04.03.2013 Views

OfficeScan 10.6 Administrator's Guide - Trend Micro™ Online Help

OfficeScan 10.6 Administrator's Guide - Trend Micro™ Online Help

OfficeScan 10.6 Administrator's Guide - Trend Micro™ Online Help

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Contents<br />

Component Update Summary .................................................................... 5-56<br />

Chapter 6: Scanning for Security Risks<br />

About Security Risks ...................................................................................... 6-2<br />

Viruses and Malware .................................................................................. 6-2<br />

Spyware and Grayware .............................................................................. 6-4<br />

How Spyware/Grayware Gets into a Network ................................ 6-5<br />

Potential Risks and Threats ................................................................. 6-5<br />

Guarding Against Spyware/Grayware ............................................... 6-7<br />

Scan Methods .................................................................................................. 6-8<br />

Scan Types ..................................................................................................... 6-14<br />

Real-time Scan .......................................................................................... 6-15<br />

Manual Scan .............................................................................................. 6-18<br />

Scheduled Scan ......................................................................................... 6-20<br />

Scan Now .................................................................................................. 6-22<br />

Initiating Scan Now ............................................................................ 6-24<br />

Settings Common to All Scan Types ......................................................... 6-26<br />

Scan Criteria .............................................................................................. 6-26<br />

Scan Exclusions ........................................................................................ 6-29<br />

Scan Actions ............................................................................................. 6-34<br />

Virus/Malware Scan Actions ............................................................ 6-34<br />

Spyware/Grayware Scan Actions ..................................................... 6-45<br />

Scan Privileges and Other Settings ............................................................. 6-49<br />

Scan Type Privileges ................................................................................ 6-49<br />

Scheduled Scan Privileges and Other Settings .................................... 6-51<br />

Mail Scan Privileges and Other Settings ............................................... 6-55<br />

Cache Settings for Scans ......................................................................... 6-58<br />

Global Scan Settings ..................................................................................... 6-62<br />

Security Risk Notifications .......................................................................... 6-72<br />

Security Risk Notifications for Administrators ................................... 6-72<br />

Security Risk Notifications for Client Users ........................................ 6-76<br />

Security Risk Logs ......................................................................................... 6-79<br />

Virus/Malware Logs ................................................................................ 6-79<br />

Spyware/Grayware Logs ........................................................................ 6-86<br />

v

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!