04.03.2013 Views

OfficeScan 10.6 Administrator's Guide - Trend Micro™ Online Help

OfficeScan 10.6 Administrator's Guide - Trend Micro™ Online Help

OfficeScan 10.6 Administrator's Guide - Trend Micro™ Online Help

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Trend</strong> Micro <strong>OfficeScan</strong> <strong>10.6</strong> Administrator’s <strong>Guide</strong><br />

vi<br />

Spyware/Grayware Restore Logs ..........................................................6-88<br />

Scan Logs ...................................................................................................6-89<br />

Security Risk Outbreaks ...............................................................................6-90<br />

Security Risk Outbreak Criteria and Notifications ..............................6-90<br />

Preventing Security Risk Outbreaks ......................................................6-94<br />

Outbreak Prevention Policies .................................................................6-95<br />

Limit/Deny Access to Shared Folders .............................................6-95<br />

Block Ports ...........................................................................................6-96<br />

Deny Write Access to Files and Folders ..........................................6-98<br />

Disabling Outbreak Prevention .............................................................6-99<br />

Chapter 7: Using Behavior Monitoring<br />

Behavior Monitoring .......................................................................................7-2<br />

Behavior Monitoring Privileges .....................................................................7-9<br />

Behavior Monitoring Notifications for Client Users ...............................7-10<br />

Behavior Monitoring Logs ...........................................................................7-11<br />

Chapter 8: Using Device Control<br />

Device Control ................................................................................................8-2<br />

Device Control Notifications ......................................................................8-16<br />

Device Control Logs .....................................................................................8-17<br />

Chapter 9: Managing Data Protection and Using Digital<br />

Asset Control<br />

Data Protection Installation ...........................................................................9-2<br />

Data Protection License .................................................................................9-4<br />

Deploying Data Protection to Clients ..........................................................9-6<br />

About Digital Asset Control ..........................................................................9-9<br />

Digital Asset Control Policies ......................................................................9-10<br />

Digital Asset Definitions .........................................................................9-11<br />

Expressions ..........................................................................................9-12

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!