05.08.2013 Views

Configuring Scanning - Trend Micro? Online Help

Configuring Scanning - Trend Micro? Online Help

Configuring Scanning - Trend Micro? Online Help

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 8: Performing Administrative Tasks<br />

Contents<br />

<strong>Configuring</strong> Proxy Settings ............................................................................ 8-2<br />

<strong>Configuring</strong> Notification Settings ................................................................ 8-2<br />

Spam Maintenance .......................................................................................... 8-4<br />

<strong>Configuring</strong> Real-time Scan Settings ............................................................ 8-4<br />

About Access Control .................................................................................... 8-5<br />

Access Control Settings ................................................................................. 8-5<br />

Access Control Permissions ..................................................................... 8-6<br />

<strong>Configuring</strong> Access Control ..................................................................... 8-6<br />

Special Groups ................................................................................................ 8-7<br />

<strong>Configuring</strong> Special Groups ..................................................................... 8-7<br />

<strong>Configuring</strong> Internal Domains ...................................................................... 8-8<br />

Product License ............................................................................................... 8-9<br />

World Virus Tracking Program .................................................................... 8-9<br />

About <strong>Trend</strong> <strong>Micro</strong> Control Manager ....................................................... 8-11<br />

<strong>Configuring</strong> Control Manager Settings ................................................. 8-11<br />

About <strong>Trend</strong> <strong>Micro</strong> Management Communication Protocol ........... 8-12<br />

Using ScanMail with Control Manager ................................................. 8-12<br />

Registering to Control Manager ............................................................. 8-13<br />

<strong>Trend</strong> Support / System Debugger ........................................................... 8-14<br />

Chapter 9: Understanding Security Risks<br />

Understanding the Terms .............................................................................. 9-2<br />

About Internet Security Risks .................................................................. 9-2<br />

Viruses/Malware ........................................................................................ 9-3<br />

Virus/Malware Writers ............................................................................. 9-5<br />

Worms ......................................................................................................... 9-6<br />

Trojan Horse Programs ............................................................................ 9-6<br />

Joke Programs ............................................................................................ 9-7<br />

About Mass-Mailing Attacks .................................................................... 9-7<br />

About Compressed Files ........................................................................... 9-8<br />

Zip of Death ............................................................................................... 9-9<br />

1-vii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!