05.08.2013 Views

OfficeScan 10 Administrator's Guide - Online Help Home - Trend Micro

OfficeScan 10 Administrator's Guide - Online Help Home - Trend Micro

OfficeScan 10 Administrator's Guide - Online Help Home - Trend Micro

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Index<br />

A<br />

Access Control Server (ACS) <strong>10</strong>-3<br />

ACS certificate <strong>10</strong>-17<br />

Active Directory 1-3, 2-22, 3-19, 3-30, 8-9<br />

query results 2-24<br />

scheduled query 2-27<br />

scope and query 2-23<br />

ActiveAction 5-32<br />

adware 5-4<br />

approved list 5-41<br />

Approved programs 5-68<br />

approved URLs 6-5<br />

assessment mode 9-23<br />

Authentication, Authorization, and Accounting<br />

(AAA) <strong>10</strong>-5<br />

AutoPcc.exe 3-18, 3-22–3-23<br />

AutoRun 5-73<br />

B<br />

Behavior Monitoring 1-4<br />

approved programs 5-68<br />

blocked programs 5-69<br />

Certified Safe Software Service 5-69<br />

Digital Signature Pattern 4-7<br />

event monitoring 5-65<br />

event monitoring rules 5-66<br />

exceptions 5-68<br />

global settings 9-25<br />

logs 5-70<br />

malware behavior blocking 5-65<br />

notifications 5-65<br />

Policy Enforcement Pattern 4-7<br />

settings 5-65<br />

Blocked programs 5-69<br />

C<br />

CA certificate <strong>10</strong>-17, <strong>10</strong>-19<br />

Case Diagnostic Tool 12-2<br />

Certificate Authority (CA) <strong>10</strong>-5<br />

certificates <strong>10</strong>-17<br />

CA <strong>10</strong>-19<br />

SSL <strong>10</strong>-33<br />

Certified Safe Software Service 5-69<br />

Check Point SecureClient 3-30<br />

Cisco NAC<br />

about <strong>10</strong>-1<br />

architecture <strong>10</strong>-6<br />

components and terms <strong>10</strong>-2<br />

policy server deployment <strong>10</strong>-23<br />

Cisco Trust Agent 1-7, 4-8, <strong>10</strong>-2<br />

client console<br />

access restriction 9-17<br />

client disk image 3-19, 3-36<br />

client installation<br />

browser-based 3-22<br />

from the Web console 3-34<br />

from the Web install page 3-20<br />

post-installation 3-55<br />

system requirements 3-2<br />

using client disk image 3-36<br />

using Client Packager 3-25<br />

using Login Setup Script 3-22<br />

using Security Compliance 2-26<br />

using Vulnerability Scanner 3-37<br />

client logs<br />

client connection log 12-11<br />

client update log 12-11<br />

DCS debug log 12-<strong>10</strong><br />

debug log 12-9<br />

IN-1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!