Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Similar documents











OfficeScanTM 10 For Enterprise and Medium Business

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.





Document Part No. PPEM27723/ Protected by U.S. Patent No.



Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.



Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.



Copyright 2012 Trend Micro Incorporated. All rights reserved.

TREND MICROTM IM Security


Server Edition USER MANUAL. For Mac OS X

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.


Copyright 2013 Trend Micro Incorporated. All rights reserved.

Desktop & Laptop Edition





OfficeScanTM 10 For Enterprise and Medium Business


Online Backup Client User Manual

for Small and Medium Business Quick Start Guide


Installation Guide. Contents

TREND MICROTM PortalProtectTM1.5

Online Backup Client User Manual

Trend Micro Control Manager 6.0 Service Pack 3 System Requirements






Document Part No. NVEM12103/41110

Silk Performance Manager Installation and Setup Help





Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.



Netwrix Auditor for Active Directory

Copyright 2012 Trend Micro Incorporated. All rights reserved. Protected by U.S. Patent No. 7,516,130 and U.S. Patent No. 7,747,642.

Server Edition USER MANUAL. For Microsoft Windows

SIMATIC. Process Control System PCS 7 Trend Micro OfficeScan (V8.0; V8.0 SP1) Configuration. Using virus scanners 1.


Version 8 Installation Guide: Windows or Mac versions


Client Server Security3

Server Edition. V8 Peregrine User Manual. for Microsoft Windows

TREND MICRO. InterScan VirusWall 6. FTP and POP3 Configuration Guide. Integrated virus and spam protection for your Internet gateway.


Siemens Industrial SIMATIC. Process Control System PCS 7 Configuration Trend Micro OfficeScan Server XG. Security information 1.


Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

BackupVault Desktop & Laptop Edition. USER MANUAL For Microsoft Windows


NETWRIX INACTIVE USER TRACKER

Netwrix Auditor for SQL Server


Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Seqrite Endpoint Security

NTP Software File Auditor for Windows Edition


Core Protection for Virtual Machines 1

Chapter 5: Configuring ServerProtect

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.


Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.


NETWRIX PASSWORD EXPIRATION NOTIFIER


Tivoli Endpoint Manager for Core Protection User's Guide


Dynamic Work Order System (DWOS) Installation Guide

Document Part No. PPEM25975/ Protected by U.S. Patent No. 5,951,698

General System Requirements for Process Safety and Conceptual Engineering Software

Cox Business Online Backup Administrator Guide. Version 2.0

Transcription:

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes, and the latest version of the applicable user documentation, which are available from the Trend Micro Web site at: http://www.trendmicro.com/download Trend Micro, the Trend Micro t-ball logo, OfficeScan, and TrendLabs are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright 2009 Trend Micro Incorporated. All rights reserved. Document Part No.: TSEM14308/90916 Release Date: September 2009

The user documentation for Trend Micro Security for Mac introduces the main features of the software and installation instructions for your production environment. Read through it before installing or using the software. Detailed information about how to use specific features within the software are available in the online help file and the online Knowledge Base at Trend Micro s Web site. Trend Micro always seeks to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro document, please contact us at docs@trendmicro.com. Please evaluate this documentation on the following site: http://www.trendmicro.com/download/documentation/rating.asp

Introduction This document provides a checklist of items to guide you in setting up and configuring Trend Micro Security for Mac. See the Administrator s Guide for detailed information on setup and configuration tasks. Server Installation Before installing the Trend Micro Security server, carefully review the items in this worksheet to speed up the installation of the server and avoid installation issues. TABLE 1-1. Server installation worksheet INSTALLATION ITEM REQUIREMENTS/ RECOMMENDATIONS/NOTES YOUR INFORMATION Computer name or IP address RAM Available disk space -- 512MB minimum, 1GB recommended 1.4GB minimum if the OfficeScan server is installed on the system drive (usually, C: drive) If the OfficeScan server is not installed on the system drive: 600MB minimum on the drive where the OfficeScan server is installed. The Trend Micro Security server will be installed on this drive. 800MB minimum on the system drive. Third-party programs used by Trend Micro Security server (such as Microsoft SQL Server 2005 Express ) will be installed on this drive. 1

TABLE 1-1. Server installation worksheet INSTALLATION ITEM REQUIREMENTS/ RECOMMENDATIONS/NOTES YOUR INFORMATION Other system requirements Microsoft.NET Framework 2.0 Java runtime environment (JRE) 1.6 Update 14 or above on computers running Windows Server 2008 OfficeScan server Version 10.0 or 8.0 Service Pack 1 User name and password used to log on to the OfficeScan server Web console Open the Web console on the computer where the OfficeScan server is installed. Trend Micro Security server will not be installed successfully if you open the console on another computer and run the Trend Micro Security server installation from there. If you are running OfficeScan 10, use any of the following accounts to log on to the console: root account built-in administrator account custom user account with "configure" access to Plug-in Manager Use an account with administrator privileges when logging on to the computer. 2

TABLE 1-1. Server installation worksheet INSTALLATION ITEM REQUIREMENTS/ RECOMMENDATIONS/NOTES YOUR INFORMATION OfficeScan server installation folder Plug-in Manager Update source (Trend Micro ActiveUpdate server or custom update source) Activation Code for an evaluation or full version license Number of seats for the Activation Code The default folder is C:\Program Files\Trend Micro\OfficeScan. Trend Micro Security installation files will be copied to C:\Program Files\Trend Micro\OfficeScan\Addon\ TMSM. You cannot specify a different folder to which to copy the files. Version 1.0 with the latest patch Internet connection is required if the update source is the Trend Micro ActiveUpdate server. Include proxy settings if connecting through a proxy server. The following items are required if the update source is a custom update source: Latest version of OSCE_AOS_COMP_LIST.xml Trend Micro Security installation package Valid Activation Code with 31 alphanumeric characters specified in the following format: XX-XXXX-XXXXX-XXXXX-XXXXX- XXXXX-XXXXX -- 3

Client Installation Before installing the Trend Micro Security client, carefully review the items in this worksheet to speed up the installation of the client and avoid installation issues. TABLE 1-2. Client installation worksheet INSTALLATION ITEM REQUIREMENTS/ RECOMMENDATIONS/NOTES YOUR INFORMATION Computer name or IP address -- Operating system Mac OS X Snow Leopard 10.6 or 10.6.1 Mac OS X version 10.5.5 (Leopard ) or later Mac OS X version 10.4.11 (Tiger ) or later Processor RAM Available disk space PowerPC or Intel core processor 256MB minimum 30MB minimum Others Java for Mac OS X 10.4, Release 9 Java for Mac OS X 10.5, Update 4 Client-server communication settings (configured on the Trend Micro Security server Web console) Trend Micro Security server name or IP address Listening port (the default port is 61617) (Optional) Proxy settings 4

TABLE 1-2. Client installation worksheet INSTALLATION ITEM REQUIREMENTS/ RECOMMENDATIONS/NOTES YOUR INFORMATION Client installation package Launching the installation package Firewall in use in the server computer Personal firewall in Mac OS X To obtain the package, open the Trend Micro Security Server Web console, navigate to Administration > Client Setup Files, and click the link under Client Installation File. The files on the package may become corrupted if users launch the package using archiving tools not built-in on the Mac. Instruct users to launch the package using built-in archiving tools, such as Archive Utility. Users can also launch the package from the command line by using the following command: ditto xk tmsminstall.mpkg.zip <destination folder> The firewall should not block client-server communication through the listening port. If the personal firewall option Set access for specific services and applications is enabled, instruct users to allow connections to icorepluginmgr when prompted by the system. icorepluginmgr is used to register the client to the server. 5

Server Configuration The default settings that ship with this product should be able to provide adequate protection on client computers. Use the information below as an additional reference to enhance security or achieve better performance. Some of the recommendations provided below are the default settings for the product. TABLE 1-3. Server configuration worksheet CONFIGURATION ITEM RECOMMENDATIONS YOUR INFORMATION Manual Scan Settings Scan compressed files CPU usage Action Add compressed files or file extentions you do not want scanned to the scan exclusion list. Low This setting helps minimize computer slowdown when scanning occurs during peak hours. To improve performance, consider running Manual Scan during off-peak hours. Use ActiveAction Real-time Scan Settings Real-time Scan User activity on files Scan files being created/modified and retrieved/executed This option ensures that files introduced to and originating from the computer are safe to access. 6

TABLE 1-3. Server configuration worksheet CONFIGURATION ITEM RECOMMENDATIONS YOUR INFORMATION Scan compressed files Action Display a notification message when a security risk is detected Add compressed files or file extentions you do not want scanned to the scan exclusion list. Use ActiveAction Notifications allow users to take immediate action. Consider disabling only if the notifications are generating a large number of support calls. Scheduled Scan Settings Scheduled Scan Schedule Scan target Scan compressed files Weekly Schedule the scan during off-peak hours to improve the scanning performance and avoid potential computer slowdown. File types scanned by IntelliScan IntelliScan improves performance by only scanning types known to potentially carry malicious code. Using this setting also allows you to utilize true file-type scanning. Add compressed files or file extentions you do not want scanned to the scan exclusion list. 7

TABLE 1-3. Server configuration worksheet CONFIGURATION ITEM RECOMMENDATIONS YOUR INFORMATION CPU usage Action Allow users to postpone or cancel Scheduled Scan Low This setting helps minimize computer slowdown when scanning occurs during peak hours. Use ActiveAction Disabled Users may cancel the scan if this setting is enabled. Consider enabling only on selected computers. For example, enable the option on a shared computer used for presentations. This allows the user to cancel the scan if scanning will occur during a presentation. Scan Exclusion Settings Scan exclusions Database and encrypted files should generally be excluded from scanning to avoid performance and functionality issues. Also add files that are causing false-positives and files that many users are reporting as safe. Web Reputation Settings for External Clients Web Reputation policy Security level This setting ensures that clients are protected from Web-based threats even if they are outside the corporate network. Medium 8

TABLE 1-3. Server configuration worksheet CONFIGURATION ITEM RECOMMENDATIONS YOUR INFORMATION Web Reputation Settings for Internal Clients Web Reputation policy Security level Allow clients to send logs to the Trend Micro Security server Medium or Low if you want to monitor Web sites that users are accessing. This setting generates traffic between the server and clients. Web Reputation Approved URL List Approved URL list Add URLs that you or users think are safe to access. Also access the following page if you think a URL has been misclassified: http://reclassify.wrs.trendmicro.com /wrsonlinequery.aspx Server Updates Update schedule Update source Daily or Hourly Trend Micro ActiveUpdate server Setting up and maintaining a custom update source may be a tedious process and requires additional computing resources. Standard Notifications 9

TABLE 1-3. Server configuration worksheet CONFIGURATION ITEM RECOMMENDATIONS YOUR INFORMATION Criteria Email Send a notification only when the scan action was not performed successfully Select this option to limit the amount of email notifications you receive and focus only on security events that require your attention. Add all Trend Micro Security and OfficeScan administrators in your organization as email recipients. Outbreak Notifications Criteria Use the default settings: Unique sources: 1 Detections: 100 Time period: 24 hours Email Add all Trend Micro Security and OfficeScan administrators in your organization as email recipients. Client-Server Communication Server name and listening port Avoid changing when clients have been registered to the server or clients will have to be re-deployed. 10

TABLE 1-3. Server configuration worksheet CONFIGURATION ITEM RECOMMENDATIONS YOUR INFORMATION Proxy settings Disabled Clients do not typically communicate with the server through an intranet proxy. Also avoid changing when clients have been registered to the server or clients will have to be re-deployed. External Proxy Settings Proxy settings if the Trend Micro Security server connects to the Trend Micro ActiveUpdate server through a proxy server Log Maintenance Scheduled deletion of logs Logs to delete Log deletion schedule Logs older than 7 days Weekly Schedule the deletion during off-peak hours. 11

12