05.08.2013 Views

OfficeScan 10 Administrator's Guide - Online Help Home - Trend Micro

OfficeScan 10 Administrator's Guide - Online Help Home - Trend Micro

OfficeScan 10 Administrator's Guide - Online Help Home - Trend Micro

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Trend</strong> <strong>Micro</strong> <strong>OfficeScan</strong> <strong>10</strong> Service Pack 1 Administrator’s <strong>Guide</strong><br />

5-70<br />

To modify the content of the notification message:<br />

PATH: NOTIFICATIONS > CLIENT USER NOTIFICATIONS<br />

1. Click the Behavior Monitoring Policy Violation tab.<br />

2. Modify the default messages in the text box provided.<br />

3. Click Save.<br />

Behavior Monitoring Logs<br />

Clients log unauthorized program access instances and send the logs to the server. A<br />

client that runs continuously aggregates the logs and sends them every 60 minutes, by<br />

default.<br />

To keep the size of logs from occupying too much space on the hard disk, manually<br />

delete logs or configure a log deletion schedule. For more information about managing<br />

logs, see Managing Logs on page 8-16.<br />

To view behavior monitoring logs:<br />

PATH: LOGS > NETWORKED COMPUTER LOGS > SECURITY RISKS > VIEW LOGS > BEHAVIOR<br />

MONITORING LOGS<br />

NETWORKED COMPUTERS > CLIENT MANAGEMENT > LOGS > BEHAVIOR MONITORING<br />

LOGS<br />

1. Specify log criteria and click Display Logs.<br />

2. View logs. Logs contain the following information:<br />

• Date/Time unauthorized process was detected<br />

• Computer where unauthorized process was detected<br />

• Event monitoring rule violated by the process<br />

• <strong>OfficeScan</strong> action performed when violation was detected<br />

• Type of object accessed by the program<br />

• Risk level of the unauthorized program<br />

• Program, which is the unauthorized program<br />

• Operation, action performed by the unauthorized program<br />

• Target, which is the process that was accessed<br />

• Policy name of the event monitoring rule

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!