is mapped
9-17
Device type or network resource accessed Target, which is the item on the device or network resource that was accessed Accessed by, which specifies where access was initiated Permissions set for the target
6.
To save logs to a comma-separated value (CSV) file, click Export to CSV. Open the file or save it to a specific location.
9-18
Chapter 10
About Data Loss Prevention on page 10-2 Data Loss Prevention Policies on page 10-3 Data Identifier Types on page 10-4 Data Loss Prevention Templates on page 10-18 DLP Channels on page 10-23 Data Loss Prevention Actions on page 10-34 Data Loss Prevention Exceptions on page 10-35 Data Loss Prevention Policy Configuration on page 10-40 Data Loss Prevention Notifications on page 10-45 Data Loss Prevention Logs on page 10-49
10-1
Damage brand reputation Erode customer trust in the organization Result in unnecessary costs to cover for remediation and to pay fines for violating compliance regulations Lead to lost business opportunities and revenue when intellectual property is stolen
With the prevalence and damaging effects of data breaches, organizations now see digital asset protection as a critical component of their security infrastructure. Data Loss Prevention safeguards an organizations sensitive data against accidental or deliberate leakage. Data Loss Prevention allows you to:
Identify the sensitive information that requires protection using data identifiers Create policies that limit or prevent the transmission of digital assets through common transmission channels, such as email and external devices Enforce compliance to established privacy standards
Before you can monitor sensitive information for potential loss, you must be able to answer the following questions:
What data needs protection from unauthorized users? Where does the sensitive data reside? How is the sensitive data transmitted? What users are authorized to access or transmit the sensitive data?
10-2
This important audit typically involves multiple departments and personnel familiar with the sensitive information in your organization. If you already defined your sensitive information and security policies, you can begin to define data identifiers and company policies.
You can configure policies for internal and external clients. OfficeScan administrators typically configure a stricter policy for external clients. You can enforce specific policies to client groups or individual clients. You can also enforce a single policy to all clients. After you deploy the policies, clients use the location criteria you have set in the Computer Location screen (see Computer Location on page 14-2) to determine their location and the policy to apply. Clients switch policies each time the location changes.
Policy Configuration
Define DLP policies by configuring the following settings and deploying the settings to selected clients:
10-3
DESCRIPTION
OfficeScan uses data identifiers to identify sensitive information. Data identifiers include expressions, file attributes, and keywords which act as the building blocks for DLP templates. A DLP rule can consist of multiple templates, channels, and actions. Each rule is a subset of the encompassing DLP policy. A DLP template combines data identifiers and logical operators (And, Or, Except) to form condition statements. Only files or data that satisfy a certain condition statement will be subject to a DLP rule. OfficeScan comes with a set of predefined templates and allows you to create customized templates. A DLP rule can contain one or several templates. OfficeScan uses the first-match rule when checking templates. This means that if a file or data matches the data identifiers in a template, OfficeScan will no longer check the other templates.
Rules Templates
Channels
Channels are entities that transmit sensitive information. OfficeScan supports popular transmission channels, such as email, removable storage devices, and instant messaging applications. OfficeScan performs one or several actions when it detects an attempt to transmit sensitive information through any of the channels. Exceptions act as overrides to the configured DLP rules. Configure exceptions to manage non-monitored targets, monitored targets, and compressed file scanning.
Actions
Exceptions
Expressions: Data that has a certain structure. For details, see Expressions on page 10-5.
10-4
File attributes: File properties such as file type and file size. For details, see File Attributes on page 10-10. Keywords: A list of special words or phrases. For details, see Keywords on page 10-13.
Note It is not possible to delete a data identifier that is being used in a DLP template. Delete the template before deleting the data identifier.
Expressions
An expression is data that has a certain structure. For example, credit card numbers typically have 16 digits and appear in the format "nnnn-nnnn-nnnn-nnnn", making them suitable for expression-based detections. You can use predefined and customized expressions. For details, see Predefined Expressions on page 10-5 and Customized Expressions on page 10-6.
Predefined Expressions
OfficeScan comes with a set of predefined expressions. These expressions cannot be modified or deleted. OfficeScan verifies these expressions using pattern matching and mathematical equations. After OfficeScan matches potentially sensitive data with an expression, the data may also undergo additional verification checks. For a complete list of predefined expressions, see the Data Protection Lists document at http://docs.trendmicro.com/en-us/enterprise/data-protection-referencedocuments.aspx.
10-5
Procedure 1. 2. 3. 4. Navigate to Networked Computers > Data Loss Prevention > Data Identifiers. Click the Expression tab. Click the expression name. View settings in the screen that opens.
Customized Expressions
Create customized expressions if none of the predefined expressions meet your requirements. Expressions are a powerful string-matching tool. Ensure that you are comfortable with expression syntax before creating expressions. Poorly written expressions can dramatically impact performance. When creating expressions:
Refer to the predefined expressions for guidance on how to define valid expressions. For example, if you are creating an expression that includes a date, you can refer to the expressions prefixed with "Date". Note that OfficeScan follows the expression formats defined in Perl Compatible Regular Expressions (PCRE). For more information on PCRE, visit the following website: http://www.pcre.org/
Start with simple expressions. Modify the expressions if they are causing false alarms or fine tune them to improve detections.
There are several criteria that you can choose from when creating expressions. An expression must satisfy your chosen criteria before OfficeScan subjects it to a DLP policy. For details about the different criteria options, see Criteria for Customized Expression on page 10-7.
10-6
RULE
EXAMPLE
All - Names from US Census Bureau Expression: [^\w]([A-Z][a-z]{1,12} (\s?,\s?|[\s]|\s([A-Z])\.\s)[A-Z][a-z] {1,12})[^\w]
Specific characters
An expression must include the characters you have specified. In addition, the number of characters in the expression must be within the minimum and maximum limits.
US - ABA Routing Number Expression: [^\d]([0123678]\d{8}) [^\d] Characters: 0123456789 Minimum characters: 9 Maximum characters: 9 All - Home Address Expression: \D(\d+\s[a-z.]+\s([a-z] +\s){0,2} (lane|ln|street|st|avenue| ave| road|rd|place|pl|drive|dr| circle| cr|court|ct|boulevard|blvd) \.? [0-9a-z,#\s\.]{0,30}[\s|,][a-z]{2}\ s\d{5}(-\d{4})?)[^\d-] Suffix characters: 0123456789Number of characters: 5 Minimum characters in the expression: 25 Maximum characters in the expression: 80
Suffix
Suffix refers to the last segment of an expression. A suffix must include the characters you have specified and contain a certain number of characters. In addition, the number of characters in the expression must be within the minimum and maximum limits.
10-7
CRITERIA
Single- character separator
RULE
An expression must have two segments separated by a character. The character must be 1 byte in length. In addition, the number of characters left of the separator must be within the minimum and maximum limits. The number of characters right of the separator must not exceed the maximum limit.
EXAMPLE
All - Email Address Expression: [^\w.]([\w\.]{1,20}@[az0-9]{2,20}[\.][a-z]{2,5}[a-z\.] {0,10})[^\w.] Separator: @ Minimum characters to the left: 3 Maximum characters to the left: 15 Maximum characters to the right: 30
><*^|&?\/
5. 6. 7.
Type a description that does not exceed 256 bytes in length. Type the expression and specify whether it is case-sensitive. Type the displayed data. For example, if you are creating an expression for ID numbers, type a sample ID number. This data is used for reference purposes only and will not appear elsewhere in the product.
10-8
8.
Choose one of the following criteria and configure additional settings for the chosen criteria (see Criteria for Customized Expression on page 10-7):
9.
Test the expression against an actual data. For example, if the expression is for a national ID, type a valid ID number in the Test data text box, click Test, and then check the result.
11. A message appears, reminding you to deploy the settings to clients. Click Close. 12. Back in the DLP Data Identifiers screen, click Apply to All Clients.
10-9
Procedure 1. 2. 3. 4. Navigate to Networked Computers > Data Loss Prevention > Data Identifiers. Click the Expression tab. Click Import and then locate the .dat file containing the expressions. Click Open. A message appears, informing you if the import was successful. If an expression to be imported already exists, it will be skipped. 5. Click Apply to All Clients.
File Attributes
File attributes are specific properties of a file. You can use two file attributes when defining data identifiers, namely, file type and file size. For example, a software development company may want to limit the sharing of the companys software installer to the R&D department, whose members are responsible for the development and testing of the software. In this case, the OfficeScan administrator can create a policy that blocks the transmission of executable files that are 10 to 40MB in size to all departments except R&D. By themselves, file attributes are poor identifiers of sensitive files. Continuing the example in this topic, third-party software installers shared by other departments will most likely be blocked. Trend Micro therefore recommends combining file attributes with other DLP data identifiers for a more targeted detection of sensitive files. For a complete list of supported file types see the Data Protection Lists document at http://docs.trendmicro.com/en-us/enterprise/data-protection-referencedocuments.aspx.
10-10
><*^|&?\/
5. 6. 7.
Type a description that does not exceed 256 bytes in length. Select your preferred true file types. If a file type you want to include is not listed, select File extensions and then type the file types extension. OfficeScan checks files with the specified extension but does not check their true file types. Guidelines when specifying file extensions:
Each extension must start with an asterisk (*), followed by a period (.), and then the extension. The asterisk is a wildcard, which represents a files actual name. For example, *.pol matches 12345.pol and test.pol. You can include wildcards in extensions. Use a question mark (?) to represent a single character and an asterisk (*) to represent two or more characters. See the following examples: - *.*m matches the following files: ABC.dem, ABC.prm, ABC.sdcm - *.m*r matches the following files: ABC.mgdr, ABC.mtp2r, ABC.mdmr - *.fm? matches the following files: ABC.fme, ABC.fml, ABC.fmp
Be careful when adding an asterisk at the end of an extension as this might match parts of a file name and an unrelated extension. For example: *.do* matches abc.doctor_john.jpg and abc.donor12.pdf.
10-11
Use semicolons (;) to separate file extensions. There is no need to add a space after a semicolon.
8. 9.
Type the minimum and maximum file sizes in bytes. Both file sizes must be whole numbers larger than zero. Click Save.
10. A message appears, reminding you to deploy the settings to clients. Click Close. 11. Back in the DLP Data Identifiers screen, click Apply to All Clients.
Procedure 1. 2. 3. 4. Navigate to Networked Computers > Data Loss Prevention > Data Identifiers. Click the File Attribute tab. Click Import and then locate the .dat file containing the file attribute lists. Click Open. A message appears, informing you if the import was successful. If a file attribute list to be imported already exists, it will be skipped. 5. Click Apply to All Clients.
10-12
Keywords
Keywords are special words or phrases. You can add related keywords to a keyword list to identify specific types of data. For example, "prognosis", "blood type", "vaccination", and "physician" are keywords that may appear in a medical certificate. If you want to prevent the transmission of medical certificate files, you can use these keywords in a DLP policy and then configure OfficeScan to block files containing these keywords. Commonly used words can be combined to form meaningful keywords. For example, "end", "read", "if", and "at" can be combined to form keywords found in source codes, such as "END-IF", "END-READ", and "AT END". You can use predefined and customized keyword lists. For details, see Predefined Keyword Lists on page 10-13 and Customized Keyword Lists on page 10-14.
All: All of the keywords in the list must be present in the document. Any: Any one of the keywords in the list must be present in the document.
10-13
Specific number: There must be at least the specified number of keywords in the document. If there are more keywords in the document than the number specified, a violation will trigger.
Distance Condition
Some of the lists contain a distance condition to determine if a violation is present. Distance refers to the amount of characters between the first character of one keyword and the first character of another keyword. Consider the following entry: First Name:_John_ Last Name:_Smith_ The Forms - First Name, Last Name list has a distance condition of fifty (50) and the commonly used form fields of First Name and Last Name. In the example above, a violation will trigger as the number of characters between the F in First Name and the L in Last Name is equal to eighteen (18). For an example of an entry that would not trigger a violation, consider the following: The first name of our new employee from Switzerland is John. His last name is Smith. In this example, the number of characters between the f in first name and the l in last name is sixty-one (61). This exceeds the distance threshold and does not trigger a violation.
10-14
For details regarding the criteria rules, see Customized Keyword List Criteria on page 10-15.
RULE
A file must contain at least one keyword in the keyword list. A file must contain all the keywords in the keyword list. A file must contain all the keywords in the keyword list. In addition, each keyword pair must be within <x> characters of each other. For example, your 3 keywords are WEB, DISK, and USB and the number of characters you specified is 20. If OfficeScan detects all keywords in the order DISK, WEB, and USB, the number of characters from the "D" (in DISK) to the "W" (in WEB) and from the "W" to the "U" (in USB) must be 20 characters or less. The following data matches the criteria: DISK####WEB############USB The following data does not match the criteria: DISK*******************WEB****USB(23 characters between "D" and "W") When deciding on the number of characters, remember that a small number, such as 10, will usually result in faster scanning time but will only cover a relatively small area. This may reduce the likelihood of detecting sensitive data, especially in large files. As the number increases, the area covered also increases but scanning time might be slower.
10-15
CRITERIA
Combined score for keywords exceeds threshold
RULE
A file must contain one or more keywords in the keyword list. If only one keyword was detected, its score must be higher than the threshold. If there are several keywords, their combined score must be higher than the threshold. Assign each keyword a score of 1 to 10. A highly confidential word or phrase, such as "salary increase" for the Human Resources department, should have a relatively high score. Words or phrases that, by themselves, do not carry much weight can have lower scores. Consider the scores that you assigned to the keywords when configuring the threshold. For example, if you have five keywords and three of those keywords are high priority, the threshold can be equal to or lower than the combined score of the three high priority keywords. This means that the detection of these three keywords is enough to treat the file as sensitive.
><*^|&?\/
5. 6.
Type a description that does not exceed 256 bytes in length. Choose one of the following criteria and configure additional settings for the chosen criteria:
Any keyword
10-16
All keywords All keywords within <x> characters Combined score for keywords exceeds threshold
7.
To manually add keywords to the list: a. b. Type a keyword that is 3 to 40 bytes in length and specify whether it is casesensitive. Click Add.
8.
a. b.
Click Import and then locate the .csv file containing the keywords. Click Open. A message appears, informing you if the import was successful. If a keyword to be imported already exists in the list, it will be skipped.
9.
a. b.
Click Export. Save the resulting .csv file to your preferred location.
10-17
12. A message appears, reminding you to deploy the settings to clients. Click Close. 13. Back in the DLP Data Identifiers screen, click Apply to All Clients.
Procedure 1. 2. 3. 4. Navigate to Networked Computers > Data Loss Prevention > Data Identifiers. Click the Keyword tab. Click Import and then locate the .dat file containing the keyword lists. Click Open. A message appears, informing you if the import was successful. If a keyword list to be imported already exists, it will be skipped. 5. Click Apply to All Clients.
10-18
For example, a file must be a Microsoft Word file (file attribute) AND must contain certain legal terms (keywords) AND must contain ID numbers (expressions) for it to be subject to the "Employment Contracts" policy. This policy allows Human Resources personnel to transmit the file through printing so that the printed copy can be signed by an employee. Transmission through all other possible channels, such as email, is blocked. You can create your own templates if you have configured DLP data identifiers. You can also use predefined templates. For details, see Customized DLP Templates on page 10-19 and Predefined DLP Templates on page 10-19.
Note It is not possible to delete a template that is being used in a DLP policy. Remove the template from the policy before deleting it.
GLBA: Gramm-Leach-Billey Act HIPAA: Health Insurance Portability and Accountability Act PCI-DSS: Payment Card Industry Data Security Standard SB-1386: US Senate Bill 1386 US PII: United States Personally Identifiable Information
For a detailed list on the purposes of all predefined templates, and examples of data being protected, see the Data Protection Lists document at http:// docs.trendmicro.com/en-us/enterprise/data-protection-reference-documents.aspx.
10-19
For more information and examples on how condition statements and logical operators work, see Condition Statements and Logical Operators on page 10-20.
A file must satisfy [Data Identifier 1] or [Data Identifier 2]. For example: A file must be [an Adobe PDF document] or [a Microsoft Word document].
A file must not satisfy [Data Identifier 1]. For example: A file must not be [a multimedia file].
As the last example in the table illustrates, the first data identifier in the condition statement can have the "Except" operator if a file must not satisfy all of the data identifiers in the statement. In most cases, however, the first data identifier does not have an operator.
10-20
Creating a Template
Procedure 1. 2. Navigate to Networked Computers > Data Loss Prevention > Templates. Click Add. A new screen displays. 3. Type a name for the template. The name must not exceed 100 bytes in length and cannot contain the following characters:
><*^|&?\/
4. 5.
Type a description that does not exceed 256 bytes in length. Select data identifiers and then click the "add" icon. When selecting definitions:
Select multiple entries by pressing and holding the CTRL key and then selecting the data identifiers. Use the search feature if you have a specific definition in mind. You can type the full or partial name of the data identifier. Each template can contain a maximum of 30 data identifiers.
6. 7. 8. 9.
To create a new expression, click Expressions and then click Add new expression. In the screen that appears, configure settings for the expression. To create a new file attribute list, click File attributes and then click Add new file attribute. In the screen that appears, configure settings for the file attribute list. To create a new keyword list, click Keywords and then click Add new keyword. In the screen that appears, configure settings for the keyword list. If you selected an expression, type the number of occurrences, which is the number of times an expression must occur before OfficeScan subjects it to a DLP policy.
10-21
Note Use logical operators carefully when configuring condition statements. Incorrect usage leads to an erroneous condition statement that will likely produce unexpected results. For examples of correct usage, see Condition Statements and Logical Operators on page 10-20.
11. To remove a data identifier from the list of selected identifiers, click the trash bin icon. 12. Below Preview, check the condition statement and make changes if this is not your intended statement. 13. Click Save. 14. A message appears, reminding you to deploy the settings to clients. Click Close. 15. Back in the DLP Templates screen, click Apply to All Clients.
Importing Templates
Use this option if you have a properly-formatted .dat file containing the templates. You can generate the file by exporting the templates from either the OfficeScan server you are currently accessing or from another OfficeScan server.
Note To import DLP templates from OfficeScan 10.6, import the associated data identifiers (previously named Definitions) first. OfficeScan cannot import templates that are missing their associated data identifiers.
Procedure 1. 2. 3. Navigate to Networked Computers > Data Loss Prevention > Templates. Click Import and then locate the .dat file containing the templates. Click Open. A message appears, informing you if the import was successful. If a template to be imported already exists, it will be skipped.
10-22
4.
DLP Channels
Users can transmit sensitive information through various channels. OfficeScan can monitor the following channels:
Network channels: Sensitive information is transmitted using network protocols, such as HTTP and FTP. System and application channels: Sensitive information is transmitted using a local computers applications and peripherals.
Network Channels
OfficeScan can monitor data transmission through the following network channels:
Email clients FTP HTTP and HTTPS IM Applications SMB protocol Webmail
To determine data transmissions to monitor, OfficeScan checks the transmission scope, which you need to configure. Depending on the scope that you selected, OfficeScan will monitor all data transmissions or only transmissions outside the Local Area Network (LAN). For details about transmission scope, see Transmission Scope and Targets for Network Channels on page 10-27.
10-23
Email Clients
OfficeScan monitors email transmitted through various email clients. OfficeScan checks the emails subject, body, and attachments for data identifiers. For a list of supported email clients, see the Data Protection Lists document at: http://docs.trendmicro.com/en-us/enterprise/officescan.aspx Monitoring occurs when a user attempts to send the email. If the email contains data identifiers, OfficeScan will either allow or block the email. You can define monitored and non-monitored internal email domains.
Monitored email domains: When OfficeScan detects email transmitted to a monitored domain, it checks the action for the policy. Depending on the action, the transmission is allowed or blocked.
Note If you select email clients as a monitored channel, an email must match a policy for it to be monitored. In contrast, an email sent to monitored email domains is automatically monitored, even if it does not match a policy.
Non-monitored email domains: OfficeScan immediately allows the transmission of emails sent to non-monitored domains.
Note Data transmissions to non-monitored email domains and to monitored email domains where "Monitor" is the action are similar in that the transmission is allowed. The only difference is that for non-monitored email domains, OfficeScan does not log the transmission, whereas for monitored email domains, the transmission is always logged.
Specify domains using any of the following formats, separating multiple domains with commas:
10-24
For email messages sent through the SMTP protocol, OfficeScan checks if the target SMTP server is on the following lists: 1. 2. Monitored targets Non-monitored targets
Note For details about monitored and non-monitored targets, see Defining Non-monitored and Monitored Targets on page 10-35.
3. 4.
This means that if an email is sent to an SMTP server on the monitored targets list, the email is monitored. If the SMTP server is not on the monitored targets list, OfficeScan checks the other lists. For emails sent through other protocols, OfficeScan only checks the following lists: 1. 2. Monitored email domains Non-monitored email domains
FTP
When OfficeScan detects that an FTP client is attempting to upload files to an FTP server, it checks for the presence of data identifiers in the files. No file has been uploaded at this point. Depending on the DLP policy, OfficeScan will allow or block the upload. When you configure a policy that blocks file uploads, remember the following:
When OfficeScan blocks an upload, some FTP clients will try to re-upload the files. In this case, OfficeScan terminates the FTP client to prevent the re-upload. Users do not receive a notification after the FTP client terminates. Inform them of this situation when you roll out your DLP policies. If a file to be uploaded will overwrite a file on the FTP server, the file on the FTP server may be deleted.
10-25
For a list of supported FTP clients, see the Data Protection Lists document at: http://docs.trendmicro.com/en-us/enterprise/officescan.aspx
IM Applications
OfficeScan monitors messages and files that users send through instant messaging (IM) applications. Messages and files that users receive are not monitored. For a list of supported IM applications, see the Data Protection Lists document at: http://docs.trendmicro.com/en-us/enterprise/officescan.aspx When OfficeScan blocks a message or file sent through AOL Instant Messenger, MSN, Windows Messenger, or Windows Live Messenger, it also terminates the application. If OfficeScan does not do this, the application will become unresponsive and users will be forced to terminate the application anyway. Users do not receive a notification after the application terminates. Inform them of this situation when you roll out your DLP policies.
SMB Protocol
OfficeScan monitors data transmissions through the Server Message Block (SMB) protocol, which facilitates shared file access. When another user attempts to copy or read a users shared file, OfficeScan checks if the file is or contains a data identifier and then allows or blocks the operation.
10-26
Note The Device Control action has a higher priority than the DLP action. For example, if Device Control does not allow files on mapped network drives to be moved, transmission of sensitive data does not proceed even if DLP allows it. For details on Device Control actions, see Permissions for Storage Devices on page 9-3.
For a list of applications that OfficeScan monitors for shared file access, see the Data Protection Lists document at: http://docs.trendmicro.com/en-us/enterprise/officescan.aspx
Webmail
Web-based email services transmit data through HTTP. If OfficeScan detects outgoing data from supported services, it checks the data for the presence of data identifiers. For a list of supported web-based email services, see the Data Protection Lists document at: http://docs.trendmicro.com/en-us/enterprise/officescan.aspx
10-27
If you do not want to monitor data transmissions to certain targets outside the host computer, define the following:
Non-monitored targets: OfficeScan does not monitor data transmitted to these targets.
Note Data transmissions to non-monitored targets and to monitored targets where "Monitor" is the action are similar in that the transmission is allowed. The only difference is that for non-monitored targets, OfficeScan does not log the transmission, whereas for monitored targets, the transmission is always logged.
Monitored targets: These are specific targets within the non-monitored targets that should be monitored. Monitored targets are:
Optional if you defined non-monitored targets. Not configurable if you did not define non-monitored targets.
For example: The following IP addresses are assigned to your companys Legal Department:
10.201.168.1 to 10.201.168.25
You are creating a policy that monitors the transmission of Employment Certificates to all employees except the Legal Departments full time staff. To do this, you would select All transmissions as the transmission scope and then: Option 1: 1. 2. Add 10.201.168.1-10.201.168.25 to the non-monitored targets. Add the IP addresses of the Legal Departments part-time staff to the monitored targets. Assume that there are 3 IP addresses, 10.201.168.21-10.201.168.23.
Option 2: Add the IP addresses of the Legal Departments full time staff to the non-monitored targets:
10.201.168.1-10.201.168.20
10-28
10.201.168.24-10.201.168.25
For guidelines on defining monitored and non-monitored targets, see Defining Nonmonitored and Monitored Targets on page 10-35.
"Network" refers to the company or local network. This includes the current network (IP address of the endpoint and netmask) and the following standard private IP addresses:
If you select this transmission scope, you can define the following:
Non-monitored targets: Define targets outside the LAN that you consider safe and therefore should not be monitored.
Note Data transmissions to non-monitored targets and to monitored targets where "Monitor" is the action are similar in that the transmission is allowed. The only difference is that for non-monitored targets, OfficeScan does not log the transmission, whereas for monitored targets, the transmission is always logged.
Monitored targets: Define targets within the LAN that you want to monitor.
10-29
For guidelines on defining monitored and non-monitored targets, see Defining Nonmonitored and Monitored Targets on page 10-35.
Resolving Conflicts
If settings for transmission scope, monitored targets, and non-monitored targets conflict, OfficeScan recognizes the following priorities, in order of highest priority to lowest:
Data recorders (CD/DVD) Peer-to-peer applications PGP Encryption Printer Removable storage Synchronization software (ActiveSync) Windows clipboard
10-30
OfficeScan checks if any of the files to be recorded is or contains a data identifier. If OfficeScan detects at least one data identifier, all filesincluding those that are not, or do not contain, data identifierswill not be recorded. OfficeScan may also prevent the CD or DVD from ejecting. If this issue occurs, instruct users to restart the software process or reset the device. OfficeScan implements additional CD/DVD recording rules:
To reduce false positives, OfficeScan does not monitor the following files:
.bud .jpg .dll .lnk .gif .sys .gpd .ttf .htm .url .ico .xml .ini
Two file types used by Roxio data recorders (*.png and *.skn) are not monitored to increase performance. OfficeScan does not monitor files in the following directories:
*:\autoexec.bat ..\Application Data ..\Local Settings ..\Program Files ..\WINNT *:\Windows ..\Cookies ..\ProgramData ..\Users\*\AppData
ISO images created by the devices and software are not monitored.
Peer-to-Peer Applications
OfficeScan monitors files that users share through peer-to-peer applications. For a list of supported peer-to-peer applications, see the Data Protection Lists document at: http://docs.trendmicro.com/en-us/enterprise/officescan.aspx
10-31
PGP Encryption
OfficeScan monitors data to be encrypted by PGP encryption software. OfficeScan checks the data before encryption proceeds. For a list of supported PGP encryption software, see the Data Protection Lists document at: http://docs.trendmicro.com/en-us/enterprise/officescan.aspx
Printer
OfficeScan monitors printer operations initiated from various applications. OfficeScan does not block printer operations on new files that have not been saved because printing information has only been stored in the memory at this point. For a list of supported applications that can initiate printer operations, see the Data Protection Lists document at: http://docs.trendmicro.com/en-us/enterprise/officescan.aspx
Removable Storage
OfficeScan monitors data transmissions to or within removable storage devices. Activities related to data transmission include:
Creation of a file within the device Copying of a file from the host machine to the device Closing of a modified file within the device Modifying of file information (such as the files extension) within the device
When a file to be transmitted contains a data identifier, OfficeScan either blocks or allows the transmission.
10-32
Note The Device Control action has a higher priority than the DLP action. For example, If Device Control does not allow copying of files to a removable storage device, transmission of sensitive information does not proceed even if DLP allows it. For details on Device Control actions, see Permissions for Storage Devices on page 9-3.
For a list of supported removable storage devices and applications that facilitate data transmission activities, see the Data Protection Lists document at: http://docs.trendmicro.com/en-us/enterprise/officescan.aspx The handling of file transmission to a removable storage device is a straightforward process. For example, a user who creates a file from Microsoft Word may want to save the file to an SD card (it does not matter which file type the user saves the file as). If the file contains a data identifier that should not be transmitted, OfficeScan prevents the file from being saved. For file transmission within the device, OfficeScan first backs up the file (if its size is 75MB or less) to %WINDIR%\system32\dgagent\temp before processing it. OfficeScan removes the backup file if it allowed the file transmission. If OfficeScan blocked the transmission, it is possible that the file may have been deleted in the process. In this case, OfficeScan will copy the backup file to the folder containing the original file. OfficeScan allows you to define non-monitored devices. OfficeScan always allows data transmissions to or within these devices. Identify devices by their vendors and optionally provide the device models and serial IDs.
Tip Use the Device List Tool to query devices connected to endpoints. The tool provides the device vendor, model, and serial ID for each device. For details, see Device List Tool on page 9-13.
10-33
For a list of supported synchronization software, see the Data Protection Lists document at: http://docs.trendmicro.com/en-us/enterprise/officescan.aspx If the data has a source IP address of 127.0.0.1 and is sent through either port 990 or 5678 (the ports used for synchronization), OfficeScan checks if the data is a data identifier before allowing or blocking its transmission. When OfficeScan blocks a file transmitted on port 990, a file of the same name containing malformed characters may still be created at the destination folder on the mobile device. This is because parts of the file have been copied to the device before OfficeScan blocked the transmission.
Windows Clipboard
OfficeScan monitors data to be transmitted to Windows clipboard before allowing or blocking the transmission. OfficeScan can also monitor clipboard activities between the host machine and VMWare or Remote Desktop. Monitoring occurs on the entity with the OfficeScan client. For example, an OfficeScan client on a VMware virtual machine can prevent clipboard data on the virtual machine from being transmitted to the host machine. Similarly, a host machine with an OfficeScan client may not copy clipboard data to an endpoint accessed through Remote Desktop.
DESCRIPTION
10-34
ACTION
Pass Block Additional Actions Notify the client user
DESCRIPTION
OfficeScan allows and logs the transmission OfficeScan blocks and logs the transmission
OfficeScan displays a notification message to inform the user of the data transmission and whether it was passed or blocked. Regardless of the primary action, OfficeScan records the sensitive information to <Client installation folder> \DLPLite\Forensic. Select this action to evaluate sensitive information that is being flagged by Data Loss Prevention. Recorded sensitive information may consume too much hard disk space. Therefore, Trend Micro highly recommends that you choose this option only for highly sensitive information.
Record data
10-35
1.
IP address Host name FQDN Network address and subnet mask, such as 10.1.1.1/32
Note For the subnet mask, OfficeScan only supports a classless inter-domain routing (CIDR) type port. That means that you can only type a number like 32 instead of 255.255.255.0.
2.
To target specific channels, include the default or company-defined port numbers for those channels. For example, port 21 is typically for FTP traffic, port 80 for HTTP, and port 443 for HTTPS. Use a colon to separate the target from the port numbers. You can also include port ranges. To include all ports, ignore the port range. Below are some examples of targets with port numbers and port ranges:
3.
4.
Decompression Rules
Files contained in compressed files can be scanned for digital assets. To determine the files to scan, OfficeScan subjects a compressed file to the following rules:
10-36
If my_archive.zip does not contain compressed files, OfficeScan skips Rule 2 and proceeds to Rule 3. If my_archive.zip contains compressed files, the size of all decompressed files must be within the limit. For example, if my_archive.zip contains AAA.rar, BBB.zip and EEE.zip, and EEE.zip contains 222.zip:
my_archive.z ip \AAA.rar \BBB.zip \EEE.zip \222.zi p
= 10MB upon decompression = 25MB upon decompression = 3MB upon decompression = 1MB upon decompression = 2MB upon decompression
my_archive.zip, BBB.zip, EEE.zip, and 222.zip will be checked against Rule 2 because the combined size of these files is within the 20MB limit. AAA.rar is skipped.
10-37
OfficeScan will ignore 333.txt because it is located on the third layer. OfficeScan will flag the following files for scanning and then check Rule 3:
DDD.txt (located on the first layer) CCC.xls (located on the second layer) 111.pdf (located on the second layer)
In addition, my_archive.zip contains a folder named 7Folder, which was not checked against Rule 2. This folder contains FFF.doc and GGG.ppt. This brings the total number of files to be scanned to 5, as highlighted below:
10-38
my_archive.zip \7Folder \7Folder \BBB.zip \DDD.txt \EEE.zip \111.pdf \222.zip \333.txt \FFF.doc \GGG.ppt \CCC.xls
If you set the limit to 4 files, the following files are scanned:
FFF.doc GGG.ppt CCC.xls DDD.txt Note For files that contain embedded files, OfficeScan extracts the content of the embedded files. If the extracted content is text, the host file (such as 123.doc) and embedded files (such as abc.txt and xyz.xls) are counted as one. If the extracted content is not text, the host file (such as 123.doc) and embedded files (such as abc.exe) are counted separately.
Event 1: A compressed file to be transmitted matches a policy and the action on the compressed file is Pass (transmit the file).
10-39
For example, to monitor .ZIP files that users are transmitting, you defined a file attribute (.ZIP), added it to a template, used the template in a policy, and then set the action to Pass.
Note If the action is Block, the entire compressed file is not transmitted and therefore, there is no need to scan the files it contains.
Event 2: A compressed file to be transmitted does not match a policy. In this case, OfficeScan will still subject the compressed file to the decompression rules to determine which of the files it contains should be scanned for digital assets and whether to transmit the entire compressed file.
Result: Events 1 and 2 have the same result. When OfficeScan encounters a compressed file:
If Rule 1 is not satisfied, OfficeScan allows the transmission of the entire compressed file. If Rule 1 is satisfied, the other two rules are checked. OfficeScan allows the transmission of the entire compressed file if:
All scanned files do not match a policy. All scanned files match a policy and the action is Pass. The transmission of the entire compressed file is blocked if at least one scanned file matches a policy and the action is Block.
10-40
In addition to data identifiers and templates, you need to configure channels and actions when creating a policy. For details about policies, see Data Loss Prevention Policies on page 10-3.
5. 6.
If you are on the External Clients tab, you can apply all Data Loss Prevention settings to internal clients by selecting Apply all settings to internal clients. If you are on the Internal Clients tab, you can apply all Data Loss Prevention settings to external clients by selecting Apply all settings to external clients.
7.
On the Rules tab, click Add. A policy can contain a maximum of 40 rules.
8.
10-41
For details creating DLP rules, see Creating Data Loss Prevention Rules on page 10-42. 9. Click the Exceptions tab and configure any necessary exception settings. For details on the available exception settings, see Data Loss Prevention Exceptions on page 10-35. 10. If you selected domain(s) or client(s) in the client tree, click Save and Apply the Settings to Clients. If you clicked the root domain icon, choose from the following options:
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
Select multiple entries by clicking the template names which highlights the name. Use the search feature if you have a specific template in mind. You can type the full or partial name of the template.
10-42
5.
If your preferred template is not found in the Available templates list: a. Click Add new template. The Data Loss Prevention Templates screen displays. For instructions on adding templates in the Data Prevention Templates screen, see Data Loss Prevention Templates on page 10-18. b. After creating the template, select it and then click Add.
Note OfficeScan uses the first-match rule when checking templates. This means that if a file or data matches the definition on a template, OfficeScan will no longer check the other templates. Priority is based on the order of the templates in the list.
Configure the channel settings: 6. 7. Click the Channel tab. Select the channels for the rule. For details about channels, see Network Channels on page 10-23 and System and Application Channels on page 10-30. 8. If you selected any of the network channels, select the transmission scope:
See Transmission Scope and Targets for Network Channels on page 10-27 for details on transmission scope, how targets work depending on the transmission scope, and how to define targets correctly. 9. If you selected Email clients: a. Click Exceptions.
10-43
b.
Specify monitored and non-monitored internal email domains. For details on monitored and non-monitored email domains, see Email Clients on page 10-24.
10. If you selected Removable storage: a. b. Click Exceptions. Add non-monitored removable storage devices, identifying them by their vendors. The device model and serial ID are optional. The approved list for USB devices supports the use of the asterisk (*) wildcard. Replace any field with the asterisk (*) to include all devices that satisfy the other fields. For example, [vendor]-[model]-* places all USB devices from the specified vendor and the specified model type, regardless of serial ID, to the approved list. c. To add more devices, click the plus (+) icon.
Tip Use the Device List Tool to query devices connected to endpoints. The tool provides the device vendor, model, and serial ID for each device. For details, see Device List Tool on page 9-13.
Configure the action settings: 11. Click the Action tab. 12. Select a primary action and any additional actions. For details about actions, see Data Loss Prevention Actions on page 10-34. 13. After configuring the Template, Channel, and Action settings, click Save.
10-44
DESCRIPTION
Importing a rule list appends non-existing rules to the existing DLP rule list. OfficeScan skips rules that already exist in the target list. OfficeScan maintains all pre-configured settings for each rule, including the enabled or disabled status. Exporting a rule list exports the entire list to a .dat file that administrators can then import and deploy to other domains or clients. OfficeScan saves all rule settings based on the current configuration. Note
Export
Administrators must save or apply any new or modified rules before exporting the list. OfficeScan does not export any exceptions configured for the policy, only the settings configured for each rule.
Copy
Copying a rule creates an exact replica of the current configuration settings for the rule. Administrators must type a new name for the rule and can make any configuration modifications necessary for the new rule.
10-45
3.
On the Email tab: a. b. c. Go to the Digital Asset Transmissions section. Select Enable notification via email. Select Send notifications to users with client tree domain permissions. Use Role-based Administration to grant client tree domain permissions to users. If transmission occurs on a client belonging to a specific domain, the
10-46
email are sent to the email addresses of the users with domain permissions. See the following table for examples:
TABLE 10-7. Client Tree Domains and Permissions CLIENT TREE DOMAIN
Domain A
Domain B
root admin_jane
If an OfficeScan client belonging to Domain A detects a digital asset transmission, the email will be sent to [email protected], [email protected], and [email protected]. If a client belonging to Domain B detects the transmission, the email is sent to [email protected] and [email protected].
Note When enabling this option, all users with domain permissions must have a corresponding email address. The email notification will not be sent to users without an email address. Users and email addresses are configured from Administration > User Accounts.
d. e.
Select Send notifications to the following email address(es) and then type the email addresses. Accept or modify the default subject and message. Use token variables to represent data in the Subject and Message fields.
10-47
TABLE 10-8. Token Variables for Data Loss Prevention Notifications VARIABLE
%USER% %COMPUTER% %DOMAIN% %DATETIME% %CHANNEL% %TEMPLATE%
DESCRIPTION
The user logged on to the computer when transmission was detected Computer where transmission was detected Domain of the computer Date and time transmission was detected The channel through which transmission was detected The digital asset template that triggered the detection
4.
On the Pager tab: a. b. c. Go to the Digital Asset Transmissions section. Select Enable notification via pager. Type the message.
5.
On the SNMP Trap tab: a. b. c. Go to the Digital Asset Transmissions section. Select Enable notification via SNMP trap. Accept or modify the default message. Use token variables to represent data in the Message field. See Table 10-8: Token Variables for Data Loss Prevention Notifications on page 10-48 for details.
6.
On the NT Event Log tab: a. b. c. Go to the Digital Asset Transmissions section. Select Enable notification via NT Event Log. Accept or modify the default message. You can use token variables to represent data in the Message field. See Table 10-8: Token Variables for Data Loss Prevention Notifications on page 10-48 for details.
10-48
7.
Click Save.
10-49
Click Logs > Data Loss Prevention Logs or View Logs > DLP Logs. Specify the log criteria and then click Display Logs. View logs. Logs contain the following information:
TABLE 10-9. Data Loss Prevention Log Information COLUMN
Date/Time User Name Computer Domain IP Rule Name
DESCRIPTION
The date and time that OfficeScan logged the incident The user name logged on to the computer The name of computer where OfficeScan detected the transmission The domain of the computer The IP address of the computer The rule name(s) that triggered the incident Note Policies created in a previous version of OfficeScan display the default name of LEGACY_DLP_Policy.
Channel
10-50
COLUMN
Process
DESCRIPTION
The process that facilitated the transmission of a digital asset (the process depends on the channel) For details, see Processes by Channel on page 10-51.
The source of the file containing the digital asset, or channel (if no source is available) The intended destination of the file containing the digital asset, or channel (if no source is available) The action taken on the transmission A link which includes additional details about the transmission For details, see Data Loss Prevention Log Details on page 10-54.
6.
To save logs to a comma-separated value (CSV) file, click Export to CSV. Open the file or save it to a specific location.
Processes by Channel
The following table lists the processes that display under the Process column in the Data Loss Prevention logs.
TABLE 10-10. Processes by Channel CHANNEL
Synchronization software (ActiveSync)
PROCESS
Full path and process name of the synchronization software Example:
C:\Windows\system32\WUDFHost.exe
10-51
CHANNEL
Windows clipboard Email client - Lotus Notes Not applicable
PROCESS
Removable storage
Process name of the application that transmitted data to or within the storage device Example:
explorer.exe
FTP
HTTP HTTPS
"HTTP application" Full path and process name of the browser or application Example:
C:\Program Files\Internet Explorer\iexplore.exe
IM application
10-52
CHANNEL
IM application MSN
PROCESS
Full path and process name of MSN Example:
C:\Program Files\Windows Live\Messenger\ msnmsgr.exe
Peer-to-peer application
PGP encryption
Full path and process name of the PGP encryption software Example:
C:\Program Files\PGP Corporation\PGP Desktop\ PGPmnApp.exe
Printer
Full path and process name of the application that initiated a printer operation Example:
C:\Program Files\Microsoft Office\Office12\ WINWORD.EXE
SMB protocol
Full path and process name of the application from which shared file access (copying or creating a new file) was performed Example:
C:\Windows\Explorer.exe
"HTTP application" Full path and process name of the browser or application Example:
C:\Program Files\Mozilla Firefox\firefox.exe
10-53
DESCRIPTION
The date and time that OfficeScan logged the incident The unique ID of the incident The user name logged on to the computer The name of computer where OfficeScan detected the transmission The domain of the computer The IP address of the computer The channel through which the transmission occurred The process that facilitated the transmission of a digital asset (the process depends on the channel) For details, see Processes by Channel on page 10-51.
Source Email Sender Email Subject Email Recipients URL FTP User File Class
The source of the file containing the digital asset, or channel (if no source is available) The email address where the transmission originated The subject line of the email message containing the digital asset The destination email address(es) of the email message The URL of a website or web page The user name used to log on to the FTP server The type of file in which OfficeScan detected the digital asset
10-54
DETAIL
Rule/Template
DESCRIPTION
A list of the exact rule name(s) and template(s) that triggered the detection Note Each rule can contain multiple templates that triggered the incident. Multiple template names are separated by commas.
Action
3. 4. 5.
Create a folder named Log in the C:\ directory. Copy logger.cfg to the Log folder. Deploy Data Loss Prevention and Device Control settings from the web console to start collecting logs.
10-55
Note Disable debug logging for the Data Protection module by deleting debugcfg in the registry key and restarting the computer.
10-56
Chapter 11
About Web Threats on page 11-2 Command & Control Contact Alert Services on page 11-2 Web Reputation on page 11-4 Web Reputation Policies on page 11-5 Web Threat Notifications for Client Users on page 11-11 Configuring C&C Callback Notifications for Administrators on page 11-13 C&C Callback Outbreaks on page 11-16 Web Reputation Logs on page 11-18
11-1
11-2
DESCRIPTION
Trend Micro Smart Protection Network compiles the Global Intelligence list from sources all over the world and tests and evaluates the risk level of each C&C callback address. Web Reputation Services uses the Global Intelligence list in conjunction with the reputation scores for malicious websites to provide enhanced security against advanced threats. The web reputation security level determines the action taken on malicious websites or C&C servers based on assigned risk levels. Smart Protection Servers can integrate with Deep Discovery Advisor to obtain the Virtual Analyzer C&C server list. The Deep Discovery Advisor Virtual Analyzer evaluates potential risks in a secure environment and, through use of advanced heuristics and behavioral testing methods, assigns a risk level to the analyzed threats. The Virtual Analyzer populates the Virtual Analyzer list with any threat that attempts to connect to a possible C&C server. The Virtual Analyzer list is highly company-specific and provides a more customized defense against targeted attacks. Smart Protection Servers retrieve the list from Deep Discovery Advisor and can evaluate all possible C&C threats against both the Global Intelligence and the local Virtual Analyzer list. For details on connecting the integrated Smart Protection Server to Deep Discovery Advisor, see Configuring Integrated Smart Protection Server Settings on page 4-20.
C&C IP list
The C&C IP list works in conjunction with the Network Content Inspection Engine (NCIE) to detect network connections with known C&C servers. NCIE detects C&C server contact through any network channel. OfficeScan logs all connection information to servers in the C&C IP list for evaluation. For details on configuring the C&C IP list logs, see Configuring Global C&C Callback Settings on page 11-11.
11-3
FEATURE
Administrator notifications
DESCRIPTION
Administrators can choose to receive detailed and customizable notifications after detecting a C&C callback. For details, see Configuring C&C Callback Notifications for Administrators on page 11-13.
Endpoint notifications
Administrators can choose to send detailed and customizable notifications to end users after detecting a C&C callback on an endpoint. For details, see Enabling Web Reputation and C&C Callback Notifications on page 11-11.
Outbreak notifications
Administrators can customize outbreak notifications specific to C&C callback events and specify whether the outbreak occurs on a single endpoint or across the entire network. For details, see C&C Callback Outbreaks on page 11-16.
Logs provide detailed information regarding all C&C callback events. For details, see Viewing C&C Callback Logs on page 11-19.
Web Reputation
Web reputation technology tracks the credibility of web domains by assigning a reputation score based on factors such as a website's age, historical location changes and indications of suspicious activities discovered through malware behavior analysis. It will then continue to scan sites and block users from accessing infected ones. OfficeScan clients send queries to smart protection sources to determine the reputation of websites that users are attempting to access. A websites reputation is correlated with the specific web reputation policy enforced on the computer. Depending on the policy in use, the OfficeScan client will either block or allow access to the website.
Note For details about smart protection sources, see Smart Protection Source List on page 4-23.
11-4
Add websites that you consider safe or dangerous to the approved or blocked list. When an OfficeScan client detects access to any of these websites, it automatically allows or blocks the access and no longer sends a query to smart protection sources.
11-5
To configure a policy for clients running Windows XP, Vista, 7, or 8, select the root domain icon ( ), specific domains, or clients.
Note When you select the root domain or specific domains, the setting will only apply to clients running Windows XP, Vista, 7, or 8. The setting will not apply to clients running Windows Server 2003, Windows Server 2008, or Windows Server 2012 even if they part of the domains.
To configure a policy for clients running Windows Server 2003, Windows Server 2008, or Windows Server 2012, select a specific client.
3. 4.
Click Settings > Web Reputation Settings. Click the External Clients tab to configure a policy for external clients or the Internal Clients tab to configure a policy for internal clients.
Tip Configure client location settings if you have not done so. Clients will use these settings to determine their location and apply the correct web reputation policy. For details, see Computer Location on page 14-2.
5.
Select Enable Web reputation policy on the following operating systems. The operating systems listed in the screen depends on the targets you selected in step 1.
Tip Trend Micro recommends disabling web reputation for internal clients if you already use a Trend Micro product with the web reputation capability, such as InterScan Web Security Virtual Appliance.
External clients send web reputation queries to the Smart Protection Network. Internal clients send web reputation queries to:
11-6
Smart Protection Servers if the Send queries to Smart Protection Servers option is enabled. For details about this option, see step 7. Smart Protection Network if the Send queries to Smart Protection Servers option is disabled.
6.
7.
Select Check HTTPS URLs. HTTPS communication uses certificates to identify web servers. It encrypts data to prevent theft and eavesdropping. Although more secure, accessing websites using HTTPS still has risks. Compromised sites, even those with valid certificates, can host malware and steal personal information. In addition, certificates are relatively easy to obtain, making it easy to set up malicious web servers that use HTTPS. Enable checking of HTTPS URLs to reduce exposure to compromised and malicious sites that use HTTPS. OfficeScan can monitor HTTPS traffic on the following browsers:
TABLE 11-2. Supported Browsers for HTTPS Traffic BROWSER
Microsoft Internet Explorer
VERSION
6 with SP2 or higher 7.x 8.x 9.x 10.x
Mozilla Firefox
3.5 or later
11-7
Important
HTTPS scanning only supports Windows 8 or Windows 2012 platforms operating in desktop mode. After enabling HTTPS scanning for the first time on OfficeScan clients running Internet Explorer 9 or 10, users must enable the TmIEPlugInBHO Class addon in the browser pop-up window before HTTPS scanning is operational. For more information on configuring Internet Explorer settings for web reputation, see the following Knowledge Base articles:
http://esupport.trendmicro.com/solution/en-us/1060643.aspx http://esupport.trendmicro.com/solution/en-us/1060644.aspx
8.
Select Scan common HTTP ports only to restrict web reputation scanning to traffic through ports 80, 81, and 8080. By default, OfficeScan scans all traffic through all ports. Select Send queries to Smart Protection Servers if you want internal clients to send web reputation queries to Smart Protection Servers.
9.
Clients refer to the smart protection source list to determine the Smart Protection Servers to which they send queries. For details about the smart protection source list, see Smart Protection Source List on page 4-23. Be sure that Smart Protection Servers are available. If all Smart Protection Servers are unavailable, clients do not send queries to Smart Protection Network. The only remaining sources of web reputation data for clients are the approved and blocked URL lists (configured in step 10). If you want clients to connect to Smart Protection Servers through a proxy server, specify proxy settings in Administration > Proxy Settings > Internal Proxy tab. Be sure to update Smart Protection Servers regularly so that protection remains current. Clients will not block untested websites. Smart Protection Servers do not store web reputation data for these websites.
11-8
Clients send web reputation queries to Smart Protection Network. Client computers must have Internet connection to send queries successfully. If connection to Smart Protection Network requires proxy server authentication, specify authentication credentials in Administration > Proxy Settings > External Proxy (tab) > Client Connection with Trend Micro Servers. Clients will block untested websites if you select Block pages that have not been tested by Trend Micro in step 9.
10. Select from the available web reputation security levels: High, Medium, or Low
Note The security levels determine whether OfficeScan will allow or block access to a URL. For example, if you set the security level to Low, OfficeScan only blocks URLs that are known to be web threats. As you set the security level higher, the web threat detection rate improves but the possibility of false positives also increases.
11. If you disabled the Send queries to Smart Protection Servers option in step 7, you can select Block pages that have not been tested by Trend Micro.
Note While Trend Micro actively tests web pages for safety, users may encounter untested pages when visiting new or less popular websites. Blocking access to untested pages can improve safety but can also prevent access to safe pages.
a.
11-9
b.
Type a URL. You can add a wildcard character (*) anywhere on the URL. For example:
Typing www.trendmicro.com/* means that all pages in the Trend Micro website will be approved. Typing *.trendmicro.com/* means that all pages on any subdomain of trendmicro.com will be approved.
You can type URLs containing IP addresses. If a URL contains an IPv6 address, enclose the address in parentheses. c. d. e. Click Add to Approved List or Add to Blocked List. To export the list to a .dat file, click Export and then click Save. If you have exported a list from another server and want to import it to this screen, click Import and locate the .dat file. The list loads on the screen.
13. To submit web reputation feedback, click the URL provided under Reassess URL. The Trend Micro Web Reputation Query system opens in a browser window. 14. Select whether to allow the OfficeScan client to send web reputation logs to the server. Allow clients to send logs if you want to analyze URLs being blocked by OfficeScan and take the appropriate action on URLs you think are safe to access. 15. If you selected domain(s) or client(s) in the clients tree, click Save. If you clicked the root domain icon, choose from the following options:
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
11-10
11-11
4. 5. 6. 7.
Click the Other Settings tab. In the Web Reputation Settings section, select Display a notification when a web site is blocked. In the C&C Callback Settings section, select Display a notification when a C&C callback is detected. If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
3. 4.
Modify the default message in the text box provided. Click Save.
11-12
3.
On the Email tab: a. b. c. Go to the C&C Callbacks section. Select Enable notification via email. Select Send notifications to users with client tree domain permissions. Use Role-based Administration to grant client tree domain permissions to users. If transmission occurs on a client belonging to a specific domain, the email are sent to the email addresses of the users with domain permissions. See the following table for examples:
11-13
TABLE 11-3. Client Tree Domains and Permissions CLIENT TREE DOMAIN
Domain A
Domain B
root admin_jane
If an OfficeScan client belonging to Domain A detects a C&C callback, the email will be sent to [email protected], [email protected], and [email protected]. If a client belonging to Domain B detects the C&C callback, the email is sent to [email protected] and [email protected].
Note When enabling this option, all users with domain permissions must have a corresponding email address. The email notification will not be sent to users without an email address. Users and email addresses are configured from Administration > User Accounts.
d. e.
Select Send notifications to the following email address(es) and then type the email addresses. Accept or modify the default subject and message. Use token variables to represent data in the Subject and Message fields.
TABLE 11-4. Token Variables for C&C Callback Notifications VARIABLE
%CLIENTCOMPU TER%
DESCRIPTION
Target computer that sent the callback
11-14
VARIABLE
%IP% %DOMAIN% %DATETIME% %CALLBACKADD RESS% %CNCRISKLEVE L% %CNCLISTSOUR CE% %ACTION%
DESCRIPTION
IP address of the targeted computer Domain of the computer Date and time the transmission was detected Callback address of the C&C server Risk level of the C&C server Indicates the C&C source list Action taken
4.
On the SNMP Trap tab: a. b. c. Go to the C&C Callbacks section. Select Enable notification via SNMP trap. Accept or modify the default message. Use token variables to represent data in the Message field. See Table 11-4: Token Variables for C&C Callback Notifications on page 11-14 for details.
5.
On the NT Event Log tab: a. b. c. Go to the C&C Callbacks section. Select Enable notification via NT Event Log. Accept or modify the default message. You can use token variables to represent data in the Message field. See Table 11-4: Token Variables for C&C Callback Notifications on page 11-14 for details.
6.
Click Save.
11-15
11-16
Option C&C list source C&C risk level Action Detections Time Period
Description Specify whether to include all C&C source lists, only the Global Intelligence list, or only the Virtual Analyzer list Specify whether to trigger an outbreak on all C&C callbacks or only high risk sources Select from Any action, Logged, or Blocked Indicate the required number of detections that defines an outbreak Indicate the number of hours that the number of detections must occur within
Tip Trend Micro recommends accepting the default values in this screen.
3.
In the Email tab: a. b. c. d. Go to the C&C Callbacks section. Select Enable notification via email. Specify the email recipients. Accept or modify the default email subject and message. You can use token variables to represent data in the Subject and Message fields.
TABLE 11-5. Token Variables for C&C Callbacks Outbreak Notifications VARIABLE
%C %T
DESCRIPTION
Number of C&C callback logs Time period when the C&C callback logs accumulated
e. 4.
Select from the available additional C&C callback information to include in the email.
11-17
b. c.
Select Enable notification via SNMP trap. Accept or modify the default message. You can use token variables to represent data in the Message field. See Table 11-5: Token Variables for C&C Callbacks Outbreak Notifications on page 11-17 for details.
5.
In the NT Event Log tab: a. b. c. Go to the C&C Callbacks section. Select Enable notification via NT Event Log. Accept or modify the default message. You can use token variables to represent data in the Message field. See Table 11-5: Token Variables for C&C Callbacks Outbreak Notifications on page 11-17 for details.
6.
Click Save.
11-18
3. 4. 5.
Click View Logs > Web Reputation Logs or Logs > Web Reputation Logs. Specify the log criteria and then click Display Logs. View logs. Logs contain the following information:
Date/Time OfficeScan blocked the URL Computer where the user accessed the URL Computer domain where the user accessed the URL Blocked URL URL's risk level
6. 7.
If there are URLs that should not be blocked, click the Add to Approved List button to add the website to the Approved URL list. To save logs to a comma-separated value (CSV) file, click Export to CSV. Open the file or save it to a specific location.
Click View Logs > C&C Callback Logs or Logs > C&C Callback Logs. Specify the log criteria and then click Display Logs. View logs. Logs contain the following information:
Date/Time OfficeScan logged the callback Compromised host from which the callback originated
11-19
IP address of the compromised host Domain from which the callback originated Callback address to which the endpoint sent the callback C&C list source that identified the C&C server C&C server's risk level Action taken on the callback
6.
If there are URLs that should not be blocked, click the Add to Web Reputation Approved List button to add the website to the Web Reputation Approved URL list.
Note OfficeScan always passes C&C servers detected by the C&C IP list and administrators cannot add these IP addresses to the Approved lists directly from the log table.
7.
To save logs to a comma-separated value (CSV) file, click Export to CSV. Open the file or save it to a specific location.
11-20
Chapter 12
About the OfficeScan Firewall on page 12-2 Enabling or Disabling the OfficeScan Firewall on page 12-6 Firewall Policies and Profiles on page 12-7 Firewall Privileges on page 12-22 Global Firewall Settings on page 12-24 Firewall Violation Notifications for OfficeScan Client Users on page 12-26 Firewall Logs on page 12-27 Firewall Violation Outbreaks on page 12-29 Testing the OfficeScan Firewall on page 12-30
12-1
The OfficeScan firewall includes the following key features and benefits:
Traffic Filtering on page 12-2 Application Filtering on page 12-3 Certified Safe Software List on page 12-3 Scanning for Network Viruses on page 12-3 Customizable Profiles and Policies on page 12-4 Stateful Inspection on page 12-4 Intrusion Detection System on page 12-4 Firewall Violation Outbreak Monitor on page 12-5 OfficeScan Client Firewall Privileges on page 12-5
Traffic Filtering
The OfficeScan firewall filters all incoming and outgoing traffic, providing the ability to block certain types of traffic based on the following criteria:
Direction (inbound/outbound)
12-2
Application Filtering
The OfficeScan firewall filters incoming and outgoing traffic for specific applications, allowing these applications to access the network. However, network connections will depend on the policies set by the administrator.
Note OfficeScan does not support specific application exceptions on Windows 8 and Windows Server 2012 platforms. OfficeScan allows or denies all application traffic on computers with these platforms.
12-3
Stateful Inspection
The OfficeScan firewall is a stateful inspection firewall; it monitors all connections to the OfficeScan client and remembers all connection states. It can identify specific conditions in any connection, predict what actions should follow, and detect disruptions in a normal connection. Therefore, effective use of the firewall not only involves creating profiles and policies, but also analyzing connections and filtering packets that pass through the firewall.
Too Big Fragment: A Denial of Service attack where a hacker directs an oversized TCP/UDP packet at a target computer. This can cause the computer's buffer to overflow, which can freeze or reboot the computer. Ping of Death: A Denial of Service attack where a hacker directs an oversized ICMP/ICMPv6 packet at a target computer. This can cause the computer's buffer to overflow, which can freeze or reboot the computer. Conflicted ARP: A type of attack where a hacker sends an Address Resolution Protocol (ARP) request with the same source and destination IP address to a computer. The target computer continually sends an ARP response (its MAC address) to itself, causing it to freeze or crash. SYN Flood: A Denial of Service attack where a program sends multiple TCP synchronization (SYN) packets to a computer, causing the computer to continually
12-4
send synchronization acknowledgment (SYN/ACK) responses. This can exhaust computer memory and eventually crash the computer.
Overlapping Fragment: Similar to a Teardrop attack, this Denial of Service attack sends overlapping TCP fragments to a computer. This overwrites the header information in the first TCP fragment and may pass through a firewall. The firewall may then allow subsequent fragments with malicious code to pass through to the target computer. Teardrop: Similar to an overlapping fragment attack, this Denial of Service attack deals with IP fragments. A confusing offset value in the second or later IP fragment can cause the receiving computers operating system to crash when attempting to reassemble the fragments. Tiny Fragment Attack: A type of attack where a small TCP fragment size forces the first TCP packet header information into the next fragment. This can cause routers that filter traffic to ignore the subsequent fragments, which may contain malicious data. Fragmented IGMP: A Denial of Service attack that sends fragmented IGMP packets to a target computer, which cannot properly process the IGMP packets. This can freeze or slow down the computer. LAND Attack: A type of attack that sends IP synchronization (SYN) packets with the same source and destination address to a computer, causing the computer to send the synchronization acknowledgment (SYN/ACK) response to itself. This can freeze or slow down the computer.
12-5
12-6
b. 2.
Select or clear the Trend Micro Common Firewall Driver check box from the network card.
Enable/Disable the firewall service. a. b. Open a command prompt and type services.msc. Start or stop OfficeScan NT Firewall from Microsoft Management Console (MMC).
12-7
Tip Multiple firewall installations on the same computer may produce unexpected results. Consider uninstalling other software-based firewall applications on OfficeScan clients before deploying and enabling the OfficeScan firewall.
The following steps are necessary to successfully use the OfficeScan firewall: 1. 2. Create a policy. The policy allows you to select a security level that blocks or allows traffic on networked computers and enables firewall features. Add exceptions to the policy. Exceptions allow OfficeScan clients to deviate from a policy. With exceptions, you can specify clients, and allow or block certain types of traffic, despite the security level setting in the policy. For example, block all traffic for a set of clients in a policy, but create an exception that allows HTTP traffic so clients can access a web server. Create and assign profiles to OfficeScan clients. A firewall profile includes a set of client attributes and is associated with a policy. When a client matches the attributes specified in the profile, the associated policy is triggered.
3.
Firewall Policies
Firewall policies allow you to block or allow certain types of network traffic not specified in a policy exception. A policy also defines which firewall features get enabled or disabled. Assign a policy to one or multiple firewall profiles. OfficeScan comes with a set of default policies, which you can modify or delete. With Active Directory integration and role-based administration, each user role, depending on the permission, can create, configure, or delete policies for specific domains. The following table lists the default firewall policies.
12-8
SECURITY LEVEL
Low
CLIENT SETTINGS
Enable firewall Enable firewall Enable firewall
EXCEPTIONS
None
RECOMMENDED USE
Use to allow clients unrestricted access to the network Use when clients have a Cisco Trust Agent (CTA) installation Use when clients have an MCP agent installation
Cisco Trust Agent for Cisco NAC Communication Ports for Trend Micro Control Manager ScanMail for Microsoft Exchange console InterScan Messaging Security Suite (IMSS) console
Low
Allow incoming and outgoing UDP traffic through port 21862 Allow all incoming and outgoing TCP/UDP traffic through ports 80 and 10319 Allow all incoming and outgoing TCP traffic through port 16372 Allow all incoming and outgoing TCP traffic through port 80
Low
Low
Enable firewall
Use when clients need to access the ScanMail console Use when clients need to access the IMSS console
Low
Enable firewall
Also create new policies if you have requirements not covered by any of the default policies. All default and user-created firewall policies display on the firewall policy list on the web console.
12-9
If the new policy you want to create has similar settings with an existing policy, select the existing policy and click Copy. To edit an existing policy, click the policy name. A policy configuration screen appears. See Adding or Modifying a Firewall Policy on page 12-10 for more information. 3. 4. To delete an existing policy, select the check box next to the policy and click Delete. To edit the firewall exception template, click Edit Exception Template. See Editing the Firewall Exception Template on page 12-13 for more information. The Exception Template Editor appears.
Security level: A general setting that blocks or allows all inbound and/or all outbound traffic on the OfficeScan client computer Firewall features: Specify whether to enable or disable the OfficeScan firewall, the Intrusion Detection System (IDS), and the firewall violation notification message. See Intrusion Detection System on page 12-4 for more information on IDS. Certified Safe Software List: Specify whether to allow certified safe applications to connect to the network. See Certified Safe Software List on page 12-3 for more information on Certified Safe Software List. Policy exception list: A list of configurable exceptions that block or allow various types of network traffic
12-10
2.
To add a new policy, click Add. If a new policy you want to create has similar settings with an existing policy, select the existing policy and click Copy.
3. 4.
Type a name for the policy. Select a security level. The selected security level will not apply to traffic that meet the firewall policy exception criteria.
5.
The firewall violation notification message displays when the firewall blocks an outgoing packet. To modify the message, see Modifying the Content of the Firewall Notification Message on page 12-27. Enabling all the firewall features grants the OfficeScan client users the privileges to enable/disable the features and modify firewall settings in the OfficeScan client console.
WARNING! You cannot use the OfficeScan server web console to override OfficeScan client console settings that the user configures.
If you do not enable the features, the firewall settings you configure from the OfficeScan server web console display under Network card list on the OfficeScan client console. The information under Settings on the OfficeScan client console's Firewall tab always reflects the settings configured from the OfficeScan client console, not from the server web console.
6.
12-11
7.
Under Exception, select the firewall policy exceptions. The policy exceptions included here are based on the firewall exception template. See Editing the Firewall Exception Template on page 12-13 for details.
Modify an existing policy exception by clicking the policy exception name and changing the settings in the page that opens.
Note The modified policy exception will only apply to the policy to be created. If you want the policy exception modification to be permanent, you will need to make the same modification to the policy exception in the firewall exception template.
Click Add to create a new policy exception. Specify the settings in the page that opens.
Note The policy exception will also apply only to the policy to be created. To apply this policy exception to other policies, you need to add it first to the list of policy exceptions in the firewall exception template.
8.
Click Save.
Policy name Security level Firewall features to use for the policy
12-12
Certified Safe Software Service List status Firewall policy exceptions to include in the policy
Edit an existing policy exception (click the policy exception name and change settings in the page that opens) Click Add to create a new policy exception. Specify the settings in the page that opens.
4.
Restrictive Blocks only specified types of network traffic and applies to policies that allow all network traffic. An example use of a restrictive policy exception is to block OfficeScan client ports vulnerable to attack, such as ports that Trojans often use.
Permissive Allows only specified types of network traffic and applies to policies that block all network traffic. For example, you may want to permit OfficeScan clients to access only the OfficeScan server and a web server. To do this, allow traffic from the trusted port (the port used to communicate with the OfficeScan server) and the port the OfficeScan client uses for HTTP communication. OfficeScan client listening port: Networked Computers > Client Management > Status. The port number is under Basic Information. Server listening port: Administration > Connection Settings. The port number is under Connection Settings for Networked Computers.
12-13
OfficeScan comes with a set of default firewall policy exceptions, which you can modify or delete.
TABLE 12-2. Default Firewall Policy Exceptions EXCEPTION NAME
DNS NetBIOS HTTPS HTTP Telnet SMTP FTP POP3 LDAP
ACTION
Allow Allow Allow Allow Allow Allow Allow Allow Allow
PROTOCOL
TCP/UDP TCP/UDP TCP TCP TCP TCP TCP TCP TCP/UDP 53
PORT
DIRECTION
Incoming and outgoing Incoming and outgoing Incoming and outgoing Incoming and outgoing Incoming and outgoing Incoming and outgoing Incoming and outgoing Incoming and outgoing Incoming and outgoing
Note Default exceptions apply to all clients. If you want a default exception to apply only to certain clients, edit the exception and specify the IP addresses of the clients. The LDAP exception is not available if you upgrade from a previous OfficeScan version. Manually add this exception if you do not see it on the exception list.
12-14
4. 5.
Type a name for the policy exception. Select the type of application. You can select all applications, or specify application path or registry keys.
Note Verify the name and full paths entered. Application exception does not support wildcards.
6.
Select the action OfficeScan will perform on network traffic (block or allow traffic that meets the exception criteria) and the traffic direction (inbound or outbound network traffic on the OfficeScan client computer). Select the type of network protocol: TCP, UDP, ICMP, or ICMPv6. Specify ports on the OfficeScan client computer on which to perform the action. Select OfficeScan client computer IP addresses to include in the exception. For example, if you chose to deny all network traffic (inbound and outbound) and type the IP address for a single computer on the network, then any OfficeScan client that has this exception in its policy will not be able to send or receive data to or from that IP address.
7. 8. 9.
All IP addresses: Includes all IP addresses Single IP address: Type an IPv4 or IPv6 address, or a host name. Range (for IPv4 or IPv6): Type an IPv4 or IPv6 address range. Range (for IPv6): Type an IPv6 address prefix and length. Subnet mask: Type an IPv4 address and its subnet mask.
12-15
2. 3. 4.
Click Edit Exception Template. Click a policy exception. Modify the following:
Policy exception name Application type, name, or path Action OfficeScan will perform on network traffic and the traffic direction Type of network protocol Port numbers for the policy exception OfficeScan client computer IP addresses
5.
Click Save.
Save Template Changes: Saves the exception template with the current policy exceptions and settings. This option only applies the template to policies created in the future, not existing policies. Save and Apply to Existing Policies: Saves the exception template with the current policy exceptions and settings. This option applies the template to existing and future policies.
12-16
Firewall Profiles
Firewall profiles provide flexibility by allowing you to choose the attributes that a client or group of clients must have before applying a policy. Create user roles that can create, configure, or delete profiles for specific domains. Users using the built-in administrator account or users with full management permissions can also enable the Overwrite client security level exception list option to replace the OfficeScan client profile settings with the server settings. Profiles include the following:
Associated policy: Each profile uses a single policy Client attributes: OfficeScan clients with one or more of the following attributes apply the associated policy:
IP address: An OfficeScan client that has a specific IP address, an IP address that falls within a range of IP addresses, or an IP address belonging to a specified subnet Domain: An OfficeScan client that belongs to a certain OfficeScan domain Computer: An OfficeScan client with a specific computer name Platform: An OfficeScan client running a specific platform Logon name: OfficeScan client computers to which specified users have logged on NIC description: An OfficeScan client computer with a matching NIC description Client connection status: If an OfficeScan client is online or offline
Note An OfficeScan client is online if it can connect to the OfficeScan server or any of the reference servers, and offline if it cannot connect to any server.
User privileges: Allow or prevent OfficeScan client users from doing the following:
12-17
OfficeScan comes with a default profile named "All clients profile", which uses the "All access" policy. You can modify or delete this default profile. You can also create new profiles. All default and user-created firewall profiles, including the policy associated to each profile and the current profile status, display on the firewall profile list on the web console. Manage the profile list and deploy all profiles to OfficeScan clients. OfficeScan clients store all the firewall profiles on the client computer.
3.
12-18
Tip The more exclusive a policy, the better it is at the top of the list. For example, move a policy you create for a single client to the top, followed by those for a range of clients, a network domain, and all clients.
6.
To manage reference servers, click Edit Reference Server List. Reference servers are computers that act as substitutes for the OfficeScan server when it applies firewall profiles. A reference server can be any computer on the network (see Reference Servers on page 13-27 for more information). OfficeScan makes the following assumptions when you enable reference servers:
OfficeScan clients connected to reference servers are online, even if the clients cannot communicate with the OfficeScan server. Firewall profiles applied to online OfficeScan clients also apply to OfficeScan clients connected to reference servers.
Note Only users using the built-in administrator account or those with full management permissions can see and configure the reference server list.
7.
To save the current settings and assign the profiles to OfficeScan clients: a. b. Select whether to Overwrite client security level/exception list. This option overwrites all user-configured firewall settings. Click Assign Profile to Clients. OfficeScan assigns all profiles on the profile list to all the OfficeScan clients.
8.
To verify that you successfully assigned profiles to OfficeScan clients: a. b. Go to Networked Computers > Client Management. In the client tree view drop-down box, select Firewall view. Ensure that a green check mark exists under the Firewall column in the client tree. If the policy associated with the profile enables the Intrusion Detection System, a green check mark also exists under the IDS column.
12-19
c.
Verify that the client applied the correct firewall policy. The policy appears under the Firewall Policy column in the client tree.
IP address Domain: Click the button to open and select domains from the client tree.
Note Only users with full domain permissions can select domains.
Computer name: Click the button to open, and select OfficeScan client computers from, the client tree. Platform
12-20
Logon name NIC description: Type a full or partial description, without wildcards.
Tip Trend Micro recommends typing the NIC card manufacturer because NIC descriptions typically start with the manufacturers name. For example, if you typed "Intel", all Intel-manufactured NICs will satisfy the criteria. If you typed a particular NIC model, such as "Intel(R) Pro/100", only NIC descriptions that start with "Intel(R) Pro/100" will satisfy the criteria.
7.
Select whether to grant users the privilege to change the firewall security level or edit a configurable list of exceptions to allow specified types of traffic. See Adding or Modifying a Firewall Policy on page 12-10 for more information about these options.
8.
Click Save.
Profile name and description Policy assigned to the profile OfficeScan client computers, based on the following criteria:
IP address
12-21
Domain: Click the button to open the client tree and select domains from there. Computer name: Click the button to open the client tree and select client computers from there. Platform Logon name NIC description: Type a full or partial description, without wildcards.
Tip Trend Micro recommends typing the NIC card manufacturer because NIC descriptions typically start with the manufacturers name. For example, if you typed "Intel", all Intel-manufactured NICs will satisfy the criteria. If you typed a particular NIC model, such as "Intel(R) Pro/100", only NIC descriptions that start with "Intel(R) Pro/100" will satisfy the criteria.
Privileges: Select whether to grant users the privilege to change the firewall security level or edit a configurable list of exceptions to allow specified types of traffic. See Adding or Modifying a Firewall Policy on page 12-10 for more information about these options.
4.
Click Save.
Firewall Privileges
Allow users to configure their own firewall settings. All user-configured settings cannot be overridden by settings deployed from the OfficeScan server. For example, if the user disables Intrusion Detection System (IDS) and you enable IDS on the OfficeScan server, IDS remains disabled on the OfficeScan client computer. Enable the following settings to allow users to configure the firewall:
12-22
The Firewall tab displays all firewall settings on the OfficeScan client and allows users with firewall privileges to configure their own settings.
Allow users to enable/disable the firewall, Intrusion Detection System, and the firewall violation notification message The OfficeScan firewall protects clients and servers on the network using stateful inspection, high performance network virus scanning, and elimination. If you grant users the privilege to enable or disable the firewall and its features, warn them not to disable the firewall for an extended period of time to avoid exposing the computer to intrusions and hacker attacks. If you do not grant users the privileges, the firewall settings you configure from the OfficeScan server web console display under Network card list on the OfficeScan client console.
Allow clients to send firewall logs to the OfficeScan server Select this option to analyze traffic the OfficeScan firewall blocks and allows. For details about firewall logs, see Firewall Logs on page 12-27. If you select this option, configure the log sending schedule in Networked Computers > Global Client Settings. Go to the Firewall Settings section. The schedule only applies to clients with the firewall log sending privilege. For instructions, see Global Firewall Settings on page 12-24.
Click Settings > Privileges and Other Settings. On the Privileges tab, go to the Firewall Privileges section. Select the following options:
12-23
Display the Firewall tab on the client console on page 12-22 Allow users to enable/disable the firewall, Intrusion Detection System, and the firewall violation notification message on page 12-23 Allow clients to send firewall logs to the OfficeScan server on page 12-23
6.
If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
A particular firewall setting can apply to all clients that the server manages. A setting can apply only to OfficeScan clients with certain firewall privileges. For example, the firewall log sending schedule only applies to OfficeScan clients with the privilege to send logs to the server.
Send firewall logs to the server You can grant certain OfficeScan clients the privilege to send firewall logs to the OfficeScan server. Configure the log sending schedule in this section. Only clients with the privilege to send firewall logs will use the schedule. See Firewall Privileges on page 12-22 for information on firewall privileges available to selected clients.
12-24
Enable the OfficeScan client to update the Common Firewall Driver only after the OfficeScan client computer restarts. Enable this option to avoid potential client computer disruptions (such as temporary disconnection from the network) when the Common Firewall Driver updates during client upgrade.
Note This feature only supports clients upgraded from OfficeScan 8.0 SP1 and above.
Send firewall log information to the OfficeScan server hourly to determine the possibility of a firewall outbreak When you enable this option, OfficeScan clients will send firewall log counts once every hour to the OfficeScan server. For details about firewall logs, see Firewall Logs on page 12-27. OfficeScan uses log counts and the firewall violation outbreak criteria to determine the possibility of a firewall violation outbreak. OfficeScan sends email notifications to OfficeScan administrators in the event of an outbreak.
SETTINGS
Send firewall logs to the server on page 12-24 Update the OfficeScan firewall driver only after a system reboot on page 12-24
Send firewall log information to the OfficeScan server hourly to determine the possibility of a firewall outbreak on page 12-25
12-25
3.
Click Save.
Click Settings > Privileges and Other Settings. On the Privileges tab, go to the Firewall Privileges section. Select Allow users to enable/disable the firewall, Intrusion Detection System, and the firewall violation notification message. If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
12-26
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
Firewall Logs
Firewall logs available on the server are sent by OfficeScan clients with the privilege to send firewall logs. Grant specific clients this privilege to monitor and analyze traffic on the client computers that the OfficeScan firewall is blocking. For information about firewall privileges, see Firewall Privileges on page 12-22. To keep the size of logs from occupying too much space on the hard disk, manually delete logs or configure a log deletion schedule. For more information about managing logs, see Log Management on page 13-33.
12-27
Click Logs > Firewall Logs or View Logs > Firewall Logs. To ensure that the most up-to-date logs are available to you, click Notify Clients. Allow some time for clients to send firewall logs before proceeding to the next step. Specify the log criteria and then click Display Logs. View logs. Logs contain the following information:
5. 6.
Date and time of the firewall violation detection Computer where the firewall violation occurred Computer domain where the firewall violation occurred Remote host IP address Local host IP address Protocol Port number Direction: If inbound (Receive) or outbound (Send) traffic violated a firewall policy Process: The executable program or service running on the computer that caused the firewall violation Description: Specifies the actual security risk (such as a network virus or IDS attack) or the firewall policy violation
12-28
7.
To save logs to a comma-separated value (CSV) file, click Export to CSV. Open the file or save it to a specific location.
12-29
Tip Trend Micro recommends accepting the default values in this screen.
OfficeScan sends a notification message when the number of logs is exceeded. For example, if you specify 100 IDS logs, 100 firewall logs, 100 network virus logs, and a time period of 3 hours, OfficeScan sends the notification when the server receives 301 logs within a 3-hour period. 3. In the Email tab: a. b. c. d. Go to the Firewall Violation Outbreaks section. Select Enable notification via email. Specify the email recipients. Accept or modify the default email subject and message. You can use token variables to represent data in the Subject and Message fields.
TABLE 12-4. Token Variables for Firewall Violation Outbreak Notifications VARIABLE
%A %C %T Log type exceeded Number of firewall violation logs Time period when firewall violation logs accumulated
DESCRIPTION
4.
Click Save.
12-30
WARNING! Test OfficeScan client program settings in a controlled environment only. Do not perform tests on client computers connected to the network or to the Internet. Doing so may expose OfficeScan client computers to viruses, hacker attacks, and other risks.
Procedure 1. Create and save a test policy. Configure the settings to block the types of traffic you want to test. For example, to prevent the OfficeScan client from accessing the Internet, do the following: a. b. c. 2. 3. 4. Set the security level to Low (allow all inbound/outbound traffic). Select Enable firewall and Notify users when a firewall violation occurs. Create an exception that blocks HTTP (or HTTPS) traffic.
Create and save a test profile, selecting the clients to which you will test firewall features. Associate the test policy with the test profile. Click Assign Profile to Clients. Verify the deployment. a. b. c. d. Click Networked Computers > Client Management. Select the domain to which a client belongs. Select Firewall view from the client tree view. Check if there is a green check mark under the Firewall column of the client tree. If you enabled the Intrusion Detection System for that client, check that a green check mark also exists under the IDS column. Verify that the client applied the correct firewall policy. The policy appears under the Firewall Policy column in the client tree.
e. 5. 6.
Test the firewall on the client computer by attempting to send or receive the type of traffic you configured in the policy. To test a policy configured to prevent the client from accessing the Internet, open a web browser on the client computer. If you configured OfficeScan to display a
12-31
notification message for firewall violations, the message displays on the client computer when an outbound traffic violation occurs.
12-32
Part III
Managing the OfficeScan Server and Clients
Chapter 13
Role-based Administration on page 13-2 Reference Servers on page 13-27 Administrator Notification Settings on page 13-29 System Event Logs on page 13-32 Log Management on page 13-33 OfficeScan Database Backup on page 13-39 OfficeScan Web Server Information on page 13-41 Web Console Password on page 13-42 Server Tuner on page 13-44 Smart Feedback on page 13-47
13-1
Role-based Administration
Use Role-based Administration to grant and control access to the OfficeScan web console. If there are several OfficeScan administrators in your organization, you can use this feature to assign specific web console privileges to the administrators and present them with only the tools and permissions necessary to perform specific tasks. You can also control access to the client tree by assigning them one or several domains to manage. In addition, you can grant non-administrators "view only" access to the web console. Each user (administrator or non-administrator) is assigned a specific role. A role defines the level of access to the web console. Users log on to the web console using custom user accounts or Active Directory accounts. Role-based administration involves the following tasks: 1. 2. Define user roles. For details, see User Roles on page 13-2. Configure user accounts and assign a particular role to each user account. For details, see User Accounts on page 13-17.
View web console activities for all users from the system event logs. The following activities are logged:
Logging on to the console Password modification Logging off from the console Session timeout (user is automatically logged off)
User Roles
A user role determines the web console menu items accessible to a user. A role is assigned a permission for each menu item. Assign permissions for the following:
13-2
Menu Item Types on page 13-3 Menu Items for Servers and Clients on page 13-4 Menu Items for Managed Domains on page 13-7 Client Management Menu Items on page 13-8
Configure: Allows full access to a menu item. Users can configure all settings, perform all tasks, and view data in a menu item. View: Only allows users to view settings, tasks, and data in a menu item. No Access: Hides a menu item from view.
SCOPE
Server settings, tasks, and data Global client settings, tasks, and data
For a complete list of available menu items, see Menu Items for Servers and Clients on page 13-4. Menu items for managed domains Granular client settings, tasks, and data that are available outside the client tree For a complete list of available menu items, see Menu Items for Managed Domains on page 13-7.
13-3
TYPE
Client management menu items
SCOPE
Granular client settings, tasks, and data that are available in the client tree For a complete list of available menu items, see Client Management Menu Items on page 13-8.
SUBMENUS
None
Client Management Client Grouping Global Client Settings Computer Location Data Loss Prevention
13-4
SUBMENUS
Smart Protection Sources Integrated Server Smart Feedback Server
Updates
Networked Computers
Logs
Server Update Logs System Event Logs Log Maintenance Policy Servers Agent Management Agent Deployment Client Certificate Administrator Notifications
Cisco NAC
Notifications
13-5
SUBMENUS
User Accounts User Roles Note Only users using the built-in administrator account can access User Accounts and Roles.
Active Directory
Proxy Settings Connection Settings Inactive Clients Quarantine Manager Product License Control Manager Settings Web Console Settings Database Backup Administrative Tools Client Tools
Tools
Plug-in Manager Note Only users using the built-in administrator account can access this feature.
None
13-6
SUBMENUS
None
Compliance Assessment
Networked Computers
Policies Profiles
Client Installation
Updates
Manual Update
Logs
13-7
SUBMENUS
Administrator Notifications
Standard Notifications
SUBMENUS
13-8
SUBMENUS
Scan Settings
Scan Methods Manual Scan Settings Real-time Scan Settings Scheduled Scan Settings Scan Now Settings
Web Reputation Settings Behavior Monitoring Settings Device Control Settings DLP Settings Update Agent Settings Privileges and Other Settings Additional Service Settings Spyware/Grayware Approved List Export Settings Import Settings Virus/Malware Logs Spyware/Grayware Logs Firewall Logs Web Reputation Logs C&C Callback Logs Behavior Monitoring Logs Device Control Logs DLP Logs Delete Logs
Logs
13-9
SUBMENUS
Add Domain Rename Domain Move Client Sort Client Remove Domain/Client
Export
None
DESCRIPTION
Delegate this role to other OfficeScan administrators or users with sufficient knowledge of OfficeScan. Users with this role have "Configure" permission to all menu items.
Guest User
Delegate this role to users who want to view the web console for reference purposes.
Users with this role have no access to the following menu items:
Scan Now for All Domains Plug-in Manager Administration > User Roles Administration > User Accounts
13-10
ROLE NAME
Trend Power User
DESCRIPTION
This role is only available if you upgrade from OfficeScan 10. This role inherits the permissions of the "Power User" role in OfficeScan 10. Users with this role have "Configure" permission to all client tree domains but will have no access to the new features in this release.
Custom Roles
You can create custom roles if none of the built-in roles meet your requirement. Only users with the built-in administrator role and those using the root account created during OfficeScan installation can create custom user roles and assign these roles to user accounts.
13-11
Only the domains have been defined at this point. The level of access to the selected domains will be defined in step 6 and step 7. 5. 6. Click the Global Menu Items tab. Click Menu Items for Servers/Clients and specify the permission for each available menu item. For a list of available menu items, see Menu Items for Servers and Clients on page 13-4. The client tree scope you configured in step 3 determines the level of permission to the menu items and defines the targets for the permission. The client tree scope can either be the root domain (all clients) or specific client tree domains.
TABLE 13-6. Menu Items for Server/Clients and Client Tree Scope CRITERIA
Menu item permission Target
SPECIFIC DOMAINS
View or No Access OfficeScan server and all clients For example, if you grant a role "Configure" permission to all menu items for servers/clients, the user can:
Manage server settings, tasks, and data Deploy global client settings Initiate global client tasks Manage global client data
View server settings, tasks, and data View global client settings, tasks, and data
Some menu items are not available to custom roles. For example, Plug-in Manager, User Roles, and User Accounts are only available to users with the built-in administrator role. If you select the check box under Configure, the check box under View is automatically selected.
13-12
If you do not select any check box, the permission is "No Access".
7.
Click Menu items for managed domains and specify the permission for each available menu item. For a list of available menu items, see . The client tree scope you configured in step 3 determines the level of permission to the menu items and defines the targets for the permission. The client tree scope can either be the root domain (all clients) or specific client tree domains.
TABLE 13-7. Menu Items for Managed Domains and Client Tree Scope CRITERIA
Menu item permission Target
SPECIFIC DOMAINS
Configure, View, or No Access Clients in the selected domains Examples:
If a user deployed firewall policies, the policies will be deployed to all clients. The user can initiate manual client update on all or specific clients. A compliance report can include all or specific clients.
If a user deployed firewall policies, the policies will only be deployed to clients in the selected domains. The user can initiate manual client update only on clients in the selected domains. A compliance report only includes clients in the selected domains.
If you select the check box under Configure, the check box under View is automatically selected. If you do not select any check box, the permission is "No Access".
8.
Click the Client Management Menu Items tab and then specify the permission for each available menu item. For a list of available menu items, see .
13-13
The client tree scope you configured in step 3 determines the level of permission to the menu items and defines the targets for the permission. The client tree scope can either be the root domain (all clients) or specific client tree domains.
TABLE 13-8. Client Management Menu Items and Client Tree Scope CRITERIA
Menu item permission Target
SPECIFIC DOMAINS
Configure, View, or No Access Only the selected domains For example, you can grant a role "Configure" permission to the "Settings" menu item in the client tree. This means that the user can deploy the settings but only to the clients in the selected domains.
The client tree will only display if the permission to the "Client Management" menu item in "Menu Items for Servers/Clients" is "View".
If you select the check box under Configure, the check box under View is automatically selected. If you do not select any check box, the permission is "No Access". If you are configuring permissions for a specific domain, you can copy the permissions to other domains by clicking Copy settings of the selected domain to other domains.
9.
Click Save. The new role displays on the User Roles list.
13-14
Menu items for servers/clients Menu items for managed domains Client management menu items
4.
Click Save.
13-15
3.
To export custom roles to a .csv file: a. b. Select the roles and click Export Role Settings. Save the .csv file. Use this file to check the information and permissions for the selected roles.
4.
If you have saved custom roles from a different OfficeScan server and want to import those roles into the current OfficeScan server, click Import and locate the .zip file containing the custom roles.
A role on the User Roles screen will be overwritten if you import a role with the same name. Importing roles can only be done between servers that have the same version. A role imported from another OfficeScan server:
Retains the permissions for menu items for servers/clients and menu items for managed domains. Applies the default permissions for client management menu items. On the other server, record the roles permissions for client management menu items and then re-apply them to the role that was imported.
13-16
User Accounts
Set up user accounts and assign a particular role to each user. The user role determines the web console menu items a user can view or configure. During OfficeScan server installation, Setup automatically creates a built-in account called "root". Users who log on using the root account can access all menu items. You cannot delete the root account but you can modify account details, such as the password and full name or the account description. If you forget the root account password, contact your support provider for help in resetting the password. Add custom accounts or Active Directory accounts. All user accounts display on the User Accounts list on the web console. OfficeScan user accounts can be used to perform "single sign-on". Single sign-on allows users to access the OfficeScan web console from the Trend Micro Control Manager console. For details, see the procedure below.
6.
13-17
7. 8.
5. 6.
13-18
Include the complete account and domain names. OfficeScan will not return a result for incomplete account and domain names or if the default group "Domain Users" is used. All members belonging to a group get the same role. If a particular account belongs to at least two groups and the role for both groups are different:
The permissions for both roles are merged. If a user configures a particular setting and there is a conflict between permissions for the setting, the higher permission applies. All user roles display in the System Event logs. For example, "User John Doe logged on with the following roles: Administrator, Guest User".
5. 6. 7.
Select a role for the account. Click Save. Inform the user to log on to the web console using his or her domain account and password.
13-19
4.
When OfficeScan finds a valid account, it displays the account name under User and Groups. Click the forward icon (>) to move the account under Selected Users and Groups. If you specify an Active Directory group, all members belonging to a group get the same role. If a particular account belongs to at least two groups and the role for both groups are different:
The permissions for both roles are merged. If a user configures a particular setting and there is a conflict between permissions for the setting, the higher permission applies. All user roles display in the System Event logs. For example, "User John Doe logged on with the following roles: Administrator, Power User".
5. 6. 7. 8.
Add more accounts or groups. Select a role for the accounts or groups. Click Save. Inform users to log on to the web console using their domain names and passwords.
13-20
13-21
Control Manager allows system administrators to monitor and report on activities such as infections, security violations, or virus entry points. System administrators can download and deploy components throughout the network, helping ensure that protection is consistent and up-to-date. Control Manager allows both manual and prescheduled updates, and the configuration and administration of products as groups or as individuals for added flexibility.
Create, manage, and deploy policies for OfficeScan Antivirus, Data Loss Prevention, and Device Control, and assign privileges directly to OfficeScan clients from the Control Manager console. The following table lists the policy configurations available in Control Manager 6.0.
TABLE 13-9. OfficeScan Policy Management Types in Control Manager POLICY TYPE
OfficeScan Antivirus and Client Settings
FEATURES
Additional Service Settings Behavior Monitoring Settings Device Control Settings Manual Scan Settings Privileges and Other Settings Real-time Scan Settings Spyware/Grayware Approved List Scan Methods Scan Now Settings Scheduled Scan Settings Update Agent Settings Web Reputation Settings
13-22
POLICY TYPE
Data Protection
FEATURES
Data Loss Prevention Policy Settings Note Manage the Device Control permissions for Data Protection in the OfficeScan Client policies.
Replicate the following settings from one OfficeScan server to another from the Control Manager console:
Data Identifier Types on page 10-4 Data Loss Prevention Templates on page 10-18
Note If these settings are replicated to an OfficeScan server where the Data Protection license has not been activated, the settings will only take effect when the license is activated.
5.5
Yes Yes No
5.0
13-23
Note IPv6 support for Control Manager starts in version 5.5 Service Pack 1. For details on the IP addresses that the OfficeScan server and OfficeScan clients report to Control Manager, see Screens That Display IP Addresses on page A-7.
Apply the latest patches and critical hot fixes for these Control Manager versions to enable Control Manager to manage OfficeScan. To obtain the latest patches and hot fixes, contact your support provider or visit the Trend Micro Update Center at: http://www.trendmicro.com/download After installing OfficeScan, register it to Control Manager and then configure settings for OfficeScan on the Control Manager management console. See the Control Manager documentation for information on managing OfficeScan servers.
3.
Specify the Control Manager server FQDN or IP address and the port number to use to connect to this server. Optionally connect with increased security using HTTPS.
For a dual-stack OfficeScan server, type the Control Manager FQDN or IP address (IPv4 or IPv6, if available).
13-24
For a pure IPv4 OfficeScan server, type the Control Manager FQDN or IPv4 address. For a pure IPv6 OfficeScan server, type the Control Manager FQDN or IPv6 address.
Note Only Control Manager 5.5 SP1 and later versions support IPv6.
4. 5.
If the IIS web server of Control Manager requires authentication, type the user name and password. If you will use a proxy server to connect to the Control Manager server, specify the following proxy settings:
Proxy protocol Server FQDN or IPv4/IPv6 address and port Proxy server authentication user ID and password
6. 7.
Decide whether to use one-way communication or two-way communication port forwarding, and then specify the IPv4/IPv6 address and port. To check whether OfficeScan can connect to the Control Manager server based on the settings you specified, click Test Connection. Click Register if connection was successfully established.
8.
If you change any of the settings on this screen after registration, click Update Settings after changing the settings to notify the Control Manager server of the changes. If you no longer want the Control Manager server to manage OfficeScan, click Unregister.
9.
13-25
Where <Control Manager server name> is the IP address or host name of the Control Manager server 2. 3. In Main Menu, click Products. Check if the OfficeScan server icon displays.
Real-time Scan settings Scheduled Scan settings Manual Scan settings Scan Now settings Update Agent settings Web reputation settings Scan method
Behavior Monitoring settings Device Control settings Data Loss Prevention settings Privileges and Other Settings Additional Service settings Spyware/Grayware approved list
13-26
Reference Servers
One of the ways the OfficeScan client determines which policy or profile to use is by checking its connection status with the OfficeScan server. If an internal OfficeScan client (or a client within the corporate network) cannot connect to the server, the client status becomes offline. The client then applies a policy or profile intended for external clients. Reference servers address this issue. An OfficeScan client that loses connection with the OfficeScan server will try connecting to reference servers. If the client successfully establishes connection with a reference server, it applies the policy or profile for internal clients.
13-27
Firewall profiles Web reputation policies Data Protection policies Device Control policies
Assign computers with server capabilities, such as a web server, SQL server, or FTP server, as reference servers. You can specify a maximum of 32 reference servers. OfficeScan clients connect to the first reference server on the reference server list. If connection cannot be established, the client tries connecting to the next server on the list. OfficeScan clients use reference servers when determining the antivirus (Behavior Monitoring, Device Control, firewall profiles, the web reputation policy) or Data Protection settings to use. Reference servers do not manage clients or deploy updates and client settings. The OfficeScan server performs these tasks. An OfficeScan client cannot send logs to reference servers or use them as update sources
If you are on the Firewall Profiles for Networked Computers screen, click Edit Reference Server List. If you are on the Computer Location screen, click reference server list.
13-28
3. 4.
Select Enable the Reference Server list. To add a computer to the list, click Add. a. Specify the computer's IPv4/IPv6 address, name, or fully qualified domain name (FQDN), such as:
b.
Type the port through which clients communicate with this computer. Specify any open contact port (such as ports 20, 23 or 80) on the reference server.
Note To specify another port number for the same reference server, repeat steps 2a and 2b. The OfficeScan client uses the first port number on the list and, if connection is unsuccessful, uses the next port number.
c. 5. 6. 7.
Click Save.
To edit the settings of a computer on the list, click the computer name. Modify the computer name or port, and then click Save. To remove a computer from the list, select the computer name and then click Delete. To enable the computers to act as reference servers, click Assign to Clients.
13-29
OfficeScan can send notifications to you and other OfficeScan administrators when the following are detected:
TABLE 13-11. Detections that Trigger Administrator Notifications NOTIFICATION CHANNELS DETECTIONS EMAIL
Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes No Yes Yes No No No
PAGER
SNMP TRAP
Yes Yes Yes Yes Yes Yes No No Yes
Viruses and malware Spyware and grayware Digital asset transmissions C&C callbacks Virus and malware outbreaks Spyware and grayware outbreaks Firewall violation outbreaks Shared folder session outbreaks C&C callbacks
13-30
b. c.
Specify a port number between 1 and 65535. Specify a name or email address. If you want to enable ESMTP in the next step, specify a valid email address.
d. e. f.
Optionally enable ESMTP. Specify the username and password for the email address you specified in the From field. Choose a method for authenticating the client to the server:
Login: Login is an older version of the mail user agent. The server and client both use BASE64 to authenticate the username and password. Plain Text: Plain Text is the easiest to use but can also be unsafe because the username and password are sent as one string and BASE64 encoded before being sent over the Internet. CRAM-MD5: CRAM-MD5 uses a combination of a challenge-response authentication mechanism and a cryptographic Message Digest 5 algorithm to exchange and authenticate information.
3.
Configure pager notification settings. a. For the Pager number field, the following characters are allowed:
0 to 9 # * ,
b. 4.
Configure SNMP Trap notification settings. a. b. Specify either an IPv4/IPv6 address or computer name in the Server IP address field. Specify a community name that is difficult to guess.
13-31
5.
Click Save.
EVENTS
Master Service started Master Service stopped successfully Master Service stopped unsuccessfully Outbreak Prevention enabled Outbreak Prevention disabled Number of shared folder sessions in the last <number of minutes> Database backup successful Database backup unsuccessful
Outbreak Prevention
Database backup
13-32
LOG TYPE
Role-based web console access
EVENTS
Logging on to the console Password modification Logging off from the console Session timeout (user automatically gets logged off)
3.
To save logs to a comma-separated value (CSV) file, click Export to CSV. Open the file or save it to a specific location.
Log Management
OfficeScan keeps comprehensive logs about security risk detections, events, and updates. Use these logs to assess your organization's protection policies and to identify OfficeScan clients at a higher risk of infection or attack. Also use these logs to check client-server connection and verify that component updates were successful. OfficeScan also uses a central time verification mechanism to ensure time consistency between OfficeScan server and clients. This prevents log inconsistencies caused by time zones, Daylight Saving Time, and time differences, which can cause confusion during log analysis.
Note OfficeScan performs time verification for all logs except for Server Update and System Event logs.
The OfficeScan server receives the following logs from OfficeScan clients:
Viewing Virus/Malware Logs on page 7-81 Viewing Spyware/Grayware Logs on page 7-88 Viewing Spyware/Grayware Restore Logs on page 7-90 Viewing Firewall Logs on page 12-28
13-33
Viewing Web Reputation Logs on page 11-18 Viewing C&C Callback Logs on page 11-19 Viewing Behavior Monitoring Logs on page 8-13 Viewing Device Control Logs on page 9-17 Viewing Data Loss Prevention Logs on page 10-50 Viewing OfficeScan Client Update Logs on page 6-47 Viewing Connection Verification Logs on page 14-41
OfficeScan Server Update Logs on page 6-25 System Event Logs on page 13-32
The following logs are also available on the OfficeScan server and OfficeScan clients:
Windows Event Logs on page 18-22 OfficeScan Server Logs on page 18-3 OfficeScan Client Logs on page 18-15
Log Maintenance
To keep the size of logs from occupying too much space on the hard disk, manually delete logs or configure a log deletion schedule from the web console.
13-34
3.
Select the log types to delete. All OfficeScan-generated logs, except debug logs, can be deleted based on a schedule. For debug logs, disable debug logging to stop collecting logs.
Note For virus/malware logs, you can delete logs generated from certain scan types and Damage Cleanup Services. For spyware/grayware logs, you can delete logs from certain scan types. For details about scan types, see Scan Types on page 7-13.
4. 5. 6.
Select whether to delete logs for all the selected log types or only logs older than a certain number of days. Specify the log deletion frequency and time. Click Save.
If you are accessing the Security Risk Logs for Networked Computers screen, click Delete Logs or View Logs > Delete Logs. If you are accessing the Client Management screen, click Logs > Delete Logs.
4.
Select the log types to delete. Only the following logs can be deleted manually:
13-35
Firewall logs Web reputation logs C&C Callback logs Behavior Monitoring logs Device Control logs Data Loss Prevention logs
Note For virus/malware logs, you can delete logs generated from certain scan types and Damage Cleanup Services. For spyware/grayware logs, you can delete logs from certain scan types. For details about scan types, see Scan Types on page 7-13.
5. 6.
Select whether to delete logs for all the selected log types or only logs older than a certain number of days. Click Delete.
Licenses
View, activate, and renew OfficeScan license services on the web console, and enable/ disable the OfficeScan firewall. The OfficeScan firewall is part of the Antivirus service, which also includes support for Cisco NAC and outbreak prevention.
Note Some native OfficeScan features, such as Data Protection and Virtual Desktop Support, have their own licenses. The licenses for these features are activated and managed from Plug-in Manager. For details about licensing for these features, see Data Protection License on page 3-4 and Virtual Desktop Support License on page 14-72. A pure IPv6 OfficeScan server cannot connect to the Trend Micro Online Registration Server to activate/renew the license. A dual-stack proxy server that can convert IP addresses, such as DeleGate, is required to allow the OfficeScan server to connect to the registration server.
13-36
Log off and then log on again to the web console during the following instances:
After enabling or disabling the OfficeScan firewall. If you disable firewall, OfficeScan hides all firewall features on the server and client.
REMINDER
During the products grace period. The duration of the grace period varies by region. Please verify the grace period with your Trend Micro representative. When the license expires and grace period elapses. During this time, you will not be able to obtain technical support or perform component updates. The scan engines will still scan computers but will use out-of-date components. These out-of-date components may not be able to protect you completely from the latest security risks.
13-37
LICENSE TYPE
Evaluation Version
REMINDER
When the license expires. During this time, OfficeScan disables component updates, scanning, and all client features.
3.
View license information. The License Information section provides you the following information:
Services: Includes all the OfficeScan license services Status: Displays either "Activated", "Not Activated" or "Expired". If a service has multiple licenses and at least one license is still active, the status that displays is "Activated". Version: Displays either "Full" or "Evaluation" version. If you have both full and evaluation versions, the version that displays is "Full". Expiration Date: If a service has multiple licenses, the latest expiration date displays. For example, if the license expiration dates are 12/31/2007 and 06/30/2008, 06/30/2008 displays.
Note The version and expiration date of license services that have not been activated are "N/A".
4.
OfficeScan allows you to activate multiple licenses for a license service. Click the service name to view all the licenses (both active and expired) for that service.
13-38
Note Register a service before activating it. Contact your Trend Micro representative for more information about the Registration Key and Activation Code.
5.
Back in the Product License Details screen, click Update Information to refresh the screen with the new license details and the status of the service. This screen also provides a link to the Trend Micro website where you can view detailed information about your license.
WARNING! Do not perform the backup with any other tool or software. Configure database backup from the OfficeScan web console only.
13-39
3.
If the backup path is on a remote computer (using a UNC path), type an appropriate account name and the corresponding password. Ensure that the account has write privileges on the computer. To configure a backup schedule: a. b. c. Select Enable scheduled database backup. Specify the backup frequency and time. To back up the database and save the changes you made, click Backup Now. To save only without backing up the database, click Save.
4.
13-40
2. 3.
Overwrite the database files in <Server installation folder>\PCCSRV\HTTPDB with the backup files. Restart the OfficeScan Master Service.
3.
Click Save.
13-41
Configure the OfficeScan server to refresh the Summary dashboard periodically. By default, the server will refresh the dashboard every 30 seconds. The number of seconds can be from 10 to 300. Specify the web console timeout settings. By default, a user is automatically logged off from the web console after 30 minutes of inactivity. The number of minutes can be from 10 to 60.
13-42
4.
Click Save.
Quarantine Manager
Whenever the OfficeScan client detects a security risk and the scan action is quarantine, it encrypts the infected file and then moves it to the local quarantine folder located in <Client installation folder>\SUSPECT. After moving the file to the local quarantine directory, the OfficeScan client sends it to the designated quarantine directory. Specify the directory in Networked Computers > Client Management > Settings > {Scan Type} Settings > Action tab. Files in the designated quarantine directory are encrypted to prevent them from infecting other files. See Quarantine Directory on page 7-38 for more information. If the designated quarantine directory is on the OfficeScan server computer, modify the servers quarantine directory settings from the web console. The server stores quarantined files in <Server installation folder>\PCCSRV\Virus.
Note If the OfficeScan client is unable to send the encrypted file to the OfficeScan server for any reason, such as a network connection problem, the encrypted file remains in the OfficeScan client quarantine folder. The OfficeScan client will attempt to resend the file when it connects to the OfficeScan server.
13-43
4.
To remove all existing files in the quarantine folder, click Delete All Quarantined Files.
Server Tuner
Use Server Tuner to optimize the performance of the OfficeScan server using parameters for the following server-related performance issues:
Download When the number of OfficeScan clients (including update agents) requesting updates from the OfficeScan server exceeds the server's available resources, the server moves the client update request into a queue and processes the requests when resources become available. After a client successfully updates components from the OfficeScan server, it notifies the server that the update is complete. Set the maximum number of minutes the OfficeScan server waits to receive an update notification from the client. Also set the maximum number of times the server tries to notify the client to perform an update and to apply new configuration settings. The server keeps trying only if it does not receive client notification.
Buffer When the OfficeScan server receives multiple requests from OfficeScan clients, such as a request to perform an update, the server handles as many requests as it can and puts the remaining requests in a buffer. The server then handles the requests saved in the buffer one at a time when resources become available. Specify the size of the buffer for events, such as client requests for updates, and for client log reporting.
Network Traffic The amount of network traffic varies throughout the day. To control the flow of network traffic to the OfficeScan server and to other update sources, specify the number of OfficeScan clients that can simultaneously update at any given time of the day.
13-44
Double-click SvrTune.exe to start Server Tuner. The Server Tuner console opens.
3.
Timeout for client: Type the number of minutes for the OfficeScan server to wait to receive an update response from clients. If the client does not respond within this time, the OfficeScan server does not consider the client to have current components. When a notified client times out, a slot for another client awaiting notification becomes available. Timeout for update agent: Type the number of minutes for the OfficeScan server to wait to receive an update response from an Update Agent. When a notified client times out, a slot for another client awaiting notification becomes available. Retry count: Type the maximum number of times the OfficeScan server tries to notify a client to perform an update or to apply new configuration settings. Retry interval: Type the number of minutes the OfficeScan server waits between notification attempts.
4.
Event Buffer: Type the maximum number of client event reports to the server (such as updating components) that OfficeScan holds in the buffer. The connection to the client breaks while the client request waits in the buffer. OfficeScan establishes a connection toa client when it processes the client report and removes it from the buffer. Log Buffer: Type the maximum number of client log information reports to the server that OfficeScan holds in the buffer. The connection to the client breaks while the client request waits in the buffer. OfficeScan establishes a
13-45
connection to a client when it processes the client report and removes it from the buffer.
Note If a large number of clients report to the server, increase the buffer size. A higher buffer size, however, means higher memory utilization on the server.
5.
Normal hours: Click the radio buttons that represent the hours of the day you consider network traffic to be normal. Off-peak hours: Click the radio buttons that represent the hours of the day you consider network traffic to be at its lowest. Peak hours: Click the radio buttons that represent the hours of the day you consider network traffic to be at its peak. Maximum client connections: Type the maximum number of clients that can simultaneously update components from both "other update source" and from the OfficeScan server. Type a maximum number of clients for each of the time periods. When the maximum number of connections is reached, a client can update components only after a current client connection closes (due to either the completion of the update or the client response reaching the timeout value you specified in the Timeout for client or Timeout for Update Agent field).
6.
Click OK. A prompt appears asking you to restart the OfficeScan Master Service.
Note Only the service restarts, not the computer.
7.
Click Yes to save the Server Tuner settings and restart the service. The settings take effect immediately after restart.
13-46
Click No to save the Server Tuner settings but not restart the service. Restart the OfficeScan Master Service or restart the OfficeScan server computer for settings to take effect.
Smart Feedback
Trend Micro Smart Feedback shares anonymous threat information with the Smart Protection Network, allowing Trend Micro to rapidly identify and address new threats. You can disable Smart Feedback anytime through this console.
5. 6. 7.
To configure the criteria for sending feedback, select the number of detections for the specific amount of time that triggers the feedback. Specify the maximum bandwidth OfficeScan can use when sending feedback to minimize network interruptions. Click Save.
13-47
Chapter 14
Computer Location on page 14-2 OfficeScan Client Program Management on page 14-6 Client-Server Connection on page 14-24 OfficeScan Client Proxy Settings on page 14-46 Viewing OfficeScan Client Information on page 14-50 Importing and Exporting Client Settings on page 14-51 Security Compliance on page 14-52 Trend Micro Virtual Desktop Support on page 14-70 Global Client Settings on page 14-83 Configuring Client Privileges and Other Settings on page 14-84
14-1
Computer Location
OfficeScan provides a location awareness feature that determines whether a OfficeScan clients location is internal or external. Location awareness is leveraged in the following OfficeScan features and services:
TABLE 14-1. Features and Services that Leverage Location Awareness FEATURE/SERVICE
Web Reputation Services
DESCRIPTION
The OfficeScan clients location determines the web reputation policy that the OfficeScan client will apply. Administrators typically enforce a stricter policy for external clients. For details about web reputation policies, see Web Reputation Policies on page 11-5.
For clients that use smart scan, the OfficeScan clients location determine the smart protection source to which clients send scan queries. External clients send scan queries to Smart Protection Network while internal clients send the queries to the sources defined in the smart protection source list. For details about smart protection sources, see Smart Protection Sources on page 4-5.
A OfficeScan clients location determines the Data Loss Prevention policy that the client will apply. Administrators typically enforce a stricter policy for external clients. For details about Data Loss Prevention policies, see Data Loss Prevention Policies on page 10-3.
Device Control
A OfficeScan clients location determines the Device Control policy that the client will apply. Administrators typically enforce a stricter policy for external clients. For details about Device Control policies, see Device Control on page 9-2.
14-2
Location Criteria
Specify whether location is based on the OfficeScan client computer's gateway IP address or the OfficeScan client's connection status with the OfficeScan server or any reference server.
Gateway IP and MAC address: If the OfficeScan client computer's gateway IP address matches any of the gateway IP addresses you specified on the Computer Location screen, the computer's location is internal. Otherwise, the computer's location is external. Client connection status: If the OfficeScan client can connect to the OfficeScan server or any of the assigned reference servers on the intranet, the computer's location is internal. Additionally, if a computer outside the corporate network can establish connection with the OfficeScan server/reference server, its location is also internal. If none of these conditions apply, the computer's location is external.
OfficeScan client switches from roaming to normal (online/offline) mode. OfficeScan client switches from one scan method to another. See Scan Methods on page 7-7 for details.
14-3
OfficeScan client detects IP address change in the computer. OfficeScan client restarts. Server initiates connection verification. See OfficeScan Client Icons on page 14-24 for details. Web reputation location criteria changes while applying global settings. Outbreak prevention policy is no longer enforced and pre-outbreak settings are restored.
b.
If you specified a reference server, the OfficeScan client checks its connection status with the OfficeScan server first, and then with the reference server if connection to the OfficeScan server is unsuccessful. The OfficeScan client checks the connection status every hour and when any of the above events occur.
4.
If you choose Gateway IP and MAC address: a. b. c. Type the gateway IPv4/IPv6 address in the text box provided. Type the MAC address. Click Add. If you do not type a MAC address, OfficeScan will include all the MAC addresses belonging to the specified IP address. d. e. Repeat step a to step c until you have all the gateway IP addresses you want to add. Use the Gateway Settings Importer tool to import a list of gateway settings. See Gateway Settings Importer on page 14-4 for details.
5.
Click Save.
14-4
identifies the location is by checking the computer's gateway IP address and MAC address. Configure the gateway settings on the Computer Location screen or use the Gateway Settings Importer tool to import a list of gateway settings to the Computer Location screen.
2.
On the server computer, go to <Server installation folder>\PCCSRV\Admin \Utility\GatewaySettingsImporter and double-click GSImporter.exe.
Note You cannot run the Gateway Settings Importer tool from Terminal Services.
3. 4.
On the Gateway Settings Importer screen, browse to the file created in step 1 and click Import. Click OK. The gateway settings display on the Computer Location screen and the OfficeScan server deploys the settings to OfficeScan clients.
5.
14-5
If you only need to delete a particular entry, remove it from the Computer Location screen. 6. To export the settings to a file, click Export All and then specify the file name and type.
OfficeScan Client Services on page 14-6 OfficeScan Client Service Restart on page 14-11 Client Self-protection on page 14-12 OfficeScan Client Security on page 14-16 OfficeScan Client Console Access Restriction on page 14-17 OfficeScan Client Unloading on page 14-18 OfficeScan Client Roaming Privilege on page 14-19 Client Mover on page 14-21 Inactive OfficeScan Clients on page 14-23
14-6
FEATURES CONTROLLED
Behavior Monitoring Device Control Certified Safe Software Service OfficeScan client Self-protection Note OfficeScan client Self-protection prevents OfficeScan client services from being terminated when they are enabled and running.
OfficeScan NT Firewall (TmPfw.exe) OfficeScan Data Protection Service (dsagent.exe) OfficeScan NT Listener (tmlisten.exe) OfficeScan NT Proxy Service (TmProxy.exe) OfficeScan NT RealTime Scan (ntrtscan.exe)
OfficeScan firewall
Web reputation POP3 mail scan Real-time Scan Scheduled Scan Manual Scan/Scan Now
The following services provide robust protection but their monitoring mechanisms can strain system resources, especially on servers running system-intensive applications:
Trend Micro Unauthorized Change Prevention Service (TMBMSRV.exe) OfficeScan NT Firewall (TmPfw.exe) OfficeScan Data Protection Service (dsagent.exe)
14-7
For this reason, these services are disabled by default on server platforms (Windows Server 2003, Windows Server 2008, and Windows Server 2012). If you want to enable these services:
Monitor the systems performance constantly and take the necessary action when you notice a drop in performance. For TMBMSRV.exe, you can enable the service if you exempt system-intensive applications from Behavior Monitoring policies. You can use a performance tuning tool to identify system intensive applications. For details, see Using the Trend Micro Performance Tuning Tool on page 14-9.
For desktop platforms, disable the services only if you notice a significant drop in performance.
b. c.
Click Settings > Additional Service Settings. Select or clear the check box under the following sections:
14-8
d.
Click Save to apply settings to the domain(s). If you selected the root domain icon, choose from the following options:
Apply to All Clients: Applies settings to all existing Windows XP/ Vista/7/8 clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configure the settings. Apply to Future Domains Only: Applies settings only to Windows XP/Vista/7/8 clients added to future domains. This option will not apply settings to new clients added to an existing domain.
3.
For OfficeScan clients running Windows Server 2003, Windows Server 2008, or Windows Server 2012: a. b. c. Select a client in the client tree. Click Settings > Additional Service Settings. Select or clear the check box under the following sections:
d.
Click Save.
14-9
3. 4. 5. 6.
Place TMPerfTool.exe in the <Client installation folder> or in the same folder as TMBMCLI.dll. Right-click TMPerfTool.exe and select Run as administrator. Read and accept the end user agreement and then click OK. Click Analyze.
The tool starts to monitor CPU usage and event loading. A system-intensive process is highlighted in red. 7. 8. 9. Select a system-intensive process and click the Add to the exception list (allow) ). button ( Check if the system or application performance improves. If the performance improves, select the process again and click the Remove from the exception list button ( ).
14-10
10. If the performance drops again, perform the following steps: a. b. c. d. Note the name of the application. Click Stop. Click the Generate report button ( ) and then save the .xml file.
Review the applications that have been identified as conflicting and add them to the Behavior Monitoring exception list. For details, see Behavior Monitoring Exception List on page 8-5.
Restart the service after __ minutes: Specify the amount of time (in number of minutes) that must elapse before OfficeScan restarts a service. If the first attempt to restart the service fails, retry __ times: Specify the maximum retry attempts for restarting a service. Manually restart a service if it remains stopped after the maximum retry attempts.
14-11
Reset the restart failure count after __ hours: If a service remains stopped after exhausting the maximum retry attempts, OfficeScan waits a certain number of hours to reset the failure count. If a service remains stopped after the number of hours elapses, OfficeScan restarts the service.
Client Self-protection
OfficeScan client self-protection provides ways for the OfficeScan client to protect the processes and other resources required to function properly. OfficeScan client selfprotection helps thwart attempts by programs or actual users to disable anti-malware protection. OfficeScan client self-protection provides the following options:
Protect OfficeScan Client Services on page 14-13 Protect Files in the OfficeScan Client Installation Folder on page 14-14 Protect OfficeScan Client Registry Keys on page 14-15 Protect OfficeScan Client Processes on page 14-15
Click Settings > Privileges and Other Settings. Click the Other Settings tab and go to the Client Self-protection section. Enable the following options:
Protect OfficeScan Client Services on page 14-13 Protect Files in the OfficeScan Client Installation Folder on page 14-14
14-12
Protect OfficeScan Client Registry Keys on page 14-15 Protect OfficeScan Client Processes on page 14-15
Note Protection of registry keys and processes is disabled by default on Windows server platforms.
6.
If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
OfficeScan NT Listener (TmListen.exe) OfficeScan NT RealTime Scan (NTRtScan.exe) OfficeScan NT Proxy Service (TmProxy.exe) OfficeScan NT Firewall (TmPfw.exe) OfficeScan Data Protection Service (dsagent.exe) Trend Micro Unauthorized Change Prevention Service (TMBMSRV.exe)
14-13
Note If this option is enabled, OfficeScan may prevent third-party products from installing successfully on endpoints. If you encounter this issue, you can temporarily disable the option and then re-enable it after the installation of the third-party product.
All digitally-signed files with .exe, .dll, and .sys extensions Some files without digital signatures, including:
bspatch.exe bzip2.exe INETWH32.dll libcurl.dll libeay32.dll libMsgUtilExt.mt.dll msvcm80.dll MSVCP60.DLL msvcp80.dll msvcr80.dll OfceSCV.dll OFCESCVPack.exe patchbld.dll patchw32.dll patchw64.dll
14-14
TmListen.exe: Receives commands and notifications from the OfficeScan server and facilitates communication from the OfficeScan client to the server NTRtScan.exe: Performs Real-time, Scheduled, and Manual Scan on OfficeScan
clients
TmProxy.exe: Scans network traffic before passing it to the target application TmPfw.exe: Provides packet level firewall, network virus scanning and intrusion detection capabilities TMBMSRV.exe: Regulates access to external storage devices and prevents unauthorized changes to registry keys and processes
14-15
devices
Controlling Access to the OfficeScan Client Installation Directory and Registry Keys
Procedure 1. 2. 3. 4. 5. Navigate to Networked Computers > Client Management. In the client tree, click the root domain icon ( clients. ) or select specific domains or
Click Settings > Privileges and Other Settings. Click the Other Settings tab and go to the Client Security Settings section. Select from the following access permissions:
High: The OfficeScan client installation directory inherits the rights of the
Program Files folder and the OfficeScan clients registry entries inherit permissions from the HKLM\Software key. For most Active Directory
configurations, this automatically limits normal users (those without administrator privileges) to read-only access.
Normal: This permission grants all users (the user group "Everyone") full rights to the OfficeScan client program directory and OfficeScan client registry entries.
6.
If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
14-16
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
Click Settings > Privileges and Other Settings. Click the Other Settings tab and go to the Client Console Access Restriction section. Select Do not allow users to access the client console from the system tray or Windows Start menu. If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
14-17
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
Click Settings > Privileges and Other Settings. On the Privileges tab, go to the Unloading section. To allow client unloading without a password, select Allow the user to unload the OfficeScan client.
If a password is required, select Require a password for the user to unload the OfficeScan client, type the password, and then confirm it.
6.
If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings.
14-18
Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
OfficeScan clients do not send logs to the OfficeScan server, even if there is a functional connection between the server and clients. The OfficeScan server does not initiate tasks and deploy OfficeScan client settings to the clients, even if there is functional connection between the server and clients. OfficeScan clients update components if they can connect to any of their update sources. Sources include the OfficeScan server, Update Agents, or a custom update source. The following events trigger an update on roaming clients:
The user performs a manual update. Automatic client update runs. You can disable automatic client update on roaming clients. For details, see Disabling Automatic Client Update on Roaming Clients on page 14-20. Scheduled update runs. Only clients with the required privileges can run scheduled updates. You can revoke this privilege anytime. For details, see Revoking the Scheduled Update Privilege on roaming OfficeScan Clients on page 14-21.
14-19
Click Settings > Privileges and Other Settings. On the Privileges tab, go to the Roaming Privilege section. Select Enable roaming mode. If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
14-20
4.
Click Save.
Click Settings > Privileges and Other Settings. On the Privileges tab, go to the Component Update Privileges section. Clear the Enable scheduled update option. Click Save.
Client Mover
If you have more than one OfficeScan server on the network, use the Client Mover tool to transfer OfficeScan clients from one OfficeScan server to another. This is especially useful after adding a new OfficeScan server to the network and you want to transfer existing OfficeScan clients to the new server.
Note The two servers must be of the same language version. If you use Client Mover to move an OfficeScan client running an earlier version to a server of the current version, the OfficeScan client will be upgraded automatically. Ensure that the account you use has administrator privileges before using this tool.
14-21
EXPLANATION
IpXfer.exe or IpXfer_x64.exe
The name of the destination OfficeScan server (the server to which the OfficeScan client will transfer) The listening port (or trusted port) of the destination OfficeScan server. To view the listening port on the OfficeScan web console, click Administration > Connection Settings in the main menu. The port number used by the OfficeScan client computer to communicate with the server The client tree domain or subdomain to which the client will be grouped. The domain hierarchy should indicate the subdomain.
Examples:
ipXfer.exe -s Server01 -p 8080 -c 21112 -d Workgroup
14-22
5.
To confirm the OfficeScan client now reports to the other server, do the following: a. b. c. d. On the OfficeScan client computer, right-click the OfficeScan client program icon in the system tray. Select OfficeScan Console. Click Help in the menu and select About. Check the OfficeScan server that the OfficeScan client reports to in the Server name/port field.
Note If the OfficeScan client does not appear in the client tree of the new OfficeScan server managing it, restart the new servers Master Service (ofservice.exe).
14-23
Client-Server Connection
The OfficeScan client must maintain a continuous connection with its parent server so that it can update components, receive notifications, and apply configuration changes in a timely manner. The following topics discuss how to check the OfficeScan clients connection status and resolve connection issues:
Client IP Addresses on page 5-9 OfficeScan Client Icons on page 14-24 Client-Server Connection Verification on page 14-40 Connection Verification Logs on page 14-41 Unreachable Clients on page 14-41
14-24
TABLE 14-4. OfficeScan client Status as Indicated in the OfficeScan client Icon CLIENT STATUS
Client connection with the OfficeScan server
DESCRIPTION
Online clients are connected to the OfficeScan server. The server can initiate tasks and deploy settings to these clients
VISUAL HINT
The icon contains a symbol resembling a heartbeat.
The background color is a shade of blue or red, depending on the status of the Realtime Scan Service. The icon contains a symbol resembling the loss of a heartbeat.
Offline clients are disconnected from the OfficeScan server. The server cannot manage these clients.
The background color is a shade of blue or red, depending on the status of the Realtime Scan Service. It is possible for a client to become offline even if it is connected to the network. For details about this issue, see An OfficeScan Client is Connected to the Network but Appears Offline on page 14-37. Roaming clients may or may not be able to communicate with the OfficeScan server. The icon contains the desktop and signal symbols.
The background color is a shade of blue or red, depending on the status of the Realtime Scan Service. For details about roaming clients, see OfficeScan Client Roaming Privilege on page 14-19.
14-25
CLIENT STATUS
Availability of smart protection sources
DESCRIPTION
Smart protection sources include Smart Protection Servers and Trend Micro Smart Protection Network. Conventional scan clients connect to smart protection sources for web reputation queries. Smart scan clients connect to smart protection sources for scan and web reputation queries.
VISUAL HINT
The icon includes a check mark if a smart protection source is available.
The icon includes a progress bar if no smart protection source is available and the client is attempting to establish connection with the sources.
For details about this issue, see Smart Protection Sources are Unavailable on page 14-38. For conventional scan clients, no check mark or progress bar appears if web reputation has been disabled on the client.
14-26
CLIENT STATUS
Real-time Scan Service status
DESCRIPTION
OfficeScan uses the Realtime Scan Service not only for Real-time Scan, but also for Manual Scan and Scheduled Scan. The service must be functional or the client becomes vulnerable to security risks.
VISUAL HINT
The entire icon is shaded blue if the Realtime Scan Service is functional. Two shades of blue are used to indicate the clients scan method.
The entire icon is shaded red if the Realtime Scan Service has been disabled or is not functional. Two shades of red are used to indicate the clients scan method.
For details about this issue, see Real-time Scan Service Has Been Disabled or is Not Functional on page 14-37.
14-27
CLIENT STATUS
Real-time Scan status
DESCRIPTION
Real-time Scan provides proactive protection by scanning files for security risks as they are created, modified, or retrieved.
VISUAL HINT
There are no visual hints if Real-time Scan is enabled. The entire icon is surrounded by a red circle and contains a red diagonal line if Real-time Scan is disabled.
Real-time Scan was Disabled on page 14-37 Real-time Scan was Disabled and an OfficeScan Client is in Roaming Mode on page 14-37
Clients must update the pattern regularly to protect the client from the latest threats.
There are no visual hints if the pattern is upto-date or is slightly out-of-date. The icon includes an exclamation mark if the pattern is severely outdated. This means that the pattern been not been updated for a while.
For details on how to update clients, see OfficeScan Client Updates on page 6-26.
14-28
OFFICESCAN SERVER
Online Online Online Online Online Online Offline Offline Offline Offline Offline Offline Roaming
REAL-TIME SCAN
Enabled Disabled Disabled or not functional Enabled Disabled Disabled or not functional Enabled Disabled Disabled or not functional Enabled Disabled Disabled or not functional Enabled
14-29
CONNECTION ICON
WITH
OFFICESCAN SERVER
Roaming Roaming Roaming Roaming Roaming
REAL-TIME SCAN
OFFICESCAN SERVER
Online
REAL-TIME SCAN
VIRUS PATTERN
Functional
Enabled
Online
Functional
Enabled
14-30
CONNECTION ICON
WITH
OFFICESCAN SERVER
Online Online
REAL-TIME SCAN
VIRUS PATTERN
Functional Functional
Enabled Enabled
Severely outdated Severely outdated Up-to-date or slightly outdated Up-to-date or slightly outdated Severely outdated Severely outdated Up-to-date or slightly outdated Up-to-date or slightly outdated Severely outdated Severely outdated
Online
Functional
Disabled
Online
Functional
Disabled
Online Online
Functional Functional
Disabled Disabled
Online
Disabled or not functional Disabled or not functional Disabled or not functional Disabled or not functional
Disabled or not functional Disabled or not functional Disabled or not functional Disabled or not functional
Online
Online Online
14-31
CONNECTION ICON
WITH
OFFICESCAN SERVER
Offline
REAL-TIME SCAN
VIRUS PATTERN
Functional
Enabled
Up-to-date or slightly outdated Up-to-date or slightly outdated Severely outdated Severely outdated Up-to-date or slightly outdated Up-to-date or slightly outdated Severely outdated Severely outdated Up-to-date or slightly outdated Up-to-date or slightly outdated
Offline
Functional
Enabled
Offline Offline
Functional Functional
Enabled Enabled
Offline
Functional
Disabled
Offline
Functional
Disabled
Offline Offline
Functional Functional
Disabled Disabled
Offline
Offline
14-32
CONNECTION ICON
WITH
OFFICESCAN SERVER
Offline Offline
REAL-TIME SCAN
VIRUS PATTERN
Severely outdated Severely outdated Up-to-date or slightly outdated Up-to-date or slightly outdated Severely outdated Severely outdated Up-to-date or slightly outdated Up-to-date or slightly outdated Severely outdated Severely outdated
Roaming
Roaming
Functional
Enabled
Roaming Roaming
Functional Functional
Enabled Enabled
Roaming
Functional
Disabled
Roaming
Functional
Disabled
Roaming Roaming
Functional Functional
Disabled Disabled
14-33
CONNECTION ICON
WITH
OFFICESCAN SERVER
Roaming
REAL-TIME SCAN
VIRUS PATTERN
Disabled or not functional Disabled or not functional Disabled or not functional Disabled or not functional Functional
Disabled or not functional Disabled or not functional Disabled or not functional Disabled or not functional Enabled
Up-to-date or slightly outdated Up-to-date or slightly outdated Severely outdated Severely outdated Up-to-date or slightly outdated Severely outdated
Roaming
Unavailable, reconnecting to sources Available Unavailable, reconnecting to sources Not applicable (Web reputation feature disabled on client) Not applicable (Web reputation feature disabled on client) Not applicable (Web reputation feature disabled on client) Not applicable (Web reputation feature disabled on client)
Roaming Roaming
Online
Online
Functional
Enabled
Online
Functional
Disabled
Online
Functional
Disabled
14-34
CONNECTION ICON
WITH
OFFICESCAN SERVER
Online
REAL-TIME SCAN
VIRUS PATTERN
Online
Offline
Functional
Enabled
Offline
Functional
Enabled
Offline
Functional
Disabled
Offline
Functional
Disabled
Offline
14-35
CONNECTION ICON
WITH
OFFICESCAN SERVER
Offline
REAL-TIME SCAN
VIRUS PATTERN
Severely outdated
Roaming
Functional
Enabled
Roaming
Functional
Enabled
Roaming
Functional
Disabled
Roaming
Functional
Disabled
Roaming
Roaming
14-36
14-37
1. 2.
If the connection status on both the server and OfficeScan client is offline, check the network connection. If the connection status on the OfficeScan client is offline but online on the server, the servers domain name may have been changed and the OfficeScan client connects to the server using the domain name (if you select domain name during server installation). Register the OfficeScan servers domain name to the DNS or WINS server or add the domain name and IP information into the "hosts" file in the client computers <Windows folder>\system32\drivers\etc folder. If the connection status on the OfficeScan client is online but offline on the server, check the OfficeScan firewall settings. The firewall may block server-to-client communication, but allow client-to-server communication. If the connection status on the OfficeScan client is online but offline on the server, the OfficeScan client's IP address may have been changed but its status does not reflect on the server (for example, when the client is reloaded). Try to redeploy the OfficeScan client.
3.
4.
2.
On the web console, go to the Smart Protection Source screen (Smart Protection > Smart Protection Sources) and then perform the following tasks: a. b. c. Check if the Smart Protection Server settings on the standard or custom list of sources are correct. Test if connection to the servers can be established. Click Notify All Clients after configuring the list of sources.
14-38
3.
Check if the following configuration files on the Smart Protection Server and OfficeScan client are synchronized:
sscfg.ini ssnotify.ini
4.
Open Registry Editor and check if a client is connected to the corporate network. Key:
HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro\PC-cillinNTCorp \CurrentVersion\iCRC Scan\Scan Server
If LocationProfile=1, the OfficeScan client is connected to the network and should be able to connect to a Smart Protection Server. If LocationProfile=2, the OfficeScan client is not connected to the network and should connect to the Smart Protection Network. From Internet Explorer, check if the OfficeScan client computer can browse Internet web pages.
5.
Check internal and external proxy settings used to connect to Smart Protection Network and Smart Protection Servers. For details, see Internal Proxy for OfficeScan Clients on page 14-46 and External Proxy for OfficeScan Clients on page 14-47. For conventional scan clients, verify that the OfficeScan NT Proxy Service (TmProxy.exe) is running. If this service stops, clients cannot connect to smart protection sources for web reputation.
6.
14-39
FIGURE 14-2. Client tree displaying client connection status with OfficeScan server
Certain conditions may prevent the client tree from displaying the correct client connection status. For example, if you accidentally unplug the network cable of a client computer, the client will not be able to notify the server that it is now offline. This client will still appear as online in the client tree. Verify client-server connection manually or let OfficeScan perform scheduled verification. You cannot select specific domains or clients and then verify their connection status. OfficeScan verifies the connection status of all its registered clients.
14-40
a. b. c. 4.
Select Enable scheduled verification. Select the verification frequency and start time. Click Save to save the verification schedule.
Check the client tree to verify the status or view the connection verification logs.
Unreachable Clients
OfficeScan clients on unreachable networks, such as those on network segments behind a NAT gateway, are almost always offline because the server cannot establish direct connection with the clients. As a result, the server cannot notify the clients to:
14-41
Apply client settings configured from the web console. For example, when you change the Scheduled Scan frequency from the web console, the server will immediately notify clients to apply the new setting.
Unreachable clients therefore cannot perform these tasks in a timely manner. They only perform the tasks when they initiate connection with the server, which happens when:
They register to the server after installation. They restart or reload. This event does not occur frequently and usually requires user intervention. Manual or scheduled update is triggered on the client. This event also does not occur frequently.
It is only during registration, restart, or reload that the server becomes "aware" of the clients connectivity and treats them as online. However, because the server is still unable to establish connection with the clients, the server immediately changes the status to offline. OfficeScan provides the "heartbeat" and server polling features to resolve issues regarding unreachable clients. With these features, the server stops notifying clients of component updates and setting changes. Instead, the server takes a passive role, always waiting for clients to send heartbeat or initiate polling. When the server detects any of these events, it treats the clients as online.
Note Client-initiated events not related to heartbeat and server polling, such as manual client update and log sending, do not trigger the server to update the unreachable clients status.
Heartbeat
OfficeScan clients send heartbeat messages to notify the server that connection from the client remains functional. Upon receiving a heartbeat message, the server treats the client as online. In the client tree, the clients status can either be:
Online: For regular online clients Unreachable/Online: For online clients in the unreachable network
14-42
Note OfficeScan clients do not update components or apply new settings when sending heartbeat messages. Regular clients perform these tasks during routine updates (see OfficeScan Client Updates on page 6-26). Clients in the unreachable network perform these tasks during server polling.
The heartbeat feature addresses the issue of OfficeScan clients in unreachable networks always appearing as offline even when they can connect to the server. A setting in the web console controls how often clients send heartbeat messages. If the server did not receive a heartbeat, it does not immediately treat the client as offline. Another setting controls how much time without a heartbeat must elapse before changing the clients status to:
Offline: For regular offline OfficeScan clients Unreachable/Offline: For offline OfficeScan clients in the unreachable network
When choosing a heartbeat setting, balance between the need to display the latest client status information and the need to manage system resources. The default setting is satisfactory for most situations. However, consider the following points when you customize the heartbeat setting:
TABLE 14-7. Heartbeat Recommendations HEARTBEAT FREQUENCY
Long-interval heartbeats (above 60 minutes) Short-interval Heartbeats (below 60 minutes)
RECOMMENDATION
The longer the interval between heartbeats, the greater the number of events that may occur before the server reflects the clients status on the web console. Short intervals present a more up-to-date client status but may be bandwidth-intensive.
Server Polling
The server polling feature addresses the issue of unreachable OfficeScan clients not receiving timely notifications about component updates and changes to client settings. This feature is independent of the heartbeat feature. With the server polling feature:
14-43
OfficeScan clients automatically initiate connection with the OfficeScan server at regular intervals. When the server detects that polling took place, it treats the client as "Unreachable/Online". OfficeScan clients connect to one or several of their update sources to download any updated components and apply new client settings. If the OfficeScan server or an Update Agent is the primary update source, clients obtain both components and new settings. If the source is not the OfficeScan server or Update Agent, clients only obtain the updated components and then connect to the OfficeScan server or Update Agent to obtain the new settings.
14-44
Note Clients with an IPv4 address can connect to a pure IPv4 or dual-stack OfficeScan server. Clients with an IPv6 address can connect to a pure IPv6 or dual-stack OfficeScan server. Dual-stack clients can connect to dual-stack, pure IPv4, or pure IPv6 OfficeScan server.
b.
In Clients poll the server for updated components and settings every __ minute(s), specify the server polling frequency. Type a value between 1 and 129600 minutes.
Tip Trend Micro recommends that the server polling frequency be at least three times the heartbeat sending frequency.
4.
Configure heartbeat settings. For details about the heartbeat feature, see Heartbeat on page 14-42. a. b. c. d. Select Allow clients to send heartbeat to the server. Select All clients or Only clients in the unreachable network. In Clients send heartbeat every __ minutes, specify how often clients send heartbeat. Type a value between 1 and 129600 minutes. In A client is offline if there is no heartbeat after __ minutes, specify how much time without a heartbeat must elapse before the OfficeScan server treats a client as offline. Type a value between 1 and 129600 minutes.
5.
Click Save.
14-45
OfficeScan Server Computer The server computer hosts the OfficeScan server and the integrated Smart Protection Server. OfficeScan clients connect to the OfficeScan server to update components, obtain configuration settings, and send logs. OfficeScan clients connect to the integrated Smart Protection Server to send scan queries.
Smart Protection Servers Smart Protection Servers include all standalone Smart Protection Servers and the integrated Smart Protection Server of other OfficeScan servers. OfficeScan clients connect to the servers to send scan and we reputation queries.
14-46
Note Specify a dual-stack proxy server identified by its host name if you have IPv4 and IPv6 clients. This is because internal proxy settings are global settings. If you specify an IPv4 address, IPv6 clients cannot connect to the proxy server. The same is true for IPv4 clients.
c. 4.
If the proxy server requires authentication, type the user name and password and then confirm the password.
Go to the Client Connection with Standalone Smart Protection Servers section. a. b. c. Select Use the following proxy settings when clients connect to the standalone Smart Protection Servers. Specify the proxy server name or IPv4/IPv6 address, and port number. If the proxy server requires authentication, type the user name and password and then confirm the password.
5.
Click Save.
14-47
2. 3. 4.
Click the External Proxy tab. Go to the Client Connection with Trend Micro Servers section. Type the user ID and password needed for proxy server authentication. The following proxy authentication protocols are supported:
5.
Click Save.
When OfficeScan clients perform "Update Now". When users disable, or the OfficeScan client cannot detect, automatic proxy settings. See Automatic Proxy Settings for the OfficeScan Client on page 14-49 for more information.
WARNING! Incorrect user-configured proxy settings can cause update problems. Exercise caution when allowing users to configure their own proxy settings.
14-48
3. 4. 5. 6.
Click Settings > Privileges and Other Settings. On the Privileges tab, go to the Proxy Setting Privileges section. Select Allow the client user to configure proxy settings. If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
14-49
Click Save.
14-50
5.
(Optional) Use the Reset buttons to set the security risk count back to zero.
14-51
If you clicked the root domain icon, select Apply to all domains and then click Apply to Target. If you selected domains, select Apply to all computers belonging to the selected domain(s), and then click Apply to Target. If you selected several clients, click Apply to Target.
Security Compliance
Use Security Compliance to determine flaws, deploy solutions, and maintain the security infrastructure. This feature helps reduce the time required to secure the network environment and balance an organizations needs for security and functionality. Enforce security compliance for two types of computers:
Managed: Computers with OfficeScan clients managed by the OfficeScan server. For details, see Security Compliance for Managed Clients on page 14-53. Unmanaged: Includes the following:
14-52
OfficeScan clients not managed by the OfficeScan server Computers without OfficeScan clients installed Computers that the OfficeScan server cannot reach Computers whose security status cannot be verified For details, see Security Compliance for Unmanaged Endpoints on page 14-65.
Services: Use this tab to check if client services are functional. For details, see Services on page 14-54. Components: Use this tab to check if OfficeScan clients have up-to-date components. For details, see Components on page 14-55. Scan Compliance: Use this tab to check if OfficeScan clients are running scans regularly. For details, see Scan Compliance on page 14-57. Settings: Use this tab to check if client settings are consistent with the settings on the server. For details, see Settings on page 14-59.
Note The Components tab can display OfficeScan clients running the current and earlier versions of the product. For the other tabs, only OfficeScan clients running version 10.5, 10.6, or OfficeScan clients are shown.
14-53
Security Compliance queries the OfficeScan clients connection status before generating a Compliance Report. It includes online and offline clients in the report, but not roaming clients. For role-based user accounts:
Each web console user account has a completely independent set of Compliance Report settings. Any changes to a user accounts Compliance Report settings will not affect the settings of the other user accounts. The scope of the report depends on the client domain permissions for the user account. For example, if you grant a user account permissions to manage domains A and B, the user accounts reports will only show data from clients belonging to domains A and B. For details about user accounts, see Role-based Administration on page 13-2.
Services
Security Compliance checks whether the following OfficeScan client services are functional:
Antivirus Anti-spyware Firewall Web Reputation Behavior Monitoring/Device Control (also referred to as Trend Micro Unauthorized Change Prevention Service) Data Protection
14-54
In the Computers with Non-compliant Services category In the category for which the OfficeScan client is non-compliant. For example, if the OfficeScan clients Antivirus service is not functional, the client is counted in the Antivirus category. If more than one service is not functional, the client is counted in each category for which it is non-compliant.
Restart non-functional services from the web console or from the OfficeScan client computer. If the services are functional after the restart, the client will no longer appear as non-compliant during the next assessment.
Components
Security Compliance determines component version inconsistencies between the OfficeScan server and OfficeScan clients. Inconsistencies typically occur when clients
14-55
cannot connect to the server to update components. If the client obtains updates from another source (such as the Trend Micro ActiveUpdate server), it is possible for a clients component version to be newer than the version on the server. Security Compliance checks the following components:
Smart Scan Agent Pattern Virus Pattern IntelliTrap Pattern IntelliTrap Exception Pattern Virus Scan Engine Spyware Pattern Spyware Active-monitoring Pattern Spyware Scan Engine Virus Cleanup Template Virus Cleanup Engine Common Firewall Pattern
Common Firewall Driver Behavior Monitoring Driver Behavior Monitoring Core Service Behavior Monitoring Configuration Pattern Digital Signature Pattern Policy Enforcement Pattern Behavior Monitoring Detection Pattern Program Version C&C IP List
14-56
In the Computers with Inconsistent Component Versions category In the category for which the client is non-compliant. For example, if the clients Smart Scan Agent Pattern version is not consistent with the version on the server, the client is counted in the Smart Scan Agent Pattern category. If more than one component version is inconsistent, the client is counted in each category for which it is non-compliant.
To resolve component version inconsistencies, update outdated components on the clients or server.
Scan Compliance
Security Compliance checks if Scan Now or Scheduled Scan are run regularly and if these scans are completed within a reasonable amount of time.
14-57
Note Security Compliance can only report the Scheduled Scan status if Scheduled Scan is enabled on clients.
No Scan Now or Scheduled Scan performed for the last (x) days: An OfficeScan client is non-compliant if it did not run Scan Now or Scheduled Scan within the specified number of days. Scan Now or Scheduled Scan exceeded (x) hours: An OfficeScan client is noncompliant if the last Scan Now or Scheduled Scan lasted more than the specified number of hours.
14-58
In the category for which the client is non-compliant. For example, if the last Scheduled Scan lasted more than the specified number of hours, the client is counted in the Scan Now or Scheduled Scan exceeded <x> hours category. If the client satisfies more than one scan compliance criteria, it is counted in each category for which it is non-compliant.
Run Scan Now or Scheduled Scan on clients that have not performed scan tasks or were unable to complete scanning.
Settings
Security Compliance determines whether clients and their parent domains in the client tree have the same settings. The settings may not be consistent if you move a client to another domain that is applying a different set of settings, or if a client user with certain privileges manually configured settings on the OfficeScan client console. OfficeScan verifies the following settings:
Scan Method Manual Scan Settings Real-time Scan Settings Scheduled Scan Settings Scan Now Settings Privileges and Other Settings
Additional Service Settings Web Reputation Behavior Monitoring Device Control Spyware/Grayware Approved List Data Loss Prevention Settings
14-59
In the Computers with Inconsistent Configuration Settings category In the category for which the client is non-compliant. For example, if the scan method settings in the client and its parent domain are not consistent, the client is counted in the Scan Method category. If more than one set of settings is inconsistent, the client is counted in each category for which it is non-compliant.
14-60
For more information on Compliance Reports, see Security Compliance for Managed Clients on page 14-53.
f. 5.
View Compliance Report for client components. For details about client components, see Components on page 14-55. a. Click the Components tab.
14-61
b.
Under Computers with Inconsistent Component Versions, check the number of clients with component versions that are inconsistent with the versions on the server. Click a number link to display all affected clients in the client tree.
Note If at least one client has a more up-to-date component than the OfficeScan server, manually update the OfficeScan server.
c.
d. e.
Select clients from the query result. Click Update Now to force clients to download components.
Note
To ensure that clients can upgrade the client program, disable the Clients can update components but not upgrade the client program or deploy hot fixes option in Networked Computers > Client Management > Settings > Privileges and Other Settings. Restart the computer instead of clicking Update Now to update the Common Firewall Driver.
f. 6.
View Compliance Report for scans. For details about scans, see Scan Compliance on page 14-57. a. b. Click the Scan Compliance tab. Under Computers with Outdated Scanning, configure the following:
Number of days a client has not performed Scan Now or Scheduled Scan Number of hours Scan Now or Scheduled Scan is running
14-62
Note If the number of days or hours is exceeded, the client is treated as noncompliant.
c. d. e. f. g.
Click Assess next to the Client Tree Scope section. Under Computers with Outdated Scanning, check the number of clients that satisfy the scan criteria. Click a number link to display all affected clients in the client tree. Select clients from the query result. Click Scan Now to initiate Scan Now on clients.
Note To avoid repeating the scan, the Scan Now option will be disabled if Scan Now lasted more than the specified number of hours.
h. 7.
View Compliance Report for settings. For details about settings, see Settings on page 14-59. a. b. Click the Settings tab. Under Computers with Inconsistent Configuration Settings, check the number of clients with settings inconsistent with the client tree domain settings. Click a number link to display all affected clients in the client tree. Select clients from the query result. Click Apply Domain Settings. To save the list of clients to a file, click Export.
c. d. e. f.
14-63
Services on page 14-54 Components on page 14-55 Scan Compliance on page 14-57 Settings on page 14-59
5.
Specify the email address(es) that will receive notifications about scheduled Compliance Reports.
Note Configure email notification settings to ensure that email notifications can be sent successfully. For details, see Administrator Notification Settings on page 13-29.
6.
14-64
7.
Click Save.
DESCRIPTION
The OfficeScan clients installed on the computers are managed by another OfficeScan server. OfficeScan clients are online and run either this OfficeScan version or an earlier version. The OfficeScan client is not installed on the computer. The OfficeScan server cannot connect to the computer and determine its security status. The computer belongs to an Active Directory domain but the OfficeScan server is unable to determine its security status. Note The OfficeScan server database contains a list of clients that the server manages. The server queries Active Directory for the computers' GUIDs and then compares them with GUIDs stored in the database. If a GUID is not in the database, the computer will fall under the Unresolved Active Directory Assessment category.
To run a security assessment, perform the following tasks: 1. 2. Define the query scope. For details, see Defining the Active Directory/IP Address Scope and Query on page 14-66. Check unprotected computers from the query result. For details, see Viewing the Query Results on page 14-68.
14-65
3. 4.
Install the OfficeScan client. For details, see Installing with Security Compliance on page 5-59. Configure scheduled queries. For details, see Configuring the Scheduled Query Assessment on page 14-69.
Procedure 1. 2. 3. Navigate to Security Compliance > Outside Server Management. On the Active Directory/IP Address Scope section, click Define. A new screen opens. To define an Active Directory scope: a. b. Go to the Active Directory Scope section. Select Use on-demand assessment to perform real-time queries and get more accurate results. Disabling this option causes OfficeScan to query the database instead of each OfficeScan client. Querying only the database can be quicker but is less accurate. Select the objects to query. If querying for the first time, select an object with less than 1,000 accounts and then record how much time it took to complete the query. Use this data as your performance benchmark.
c.
4.
14-66
b. c.
Select Enable IP Address Scope. Specify an IP address range. Click the plus or minus button to add or delete IP address ranges. For a pure IPv4 OfficeScan server, type an IPv4 address range. For a pure IPv6 OfficeScan server, type an IPv6 prefix and length. For a dual-stack OfficeScan server, type an IPv4 address range and/or IPv6 prefix and length. The IPv6 address range limit is 16 bits, which is similar to the limit for IPv4 address ranges. The prefix length should therefore be between 112 and 128.
TABLE 14-9. Prefix Lengths and Number of IPv6 Addresses LENGTH
128 124 120 116 112 2 16 256 4,096 65,536
5.
Under Advanced Setting, specify ports used by OfficeScan servers to communicate with clients. Setup randomly generates the port number during OfficeScan server installation. To view the communication port used by the OfficeScan server, go to Networked Computers > Client Management and select a domain. The port displays next to the IP address column. Trend Micro recommends keeping a record of port numbers for your reference. a. b. c. Click Specify ports. Type the port number and click Add. Repeat this step until you have all the port numbers you want to add. Click Save.
14-67
6.
To check a computers connectivity using a particular port number, select Declare a computer unreachable by checking port <x>. When connection is not established, OfficeScan immediately treats the computer as unreachable. The default port number is 135. Enabling this setting speeds up the query. When connection to a computer cannot be established, the OfficeScan server no longer needs to perform all the other connection verification tasks before treating a computer as unreachable.
7.
To save the scope and start the query, click Save and re-assess. To save the settings only, click Save only. The Outside Server Management screen displays the result of the query.
Note The query may take a long time to complete, especially if the query scope is broad. Do not perform another query until the Outside Server Management screen displays the result. Otherwise, the current query session terminates and the query process restarts.
Managed by another OfficeScan server No OfficeScan client installed Unreachable Unresolved Active Directory assessment
Recommended Tasks
1. 2. In the Security Status section, click a number link to display all affected computers. Use the search and advanced search functions to search and display only the computers that meet the search criteria.
14-68
If you use the advanced search function, specify the following items:
IPv4 address range IPv6 prefix and length (prefix should be between 112 and 128) Computer name OfficeScan server name Active Directory tree Security status
OfficeScan will not return a result if the name is incomplete. Use the wildcard character (*) if unsure of the complete name. 3. 4. To save the list of computers to a file, click Export. For OfficeScan clients managed by another OfficeScan server, use the Client Mover tool to have these OfficeScan clients managed by the current OfficeScan server. For more information about this tool, see Client Mover on page 14-21.
14-69
VMware vCenter (VMware View) Citrix XenServer (Citrix XenDesktop) Microsoft Hyper-V Server
For more details on these platforms, refer to the VMware View, Citrix XenDesktop, or Microsoft Hyper-V websites. Use the OfficeScan VDI Pre-Scan Template Generation Tool to optimize on-demand scan or remove GUIDs from base or golden images.
14-70
Note Virtual Desktop Support is not fully supported in pure IPv6 environments. For details, see Pure IPv6 Server Limitations on page A-3.
3.
Monitor the download progress. You can navigate away from the screen during the download. If you encounter problems downloading the package, check the server update logs on the OfficeScan product console. On the main menu, click Logs > Server Update Logs. After Plug-In Manager downloads the file, Virtual Desktop Support displays in a new screen.
Note If Virtual Desktop Support does not display, see the reasons and solutions in Troubleshooting Plug-In Manager on page 15-9.
14-71
4.
To install Virtual Desktop Support immediately, click Install Now. To install at a later time: a. b. c. Click Install Later. Open the Plug-in Manager screen. Go to the Trend Micro Virtual Desktop Support section and click Install.
5.
Read the license agreement and accept the terms by clicking Agree. The installation starts.
6.
Monitor the installation progress. After the installation, the Virtual Desktop Support version displays.
14-72
also provides a link to the Trend Micro website where you can view detailed information about your license.
Status: Displays either "Activated", "Not Activated" or "Expired". Version: Displays either "Full" or "Evaluation" version. If you have both full and evaluation versions, the version that displays is "Full". Expiration Date: If Virtual Desktop Support has multiple licenses, the latest expiration date displays. For example, if the license expiration dates are 12/31/2010 and 06/30/2010, 12/31/2010 displays. Seats: Displays how many OfficeScan clients can use Virtual Desktop Support Activation code: Displays the activation code
Reminders about licenses display during the following instances: If you have a full version license:
During the feature's grace period. The duration of the grace period varies by region. Please verify the grace period with your Trend Micro representative. When the license expires and grace period elapses. During this time, you will not be able to obtain technical support.
14-73
When the license expires. During this time, you will not be able to obtain technical support.
4. 5.
Click View detailed license online to view information about your license on the Trend Micro website. To update the screen with the latest license information, click Update Information.
14-74
Password
5.
Optionally enable proxy connection for VMware vCenter or Citrix XenServer. a. b. Specify the proxy server name or IP address and port. If the proxy server requires authentication, specify the user name and password.
6.
Click Test connection to verify that the OfficeScan server can successfully connect to the server.
Note For details on troubleshooting Microsoft Hyper-V connections, see Troubleshooting Microsoft Hyper-V Connections on page 14-77.
7.
Click Save.
14-75
4.
Click Save.
14-76
Where:
number of clients that can perform updates concurrently. For OfficeScan 10.6 clients:
[TaskController] Controller_02_MaxConcurrentGuests=1 Controller_03_MaxConcurrentGuests=3
Where:
Controller_02_MaxConcurrentGuests=1 equals the maximum number of clients that can perform scans concurrently. Controller_03_MaxConcurrentGuests=3 equals the maximum number of clients that can perform updates concurrently.
3.
Increase or decrease the count in each controller as necessary. The minimum value for all settings is 1. The maximum value for all settings is 65536.
4. 5. 6.
Save and close the vdi.ini file. Restart the OfficeScan Master Service. Monitor the CPU, memory, and disk usage resources of the VDI endpoints. Modify the controller settings further to increase/decrease the number of concurrent scans to best suit the VDI environment by repeating steps 1 to 5.
14-77
The Hyper-V server listening port defaults to port 135 and then chooses a randomly configured port for further communication. If the firewall blocks WMI traffic or either of these two ports, communication with the server is unsuccessful. Administrators can modify the firewall policy to allow successful communication with the Hyper-V server. Verify that all connection settings, including IP address, domain\username, and password are correct before performing the following firewall modifications.
14-78
3. 4.
14-79
2.
If the connection to the Hyper-V server is unsuccessful, configure WMI to use a fixed port. For details on Setting Up a Fixed Port for WMI, refer to: http://msdn.microsoft.com/en-us/library/windows/desktop/bb219447(v=vs. 85).aspx
3. 4.
Open ports 135 and the newly created fixed port (24158) for communication through the firewall. Test the Hyper-V connection again.
14-80
TABLE 14-10. VDI Pre-Scan Template Generation Tool Versions FILE NAME
TCacheGen.exe TCacheGen_x64.exe TCacheGenCli.exe
INSTRUCTION
Choose this file if you want to run the tool directly on a 32-bit platform. Choose this file if you want to run the tool directly on a 64-bit platform. Choose this file if you want to run the tool from the command line interface of a 32-bit platform. Choose this file if you want to run the tool from the command line interface of a 64-bit platform.
TCacheGenCli_x64.exe
3. 4.
Copy the version of the tool that you chose in the previous step to the <Client installation folder> of the base image. Run the tool.
To run the tool directly: a. b. Double-click TCacheGen.exe or TCacheGen_x64.exe. Click Generate Pre-Scan Template.
To run the tool from the command line interface: a. b. Open a command prompt and change the directory to <Client installation folder>. Type the following command:
TCacheGenCli Generate_Template
Or
TcacheGenCli_x64 Generate_Template
14-81
Note The tool scans the image for security threats before generating the pre-scan template and removing the GUID. After generating the pre-scan template, the tool unloads the OfficeScan client. Do not reload the OfficeScan client. If the OfficeScan client reloads, you will need to create the pre-scan template again.
INSTRUCTION
Choose this file if you want to run the tool directly on a 32-bit platform. Choose this file if you want to run the tool directly on a 64-bit platform. Choose this file if you want to run the tool from the command line interface of a 32-bit platform. Choose this file if you want to run the tool from the command line interface of a 64-bit platform.
TCacheGenCli_x64.exe
3. 4.
Copy the version of the tool that you chose in the previous step to the <Client installation folder> of the base image. Run the tool.
14-82
a. b.
To run the tool from the command line interface: a. b. Open a command prompt and change the directory to <Client
installation folder>.
Or
TcacheGenCli_x64 Remove GUID
REFERENCE
Global Scan Settings on page 7-64 Global Scan Settings on page 7-64 Global Scan Settings on page 7-64 Global Firewall Settings on page 12-24
14-83
SETTING
Firewall Log Count Behavior Monitoring Settings C&C Callback Settings Updates Reserved Disk Space Unreachable Network Alert Settings OfficeScan Service Restart Proxy Configuration Preferred IP Address
REFERENCE
Global Firewall Settings on page 12-24 Configuring Global Behavior Monitoring Settings on page 8-7 Configuring Global C&C Callback Settings on page 11-11 ActiveUpdate Server as the OfficeScan Client Update Source on page 6-34 Configuring Reserved Disk Space for OfficeScan Clients Updates on page 6-45 Unreachable Clients on page 14-41 Configuring OfficeScan Client Update Notifications on page 6-46 OfficeScan Client Service Restart on page 14-11 Automatic Proxy Settings for the OfficeScan Client on page 14-49 Client IP Addresses on page 5-9
3.
Click Save.
14-84
Tip To enforce uniform settings and policies throughout the organization, grant limited privileges to users.
Procedure 1. 2. 3. 4. Navigate to Networked Computers > Client Management or Networked Computers > Client Management . In the client tree, click the root domain icon ( specific domains or clients. ) to include all clients or select
Click Settings > Privileges and Other Settings. On the Privileges tab, configure the following user privileges:
TABLE 14-13. Client Privileges CLIENT PRIVILEGES
Roaming Privilege Scan Privileges Scheduled Scan Privileges Firewall Privileges Behavior Monitoring Privileges Mail Scan Privileges Toolbox Privileges Proxy Setting Privileges Component Update Privileges
REFERENCE
OfficeScan Client Roaming Privilege on page 14-19 Scan Type Privileges on page 7-49 Scheduled Scan Privileges and Other Settings on page 7-52 Firewall Privileges on page 12-22 Behavior Monitoring Privileges on page 8-10 Mail Scan Privileges and Other Settings on page 7-58 Granting Users the Privilege to View the Toolbox Tab on page 17-6 Proxy Configuration Privileges for Clients on page 14-48 Update Privileges and Other Settings for OfficeScan Clients on page 6-43
14-85
CLIENT PRIVILEGES
Uninstallation Unloading
REFERENCE
Granting the OfficeScan Client Uninstallation Privilege on page 5-70 Granting the Client Unloading Privilege on page 14-18
5.
Click the Other Settings tab and configure the following settings:
TABLE 14-14. Other Client Settings SETTING
Update Settings Web Reputation Settings Behavior Monitoring Settings C&C Contact Alert Settings Client Self-protection Cache Settings for Scans Scheduled Scan Settings
REFERENCE
Update Privileges and Other Settings for OfficeScan Clients on page 6-43 Web Threat Notifications for Client Users on page 11-11 Behavior Monitoring Privileges on page 8-10 C&C Contact Alert Notifications for Client Users on page 11-16 Client Self-protection on page 14-12 Cache Settings for Scans on page 7-60 Granting Scheduled Scan Privileges and Displaying the Privilege Notification on page 7-53 OfficeScan Client Security on page 14-16 Granting Mail Scan Privileges and Enabling POP3 Mail Scan on page 7-60 OfficeScan Client Console Access Restriction on page 14-17 Security Risk Notifications for OfficeScan Client Users on page 7-78
Client Security Settings POP3 Email Scan Settings Client Console Access Restriction Restart Notification
6.
If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
14-86
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
14-87
Part IV
Providing Additional Protection
Chapter 15
About Plug-In Manager on page 15-2 Plug-In Manager Installation on page 15-3 Native OfficeScan Feature Management on page 15-4 Managing Plug-in Programs on page 15-4 Uninstalling Plug-In Manager on page 15-9 Troubleshooting Plug-In Manager on page 15-9
15-1
Native OfficeScan Features Some native OfficeScan features are licensed separately and activated through Plug-In Manager. In this release, two features fall under this category, namely, Trend Micro Virtual Desktop Support and OfficeScan Data Protection.
Plug-in programs Plug-in programs are not part of the OfficeScan program. These programs have their own licenses and are managed mainly from their own management consoles, which are accessible from within the OfficeScan web console. Examples of plug-in programs are Intrusion Defense Firewall, Trend Micro Security (for Mac), and Trend Micro Mobile Security.
This document provides a general overview of plug-in program installation and management and discusses plug-in program data available in widgets. Refer to the documentation for the specific plug-in program for details on configuring and managing the program.
15-2
CNTAoSMgr.exe is installed with and has the same system requirements as the OfficeScan client. The only additional requirement for CNTAoSMgr.exe is Microsoft XML Parser (MSXML) version 3.0 or later. Note Other client-side agents are not installed on Windows operating systems and are therefore not managed from Client Plug-in Manager. The Trend Micro Security (for Mac) client and Mobile Device Agent for Trend Micro Mobile Security are examples of these agents.
Widgets
Use widgets to view at-a-glance data for the individual plug-in solutions that you have deployed. Widgets are available on the OfficeScan servers Summary dashboard. A special widget, called OfficeScan and Plug-ins Mashup, combines data from OfficeScan clients and plug-in solutions and then presents the data in a client tree. This Administrators Guide provides an overview of widgets and the solutions that support widgets.
15-3
Procedure 1. 2. 3. Access the Plug-In Manager web console by clicking Plug-in Manager on the main menu of the OfficeScan web console. Manage plug-in solutions. Access the Summary dashboard on the OfficeScan web console to manage widgets for the plug-in solutions.
15-4
Plug-In Manager does not support plug-in program installation or management from Trend Micro Control Managers single sign-on function.
3.
Monitor the download progress. You can navigate away from the screen during the download.
After Plug-in Manager downloads the package, the plug-in program displays in a new screen.
Note If you encounter problems downloading the package, check the server update logs on the OfficeScan product console. On the main menu, click Logs > Server Update Logs.
4.
15-5
If you clicked Install Later, access the Plug-in Manager screen, go to the plug-in program section, click Install, and then check the installation progress.
After the installation, the current plug-in program version displays. You can then start managing the plug-in program.
15-6
Plug-In Manager downloads the package from the Trend Micro ActiveUpdate server or a custom update source, if one has been properly set up. An Internet connection is necessary to download the package from the ActiveUpdate server. When Plug-In Manager downloads an installation package or starts the upgrade, Plug-In Manager temporarily disables other plug-in program functions such as downloads, installations, and upgrades. Plug-In Manager does not support plug-in program upgrading from Trend Micro Control Managers single sign-on function.
3.
4. 5.
After Plug-In Manager downloads the package, a new screen displays. Click Upgrade Now or Upgrade Later.
If you clicked Upgrade Now, check the upgrade progress. If you clicked Upgrade Later, access the Plug-in Manager screen, go to the plug-in program section, click Upgrade, and then check the upgrade progress.
15-7
After the upgrade, the Plug-In Manager service may need to restart, causing the Plug-In Manager screen to be temporarily unavailable. When the screen becomes available, the current plug-in program version displays.
Uninstall the plug-in program from the Plug-In Manager console. Uninstall the OfficeScan server, which uninstalls Plug-In Manager and all installed plug-in programs. For instructions on uninstalling the OfficeScan server, see the OfficeScan Installation and Upgrade Guide.
Consult the documentation for the plug-in program to see if uninstalling the plugin program also uninstalls the client-side agent. For client-side agents installed on the same computer as the OfficeScan client, uninstalling the OfficeScan client uninstalls the client-side agents and Client Plug-in Manager (CNTAoSMgr.exe).
15-8
3. 4.
Monitor the uninstallation progress. You can navigate away from the screen during the uninstallation. Refresh the Plug-in Manager screen after the uninstallation. The plug-in program is again available for installation.
15-9
Procedure 1. Plug-In Manager is still downloading the plug-in program, which may take some time if the program package size is large. Check the screen from time to time to see if the plug-in program displays.
Note If Plug-In Manager is unable to download a plug-in program, it automatically redownloads after 24 hours. To manually trigger Plug-In Manager to download the plug-in program, restart the OfficeScan Plug-In Manager service.
2.
The server computer cannot connect to the Internet. If the server computer connects to the Internet through a proxy server, ensure that Internet connection can be established using the proxy settings. The OfficeScan update source is not the ActiveUpdate server. On the OfficeScan web console, go to Updates > Server > Update Source and check the update source. If the update source is not the ActiveUpdate server, you have the following options:
3.
Select the ActiveUpdate server as the update source. If you select Other Update Source, select the first entry in the Other update source list as update source and verify that it can successfully connect to the ActiveUpdate server. Plug-In Manager only supports the first entry in the list. If you select Intranet location containing a copy of the current file, ensure the computer in the Intranet can also connect to the ActiveUpdate server.
15-10
Procedure 1. 2. Client Plug-in Manager (CNTAosMgr.exe) is not running. In the OfficeScan client computer, open Windows Task Manager and run the CNTAosMgr.exe process. The installation package for the client-side agent was not downloaded to the OfficeScan client computer folder located in <Client installation folder>\AU_Data\AU_Temp\{xxx}AU_Down\Product. Check Tmudump.txt located in \AU_Data\AU_Log\ for the download failure reasons.
Note If an agent successfully installs, agent information is available in <Client installation folder>\AOSSvcInfo.xml.
3.
The agent installation was unsuccessful or requires further action. You can check the installation status from the plug-in programs management console and perform actions such as restarting the OfficeScan client computer after installation or installing required operating system patches before installation.
httpd.conf
15-11
httpd.conf.tmbackup httpd.default.conf
3. 4.
Uninstall the incompatible Apache web server version from the Add/Remove Programs screen. Install Apache web server 2.0.63. a. b. c. d. Launch apache.msi from <Server installation folder>\Admin \Utility\Apache. In the Server Information screen, type the required information. In the Destination Folder screen, change the destination folder by clicking Change and browsing to <Server installation folder>. Complete the installation.
5. 6.
Copy the backup files back to the Apache2 folder. Restart the Apache web server service.
A Client-side Agent Cannot be Launched if the Automatic Configuration Script Setting on Internet Explorer Redirects to a Proxy Server
Client Plug-in Manager (CNTAosMgr.exe) is unable to launch a client-side agent because the agent launch command redirects to a proxy server. This problem only occurs if the proxy setting redirects the user's HTTP traffic to 127.0.0.1. To resolve this issue, use a well-defined proxy server policy. For example, do not reroute HTTP traffic to 127.0.0.1. If you need to use the proxy configuration that controls the 127.0.0.1 HTTP requests, perform the following tasks. Procedure 1. Configure OfficeScan firewall settings on the OfficeScan web console.
15-12
Note Perform this step only if you enables the OfficeScan firewall on OfficeScan clients.
a. b. c.
On the web console, go to Networked Computers > Firewall > Policies and click Edit Exception Template. On the Edit Exception Template screen, click Add. Use the following information:
Name: Your preferred name Action: Allow network traffic Direction: Inbound Protocol: TCP Port(s): Any port number between 5000 and 49151
d. e. f. g.
IP address(es): Select Single IP address and specify your proxy server's IP address (recommended) or select All IP addresses. Click Save. Back on the Edit Exception Template screen, click Save and Apply to Existing Policies. Go to Networked Computers > Firewall > Profiles and click Assign Profile to Clients. If there is no firewall profile, create one by clicking Add. Use the following settings:
Name: Your preferred name Description: Your preferred description Policy: All Access Policy
After saving the new profile, click Assign Profile to Clients. 2. Modify the ofcscan.ini file.
15-13
a. b.
Open the ofcscan.ini file in <Server installation folder> using a text editor. Search for [Global Setting] and add FWPortNum=21212 to the next line. Change "21212" to the port number you specified in step c above. For example:
[Global Setting] FWPortNum=5000
c. 3.
On the web console, go to Networked Computers > Global Client Settings and click Save.
An Error in the System, Update Module, or Plug-in Manager Program occurred and the Error Message Provides a Certain Error Code
Plug-In Manager displays any of the following error codes in an error message. If you are unable to troubleshoot a problem after referring to the solutions provided in the table below, please contact your support provider.
TABLE 15-1. Plug-In Manager Error Codes ERROR CODE
001
15-14
ERROR CODE
002
2. 3. 028
Restart the OfficeScan Plug-In Manager service. Download/Uninstall the plug-in program.
Plug-In Manager update module was unable to download a plug-in program. Verify that the network connection is functional, and then try again. Plug-In Manager update module cannot install the plug-in program because the AU patch agent has returned an error. The AU patch agent is the program that launches installation of new plug-in programs. For the exact cause of the error, check the ActiveUpdate module debug log "TmuDump.txt" in \PCCSRV\Web\Service\AU_Data\AU_Log.
Perform the following steps: 1. Open Registry Editor and navigate to HKEY_LOCAL_MACHINE\SOFTWARE \TrendMicro\OfficeScan\ service\AoS \OSCE_Addon_Service_CompList_Version. Reset the value to 1.0.1000. Delete the plug-in program registry key HKEY_LOCAL_MACHINE\SOFTWARE \TrendMicro\OfficeScan\ service\AoS\OSCE_ADDON_xxxx. Restart the OfficeScan Plug-In Manager service. Download and install the plug-in program.
2. 3. 4.
15-15
ERROR CODE
170
202
An error in the Plug-In Manager program occurred. The Plug-In Manager program cannot handle the task being executed on the Web console. Refresh the Web console or upgrade Plug-In Manager if an upgrade to the program is available.
203
An error in the Plug-In Manager program occurred. The Plug-In Manager program encountered an interprocess communication (IPC) error when attempting to communicate with Plug-In Manager backend services. Restart the OfficeScan Plug-In Manager service and perform the task again.
A system error occurred. When downloading a new plug-in program, Plug-In Manager checks the plug-in program list from the ActiveUpdate server. Plug-In Manager was unable to obtain the list. Perform the following steps: 1. Open Registry Editor and navigate to HKEY_LOCAL_MACHINE\SOFTWARE \TrendMicro\OfficeScan\ service\AoS \OSCE_Addon_Service_CompList_Version. Reset the value to 1.0.1000. Restart the OfficeScan Plug-In Manager service. Download and install the plug-in program.
2. 3.
15-16
Chapter 16
About Policy Server for Cisco NAC on page 16-2 Components and Terms on page 16-2 Cisco NAC Architecture on page 16-6 The Client Validation Sequence on page 16-7 The Policy Server on page 16-9 Policy Server System Requirements on page 16-19 Cisco Trust Agent (CTA) Requirements on page 16-21 Supported Platforms and Requirements on page 16-21 Policy Server for NAC Deployment on page 16-23
16-1
Instruct OfficeScan client computers to update their OfficeScan client components Enable Real-time Scan Perform Scan Now Display a notification message on OfficeScan client computers to inform users of the antivirus policy violation
For additional information on Cisco NAC technology, see the Cisco website at: http://www.cisco.com/go/nac
Components
The following components are necessary in the Trend Micro implementation of Policy Server for Cisco NAC:
TABLE 16-1. Policy Server for Cisco NAC Components COMPONENT
Cisco Trust Agent (CTA)
DESCRIPTION
A program installed on a client computer that allows it to communicate with other Cisco NAC components
16-2
COMPONENT
OfficeScan client computer Network Access Device
DESCRIPTION
A computer with the OfficeScan client program installed. To work with Cisco NAC, the OfficeScan client computer also requires the Cisco Trust Agent. A network device that supports Cisco NAC functionality. Supported Network Access Devices include a range of Cisco routers, firewalls, and access points, as well as third-party devices with Terminal Access Controller Access Control System (TACACS+) or the Remote Dial-In User Service (RADIUS) protocol. For a list of supported devices, see Supported Platforms and Requirements on page 16-21.
A server that receives OfficeScan client antivirus data from the client through the Network Access Device and passes it to an external user database for evaluation. Later in the process, the ACS server also passes the result of the evaluation, which may include instructions for the OfficeScan client, to the Network Access Device. A program that receives and evaluates OfficeScan client antivirus data. After performing the evaluation, the Policy Server determines the actions the OfficeScan client should carry out and then notifies the OfficeScan client to perform the actions. Reports the current Virus Pattern and Virus Scan Engine versions to the Policy Server, which uses this information to evaluate the OfficeScan clients antivirus status.
Policy Server
OfficeScan server
Terms
Become familiar with the following terms related to Policy Server for Cisco NAC:
16-3
DEFINITION
The presence and currency of antivirus software on an OfficeScan client. In this implementation, security posture refers to whether or not the OfficeScan client program exists on client computers, the status of certain OfficeScan client settings, and whether or not the Virus Scan Engine and Virus Pattern are up-to-date. Created by the Policy Server after OfficeScan client validation. It includes information that tells the OfficeScan client to perform a set of specified actions, such as enabling Real-time Scan or updating antivirus components. The process of evaluating client security posture and returning the posture token to the OfficeScan client Guidelines containing configurable criteria the Policy Server uses to measure OfficeScan client security posture. A rule also contains actions for the OfficeScan client and the Policy Server to carry out if the security posture information matches the criteria (see Policy Server Policies and Rules on page 16-10 for detailed information). A set of rules against which the Policy Server measures the security posture of OfficeScan clients. Policies also contain actions that OfficeScan clients and the Policy Server carry out if the criteria in the rules associated with the policy do not match the security posture (see Policy Server Policies and Rules on page 16-10 for detailed information). Describes the three main services used to control end-user OfficeScan client access to computer resources. Authentication refers to identifying a client, usually by having the user enter a user name and password. Authorization refers to the privileges the user has to issue certain commands. Accounting refers to a measurement, usually kept in logs, of the resources utilized during a session. The Cisco Secure Access Control Server (ACS) is the Cisco implementation of an AAA server. An authority on a network that distributes digital certificates for the purposes of performing authentication and securing connections between computers and/or servers.
Posture token
16-4
TERM
Digital Certificates
DEFINITION
An attachment used for security. Most commonly, certificates authenticate clients with servers, such as a web server, and contain the following: user identity information, a public key (used for encryption), and a digital signature of a Certificate authority (CA) to verify that the certificate is valid. An authentication system requiring clients to enter a user name and password. Cisco Secure ACS servers support RADIUS.
Remote Authentication Dial-In User Service (RADIUS) Terminal Access Controller Access Control System (TACACS+)
A security protocol enabled through AAA commands used for authenticating end-user clients. Cisco ACS servers support TACACS+.
16-5
The OfficeScan client in this figure has a CTA installation and is only able to access the network through a Network Access Device that supports Cisco NAC. The Network Access Device is between the client and the other Cisco NAC components.
Note The architecture of your network may differ based on the presence of proxy servers, routers, or firewalls.
16-6
5.
16-7
6.
The OfficeScan client performs the actions configured in the posture token.
16-8
16-9
You can also install the Policy Server on the same computer as the OfficeScan server.
Rule Composition
Rules include security posture criteria, default responses associated with OfficeScan clients, and actions that OfficeScan clients and the Policy Server perform.
16-10
Client machine state: If the OfficeScan client computer is in the booting state or not Client Real-time Scan status: If Real-time Scan is enabled or disabled Client scan engine version currency: If the Virus Scan Engine is up-to-date Client virus pattern file status: How up-to-date the Virus Pattern is. The Policy Server determines this by checking one of the following:
If the Virus Pattern is a certain number of versions older than the Policy Server version If the Virus Pattern became available a certain number of days prior to the validation
Healthy: The OfficeScan client computer conforms to the security policies and is not infected. Checkup: The OfficeScan client needs to update its antivirus components. Infected: The OfficeScan client computer is infected or is at risk of infection. Transition: The OfficeScan client computer is in the booting state. Quarantine: The OfficeScan client computer is at high risk of infection and requires quarantine. Unknown: Any other condition
Note You cannot add, delete, or modify responses.
16-11
Enable client Real-time Scan so the OfficeScan client can scan all opened or saved files (see Real-time Scan on page 7-14 for more information) Update all OfficeScan components (see OfficeScan Components and Programs on page 6-2 for more information) Scan the OfficeScan client (Scan Now) after enabling Real-time Scan or after an update Display a notification message on the OfficeScan client computer
Default Rules
Policy Server provides default rules to give you a basis for configuring settings. The rules cover common and recommended security posture conditions and actions. The following rules are available by default:
TABLE 16-3. Default Rules RULE NAME
Healthy
MATCHING CRITERIA
Real-time Scan status is enabled and Virus Scan Engine and Virus Pattern are up-to-date.
SERVER ACTION
None
16-12
RULE NAME
Checkup
MATCHING CRITERIA
Virus Pattern version is at least one version older than the version on the OfficeScan server to which the OfficeScan client is registered.
SERVER ACTION
Create entry in client validation log
Transition
Transition
None
None
16-13
RULE NAME
Quarantine
MATCHING CRITERIA
Virus Pattern version is at least five versions older than the version on the OfficeScan server to which the OfficeScan client is registered.
SERVER ACTION
Create entry in client validation log
Not protected
Infected
Policy Composition
Policies include of any number of rules and default responses and actions.
Rule Enforcement Policy Server enforces rules in a specific order, which allows you to prioritize rules. Change the order of rules, add new ones, and remove existing ones from a policy.
Default Responses for Policies As with rules, policies include default responses to help you understand the condition of OfficeScan clients on the network when client validation occurs. However, the default responses are associated with clients only when client security posture does NOT match any rules in the policy.
16-14
The responses for policies are the same as those for rules (see Default Responses for Rules on page 16-11 for the list of responses).
Policy Server and OfficeScan client Actions The Policy Server enforces rules to clients by subjecting OfficeScan client posture information to each of the rules associated with a policy. Rules are applied topdown based on the rules in use specified on the web console. If the OfficeScan client posture matches any of the rules, the action corresponding to the rule is deployed to the OfficeScan client. If no rules match, the default rule applies and the action corresponding to the default rule is deployed to clients. Default Outbreak Mode Policy evaluates OfficeScan clients using the "Healthy" rule. It forces all OfficeScan clients that do not match this rule to immediately implement the actions for the "Infected" response. Default Normal Mode Policy evaluates OfficeScan clients using all the non-"Healthy" rules (Transition, Not Protected, Quarantine, CheckUp). It classifies all OfficeScan clients that do not match any of these rules as "healthy" and applies the actions for the "Healthy" rule.
Default Policies
Policy Server provides default policies to give you a basis for configuring settings. Two policies are available, one for normal mode and one for outbreak mode.
TABLE 16-4. Default Policies POLICY NAME
Default Normal Mode Policy
DESCRIPTION
Default rules associated with policy: Transition, Not protected, Quarantine, and Checkup Response if none of the rules match: Healthy Server action: None OfficeScan client action: None
16-15
POLICY NAME
Default Outbreak Mode Policy
DESCRIPTION
Default rules associated with policy: Healthy Response if none of the rules match: Infected Server action: Create entry in client validation log OfficeScan client action:
Enable client Real-time Scan Update components Perform Scan Now on the OfficeScan client after enabling Real-time Scan or after an update Display a notification message on the OfficeScan client computer
Synchronization
Regularly synchronize the Policy Server with registered OfficeScan servers to keep the Policy Server versions of the Virus Pattern, Virus Scan Engine, and server outbreak status (normal mode or outbreak mode) up-to-date with those on the OfficeScan server. Use the following methods to perform synchronization:
Manually: Perform synchronization at any time on the Summary screen (see Summary Information for a Policy Server on page 16-40). By schedule: Set a synchronization schedule (see Administrative Tasks on page 16-43).
Certificates
Cisco NAC technology uses the following digital certificates to establish successful communication between various components:
16-16
DESCRIPTION
Establishes trusted communication between the ACS server and the Certificate Authority (CA) server. The Certificate Authority server signs the ACS certificate before you save it on the ACS server. Authenticates OfficeScan clients with the Cisco ACS server. The OfficeScan server deploys the CA certificate to both the ACS server and to OfficeScan clients (packaged with the Cisco Trust Agent). Establishes secure HTTPS communication between the Policy Server and ACS server. The Policy Server installer automatically generates the Policy Server SSL certificate during Policy Server installation. The Policy Server SSL certificate is optional. However, use it to ensure that only encrypted data transmits between the Policy Server and ACS server.
CA certificate
16-17
The figure below illustrates the steps involved in creating and deploying ACS and CA certificates:
1.
After the ACS server issues a certificate signing request to the CA server, the CA issues a certificated called ACS certificate. The ACS certificate then installs on the ACS server. See Cisco Secure ACS Server Enrolment on page 16-24 for more information. A CA certificate is exported from the CA server and installed on the ACS server. See CA Certificate Installation on page 16-24 for detailed instructions. A copy of the same CA certificate is saved on the OfficeScan server. The OfficeScan server deploys the CA certificate to OfficeScan clients with the CTA. See Cisco Trust Agent Deployment on page 16-27 for detailed instructions.
2. 3. 4.
16-18
The CA Certificate
OfficeScan clients with CTA installations authenticate with the ACS server before communicating client security posture. Several methods are available for authentication (see the Cisco Secure ACS documentation for details). For example, you may already have enabled computer authentication for Cisco Secure ACS using Windows Active Directory, which you can configure to automatically produce an end user client certificate when adding a new computer in Active Directory. For instructions, see Microsoft Knowledge Base Article 313407, HOW TO: Create Automatic Certificate Requests with Group Policy in Windows. For users with their own Certificate Authority (CA) server, but whose end user clients do not yet have certificates, OfficeScan provides a mechanism to distribute a root certificate to OfficeScan clients. Distribute the certificate during OfficeScan installation or from the OfficeScan web console. OfficeScan distributes the certificate when it deploys the Cisco Trust Agent to OfficeScan clients (see Cisco Trust Agent Deployment on page 16-27).
Note If you already acquired a certificate from a Certificate Authority or produced your own certificate and distributed it to end user OfficeScan clients, it is not necessary to do so again.
Before distributing the certificate to OfficeScan clients, enroll the ACS server with the CA server and then prepare the certificate (see Cisco Secure ACS Server Enrolment on page 16-24 for details).
16-19
REQUIREMENTS
Windows 2000 Professional with Service Pack 4 Windows 2000 Server with Service Pack 4 Windows 2000 Advanced Server with Service Pack 4 Windows XP Professional with Service Pack 3 or later, 32-bit and 64-bit Windows Server 2003 (Standard and Enterprise Editions) with Service Pack 2 or later, 32-bit and 64-bit 300MHz Intel Pentium II processor or equivalent 128MB of RAM 300MB of available disk space Monitor that supports 800 x 600 resolution at 256 colors or higher Microsoft Internet Information Server (IIS) versions 5.0 or 6.0 Apache web server 2.0 or later (for Windows 2000/XP/Server 2003 only)
Hardware
Web Server
Web Console
To use the OfficeScan server web console, the following are required:
133MHz Intel Pentium processor or equivalent 64MB of RAM 30MB of available disk space Monitor that supports 800 x 600 resolution at 256 colors or higher Microsoft Internet Explorer 5.5 or later
16-20
REQUIREMENTS
Windows 2000 Professional and Server with Service Pack 4 Windows XP Professional with Service Pack 3 or later, 32-bit Windows Server 2003 (Standard and Enterprise Editions) with Service Pack 2 or later, 32-bit 200MHz single or multiple Intel Pentium processors 128MB of RAM for Windows 2000 256MB of RAM for Windows XP and Windows Server 2003 5MB of available disk space (20MB recommended) Windows Installer 2.0 or later
Hardware
Others
16-21
IOS IMAGES
Cisco 1800 series Cisco 2600 series Cisco 2800 series Cisco 3600 series Cisco 3700 series Cisco 3800 series Cisco 7200 series
IOS 12.3(8) or later IOS 12.3(8) or later IOS 12.3(8) or later IOS 12.3(8) or later IOS 12.3(8) or later IOS 12.3(8) or later IOS 12.3(8) or later VPN Concentrators
3005 - 3080
N/A
16-22
SUPPORTED PLATFORM
Cisco Catalyst 6500
MODELS
6503, 6509, Supervisor 2 or higher
IOS IMAGES
CatOS 8.5 or later
4.
16-23
5.
Deploy the Cisco Trust Agent and the CA certificate to all OfficeScan clients so clients can submit security posture information to the Policy server (see Cisco Trust Agent Deployment on page 16-27). Install the Policy Server for Cisco NAC to handle requests from the ACS server (see Policy Server for Cisco NAC Installation on page 16-31). Export an SSL certificate from the Policy Server to the Cisco ACS server to establish secure SSL communications between the two servers (see Policy Server for Cisco NAC Installation on page 16-31). Configure the ACS server to forward posture validation requests to the Policy Server (see ACS Server Configuration on page 16-38). Configure the Policy Server for NAC. Create and modify Policy Server rules and policies to enforce your organizations security strategy for OfficeScan clients (see Policy Server for Cisco NAC Configuration on page 16-38).
6. 7.
8. 9.
CA Certificate Installation
The OfficeScan client authenticates with the ACS server before it sends security posture data. The CA certificate is necessary for this authentication to take place. First, export the CA certificate from the CA server to both the ACS server and the OfficeScan server, then create the CTA agent deployment package. The package includes the CA certificate (see The CA Certificate on page 16-19 and Cisco Trust Agent Deployment on page 16-27). Perform the following to export and install the CA certificate:
Export the CA certificate from the Certificate Authority server Install it on the Cisco Secure ACS server
16-24
16-25
j. k.
Select the certificate to distribute to clients and the ACS server from the list. Click Action > All Tasks > Export.... The Certificate Export Wizard opens.
l. m. n. o. p.
Click Next. Click DER encoded binary x.509 and click Next. Enter a file name and browse to a directory to which to export the certificate. Click Next. Click Finish. A confirmation window displays.
q. 2.
Click OK.
Install the certificate on Cisco Secure ACS. a. b. c. d. e. f. g. h. i. Click System Configuration > ACS Certificate Setup > ACS Certification Authority Setup. Type the full path and file name of the certificate in the CA certificate file field. Click Submit. Cisco Secure ACS prompts you to restart the service. Click System Configuration > Service Control. Click Restart. Cisco Secure ACS restarts. Click System Configuration > ACS Certificate Management > Edit Certificate Trust List. The Edit Certificate Trust List screen appears. Select the check box that corresponds to the certificate you imported in step b and click Submit. Cisco Secure ACS prompts you to restart the service. Click System Configuration > Service Control. Click Restart. Cisco Secure ACS restarts.
3.
Copy the certificate (.cer file) to the OfficeScan server computer to deploy it to the client with the CTA (see for more information).
16-26
Note Store the certificate on a local drive and not on mapped drives.
16-27
3.
When you are ready to install/upgrade, check the version of the CTA to be installed in Cisco NAC > Agent Management, then install CTA to OfficeScan clients in Cisco NAC > Agent Deployment. The Agent Deployment screen also gives you the option to uninstall CTA. Install Windows Installer 2.0 for NT 4.0 on OfficeScan clients running Windows 2000/XP before deploying CTA.
16-28
4.
Procedure 1. 2. Open the OfficeScan server web console and click Cisco NAC > Agent Management. Click Use <CTA version>. The OfficeScan server starts to use the new version.
Manually Replacing the CTA Package
Manually replace the CTA package on the OfficeScan server if there is a specific version you want to use. Procedure 1. In the CTA version you want to use, copy the CTA .msi file to one of the following folders:
16-29
2.
Copy the following files to <Server installation folder>\ PCCSRV \Admin\Utility\CTA\PosturePlugin: TmabPP.dll, tmabpp.inf and TmAbPpAct.exe. In the web console, go to Cisco NAC > Agent Management and click Use <CTA version>.
3.
After agent upgrade, the files will be zipped to PostureAgent.zip as a CTA deployment package under <Server installation folder>\PCCSRV\download\Product.
5. 6.
16-30
7.
If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
Note If the OfficeScan client to which you deploy the agent is not online when you click Install Cisco Trust Agent, OfficeScan automatically fulfills the task request when the OfficeScan client becomes online.
16-31
The OfficeScan servers master installer (this installs both OfficeScan server and the Policy Server on the same computer)
Note The master installer installs both the OfficeScan server and Policy Server web console on an IIS or Apache web server. If the installer does not find an Apache server on the system, or if an existing Apache server installation is not version 2.0, the installer automatically installs Apache version 2.0. The ACS server, Policy Server, and OfficeScan server must be on the same network segment to ensure effective communication.
Before installing the Apache web server, refer to the Apache website for the latest information on upgrades, patches, and security issues at: http://www.apache.org
You can install the Policy Server to the OfficeScan server computer.
16-32
Installing Policy Server for Cisco NAC from the OfficeScan Server Master Installer
Procedure 1. 2. 3. 4. In the Install Other OfficeScan Programs screen of the OfficeScan server master installer, select Policy Server for Cisco NAC. Click Next. Continue with OfficeScan server installation until the Welcome screen for Trend Micro Policy Server for Cisco NAC appears. Click Next. The Policy Server for Cisco NAC License Agreement screen appears. 5. Read the agreement and click Yes to continue. The Choose Destination Location screen appears. 6. 7. Modify the default destination location if necessary by clicking Browse... and selecting a new destination for the Policy Server installation. Click Next. The Web Server screen appears. 8. Choose the web server for the Policy Server:
IIS server: Click to install on an existing IIS web server installation Apache 2.0 Web server: Click to install on an Apache 2.0 web server
9.
10. Configure the following information: a. If you selected to install Policy Server on an IIS server, select one of the following:
16-33
b.
Next to Port, type a port that will serve as the server listening port. When the Policy Server and OfficeScan server are on the same computer and uses the same web server, the port numbers are as follows:
Apache Web server/IIS Web server on default Web site: Policy Server and OfficeScan server share the same port Both on IIS Web server on virtual Web site: Policy Server default listening port is 8081 and the SSL port is 4344. The OfficeScan server default listening port is 8080 and the SSL port is 4343.
c.
If you selected to install Policy Server on an IIS server, you can use Secured Socket Layer (SSL). Type the SSL port number and the number of years to keep the SSL certificate valid (the default is 3 years). If you enable SSL, this port number will serve as the servers listening port. The Policy Servers address is as follows:
http://<Policy Server name>:<port number> https://<Policy Server name>:<port number> (if you enable
SSL) 11. Click Next. 12. Specify the Policy Server console password and click Next. 13. Specify the ACS Server authentication password and click Next. 14. Review the installation settings. If satisfied with the settings, click Next to start the installation. Otherwise, click Back to go to the previous screens. 15. When the installation completes, click Finish. The OfficeScan server master installer will continue with the rest of the OfficeScan server installation.
16-34
16-35
j. k.
In the tree view of the console, click Certificates (Local Computer) > Trusted Root Certification Authorities > Certificates. Select the certificate from the list.
Note Check the certificate thumbprint by double-clicking the certificate and selecting Properties. The thumbprint should be the same as the thumbprint for the certificate located in the IIS console. To verify this, open the IIS console and right click either virtual Web site or default Web site (depending on the website on which you installed Policy Server) and then select Properties. Click Directory Security and then click View Certificate to view the certificate details, including the thumbprint.
l. m. n. o. p. q. r. 2.
Click Action > All Tasks > Export.... The Certificate Export Wizard opens. Click Next. Click DER encoded binary x.509 or Base 64 encoded X.509 and click Next. Enter a file name and browse to a directory to which to export the certificate. Click Next. Click Finish. A confirmation window displays. Click OK.
Install the certificate on Cisco Secure ACS. a. b. c. d. On the ACS web console, click System Configuration > ACS Certificate Setup > ACS Certification Authority Setup. Type the full path and file name of the certificate in the CA certificate file field. Click Submit. Cisco Secure ACS prompts you to restart the service. Click System Configuration > Service Control.
16-36
e.
If you installed OfficeScan server before installing Policy Server, the file is in the following directory: <Server installation folder>\PCCSRV
\Private\certificate
If you installed Policy Server before installing OfficeScan server, the file is in the following directory: <Server installation folder>
\PolicyServer\Private\certificate
b. 2.
Install the certificate on Cisco Secure ACS. a. b. c. On the ACS web console, click System Configuration > ACS Certificate Setup > ACS Certification Authority Setup. Type the full path and file name of the certificate in the CA certificate file field. Click Submit. Cisco Secure ACS prompts you to restart the service. d. e. Click System Configuration > Service Control. Click Restart. Cisco Secure ACS restarts.
16-37
Policy Server Configuration from OfficeScan on page 16-39 describes how to manage Policy Servers on the OfficeScan web console. Summary Information for a Policy Server on page 16-40 shows you how to get an overview of Policy Servers on the network. Policy Server Registration on page 16-41 is the first step in configuring Policy Servers. Rules on page 16-42 shows you how to create and edit rules that comprise policies. Policies on page 16-42 shows you how to create and edit policies that ultimately determine how Policy Server measures client security posture. Client Validation Logs on page 16-42 gives an overview of how to use logs to understand the security posture status of clients on the network.
16-38
Client Log Maintenance on page 16-43 gives an overview on how to maintain client validation log size. Administrative Tasks on page 16-43 describes how to change the Policy Server password and set a schedule for synchronization.
4. 5.
16-39
The Policy Servers screen appears displaying a list of all Policy Servers. 2. 3. Select the check box next to the Policy Server to delete. Click Delete.
Note To validate all clients on the network, add all OfficeScan servers to at least one Policy Server.
16-40
Registered OfficeScan server(s): The OfficeScan servers currently on the network Policies: The Policy Server policies registered OfficeScan servers can use Rule(s): The Policy Server rules that comprise policies
Tip If you want multiple Policy Servers on the network to have the same settings, including the same rules and policies, export and then import settings from one server to another. Trend Micro recommends configuring the same settings on all Policy Servers on the network to maintain a consistent antivirus policy.
OfficeScan server name: The host name or IP address and port number of the registered OfficeScan servers Synchronization Result: Indicates if the synchronization was successful or not Last Synchronized: The date of the last successful synchronization
16-41
Validation Sequence on page 16-7 for information on the role the OfficeScan server performs in the validation process.
Note For Policy Server to validate all clients on the network, add all OfficeScan servers to at least one Policy Server.
Add a new OfficeScan server or edit the settings of an existing one from the OfficeScan servers screen, which you can access by going to the Policy Server web console and clicking Configurations > OfficeScan servers.
Rules
Rules are the building blocks of policies and comprise policies. Configure rules as the next step in Policy Server configuration. See Rule Composition on page 16-10 for more information. To access the web console screens for Cisco ACS rules, go to the Policy Server web console and click Configurations > Rules on the main menu.
Policies
After configuring new rules or ensuring that the default rules are suitable for your security enforcement needs, configure policies registered OfficeScan servers can use. See Policy Composition on page 16-14 for more information. Add a new Cisco NAC policy or edit an existing one to determine the rules currently enforced and to take action on clients when client security posture does not match any rules. To access the web console screens for Cisco ACS policies, go to the Policy Server web console and click Configurations > Policies on the main menu.
16-42
security posture data and sends it to the Policy Server, which compares the data to policies and rules (see The Client Validation Sequence on page 16-7).
Note To generate client validation logs, when adding or editing a new rule or policy, select the check box under Server-side actions.
To access the web console screens for Cisco ACS logs, go to the Policy Server web console and click Logs > View Client Validation Logs on the main menu.
Administrative Tasks
Perform the following administrative tasks on the Policy Server:
Change password: Change the password configured when adding the Policy Server (see Policy Server Configuration from OfficeScan on page 16-39) Configure a synchronization schedule: The Policy Server needs to periodically obtain the version of the Virus Pattern and Virus Scan Engine on the OfficeScan server to evaluate OfficeScan client security posture. Therefore, you cannot enable or disable scheduled synchronization. By default, the Policy Server synchronizes with the OfficeScan server(s) every five minutes (see Synchronization on page 16-16 for more information).
Note Manually synchronize the Policy Server with the OfficeScan server at any time on the Summary screen (see Summary Information for a Policy Server on page 16-40).
16-43
To access the web console screens for Cisco ACS administration tasks, go to the Policy Server web console and click Administration on the main menu.
16-44
Chapter 17
Overview of Check Point Architecture and Configuration on page 17-2 Configuring the Secure Configuration Verification File for OfficeScan on page 17-4 SecureClient Support Installation on page 17-5
17-1
OfficeScan Integration
The OfficeScan client periodically passes the Virus Pattern number and Virus Scan Engine number to SecureClient for verification. SecureClient then compares these values with values in the client local.scv file.
17-2
This is what the local.scv file looks like if you open it in a text editor:
(SCVObject :SCVNames ( : (OfceSCV :type (plugin) :parameters ( :CheckType (OfceVersionCheck) :LatestPatternVersion (701) :LatestEngineVersion (7.1) :PatternCompareOp (">=") :EngineCompareOp (">=") ) ) ) :SCVPolicy ( : (OfceSCV) ) :SCVGlobalParams ( :block_connections_on_unverified (true) :scv_policy_timeout_hours (24) ) )
In this example, the SCV check will allow connections through the firewall if the pattern file version is 701 or later, and the scan engine number is 7.1 or later. If the scan engine
17-3
or pattern file is earlier, all connections through the Check Point firewall get blocked. Modify these values using the SCV Editor on the local.scv file on the Policy Server.
Note Check Point does not automatically update the pattern file and scan engine version numbers in the SCV file. Whenever OfficeScan updates the scan engine or pattern file, you need to manually change the value of the conditions in the local.scv file to keep them current. If you do not update the scan engine and pattern versions, Check Point will authorize traffic from clients with earlier pattern files or scan engines, creating a potential for new viruses to infiltrate the system.
17-4
5.
Add a parameter by clicking Edit > Parameters > Add, and then typing a Name and Value in the corresponding boxes. The following table lists the parameter names and values. Parameter names and values are case-sensitive. Type them in the order given in the table.
TABLE 17-1. SCV File Parameter Names and Values NAME
CheckType LatestPatternVersion LatestEngineVersion LatestPatternDate PatternCompareOp EngineCompareOp PatternMismatchMessage EngineMismatchMessage
VALUE
OfceVersionCheck <current pattern file number> <current scan engine number> <current pattern file release date> >= >=
Type the most current pattern file number and scan engine number in place of the text in curly braces. View the latest virus pattern and scan engine versions for clients by clicking Update & Upgrade on the main menu of the OfficeScan web console. The pattern version number will appear to the right of the pie chart representing the percentage of OfficeScan clients protected. 6. 7. 8. Select Block connections on SCV unverified. Click Edit > Product > Enforce. Click File > Generate Policy File to create the file. Select the existing
local.scv file to overwrite it.
17-5
computers, instruct them to install SecureClient support. This module allows SecureClient to perform SCV checks on VPN clients, ensuring that only securely configured systems are allowed to connect to the network. Users can verify that they have Check Point SecureClient installed on their computers by checking for the ( ) icon in the system tray. Users can also check for an item named Check Point SecureClient on the Add/Remove Programs screen of Windows. Users launch the installation from the OfficeScan client consoles Toolbox tab. This tab only appears if users have the necessary privileges and if the OfficeScan client computers operating system is Windows XP or Windows Server 2003.
17-6
2.
In the client tree, click the root domain icon ( specific domains or clients.
Note
Check Point SecureClient Support does not support IPv6. You cannot deploy this module to pure IPv6 endpoints.
3. 4. 5. 6.
Click Settings > Privileges and Other Settings. On the Privileges tab, go to the Toolbox Privileges section. Select Display the Toolbox tab on the client console and allow users to install Check Point SecureClient Support. If you selected domain(s) or client(s) in the client tree, click Save. If you clicked the root domain icon, choose from the following options:
Apply to All Clients: Applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings. Apply to Future Domains Only: Applies settings only to clients added to future domains. This option will not apply settings to new clients added to an existing domain.
17-7
The OfficeScan client connects to the server and downloads the module. OfficeScan displays a message when the download is complete. 5. Click OK.
17-8
Chapter 18
Getting Help
This chapter describes troubleshooting issues that may arise and how to contact support. Topics in this chapter:
18-1
Troubleshooting Resources
This section provides a list of resources you can use to troubleshoot OfficeScan server and OfficeScan client issues.
Support Intelligence System on page 18-2 Case Diagnostic Tool on page 18-2 OfficeScan Server Logs on page 18-3 OfficeScan Client Logs on page 18-15
18-2
Getting Help
performance issues in the actual deployment of Behavior Monitoring and Device Control. For details, visit http://esupport.trendmicro.com/solution/en-us/1056425.aspx.
OfficeScan server basic logs Trend Micro Vulnerability Scanner Active Directory integration logs Client grouping logs Security compliance logs Role-based administration Smart scan Policy Server
18-3
Uninstall and then install the server again. Upgrade OfficeScan to a new version. Perform remote installation/upgrade (Debug logging is enabled on the computer where you launched Setup and not on the remote computer.)
18-4
Getting Help
Procedure 1. 2. Copy the LogServer folder located in <Server installation folder>\PCCSRV \Private to C:\. Create a file named ofcdebug.ini with the following content:
[debug] debuglevel=9 debuglog=c:\LogServer\ofcdebug.log debugLevel_new=D debugSplitSize=10485760 debugSplitPeriod=12 debugRemoveAfterSplit=1
3. 4. 5.
Save ofcdebug.ini to C:\LogServer. Perform the appropriate task (that is, uninstall/reinstall the server, upgrade to a new server version, or perform remote installation/upgrade). Check ofcdebug.log in C:\LogServer.
Installation Logs
On the computer where you launched Setup: File name: ofcmasr.log Location: %windir%
18-5
File name: ofcdebug.log File name: ofcserver.ini Location: <Server installation folder>\PCCSRV\Private\
File names:
Run the Trend Micro Case Diagnostics Tool. For information, see Case Diagnostic Tool on page 18-2. Gather the following logs:
18-6
Getting Help
File name: ofcdebug.log File name: ofcserver.ini Location: <Server installation folder>\PCCSRV\Private\
File names:
dbADScope.cdx dbADScope.dbf
18-7
ProxyCache=0
2. 3.
Save the file to <Server installation folder>\PCCSRV\Web\Service. Restart the OfficeScan Master Service.
18-8
Getting Help
2.
All files in the <Server installation folder>\PCCSRV\Log\Security Compliance Report folder. OfficeScan Server Logs on page 18-3
File name: ofcdebug.log File name: ofcserver.ini Location: <Server installation folder>\PCCSRV\Private\
All files in the <Server installation folder>\PCCSRV\Log\Outside Server Management Report\ folder. File names:
dbADScope.cdx dbADScope.dbf
18-9
dbClientInfo.cdx dbclientInfo.dbf
18-10
Getting Help
2. 3.
VSEncrypt Logs
OfficeScan automatically creates the debug log (VSEncrypt.log) in the user account's temporary folder. For example, C:\Documents and Settings\<User name> \Local Settings\Temp.
Agent.ini Product.ini
18-11
2. 3.
Restart the OfficeScan Control Manager Agent service from Microsoft Management Console. Check CMAgent_debug.log in C:\.
2.
18-12
Getting Help
4. 5.
Perform the steps that led to the scanning issue you encountered. Check TMFilter.log in %windir%.
Virus/Malware Logs
File name:
dbVirusLog.dbf dbVirusLog.cdx
Spyware/Grayware Logs
File name:
dbSpywareLog.dbf dbSpywareLog.cdx
Outbreak Logs
Current Firewall Violation Outbreak Logs
File name: Cfw_Outbreak_Current.log Location: <Server installation folder>\PCCSRV\Log\
18-13
To generate ofcdebug.txt, enable debug logging. For instructions on enabling debug logging, see Enabling Debug Logging on page 18-4.
18-14
Getting Help
2.
Send ofcdebug.ini to client users, instructing them to save the file to C:\.
Note
LogServer.exe automatically runs each time the OfficeScan client computer starts.
Instruct users NOT to close the LogServer.exe command window that opens when the computer starts as this prompts OfficeScan to stop debug logging. If users close the command window, they can start debug logging again by running LogServer.exe located in <Client installation folder>.
18-15
3.
Note Disable debug logging for the OfficeScan client by deleting ofcdebug.ini.
%windir% for all installation methods except MSI package %temp% for the MSI package installation method
3.
18-16
Getting Help
Cleanup Log
File name: yyyymmdd.log Location: <Client installation folder>\report\
ActiveUpdate Logs
18-17
2. 3.
Save the file to <Client installation folder>. Reload the OfficeScan client.
Note Stop collecting detailed client update information by deleting the aucfg.ini file and reloading the OfficeScan client.
TmOPP.ini TmOPPRestore.ini
18-18
Getting Help
VALUES
Type: DWORD value (REG_DWORD) Name: DebugCtrl Value: 0x00001111
2. 3.
Enabling Debug Logging for the Common Firewall Driver on Windows XP and Windows Server 2003 Computers
Procedure 1. Add the following data in HKEY_LOCAL_MACHINE\System
\CurrentControlSet\Services\tmcfw\Parameters:
18-19
2. 3.
Disabling Debug Logging for the Common Firewall Driver (all operating systems)
Procedure 1. 2. Delete "DebugCtrl" in the registry key. Restart the computer.
2. 3.
18-20
Getting Help
2. 3.
Disabling Debug Logging for the Web Reputation and POP3 Mail Scan Features
Procedure 1. 2. Open TmProxy.ini and change the "Enable" value from 1 to 0. Reload the OfficeScan client.
18-21
3. 4. 5.
Create a folder named Log in the C:\ directory. Copy logger.cfg to the Log folder. Deploy Data Loss Prevention and Device Control settings from the web console to start collecting logs.
Note Disable debug logging for the Data Protection module by deleting debugcfg in the registry key and restarting the computer.
18-22
Getting Help
Click Start > Control Panel > Performance and Maintenance > Administrative Tools > Computer Management. Open the MMC containing the Event Viewer snap-in.
2.
VALUES
Type: DWORD value (REG_DWORD) Name: Debug Value: 1111 (Hexadecimal)
Key 2
2. 3.
Note Disable debug logging for TDI by deleting Debug and LogFile in the registry key and restarting the computer.
18-23
Contact Information
In the United States, you can reach the Trend Micro representatives through phone, fax, or email: Trend Micro, Inc. 10101 North De Anza Blvd., Cupertino, CA 95014 Toll free: +1 (800) 228-5651 (sales) Voice: +1 (408) 257-1500 (main) Fax: +1 (408) 257-2003 Web address: www.trendmicro.com Email: [email protected]
Microsoft Windows and Service Pack versions Network type Computer brand, model, and any additional hardware connected to your computer Amount of memory and free hard disk space on your computer
18-24
Getting Help
Detailed description of the install environment Exact text of any error message given Steps to reproduce the problem
TrendLabs
TrendLabsSM is the global antivirus research and support center of Trend Micro. Located on three continents, TrendLabs has a staff of more than 250 researchers and engineers who operate around the clock to provide you, and every Trend Micro customer, with service and support. You can rely on the following post-sales service:
Regular virus pattern updates for all known "zoo" and "in-the-wild" computer viruses and malicious codes Emergency virus outbreak support Email access to antivirus engineers Knowledge Base, the Trend Micro online database of technical support issues
18-25
List of viruses and malicious mobile code currently "in the wild," or active Computer virus hoaxes Internet threat advisories Virus weekly report Virus Encyclopedia, which includes a comprehensive list of names and symptoms for known viruses and malicious mobile code Glossary of terms http://www.trendmicro.com/vinfo/
Documentation Feedback
Trend Micro always seeks to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro document, please go to the following site: http://www.trendmicro.com/download/documentation/rating.asp
18-26
Appendix A
A-1
The server must be installed on Windows Server 2008 or Windows Server 2012. It cannot be installed on Windows Server 2003 because this operating system only supports IPv6 addressing partially. The server must use an IIS web server. Apache web server does not support IPv6 addressing. If the server will manage IPv4 and IPv6 OfficeScan clients, it must have both IPv4 and IPv6 addresses and must be identified by its host name. If a server is identified by its IPv4 address, IPv6 OfficeScan clients cannot connect to the server. The same issue occurs if pure IPv4 clients connect to a server identified by its IPv6 address. If the server will manage only IPv6 clients, the minimum requirement is an IPv6 address. The server can be identified by its host name or IPv6 address. When the server is identified by its host name, it is preferable to use its Fully Qualified Domain Name (FQDN). This is because in a pure IPv6 environment, a WINS server cannot translate a host name to its corresponding IPv6 address.
Note The FQDN can only be specified when performing a local installation of the server. It is not supported on remote installations.
A-2
Windows 7 Windows Server 2008 Windows Vista Windows 8 Windows Server 2012
It cannot be installed on Windows Server 2003 and Windows XP because these operating systems only support IPv6 addressing partially. It is preferable for an OfficeScan client to have both IPv4 and IPv6 addresses as some of the entities to which it connects only support IPv4 addressing.
LIMITATION
Deploy OfficeScan clients to pure IPv4 endpoints. Manage pure IPv4 OfficeScan clients.
A-3
ITEM
Updates and centralized management
LIMITATION
A pure IPv6 server cannot update from pure IPv4 update sources, such as:
Trend Micro ActiveUpdate Server Control Manager 5.5 Control Manager 5.0 Note IPv6 support for Control Manager starts in version 5.5 SP1.
A pure IPv6 server cannot connect to the Trend Micro Online Registration Server to register the product, obtain the license, and activate/renew the license. A pure IPv6 server cannot connect through a pure IPv4 proxy server. A pure IPv6 server will have Plug-In Manager but will not be able to deploy any of the plug-in solutions to:
Pure IPv4 OfficeScan clients or pure IPv4 hosts (because of the absence of a direct connection) Pure IPv6 OfficeScan clients or pure IPv6 hosts because none of the plug-in solutions support IPv6.
Most of these limitations can be overcome by setting up a dual-stack proxy server that can convert between IPv4 and IPv6 addresses (such as DeleGate). Position the proxy server between the OfficeScan server and the entities to which it connects or the entities that it serves.
A-4
LIMITATION
Pure IPv6 OfficeScan clients cannot be managed by a pure IPv4 OfficeScan server. A pure IPv6 OfficeScan client cannot update from pure IPv4 update sources, such as:
Trend Micro ActiveUpdate Server A pure IPv4 OfficeScan server A pure IPv4 Update Agent Any pure IPv4 custom update source
A pure IPv6 OfficeScan client cannot send queries to smart protection sources, such as:
Smart Protection Server 2.0 (integrated or standalone) Note IPv6 support for Smart Protection Server starts in version 2.5.
Pure IPv6 OfficeScan clients cannot connect to the Trend Micro-hosted Certified Safe Software Service. Pure IPv6 OfficeScan clients cannot install plug-in solutions because none of the plug-in solutions support IPv6. Pure IPv6 OfficeScan clients cannot install the following programs because they do not support IPv6:
Proxy connection
A pure IPv6 OfficeScan client cannot connect through a pure IPv4 proxy server.
A-5
Most of these limitations can be overcome by setting up a dual-stack proxy server that can convert between IPv4 and IPv6 addresses (such as DeleGate). Position the proxy server between the OfficeScan clients and the entities to which they connect.
When the IPv6 address is part of a URL, enclose the address in square brackets ([]). For IPv6 address ranges, a prefix and prefix length are usually required. For configurations that require the server to query IP addresses, prefix length restrictions apply to prevent performance issues that may occur when the server queries a significant number of IP addresses. For example, for the Outside Server Management feature, the prefix length can only be between 112 (65,536 IP addresses) and 128 (2 IP addresses).
A-6
Some settings that involve IPv6 addresses or address ranges will be deployed to OfficeScan clients but OfficeScan clients will ignore them. For example, if you configured the smart protection source list and included a Smart Protection Server identified by its IPv6 address, pure IPv4 OfficeScan clients will ignore the server and connect to the other smart protection sources.
Client Tree Whenever the client tree displays, the IPv6 addresses of pure IPv6 OfficeScan clients display under the IP address column. For dual-stack OfficeScan clients, their IPv6 addresses display if they used their IPv6 address to register to the server.
Note The IP address that dual-stack OfficeScan clients use when registering to the server can be controlled from Networked Computers > Global Client Settings > Preferred IP Address.
When you export client tree settings to a file, the IPv6 addresses also display in the exported file.
Client Status Detailed client information is available when you navigate to Networked Computers > Client Management > Status. In this screen, you will see the IPv6 addresses of pure IPv6 OfficeScan clients and dual-stack OfficeScan clients that used their IPv6 addresses to register to the server.
Logs The IPv6 addresses of dual-stack and pure IPv6 OfficeScan clients display on the following logs:
A-7
Control Manager Console The following table lists which of the OfficeScan server and OfficeScan clients IP addresses display on the Control Manager console.
TABLE A-3. OfficeScan Server and OfficeScan client IP Addresses that Display
on the Control Manager Console
OFFICESCAN
Dual-stack server Pure IPv4 server Pure IPv6 server Dual-stack OfficeScan client
5.5
IPv4 IPv4
5.0
Not supported The IP address used when the OfficeScan client registered to the OfficeScan server IPv4 IPv6
A-8
Appendix B
B-1
Many of the Windows Server 2008/2012 options and features are removed. The server runs a much thinner core operating system. Tasks are performed mostly from the command line interface. The operating system runs fewer services and requires less resources during startup.
The OfficeScan client supports Server Core. This section contains information on the extent of support for Server Core. The OfficeScan server does not support Server Core.
Web install page: This method is not supported because Server Core does not have Internet Explorer. Trend Micro Vulnerability Scanner: The Vulnerability Scanner tool cannot be run locally on the Server Core. Run the tool from the OfficeScan server or another computer.
Remote installation. For details, see Installing Remotely from the OfficeScan Web Console on page 5-19. Login Script Setup Client Packager
B-2
For example:
net use P: \\10.1.1.1\ofcscan
A message appears, informing you if the location of AutoPcc.exe was mapped successfully. 3. Change to the location of AutoPcc.exe by typing the mapped drive letter and a colon. For example:
P:
4.
B-3
The following image shows the commands and results on the command prompt.
FIGURE B-1. Command prompt showing how to install the OfficeScan client
using Login Script Setup
For example:
B-4
A message appears, informing you if the location of the OfficeScan client package was mapped successfully. 4. Change to the location of the OfficeScan client package by typing the mapped drive letter and a colon. For example:
P:
5.
Copy the OfficeScan client package to a local directory on the Server Core computer by typing the following command:
copy <package file name> <directory on the Server Core computer where you want to copy the package>
For example:
copy officescan.msi C:\Client Package
A message appears, informing you if the OfficeScan client package was copied successfully. 6. Change to the local directory. For example:
C: cd C:\Client Package
7.
Type the package file name to launch the installation. For example:
officescan.msi
B-5
The following image shows the commands and results on the command prompt.
FIGURE B-2. Command prompt showing how to install the OfficeScan client
using a client package
B-6
ACTION
Opens the OfficeScan client console
If the folder path contains a space, enclose the entire path in quotes. Scanning of individual files is not supported.
Correct commands:
Incorrect commands:
pccntmon -r pccntmon -v
Opens Real-time Monitor Opens a screen with a list of client components and their versions
B-7
COMMAND
pccntmon -u
ACTION
Opens a screen where "Update Now" (manual client update) is launched If "Update Now" cannot be launched, the following message displays on the command prompt: Disabled or Not Functional
pccntmon -n
Opens a popup window where a password is specified to unload the client If a password is not required to unload the OfficeScan client, OfficeScan client unloading starts. To reload the OfficeScan client, type the following command:
pccntmon
pccntmon -m
Opens a popup window where a password is specified to uninstall the OfficeScan client If a password is not required to uninstall the OfficeScan client, OfficeScan client uninstallation starts.
B-8
COMMAND
pccntmon -c
ACTION
Shows the following information in the command line:
Scan method
Pattern status
Updated Outdated
Available Reconnecting
Available Reconnecting
pccntmon -h
B-9
Appendix C
C-1
DESCRIPTION
Tiles are similar to the desktop icons used in previous Windows releases. Users click or tap on a tile to launch the application associated with the tile. Live tiles provide users application-specific information that dynamically updates. Applications can post information to tiles even when the application is not running
Toast notifications
Toast notifications are similar to a popup message. These notifications provide time-sensitive information about events that occur while an application is running. Toast notifications appear in the foreground whether Windows is currently in desktop mode, displaying the lock screen, or running another application. Note Depending on the application, toast notifications may not appear on all screens or in each mode.
C-2
TABLE C-2. OfficeScan Support for Tiles and Toast Notifications CONTROL
Tiles
OFFICESCAN SUPPORT
OfficeScan provides users with a tile that links to the OfficeScan client program. When users click the tile, Windows switches to desktop mode and the OfficeScan client program displays. Note OfficeScan does not support live tiles.
Toast notifications
Suspicious Program Detected Scheduled Scan Threat Resolved Computer Restart Required USB Storage Device Detected Outbreak Detected Note OfficeScan only displays toast notifications in Windows UI mode.
C-3
The PC settings screen appears. 3. 4. Click Notifications. Under the Notifications section, set the following settings to On:
Show app notifications Show app notifications on the lock screen (optional) Play notification sounds (optional)
Internet Explorer 10
Internet Explorer (IE) 10 is the default browser in Windows 8 and Windows Server 2012. Internet Explorer 10 comes in two different versions: one for the Windows UI and one for the desktop mode. Internet Explorer 10 for the Windows UI provides a plug-in free browsing experience. Plug-in programs for web browsing previously followed no set standards and consequently, the quality of the code employed by these plug-in programs is variable. Plug-ins also require the use of more system resources and increase the risk of malware infection. Microsoft has developed Internet Explorer 10 for the Windows UI to follow new standards-based technologies to replace the previously used plug-in solutions. The following table lists the technologies that Internet Explorer 10 uses instead of older plug-in technology.
TABLE C-3. Comparison of Standards-based Technologies to Plug-in Programs CAPABILITY
Video and audio
C-4
CAPABILITY
Graphics
Offline storage
Microsoft has also developed a plug-in compatible Internet Explorer 10 version solely for the desktop mode. If users in Windows UI mode encounter a website that requires the use of additional plug-in programs, a notification displays in Internet Explorer 10 prompting users to switch to desktop mode. Once in desktop mode, users can view websites requiring the use or installation of third-party plug-in programs.
C-5
DESKTOP MODE
Full support Full support
WINDOWS UI
Not supported Limited support
Firewall
Full support
Limited support
C-6
Appendix D
OfficeScan Rollback
This appendix discusses OfficeScan server and client rollback support.
D-1
Administrators can only roll back the OfficeScan server and clients using the following procedure if the administrator chose to back up the server during the installation process. If the server backup file are not available, refer to the OfficeScan 10.6, 10.6 SP1, or 10.6 SP2 Installation and Upgrade Guide for manual rollback procedures. This version of OfficeScan only supports rollbacks to the following OfficeScan versions:
OfficeScan 10.6 OfficeScan 10.6 SP1 OfficeScan 10.6 SP2 OfficeScan 10.6 SP2 DLP Enhancement Patch OfficeScan 10.6 SP2 Custom Defense Pack OfficeScan 10.6 SP2 Custom Defense Pack Scan Enhancement
D-2
OfficeScan Rollback
d. 2. 3. 4.
Enable the Clients can update components but not upgrade the client program or deploy hot fixes option.
On the OfficeScan 10.6 SP3 web console, navigate to Updates > Networked Computers > Update Source. Select Customized Update Source. On the Customized Update Source List, click Add. A new screen opens.
5. 6.
Type the IP addresses of the OfficeScan clients to be rolled back. Type the update source URL. For example, type:
http://<IP address of the OfficeScan server>:<port>/ OfficeScan/download/Rollback
7. 8.
Click Save. Click Notify All Clients. When the OfficeScan client to be rolled back updates from the update source, the OfficeScan client is uninstalled and the previous OfficeScan client version is installed.
Tip Administrators can speed up the rollback process by initiating a Manual Update on clients. For details, see Updating OfficeScan Clients Manually on page 6-41.
9.
After the previous OfficeScan client version is installed, inform the user to restart the computer. After the rollback process is complete, the OfficeScan client continues to report to the same OfficeScan server.
D-3
Note After rolling back the OfficeScan client, all components, including the Virus Pattern, also roll back to the previous version. If administrators do not roll back the OfficeScan server, the rolled-back OfficeScan client cannot update components. Administrators must change the update source of the rolled-back OfficeScan client to the standard update source to receive further component updates.
Intrusion Defense Firewall (if installed) Trend Micro Local Web Classification Server Trend Micro Smart Scan Server OfficeScan Active Directory Integration Service OfficeScan Control Manager Agent OfficeScan Plug-in Manager OfficeScan Master Service Apache 2 (if using the Apache web server) World Wide Web Publishing Service (if using the IIS web server)
2.
Copy and replace all files and directories from the <Server installation folder>
\PCCSRV\Backup\ServicePack3_<build_number>\ directory to the <Server installation folder>\PCCSRV\ directory.
3.
D-4
OfficeScan Rollback
The Registry Editor screen appears. 4. In the left navigation pane, select the one of the following registry keys:
5. 6. 7. 8.
Go to File > Import.... Select the RegBak_ServicePack3_<build_number>.reg file located in the <Server installation folder>\PCCSRV\Backup\ directory. Click Yes to restore all of the previous OfficeScan version keys. Open a command line editor (click Start and type cmd.exe) and type the following commands to reset the Local Web Classification Server performance counter:
cd <Server installation folder>\PCCSRV\LWCS regsvr32.exe /u /s perfLWCSPerfMonMgr.dll regsvr32.exe /s perfLWCSPerfMonMgr.dll
9.
Intrusion Defense Firewall (if installed) Trend Micro Local Web Classification Server Trend Micro Smart Scan Server OfficeScan Active Directory Integration Service OfficeScan Control Manager Agent OfficeScan Plug-in Manager OfficeScan Master Service Apache 2 (if using the Apache web server) World Wide Web Publishing Service (if using the IIS web server)
D-5
10. Clean the Internet Explorer cache and remove ActiveX controls manually. For details on removing ActiveX controls in Internet Explorer 9, see http:// windows.microsoft.com/en-us/internet-explorer/manage-add-ons#ie=ie-9. The OfficeScan server has been restored to the previously installed version.
Tip Administrators can confirm a successful rollback by checking the OfficeScan version number on the About screen (Help > About).
11. After confirming that OfficeScan rolled back successfully, delete the following in the <Server installation folder>\PCCSRV\Backup\ directory:
D-6
Appendix E
Glossary
The terms contained in this glossary provide further information about commonly referenced computer terms, as well as Trend Micro products and technologies.
E-1
ActiveUpdate
ActiveUpdate is a function common to many Trend Micro products. Connected to the Trend Micro update website, ActiveUpdate provides up-to-date downloads of pattern files, scan engines, programs, and other Trend Micro component files through the Internet.
Compressed File
A single file containing one or more separate files plus information for extraction by a suitable program, such as WinZip.
Cookie
A mechanism for storing information about an Internet user, such as name, preferences, and interests, which is stored in the web browser for later use. The next time you access a website for which your browser has a cookie, the browser sends the cookie to the web server, which the web server can then use to present you with customized web pages. For example, you might enter a website that welcomes you by name.
DHCP
Dynamic Host control Protocol (DHCP) is a protocol for assigning dynamic IP addresses to devices in a network. With dynamic addressing, a device can have a
E-2
Glossary
different IP address every time it connects to the network. In some systems, the devices IP address can even change while it is still connected. DHCP also supports a mix of static and dynamic IP addresses.
DNS
Domain Name system (DNS) is a general-purpose data query service chiefly used in the Internet for translating host names into IP addresses. When a DNS client requests host name and address data from a DNS server, the process is called resolution. Basic DNS configuration results in a server that performs default resolution. For example, a remote server queries another server for data in a machine in the current zone. Client software in the remote server queries the resolver, which answers the request from its database files.
Domain Name
The full name of a system, consisting of its local host name and its domain name, for example, tellsitall.com. A domain name should be sufficient to determine a unique Internet address for any host on the Internet. This process, called "name resolution", uses the Domain Name System (DNS).
Dynamic IP Address
A Dynamic IP address is an IP address assigned by a DHCP server. The MAC address of a computer will remain the same, however, the DHCP server may assign a new IP address to the computer depending on availability.
E-3
ESMTP
Enhanced Simple Mail Transport Protocol (ESMTP) includes security, authentication and other devices to save bandwidth and protect servers.
False Positive
A false positive occurs when a file is incorrectly detected by security software as infected.
FTP
File Transfer Protocol (FTP) is a standard protocol used for transporting files from a server to a client over the Internet. Refer to Network Working Group RFC 959 for more information.
GeneriClean
GeneriClean, also known as referential cleaning, is a new technology for cleaning viruses/malware even without the availability of virus cleanup components. Using a
E-4
Glossary
detected file as basis, GeneriClean determines if the detected file has a corresponding process/service in memory and a registry entry, and then removes them altogether.
Hot Fix
A hot fix is a workaround or solution to a single customer-reported issue. Hot fixes are issue-specific, and therefore not released to all customers. Windows hot fixes include a Setup program, while non-Windows hot fixes do not (typically you need to stop the program daemons, copy the file to overwrite its counterpart in your installation, and restart the daemons). By default, the OfficeScan clients can install hot fixes. If you do not want OfficeScan clients to install hot fixes, change client update settings in the web console by going to Networked Computers > Client Management, click Settings > Privileges and Other Settings > Other Settings tab. If you unsuccessfully attempt to deploy a hot fix on the OfficeScan server, use the Touch Tool to change the time stamp of the hot fix. This causes OfficeScan to interpret the hot fix file as new, which makes the server attempt to automatically deploy the hot fix again. For details about this tool, see Running the Touch Tool for OfficeScan Client Hot Fixes on page 6-49.
HTTP
Hypertext Transfer Protocol (HTTP) is a standard protocol used for transporting web pages (including graphics and multimedia content) from a server to a client over the Internet.
HTTPS
Hypertext Transfer Protocol using Secure Socket Layer (SSL). HTTPS is a variant of HTTP used for handling secure transactions.
E-5
ICMP
Occasionally a gateway or destination host uses Internet Control Message Protocol (ICMP) to communicate with a source host, for example, to report an error in datagram processing. ICMP uses the basic support of IP as if it were a higher level protocol, however, ICMP is actually an integral part of IP, and implemented by every IP module. ICMP messages are sent in several situations: for example, when a datagram cannot reach its destination, when the gateway does not have the buffering capacity to forward a datagram, and when the gateway can direct the host to send traffic on a shorter route. The Internet Protocol is not designed to be absolutely reliable. The purpose of these control messages is to provide feedback about problems in the communication environment, not to make IP reliable.
IntelliScan
IntelliScan is a method of identifying files to scan. For executable files (for example, .exe), the true file type is determined based on the file content. For nonexecutable files (for example, .txt), the true file type is determined based on the file header. Using IntelliScan provides the following benefits:
Performance optimization: IntelliScan does not affect applications on the client because it uses minimal system resources. Shorter scanning period: Because IntelliScan uses true file type identification, it only scans files that are vulnerable to infection. The scan time is therefore significantly shorter than when you scan all files.
IntelliTrap
Virus writers often attempt to circumvent virus filtering by using real-time compression algorithms. IntelliTrap helps reduce the risk of such viruses entering the network by blocking real-time compressed executable files and pairing them with other malware characteristics. Because IntelliTrap identifies such files as security risks and may
E-6
Glossary
incorrectly block safe files, consider quarantining (not deleting or cleaning) files when you enable IntelliTrap. If users regularly exchange real-time compressed executable files, disable IntelliTrap. IntelliTrap uses the following components:
IP
"The internet protocol (IP) provides for transmitting blocks of data called datagrams from sources to destinations, where sources and destinations are hosts identified by fixed length addresses." (RFC 791)
Java File
Java is a general-purpose programming language developed by Sun Microsystems. A Java file contains Java code. Java supports programming for the Internet in the form of platform-independent Java "applets". An applet is a program written in Java programming language that can be included in an HTML page. When you use a Javatechnology enabled browser to view a page that contains an applet, the applet transfers its code to your computer and the browsers Java Virtual Machine executes the applet.
LDAP
Lightweight Directory Access Protocol (LDAP) is an application protocol for querying and modifying directory services running over TCP/IP.
E-7
Listening Port
A listening port is utilized for client connection requests for data exchange.
MCP Agent
Trend Micro Management Communication Protocol (MCP) is Trend Micro's next generation agent for managed products. MCP replaces Trend Micro Management Infrastructure (TMI) as the way Control Manager communicates with OfficeScan. MCP has several new features:
Reduced network loading and package size NAT and firewall traversal support HTTPS support One-way and two-way communication support Single sign-on (SSO) support Cluster node support
NAT
Network Address Translation (NAT) is a standard for translating secure IP addresses to temporary, external, registered IP address from the address pool. This allows trusted networks with privately assigned IP addresses to have access to the Internet. This also
E-8
Glossary
means that you do not have to get a registered IP address for every machine in the network.
NetBIOS
Network Basic Input Output System (NetBIOS) is an application program interface (API) that adds functionality such as network capabilities to disk operating system (DOS) basic input/output system (BIOS).
One-way Communication
NAT traversal has become an increasingly more significant issue in the current realworld network environment. To address this issue, MCP uses one-way communication. One-way communication has the MCP agent initiating the connection to, and polling of commands from, the server. Each request is a CGI-like command query or log transmission. To reduce the network impact, the MCP agent keeps connection alive and open as much as possible. A subsequent request uses an existing open connection. If the connection breaks, all SSL connections to the same host benefit from session ID cache that drastically reduces re-connection time.
Patch
A patch is a group of hot fixes and security patches that solve multiple program issues. Trend Micro makes patches available on a regular basis. Windows patches include a Setup program, while non-Windows patches commonly have a setup script.
Phish Attack
Phish, or phishing, is a rapidly growing form of fraud that seeks to fool web users into divulging private information by mimicking a legitimate website. In a typical scenario, unsuspecting users get an urgent sounding (and authentic looking) email telling them there is a problem with their account that they must immediately fix
E-9
to avoid account termination. The email will include a URL to a website that looks exactly like the real thing. It is simple to copy a legitimate email and a legitimate website but then change the so-called backend, which receives the collected data. The email tells the user to log on to the site and confirm some account information. A hacker receives data a user provides, such as a logon name, password, credit card number, or social security number. Phish fraud is fast, cheap, and easy to perpetuate. It is also potentially quite lucrative for those criminals who practice it. Phish is hard for even computer-savvy users to detect. And it is hard for law enforcement to track down. Worse, it is almost impossible to prosecute. Please report to Trend Micro any website you suspect to be a phishing site.
Ping
Ping is a utility that sends an ICMP echo request to an IP address and waits for a response. The Ping utility can determine if the computer with the specified IP address is online or not.
POP3
Post Office Protocol 3 (POP3) is a standard protocol for storing and transporting email messages from a server to a client email application.
Proxy Server
A proxy server is a World Wide Web server which accepts URLs with a special prefix, used to fetch documents from either a local cache or a remote server, then returns the URL to the requester.
E-10
Glossary
RPC
Remote procedure call (RPC) is a network protocol that allows a computer program running on one host to cause code to be executed on another host.
Security Patch
A security patch focuses on security issues suitable for deployment to all customers. Windows security patches include a Setup program, while non-Windows patches commonly have a setup script.
Service Pack
A service pack is a consolidation of hot fixes, patches, and feature enhancements significant enough to be a product upgrade. Both Windows and non-Windows service packs include a Setup program and setup script.
SMTP
Simple Mail Transport Protocol (SMTP) is a standard protocol used to transport email messages from server to server, and client to server, over the internet.
SNMP
Simple Network Management Protocol (SNMP) is a protocol that supports monitoring of devices attached to a network for conditions that merit administrative attention.
E-11
SNMP Trap
A Small Network Management Protocol (SNMP) trap is a method of sending notifications to network administrators that use management consoles that support this protocol. OfficeScan can store notification in Management Information Bases (MIBs). You can use the MIBs browser to view SNMP trap notification.
SOCKS 4
SOCKS 4 is a TCP protocol used by proxy servers to establish a connection between clients on the internal network or LAN and computers or servers outside the LAN. The SOCKS 4 protocol makes connection requests, sets up proxy circuits and relays data at the Application layer of the OSI model.
SSL
Secure Socket Layer (SSL) is a protocol designed by Netscape for providing data security layered between application protocols (such as HTTP, Telnet, or FTP) and TCP/IP. This security protocol provides data encryption, server authentication, message integrity, and optional client authentication for a TCP/IP connection.
SSL Certificate
This digital certificate establishes secure HTTPS communication.
TCP
Transmission Control Protocol (TCP) is a connection-oriented, end-to-end reliable protocol designed to fit into a layered hierarchy of protocols that support multi-network
E-12
Glossary
applications. TCP relies on IP datagrams for address resolution. Refer to DARPA Internet Program RFC 793 for information.
Telnet
Telnet is a standard method of interfacing terminal devices over TCP by creating a "Network Virtual Terminal". Refer to Network Working Group RFC 854 for more information.
Trojan Port
Trojan ports are commonly used by Trojan horse programs to connect to a computer. During an outbreak, OfficeScan blocks the following port numbers that Trojan programs may use.
TABLE E-1. Trojan Ports PORT NUMBER
23432 31337 18006 12349 6667 80 21 3150 2140 10048
PORT NUMBER
31338 31339 139 44444 8012 7597 4000 666 1026 64666
E-13
PORT NUMBER
23 6969 7626 10100 21544 7777 6267 25 25685 68 1120 7300
PORT NUMBER
22222 11000 113 1001 3131 1243 6711 6776 27374 6400 12345 1234
Trusted Port
The server and the OfficeScan client use trusted ports to communicate with each other. If you block the trusted ports and then restore network settings to normal after an outbreak, OfficeScan clients will not immediately resume communication with the server. Client-server communication will only be restored after the number of hours you have specified in the Outbreak Prevention Settings screen elapses. OfficeScan uses the HTTP port (by default, 8080) as the trusted port on the server. During installation, you may enter a different port number. To block this trusted port and the trusted port on the OfficeScan client, select the Block trusted ports check box on the Port Blocking screen.
E-14
Glossary
The master installer randomly generates the OfficeScan client trusted port during installation.
Two-way Communication
Two-way communication is an alternative to one-way communication. Based on oneway communication but with an extra HTTP-based channel that receives server notifications, two-way communication can improve real time dispatching and processing of commands from the server by the MCP agent.
E-15
UDP
User Datagram Protocol (UDP) is a connectionless communication protocol used with IP for application programs to send messages to other programs. Refer to DARPA Internet Program RFC 768 for information.
Uncleanable File
The Virus Scan Engine is unable to clean the following files:
Files infected with Trojans Files infected with Worms Write-protected infected files Password-protected files Backup files Infected files in the Recycle Bin Infected files in Windows Temp Folder or Internet Explorer Temporary Folder
E-16
Glossary
usually takes place through network connections or email attachments. Worms are uncleanable because the file is a self-contained program. Solution: Trend Micro recommends deleting worms.
Password-protected Files
Includes password-protected compressed files or password-protected Microsoft Office files. Solution: Remove the password protection for OfficeScan to clean these files.
Backup Files
Files with the RB0~RB9 extensions are backup copies of infected files. OfficeScan creates a backup of the infected file in case the virus/malware damaged the file during the cleaning process. Solution: If OfficeScan successfully cleans the infected file, you do not need to keep the backup copy. If the computer functions normally, you can delete the backup file.
E-17
Index
A Access Control Server (ACS), 16-3 ACS certificate, 16-17 action on monitored system events, 8-4 actions Data Loss Prevention, 10-34 ActiveAction, 7-36 Active Directory, 2-322-34, 2-49, 2-53, 5-13, 5-30 client grouping, 2-49 credentials, 2-33 custom client groups, 2-32 duplicate structure, 2-53 integration, 2-32 outside server management, 2-32 role-based administration, 2-32 scope and query, 14-66 synchronization, 2-34 ActiveSync, 10-33 ActiveX malicious code, 7-3 Additional Service Settings, 14-6 advanced permissions configuring, 9-11 storage devices, 9-5, 9-6 application filtering, 12-3 approved list, 7-46 approved programs list, 8-6 assessment mode, 7-70 Authentication, Authorization, and Accounting (AAA), 16-4 automatic client grouping, 2-49, 2-50 AutoPcc.exe, 5-11, 5-12, 5-21, 5-22 B Behavior Monitoring, 8-12 action on system events, 8-4 exception list, 8-5 logs, 8-12 Behavior Monitoring Configuration Pattern,
6-8
Behavior Monitoring Core Service, 6-8 Behavior Monitoring Detection Pattern, 6-7 Behavior Monitoring Driver, 6-8 blocked programs list, 8-6 boot sector virus, 7-3 C C&C callbacks global settings, 11-11 widgets, 2-24 CA certificate, 16-17, 16-19 cache settings for scans, 7-60 Case Diagnostic Tool, 18-2 Certificate Authority (CA), 16-4 certificates, 16-16 CA, 16-19 SSL, 16-35, 16-37 Certified Safe Software List, 12-3 Certified Safe Software Service, 8-8 Check Point SecureClient, 5-30 Cisco NAC architecture, 16-6 components and terms, 16-2 policy server deployment, 16-23 Cisco Trust Agent, 6-9, 16-2 client console access restriction, 14-17 client disk image, 5-13, 5-36 client grouping, 2-49, 2-50, 2-52, 2-542-57
IN-1
Active Directory, 2-49, 2-52 adding a domain, 2-55 automatic, 2-49, 2-50 custom groups, 2-49 deleting a domain or client, 2-56 DNS, 2-49 IP addresses, 2-54 manual, 2-49 methods, 2-49 moving a client, 2-57 NetBIOS, 2-49 renaming a domain, 2-57 tasks, 2-55 client installation, 5-2, 5-21 browser-based, 5-17 Client Packager, 5-23 from the web console, 5-19 from the web install page, 5-15 Login Script Setup, 5-21 post-installation, 5-65 system requirements, 5-2 using client disk image, 5-36 using Security Compliance, 5-59 using Vulnerability Scanner, 5-37 client logs ActiveUpdate logs, 18-17 client connection logs, 18-17 client update logs, 18-17 Damage Cleanup Services logs, 18-16 Data Protection debug logs, 10-55, 18-22 debug logs, 18-15 fresh installation logs, 18-16 Mail Scan logs, 18-17 OfficeScan firewall debug logs, 18-19 Outbreak Prevention debug logs, 18-18 TDI debug logs, 18-23
upgrade/hot fix logs, 18-16 web reputation debug logs, 18-21 client mover, 14-21 Client Packager, 5-12, 5-235-25, 5-30, 5-32 deployment, 5-26 settings, 5-26 clients, 2-49, 2-56, 2-57, 4-30, 5-2 connection, 4-30 deleting, 2-56 features, 5-3 grouping, 2-49 installation, 5-2 locations, 4-30 moving, 2-57 proxy settings, 4-30 client security level, 14-16 client self-protection, 14-12 client tree, 2-35, 2-372-40, 2-432-46, 2-48 about, 2-35 advanced search, 2-38, 2-39 filters, 2-38 general tasks, 2-37 specific tasks, 2-39, 2-40, 2-432-46, 2-48 Cisco NAC agent deployment,
2-48
client management, 2-40 manual component updates, 2-44 outbreak prevention, 2-43 rollback component updates, 2-45 security risk logs, 2-46 views, 2-38 client uninstallation, 5-68 client update automatic, 6-35 customized source, 6-30 event-triggered, 6-35
IN-2
Index
from the ActiveUpdate server, 6-43 manual, 6-41 privileges, 6-43 scheduled update, 6-37, 6-43 scheduled update with NAT, 6-39 standard source, 6-28 client upgrade disable, 6-44 client validation, 16-4 COM file infector, 7-3 Common Firewall Driver, 6-6, 6-7, 18-19 Common Firewall Pattern, 7-3 Compliance Report, 14-53 component duplication, 6-19, 6-56 components, 2-19, 5-67, 6-2 on the client, 6-26 on the OfficeScan server, 6-14 on the Update Agent, 6-50 update privileges and settings, 6-43 update summary, 6-58 compressed files, 7-27, 7-65, 7-68 condition statements, 10-20 Conflicted ARP, 12-4 connection verification, 14-40 contacting, 18-2418-26 documentation feedback, 18-26 Knowledge Base, 18-25 technical support, 18-24 Trend Micro, 18-2418-26 continuity of protection, 4-10 Control Manager integration with OfficeScan, 13-22 MCP Agent logs, 18-11 conventional scan, 7-8, 7-9 switching to smart scan, 7-9 cookie scanning, 7-71
CPU usage, 7-28 criteria customized expressions, 10-7 keywords, 10-15, 10-16 custom client groups, 2-32, 2-49 customized expressions, 10-6, 10-7, 10-9 criteria, 10-7 importing, 10-9 customized keywords, 10-14 criteria, 10-15, 10-16 importing, 10-18 customized templates, 10-19 creating, 10-21 importing, 10-22 D Damage Cleanup Services, 1-15, 5-3, 5-5 dashboards Summary, 2-52-7, 2-10 database backup, 13-39 database scanning, 7-66 data identifiers, 10-4 expressions, 10-4 file attributes, 10-4 keywords, 10-4 Data Loss Prevention, 10-210-4 actions, 10-34 channels, 10-23 data identifiers, 10-4 expressions, 10-510-7, 10-9 file attributes, 10-1010-12 keywords, 10-1310-16, 10-18 network channels, 10-2310-27, 10-29,
10-30, 10-35
IN-3
templates, 10-1810-22 widgets, 2-21 Data Loss Prevention:decompression rules;decompression rules;compressed files:decompression rules, 10-36 Data Loss Prevention:system and application channels;system and application channels;system and application channels:PGP encryption, 10-32 Data Protection deployment, 3-5 installation, 3-2 license, 3-4 status, 3-7 uninstallation, 3-14 debug logs clients, 18-15 server, 18-3 device control, 9-2, 9-3, 9-59-13 advanced permissions, 9-11 configuring, 9-11 approved list, 9-12 Digital Signature Provider, 9-7 external devices, 9-10, 9-13 managing access, 9-10, 9-13 non-storage devices, 9-10 permissions, 9-3, 9-5, 9-6, 9-8, 9-10 program path and name, 9-8 requirements, 9-2 storage devices, 9-3, 9-5, 9-6 USB devices, 9-12 wildcards, 9-9 Device Control, 1-16 logs, 9-17, 18-10
notifications, 9-16 device control;device control list;device control list:adding programs, 9-15 Device List Tool, 9-13 DHCP settings, 5-45 Digital Asset Control widgets, 2-23 digital certificates, 16-5 digital signature cache, 7-61 Digital Signature Pattern, 6-8, 7-61 Digital Signature Provider, 9-7 specifying, 9-7 documentation, x documentation feedback, 18-26 domains, 2-48, 2-49, 2-552-57 adding, 2-55 client grouping, 2-49 deleting, 2-56 renaming, 2-57 DSP, 9-7 E EICAR test script, 5-67, 7-3 email domains, 10-24 encrypted files, 7-41 End User License Agreement (EULA), E-4 evaluation version, 13-36 Event Monitoring, 8-2 exception list, 8-5 Behavior Monitoring, 8-5 EXE file infector, 7-3 export settings, 14-51 expressions, 10-4, 10-5 customized, 10-6, 10-9 criteria, 10-7 predefined, 10-5 external device protection, 6-8
IN-4
Index
external devices managing access, 9-10, 9-13 F FakeAV, 7-40 file attributes, 10-4, 10-1010-12 creating, 10-11 importing, 10-12 wildcards, 10-11 file reputation, 4-3 firewall, 5-3, 5-5, 12-2 benefits, 12-2 default policy exceptions, 12-14 disabling, 12-6 outbreak monitor, 12-5 policies, 12-8 policy exceptions, 12-13 privileges, 12-5, 12-22 profiles, 12-4, 12-17 tasks, 12-8 testing, 12-30 firewall log count, 12-25 Fragmented IGMP, 12-5 FTP, 10-25 G gateway IP address, 14-3 gateway settings importer, 14-4 H hot fixes, 6-9, 6-49 HTML virus, 7-4 HTTP and HTTPS, 10-26 I IDS, 12-4 IM applications, 10-26 import settings, 14-51
inactive clients, 14-23 incremental pattern, 6-19 installation, 5-2 client, 5-2 Data Protection, 3-2 Plug-in Manager, 15-3 plug-in program, 15-4 Policy Server, 16-31 Security Compliance, 5-59 integrated server, 4-6 integrated Smart Protection Server, 4-17 ptngrowth.ini, 4-17 update, 4-17, 4-19 components, 4-19 Web Blocking List, 4-19 IntelliScan, 7-26 IntelliTrap Exception Pattern, 6-5 IntelliTrap Pattern, 6-5 intranet, 4-11 Intrusion Detection System, 12-4 IPv6, 4-23 support, 4-23 IPv6 support, A-2 displaying IPv6 addresses, A-7 limitations, A-3, A-4 IpXfer.exe, 14-21 J Java malicious code, 7-3 JavaScript virus, 7-4 joke program, 7-2 K keywords, 10-4, 10-13 customized, 10-1410-16, 10-18 predefined, 10-13, 10-14 Knowledge Base, 18-25
IN-5
L LAND Attack, 12-5 licenses, 13-36 Data Protection, 3-4 status, 2-6 location awareness, 14-2 locations, 4-30 awareness, 4-30 logical operators, 10-20 Login Script Setup, 5-11, 5-12, 5-21, 5-22 logs, 13-33 about, 13-33 Behavior Monitoring, 8-12 client update logs, 6-47 connection verification logs, 14-41 Device Control logs, 9-17 firewall logs, 12-23, 12-24, 12-27 scan logs, 7-91 security risk logs, 7-81 spyware/grayware logs, 7-88 spyware/grayware restore logs, 7-90 system event logs, 13-32 virus/malware logs, 7-73, 7-81 web reputation logs, 11-18 LogServer.exe, 18-3, 18-15 M MAC address, 14-3 macro virus, 7-3 mail scan, 5-4, 5-6, 5-29, 7-58 Malware Behavior Blocking, 8-2 manual client grouping, 2-49 Manual Scan, 7-17 shortcut, 7-66 Microsoft Exchange Server scanning, 7-67 Microsoft SMS, 5-13, 5-32 migration
from third-party security software, 5-61 monitored email domains, 10-24 monitored system events, 8-3 monitored targets, 10-28, 10-29 MSI package, 5-13, 5-30, 5-32 N NetBIOS, 2-49 Network Access Device, 16-3 network channels, 10-2310-27, 10-29, 10-30,
10-35
email clients, 10-24 FTP, 10-25 HTTP and HTTPS, 10-26 IM applications, 10-26 monitored targets, 10-30, 10-35 non-monitored targets, 10-30, 10-35 SMB protocol, 10-26 transmission scope, 10-30 all transmissions, 10-27 conflicts, 10-30 external transmissions, 10-29 transmission scope and targets, 10-27 webmail, 10-27 network virus, 7-3, 12-3 Network VirusWall Enforcer, 4-30 new features, 1-2, 1-6, 1-8 non-monitored email domains, 10-24 non-monitored targets, 10-28, 10-29 non-storage devices permissions, 9-10 notifications C&C callback detections, 11-16 client update, 6-46 computer restart, 6-47
IN-6
Index
Device Control, 9-16 firewall violations, 12-26 for administrators, 10-46, 13-29 for client users, 7-78, 10-49 outbreaks, 7-92, 11-16, 12-29 outdated Virus Pattern, 6-47 spyware/grayware detection, 7-45 virus/malware detection, 7-41 web threat detection, 11-11 O OfficeScan about, 1-2 client, 1-18 client services, 14-11 components, 2-19, 6-2 component update, 5-67 database backup, 13-39 database scanning, 7-66 documentation, x key features and benefits, 1-14 licenses, 13-36 logs, 13-33 programs, 2-19 SecureClient integration, 17-2 terminology, xii web console, 2-2 web server, 13-41 OfficeScan client connection with OfficeScan server,
14-24, 14-37
installation methods, 5-10 processes, 14-15 registry keys, 14-15 reserved disk space, 6-45 uninstallation, 5-68 OfficeScan server, 1-17 functions, 1-17 OfficeScan update, 6-11 on-demand scan cache, 7-62 outbreak criteria, 7-92, 11-16, 12-29 outbreak prevention, 2-17 disabling, 7-101 policies, 7-97 outbreak prevention policy block ports, 7-98 deny write access, 7-100 limit/deny access to shared folders, 7-97 outside server management, 2-32, 14-65 logs, 18-9 query results, 14-68 scheduled query, 14-69 Overlapping Fragment, 12-5 P packer, 7-3 password, 13-42 patches, 6-9 pattern files smart protection, 4-7 Smart Scan Agent Pattern, 4-7 Smart Scan Pattern, 4-8 Web Blocking List, 4-8 PCRE, 10-6 performance control, 7-28 Performance Tuning Tool, 18-2 Perle Compatible Regular Expressions, 10-6 permissions
connection with Smart Protection Server, 14-38 detailed client information, 14-50 files, 14-14 import and export settings, 14-51 inactive clients, 14-23
IN-7
advanced, 9-11 non-storage devices, 9-10 program path and name, 9-8 storage devices, 9-3 phishing, E-9 Ping of Death, 12-4 Plug-in Manager, 1-14, 5-4, 5-7, 15-2 installation, 15-3 managing native OfficeScan features,
15-4
troubleshooting, 15-9 uninstallation, 15-9 plug-in program installation, 15-4 policies Data Loss Prevention, 10-40 firewall, 12-4, 12-8 web reputation, 11-5 policy, 10-3 Policy Enforcement Pattern, 6-8 Policy Server for Cisco NAC, 16-3 CA certificate, 16-19 certificates, 16-16 client validation process, 16-7 default policies, 16-15 default rules, 16-12 deployment overview, 16-23 policies, 16-42 policies and rules, 16-10 policy composition, 16-14 Policy Server installation, 16-31 rule composition, 16-10 rules, 16-42 SSL certificate, 16-17 synchronization, 16-43 system requirements, 16-19
port blocking, 7-98 posture token, 16-4 predefined expressions, 10-5 viewing, 10-5 predefined keywords distance, 10-14 number of keywords, 10-13 predefined tabs, 2-10 predefined templates, 10-19 predefined widgets, 2-10 pre-installation tasks, 5-16, 5-19, 5-59 privileges firewall privileges, 12-22, 12-24 mail scan privileges, 7-58 proxy configuration privileges, 14-48 roaming privilege, 14-19 scan privileges, 7-49 Scheduled Scan privileges, 7-52 unload privilege, 14-18 probable virus/malware, 7-2, 7-84 programs, 2-19, 6-2 proxy settings, 4-30 automatic proxy settings, 14-49 clients, 4-30 for external connection, 14-47 for internal connection, 14-46 for server component update, 6-17 privileges, 14-48 ptngrowth.ini, 4-16, 4-17 Q quarantine directory, 7-38, 7-42 quarantine manager, 13-43 R Real-time Scan, 7-14 Real-time Scan service, 14-37
IN-8
Index
reference server, 13-27 Remote Authentication Dial-In User Service (RADIUS), 16-5 remote installation, 5-12 roaming clients, 5-5, 5-7 role-based administration, 2-32, 13-2 user accounts, 13-17 user roles, 13-2 rootkit detection, 6-8 S scan actions, 7-34 spyware/grayware, 7-45 virus/malware, 7-68 scan cache, 7-60 scan criteria CPU usage, 7-28 file compression, 7-27 files to scan, 7-26 schedule, 7-29 user activity on files, 7-26 scan exclusions, 7-29, 7-30 directories, 7-31 file extensions, 7-33 files, 7-33 scan method, 5-26 default, 7-7 Scan Now, 7-21 scan privileges, 7-49 scan types, 5-3, 5-5, 7-13 scheduled assessments, 14-64 Scheduled Scan, 7-19 postpone, 7-72 reminder, 7-72 resume, 7-73 skip and stop, 7-52, 7-72 stop automatically, 7-72
SCV Editor, 17-2 SecureClient, 5-5, 5-7, 17-2 integrating with OfficeScan, 17-2 Policy Servers, 17-2 SCV Editor, 17-2 Secure Configuration Verification, 17-2 Security Compliance, 14-52 components, 14-55 enforcing, 14-65 enforcing update, 6-48 installation, 5-59 logs, 18-9 outside server management, 2-32, 14-65 scan, 14-57 scheduled assessments, 14-64 services, 14-54 settings, 14-59 Security Information Center, 18-26 security patches, 6-9 security posture, 16-4 security risks, 7-2, 7-47-6 phish attacks, E-9 protection from, 1-15 spyware/grayware, 7-47-6 server logs Active Directory logs, 18-6 Apache server logs, 18-8 client grouping logs, 18-7 Client Packager logs, 18-8 component update logs, 18-7 Control Manager MCP Agent logs,
18-11
debug logs, 18-3 Device Control logs, 18-10 local installation/upgrade logs, 18-5 outside server management logs, 18-9
IN-9
remote installation/upgrade logs, 18-5 role-based administration logs, 18-6 Security Compliance logs, 18-9 ServerProtect Migration Tool debug logs, 18-10 Virtual Desktop Support logs, 18-14 Virus Scan Engine debug logs, 18-12 VSEncrypt debug logs, 18-11 web reputation logs, 18-10 ServerProtect, 5-62 Server Tuner, 13-44 server update component duplication, 6-19 logs, 6-25 manual update, 6-24 proxy settings, 6-17 scheduled update, 6-24 update methods, 6-23 service restart, 14-11 Smart Feedback, 4-3 smart protectection, 4-12 smart protection, 4-24-4, 4-64-9, 4-23 environment, 4-12 File Reputation Services, 4-3 pattern files, 4-74-9 Smart Scan Agent Pattern, 4-7 Smart Scan Pattern, 4-8 update process, 4-9 Web Blocking List, 4-8 Smart Feedback, 4-3 Smart Protection Network, 4-6 Smart Protection Server, 4-6 source, 4-6, 4-7 sources, 4-23 comparison, 4-6 IPv6 support, 4-23
locations, 4-23 protocols, 4-7 volume of threats, 4-2 Web Reputation Services, 4-3, 4-4 Smart Protection Network, 1-2, 4-6 Smart Protection Server, 4-6, 4-12, 4-16, 4-17,
4-19
best practices, 4-16 installation, 4-12 integrated, 4-6, 4-17, 4-19 standalone, 4-6, 4-16 update, 6-13, 6-26 smart scan, 6-3, 7-8, 7-9 switching from conventional scan, 7-9 Smart Scan Agent Pattern, 4-7, 6-3 Smart Scan Pattern, 4-8, 6-3 SMB protocol, 10-26 spyware/grayware, 7-47-6 adware, 7-4 dialers, 7-4 guarding against, 7-6 hacking tools, 7-5 joke programs, 7-4 password cracking applications, 7-5 potential threats, 7-5 remote access tools, 7-5 restoring, 7-48 spyware, 7-4 spyware/grayware scan actions, 7-45 approved list, 7-46 results, 7-89 Spyware Active-monitoring Pattern, 6-6 Spyware Pattern, 6-6 Spyware Scan Engine, 6-6 SSL Certificate, 16-35, 16-37
IN-10
Index
standalone server, 4-6 standalone Smart Protection Server, 4-16 ptngrowth.ini, 4-16 storage devices advanced permissions, 9-5, 9-6 permissions, 9-3 summary dashboard, 2-52-7, 2-10 updates, 6-58 summary dashboard components and programs, 2-19 Summary dashboard, 2-52-7, 2-10 predefined tabs, 2-10 predefined widgets, 2-10 product license status, 2-6 tabs, 2-7 user accounts, 2-5 widgets, 2-7 Support Intelligence System, 2-5, 18-2 synchronization, 16-43 SYN Flood, 12-4 system and application channels, 10-23,
10-3010-34
CD/DVD, 10-30 peer-to-peer (P2P), 10-31 printer, 10-32 removable storage, 10-32 synchronization software, 10-33 Windows clipboard, 10-34 system requirements Policy Server, 16-19 Update Agent, 6-50 T tabs, 2-7 Teardrop, 12-5 technical support, 18-24
templates, 10-1810-22 condition statements, 10-20 customized, 10-19, 10-21, 10-22 logical operators, 10-20 predefined, 10-19 Terminal Access Controller Access Control System (TACACS+), 16-5 test scan, 5-67 test virus, 7-3 third-party security software, 5-60 Tiny Fragment Attack, 12-5 TMPerftool, 18-2 TMTouch.exe, 6-49 token variable, 7-95 Too Big Fragment, 12-4 Top 10 Security Risk Statistics, 2-18 touch tool, 6-49 TrendLabs, 18-25 Trend Micro contact information, 18-24 Knowledge Base, 18-25 Security Information Center, 18-26 TrendLabs, 18-25 Trojan horse program, 1-15, 6-5, 7-2 troubleshooting Plug-in Manager, 15-9 troubleshooting resources, 18-2 U uninstallation, 5-68 Data Protection, 3-14 from the web console, 5-69 Plug-in Manager, 15-9 using the uninstallation program, 5-70 unreachable clients, 14-41 update Smart Protection Server, 6-13, 6-26
IN-11
Update Agent, 5-3, 5-5, 5-28, 6-50 analytical report, 6-57 assigning, 6-51 component duplication, 6-56 standard update source, 6-53 system requirements, 6-50 update methods, 6-57 update methods clients, 6-34 OfficeScan server, 6-23 Update Agent, 6-57 Update Now, 6-43 updates, 4-17, 4-19 clients, 6-26 enforcing, 6-48 integrated Smart Protection Server,
4-17, 4-19
OfficeScan server, 6-14 Update Agent, 6-50 update source clients, 6-28 OfficeScan server, 6-16 Update Agents, 6-52 URL Filtering Engine, 6-7 USB devices approved list, 9-12 configuring, 9-12 user accounts, 2-5 Summary dashboard, 2-5 user role administrator, 13-10 guest user, 13-10 Trend Power User, 13-11 V VBScript virus, 7-4 VDI, 14-70
Virtual Desktop Support, 14-70 virus/malware, 7-27-4 ActiveX malicious code, 7-3 boot sector virus, 7-3 COM and EXE file infector, 7-3 Java malicious code, 7-3 joke program, 7-2 macro virus, 7-3 packer, 7-3 probable virus/malware, 7-2 test virus, 7-3 Trojan horse program, 7-2 types, 7-27-4 VBScript, JavaScript or HTML virus,
7-4
worm, 7-4 virus/malware scan global settings, 7-64 results, 7-82 Virus Cleanup Engine, 6-5 Virus Cleanup Template, 6-5 Virus Encyclopedia, 7-2 Virus Pattern, 6-3, 6-47, 6-48 Virus Scan Driver, 6-4 Virus Scan Engine, 6-3 Vulnerability Scanner, 5-14, 5-37 computer description retrieval, 5-54 DHCP settings, 5-45 effectiveness, 5-37 ping settings, 5-56 product query, 5-50 supported protocols, 5-52
IN-12
Index
W Web Blocking List, 4-8, 4-19 web console, 1-14, 2-22-4 about, 2-2 banner, 2-4 logon account, 2-3 password, 2-3 requirements, 2-2 URL, 2-3 web install page, 5-10, 5-15 webmail, 10-27 web reputation, 1-16, 4-3, 4-4, 5-3, 5-5, 11-4 logs, 18-10 policies, 11-5 web server information, 13-41 web threats, 11-2 widgets, 2-7, 2-10, 2-13, 2-16, 2-17, 2-192-21, 2-23,
2-24, 2-272-29, 15-3
file attributes, 10-11 Windows clipboard, 10-34 Windows Server Core, B-2 available client features, B-6 commands, B-7 supported installation methods, B-2 worm, 7-4
available, 2-10 C&C Callback Events, 2-24 Client Connectivity, 2-13 Client Updates, 2-19 Digital Asset Control - Detections Over Time, 2-23 File Reputation Threat Map, 2-29 OfficeScan and Plug-ins Mashup, 2-20 Outbreaks, 2-17 Security Risk Detections, 2-16 Top Data Loss Prevention Incidents,
2-21
Web Reputation Top Threatened Users, 2-28 Web Reputation Top Threat Sources,
2-27
IN-13