04.03.2013 Views

OfficeScan 10.6 Administrator's Guide - Trend Micro™ Online Help

OfficeScan 10.6 Administrator's Guide - Trend Micro™ Online Help

OfficeScan 10.6 Administrator's Guide - Trend Micro™ Online Help

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Using the <strong>OfficeScan</strong> Firewall<br />

Certified Safe Software List<br />

The Certified Safe Software List provides a list of applications that can bypass firewall<br />

policy security levels. If the security level is set to Medium or High, <strong>OfficeScan</strong> will still<br />

allow applications to run and access the network.<br />

Enable querying of the global Certified Safe Software List that provides a more<br />

complete list. This is a list dynamically updated by <strong>Trend</strong> Micro.<br />

Note: This feature works with Behavior Monitoring. Ensure that you enable the<br />

Unauthorized Change Prevention Service and Certified Safe Software Service, before<br />

enabling the global Certified Safe Software List.<br />

Scanning for Network Viruses<br />

The <strong>OfficeScan</strong> firewall also examines each packet for network viruses. For details, see<br />

Network Virus on page 6-4.<br />

Customizable Profiles and Policies<br />

The <strong>OfficeScan</strong> firewall gives you the ability to configure policies to block or allow<br />

specified types of network traffic. Assign a policy to one or more profiles, which you can<br />

then deploy to specified <strong>OfficeScan</strong> clients. This provides a highly customized method<br />

of organizing and configuring firewall settings for clients.<br />

Stateful Inspection<br />

The <strong>OfficeScan</strong> firewall is a stateful inspection firewall; it monitors all connections to<br />

the client and remembers all connection states. It can identify specific conditions in any<br />

connection, predict what actions should follow, and detect disruptions in a normal<br />

connection. Therefore, effective use of the firewall not only involves creating profiles<br />

and policies, but also analyzing connections and filtering packets that pass through the<br />

firewall.<br />

11-3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!