04.03.2013 Views

OfficeScan 10.6 Administrator's Guide - Trend Micro™ Online Help

OfficeScan 10.6 Administrator's Guide - Trend Micro™ Online Help

OfficeScan 10.6 Administrator's Guide - Trend Micro™ Online Help

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Trend</strong> Micro <strong>OfficeScan</strong> <strong>10.6</strong> Administrator’s <strong>Guide</strong><br />

SCV Editor 16-2<br />

Security Compliance 13-53<br />

components 13-56<br />

enforcing 13-66<br />

enforcing update 5-45<br />

installation 4-30<br />

logs 17-9<br />

outside server management 2-26, 13-65<br />

scan 13-58<br />

scheduled assessments 13-64<br />

services 13-55<br />

settings 13-59<br />

Security Information Center 17-26<br />

security patches 5-8<br />

security posture 15-4<br />

security risks<br />

phish attacks C-7<br />

protection from 1-6<br />

spyware and grayware 6-4<br />

virus/malware 6-2<br />

server logs<br />

Active Directory logs 17-6<br />

Apache server logs 17-8<br />

client grouping logs 17-7<br />

Client Packager logs 17-9<br />

component update logs 17-8<br />

Control Manager MCP Agent logs 17-12<br />

debug logs 17-4<br />

Device Control logs 17-10<br />

local installation/upgrade logs 17-6<br />

outside server management logs 17-10<br />

remote installation/upgrade logs 17-6<br />

role-based administration logs 17-7<br />

Security Compliance logs 17-9<br />

ServerProtect Migration Tool debug logs<br />

17-11<br />

Virtual Desktop Support logs 17-15<br />

IN-8<br />

Virus Scan Engine debug logs 17-13<br />

VSEncrypt debug logs 17-11<br />

web reputation logs 17-10<br />

Server Tuner 12-41<br />

server update<br />

component duplication 5-17<br />

logs 5-23<br />

manual update 5-22<br />

proxy settings 5-16<br />

scheduled update 5-22<br />

update methods 5-21<br />

ServerProtect 4-55<br />

service restart 13-11<br />

Smart Feedback 3-3, 3-5<br />

smart protection 3-2<br />

environment 3-13<br />

pattern files 3-8<br />

Smart Protection Network 1-2, 3-5–3-6<br />

Smart Protection Server 3-7, 5-23<br />

integrated 3-7<br />

standalone 3-7<br />

update 3-15, 5-12, 5-23<br />

smart protection sources 3-19<br />

comparison 3-7<br />

protocols 3-8<br />

smart scan 1-6, 5-3, 6-8<br />

Smart Scan Agent Pattern 3-8, 5-3<br />

Smart Scan Pattern 3-9, 5-3<br />

sort clients 2-50<br />

spyware 6-4<br />

Spyware Active-monitoring Pattern 5-6<br />

Spyware Pattern 5-6<br />

Spyware Scan Engine 5-6<br />

spyware/grayware<br />

guarding against 6-7<br />

potential threats 6-5<br />

restoring 6-48

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!