04.03.2013 Views

OfficeScan 10.6 Administrator's Guide - Trend Micro™ Online Help

OfficeScan 10.6 Administrator's Guide - Trend Micro™ Online Help

OfficeScan 10.6 Administrator's Guide - Trend Micro™ Online Help

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Installing the <strong>OfficeScan</strong> Client<br />

d. Settings: Select which set of vulnerability scan settings to use.<br />

• Select Use current settings if you have configured and want to use<br />

manual vulnerability scan settings. For details about manual vulnerability<br />

scan settings, see To run a manual vulnerability scan: on page 4-38.<br />

• If you did not specify manual vulnerability scan settings or if you want to<br />

use another set of settings, select Modify settings and then click Settings.<br />

The Settings screen appears.<br />

You can configure the following settings and then click OK:<br />

• Ping settings: Vulnerability Scan can "ping" the IP addresses specified<br />

in step 4b to check if they are currently in use. If a target host machine<br />

is using an IP address, Vulnerability Scanner can determine the host<br />

machine’s operating system. For details, see Ping Settings on page 4-52.<br />

• Method for retrieving computer descriptions: For host machines<br />

that respond to the "ping" command, Vulnerability Scanner can<br />

retrieve additional information about the host machines. For details,<br />

see Method for Retrieving Computer Descriptions on page 4-50.<br />

• Product query: Vulnerability Scanner can check for the presence of<br />

security software on the target host machines. For details, see Product<br />

Query on page 4-46.<br />

• <strong>OfficeScan</strong> server settings: Configure these settings if you want<br />

Vulnerability Scanner to automatically install the client to unprotected<br />

host machines. These settings identify the client’s parent server and the<br />

administrative credentials used to log on to the host machines. For<br />

details, see <strong>OfficeScan</strong> Server Settings on page 4-53.<br />

Note: Certain conditions may prevent the installation of the client to the target<br />

host machines. For details, see <strong>Guide</strong>lines When Installing the <strong>OfficeScan</strong> Client<br />

Using Vulnerability Scanner on page 4-36.<br />

• Notifications: Vulnerability Scanner can send the vulnerability scan<br />

results to <strong>OfficeScan</strong> administrators. It can also display notifications on<br />

unprotected host machines. For details, see Notifications on page 4-50.<br />

• Save results: In addition to sending the vulnerability scan results to<br />

administrators, Vulnerability Scan can also save the results to a .csv file.<br />

For details, see Vulnerability Scan Results on page 4-51.<br />

4-45

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!