- Page 1: TM InterScan Gateway Security Appli
- Page 5 and 6: Contents Contents About This Manual
- Page 7 and 8: Contents The Online Help System ...
- Page 9 and 10: Contents Chapter 7: FTP Services FT
- Page 11 and 12: Contents Chapter 12: Analyzing Your
- Page 13 and 14: Contents Mass-Mailing Attacks .....
- Page 15 and 16: Appendix D: Removing the Hard Disk
- Page 17 and 18: About This Manual Introduction Welc
- Page 19 and 20: Appendixes Appendix A, Terminology
- Page 21 and 22: Introducing Trend Micro InterScan G
- Page 23 and 24: Important Features and Benefits TAB
- Page 25 and 26: Introducing Trend Micro InterScan G
- Page 27 and 28: Introducing Trend Micro InterScan G
- Page 29 and 30: Introducing Trend Micro InterScan G
- Page 31 and 32: The following table describes each
- Page 33 and 34: FIGURE 1-4. Back panel The followin
- Page 35 and 36: Introducing Trend Micro InterScan G
- Page 37 and 38: Introducing Trend Micro InterScan G
- Page 39 and 40: Deployment Options Chapter 2 This c
- Page 41 and 42: Deployment Options In a basic deplo
- Page 43 and 44: Deployment Options If the appliance
- Page 45 and 46: 219.219.2.19 Server Internet 1 Core
- Page 47 and 48: Deployment Options Advanced Deploym
- Page 49 and 50: Deployment Options When a client in
- Page 51 and 52: Deployment Options Because a DMZ is
- Page 53 and 54:
Deployment Options Failover Deploym
- Page 55 and 56:
Deployment Options Deployment Recom
- Page 57 and 58:
Assigning an IP Address Assign an I
- Page 59 and 60:
Deployment Options 4. On the Confir
- Page 61 and 62:
How InterScan Gateway Security Appl
- Page 63 and 64:
How InterScan Gateway Security Appl
- Page 65 and 66:
How InterScan Gateway Security Appl
- Page 67 and 68:
How InterScan Gateway Security Appl
- Page 69 and 70:
How InterScan Gateway Security Appl
- Page 71 and 72:
How InterScan Gateway Security Appl
- Page 73 and 74:
How InterScan Gateway Security Appl
- Page 75 and 76:
How InterScan Gateway Security Appl
- Page 77 and 78:
How InterScan Gateway Security Appl
- Page 79 and 80:
How InterScan Gateway Security Appl
- Page 81 and 82:
How InterScan Gateway Security Appl
- Page 83 and 84:
Getting Started with InterScan Gate
- Page 85 and 86:
Getting Started with InterScan Gate
- Page 87 and 88:
Outbreak Prevention Service FIGURE
- Page 89 and 90:
Getting Started with InterScan Gate
- Page 91 and 92:
• Spyware/grayware removed • Sp
- Page 93 and 94:
Getting Started with InterScan Gate
- Page 95 and 96:
Getting Started with InterScan Gate
- Page 97 and 98:
Getting Started with InterScan Gate
- Page 99 and 100:
FIGURE 4-12. Online Help - MORE> Sc
- Page 101 and 102:
SMTP Services Chapter 5 This chapte
- Page 103 and 104:
SMTP Services Enabling Scanning of
- Page 105 and 106:
SMTP Scanning - Target FIGURE 5-2.
- Page 107 and 108:
SMTP Scanning - Action FIGURE 5-4.
- Page 109 and 110:
SMTP Scanning - Notification FIGURE
- Page 111 and 112:
SMTP Services Configuring SMTP Anti
- Page 113 and 114:
SMTP Services Note: To determine th
- Page 115 and 116:
SMTP Anti-Spyware - Notification FI
- Page 117 and 118:
SMTP IntelliTrap - Action FIGURE 5-
- Page 119 and 120:
SMTP Services these variables is ac
- Page 121 and 122:
SMTP Services 3. Select one of the
- Page 123 and 124:
SMTP Anti-Spam: Email Reputation -
- Page 125 and 126:
SMTP Anti-Spam: Email Reputation -
- Page 127 and 128:
SMTP Anti-Spam: Content Scanning -
- Page 129 and 130:
SMTP Anti-Spam: Content Scanning -
- Page 131 and 132:
SMTP Anti-Phishing - Target FIGURE
- Page 133 and 134:
SMTP Anti-Phishing - Notification F
- Page 135 and 136:
SMTP Content Filtering - Target FIG
- Page 137 and 138:
SMTP Content Filtering - Action FIG
- Page 139 and 140:
SMTP Services • Recipient 4. Opti
- Page 141 and 142:
HTTP Services Chapter 6 This chapte
- Page 143 and 144:
To select an alternative service po
- Page 145 and 146:
HTTP Services e. If you want to mod
- Page 147 and 148:
HTTP Services 3. Specify files to s
- Page 149 and 150:
HTTP Services TABLE 6-1. Common Int
- Page 151 and 152:
Content-Type: audio/x-ms-wma Accept
- Page 153 and 154:
HTTP Services (See To select HTTP A
- Page 155 and 156:
HTTP Anti-Spyware - Target FIGURE 6
- Page 157 and 158:
HTTP Anti-Spyware - Action FIGURE 6
- Page 159 and 160:
Configuring IntelliTrap for HTTP HT
- Page 161 and 162:
HTTP IntelliTrap - Notification To
- Page 163 and 164:
HTTP Anti-Pharming - Action FIGURE
- Page 165 and 166:
HTTP Services Configuring HTTP Anti
- Page 167 and 168:
HTTP Anti-Phishing - Notification F
- Page 169 and 170:
To configure HTTP - URL Filtering R
- Page 171 and 172:
HTTP URL Filtering - Settings FIGUR
- Page 173 and 174:
HTTP URL Filtering - Notification F
- Page 175 and 176:
HTTP File Blocking - Target To conf
- Page 177 and 178:
HTTP Services Configuring Web Reput
- Page 179 and 180:
HTTP Services You can change the de
- Page 181 and 182:
FTP Services Chapter 7 This chapter
- Page 183 and 184:
FTP Services Selecting an Alternati
- Page 185 and 186:
FTP Services 3. Specify files to sc
- Page 187 and 188:
FTP Services 3. Choose an action fo
- Page 189 and 190:
FIGURE 7-6. FTP > Anti-Spyware - Ta
- Page 191 and 192:
FTP Anti-Spyware - Action FIGURE 7-
- Page 193 and 194:
FTP Services Configuring FTP File B
- Page 195 and 196:
FTP Services 4. Select the Administ
- Page 197 and 198:
POP3 Services Chapter 8 This chapte
- Page 199 and 200:
POP3 Services Selecting an Alternat
- Page 201 and 202:
POP3 Services 3. Specify the files
- Page 203 and 204:
POP3 Services 3. Choose an action f
- Page 205 and 206:
POP3 Services 4. Select all options
- Page 207 and 208:
POP3 Services 4. [Optional] Click t
- Page 209 and 210:
POP3 Services • Remove spyware/gr
- Page 211 and 212:
POP3 Services Configuring POP3 Inte
- Page 213 and 214:
POP3 Services • Remove infected a
- Page 215 and 216:
To configure POP3 Web Reputation -
- Page 217 and 218:
POP3 Services • Administrator - I
- Page 219 and 220:
POP3 Services but there is a greate
- Page 221 and 222:
To configure POP3 Anti-Phishing - T
- Page 223 and 224:
Configuring POP3 Content Filtering
- Page 225 and 226:
POP3 Services 3. Set any of the fol
- Page 227 and 228:
POP3 Services Note: The Delete atta
- Page 229 and 230:
Outbreak Defense Chapter 9 This cha
- Page 231 and 232:
Current Status FIGURE 9-2. Outbreak
- Page 233 and 234:
Configuring Internal Outbreak FIGUR
- Page 235 and 236:
Outbreak Defense spyware. InterScan
- Page 237 and 238:
Outbreak Defense • Disable OPS al
- Page 239 and 240:
Quarantines Chapter 10 This chapter
- Page 241 and 242:
Tip: To avoid exceeding the quarant
- Page 243 and 244:
Querying the Quarantine Folder FIGU
- Page 245 and 246:
To export messages in the list to a
- Page 247 and 248:
Quarantines 4. Find the subject of
- Page 249 and 250:
Automatic FIGURE 10-6. Quarantines
- Page 251 and 252:
Chapter 11 Updating InterScan Gatew
- Page 253 and 254:
Updating Manually FIGURE 11-2. Upda
- Page 255 and 256:
Updating InterScan Gateway Security
- Page 257 and 258:
Updating InterScan Gateway Security
- Page 259 and 260:
Analyzing Your Protection Using Log
- Page 261 and 262:
Querying Logs FIGURE 12-2. Logs > Q
- Page 263 and 264:
Analyzing Your Protection Using Log
- Page 265 and 266:
Manual FIGURE 12-5. Logs > Maintena
- Page 267 and 268:
Analyzing Your Protection Using Log
- Page 269 and 270:
Administrative Functions Chapter 13
- Page 271 and 272:
Access Control FIGURE 13-2. Adminis
- Page 273 and 274:
Administrative Functions 3. Click S
- Page 275 and 276:
Administrative Functions server. Fo
- Page 277 and 278:
Administrative Functions To verify
- Page 279 and 280:
To update the device image through
- Page 281 and 282:
Administrative Functions 4. To use
- Page 283 and 284:
Administrative Functions 4. Enter a
- Page 285 and 286:
TABLE 13-1. Static routes - example
- Page 287 and 288:
Events FIGURE 13-12. Administration
- Page 289 and 290:
Administrative Functions Note: If y
- Page 291 and 292:
To view license renewal instruction
- Page 293 and 294:
To enter a new activation code: Adm
- Page 295 and 296:
Administrative Functions 3. Choose
- Page 297 and 298:
FIGURE 13-21. Administration > Syst
- Page 299 and 300:
Administrative Functions Reboot fro
- Page 301 and 302:
World Virus Tracking FIGURE 13-24.
- Page 303 and 304:
Chapter 14 Technical Support, Troub
- Page 305 and 306:
http://www.trendmicro.com/support h
- Page 307 and 308:
Technical Support, Troubleshooting,
- Page 309 and 310:
Technical Support, Troubleshooting,
- Page 311 and 312:
To backup the device configuration:
- Page 313 and 314:
Technical Support, Troubleshooting,
- Page 315 and 316:
Technical Support, Troubleshooting,
- Page 317 and 318:
Technical Support, Troubleshooting,
- Page 319 and 320:
Technical Support, Troubleshooting,
- Page 321 and 322:
Updating the InterScan Gateway Secu
- Page 323 and 324:
Updating the InterScan Gateway Secu
- Page 325 and 326:
Updating the InterScan Gateway Secu
- Page 327 and 328:
Updating the InterScan Gateway Secu
- Page 329 and 330:
Updating the InterScan Gateway Secu
- Page 331 and 332:
Updating the InterScan Gateway Secu
- Page 333 and 334:
Updating the InterScan Gateway Secu
- Page 335 and 336:
Updating the InterScan Gateway Secu
- Page 337 and 338:
Updating the InterScan Gateway Secu
- Page 339 and 340:
Updating the InterScan Gateway Secu
- Page 341 and 342:
Updating the InterScan Gateway Secu
- Page 343 and 344:
Updating the InterScan Gateway Secu
- Page 345 and 346:
Updating the InterScan Gateway Secu
- Page 347 and 348:
Updating the InterScan Gateway Secu
- Page 349 and 350:
Updating the InterScan Gateway Secu
- Page 351 and 352:
To revert to the previously install
- Page 353 and 354:
To connect the local computer to th
- Page 355 and 356:
Updating the InterScan Gateway Secu
- Page 357 and 358:
Updating the InterScan Gateway Secu
- Page 359 and 360:
Updating the InterScan Gateway Secu
- Page 361 and 362:
Updating the InterScan Gateway Secu
- Page 363 and 364:
Updating the InterScan Gateway Secu
- Page 365 and 366:
Updating the InterScan Gateway Secu
- Page 367 and 368:
Terminology Appendix A Computer sec
- Page 369 and 370:
Terminology Mass-Mailing Attacks Em
- Page 371 and 372:
Terminology cannot be cleaned and T
- Page 373 and 374:
Introducing Trend Micro Control Man
- Page 375 and 376:
FEATURE Description Centralized upd
- Page 377 and 378:
Introducing Trend Micro Control Man
- Page 379 and 380:
Introducing Trend Micro Control Man
- Page 381 and 382:
Introducing Trend Micro Control Man
- Page 383 and 384:
Introducing Trend Micro Control Man
- Page 385 and 386:
Introducing Trend Micro Control Man
- Page 387 and 388:
Introducing Trend Micro Control Man
- Page 389 and 390:
Introducing Trend Micro Control Man
- Page 391 and 392:
Introducing Trend Micro Control Man
- Page 393 and 394:
Introducing Trend Micro Control Man
- Page 395 and 396:
Introducing Trend Micro Control Man
- Page 397 and 398:
Introducing Trend Micro Control Man
- Page 399 and 400:
Introducing Trend Micro Control Man
- Page 401 and 402:
Introducing Trend Micro Control Man
- Page 403 and 404:
Introducing Trend Micro Control Man
- Page 405 and 406:
Introducing Trend Micro Control Man
- Page 407 and 408:
• Virus Cleanup Template • Anti
- Page 409 and 410:
Introducing Trend Micro Control Man
- Page 411 and 412:
3. On the working area, click Add N
- Page 413 and 414:
Introducing Trend Micro Control Man
- Page 415 and 416:
Introducing Trend Micro Control Man
- Page 417 and 418:
Introducing Trend Micro Control Man
- Page 419 and 420:
Introducing Trend Micro Control Man
- Page 421 and 422:
5. Select the report format. 6. Cli
- Page 423 and 424:
3. Click Next > to proceed to the F
- Page 425 and 426:
Introducing Trend Micro Control Man
- Page 427 and 428:
Introducing Trend Micro Control Man
- Page 429 and 430:
Technology Reference This appendix
- Page 431 and 432:
Technology Reference scan one item
- Page 433 and 434:
Technology Reference Enabling or Di
- Page 435 and 436:
FIGURE C-3. HyperTerminal COM Prope
- Page 437 and 438:
To enable or disable LAN bypass and
- Page 439 and 440:
Technology Reference MacroTrap Macr
- Page 441 and 442:
Removing the Hard Disk Appendix D T
- Page 443 and 444:
FIGURE D-2. Releasing the bezel Rem
- Page 445 and 446:
FIGURE D-5. InterScan Gateway Secur
- Page 447 and 448:
System Checklist Appendix E The fol
- Page 449 and 450:
File Formats Supported This appendi
- Page 451 and 452:
TABLE F-1. Supported compression ty
- Page 453 and 454:
TABLE F-2. Blockable file formats (
- Page 455 and 456:
TABLE F-3. Malware naming (Continue
- Page 457 and 458:
Specifications and Environment This
- Page 459 and 460:
Power Requirements and Environment
- Page 461 and 462:
Index A Access Control 13-3, 15-4 e
- Page 463 and 464:
B Back panel 1-13 AC power receptab
- Page 465 and 466:
fig. 2-03. InterScan Gateway Securi
- Page 467 and 468:
fig. 15-37. The appliance Preconfig
- Page 469 and 470:
HTML viruses 3-12 HTTP Anti-pharmin
- Page 471 and 472:
License 13-22, 14-11 update manuall
- Page 473 and 474:
delete message and attachment 8-12
- Page 475 and 476:
Quarantines exporting query results
- Page 477 and 478:
fig. 5-09. SMTP > Anti-spyware - No
- Page 479 and 480:
Viruses defined 3-2 VT100J 15-34 W