05.08.2013 Views

OfficeScan 10 Administrator's Guide - Online Help Home - Trend Micro

OfficeScan 10 Administrator's Guide - Online Help Home - Trend Micro

OfficeScan 10 Administrator's Guide - Online Help Home - Trend Micro

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Contents<br />

Security Risk Logs ......................................................................................... 5-48<br />

Virus/Malware Logs ................................................................................ 5-48<br />

Spyware/Grayware Logs ........................................................................ 5-54<br />

Spyware/Grayware Restore Logs .......................................................... 5-56<br />

Outbreak Protection ..................................................................................... 5-57<br />

Outbreak Criteria and Notifications ..................................................... 5-57<br />

Outbreak Prevention ............................................................................... 5-60<br />

Outbreak Prevention Policies ................................................................ 5-61<br />

Limit/Deny Access to Shared Folders ............................................ 5-61<br />

Block Ports ........................................................................................... 5-62<br />

Deny Write Access to Files and Folders ......................................... 5-63<br />

Disabling Outbreak Prevention ............................................................. 5-64<br />

Behavior Monitoring .................................................................................... 5-65<br />

Behavior Monitoring Logs ..................................................................... 5-70<br />

Blocked Program Notifications for Client Users ................................ 5-72<br />

Device Control .............................................................................................. 5-73<br />

Device Control Logs ............................................................................... 5-75<br />

Chapter 6: Protecting Computers from Web-based Threats<br />

About Web Threats ........................................................................................ 6-2<br />

Web Reputation .............................................................................................. 6-2<br />

Location Awareness ....................................................................................... 6-3<br />

Web Reputation Policies ................................................................................ 6-3<br />

Approved URLs .............................................................................................. 6-5<br />

Proxy for Web Reputation ............................................................................ 6-5<br />

Web Threat Notifications for Client Users ................................................. 6-6<br />

Web Reputation Logs ..................................................................................... 6-7<br />

Chapter 7: Using the <strong>OfficeScan</strong> Firewall<br />

About the <strong>OfficeScan</strong> Firewall ..................................................................... 7-2<br />

Firewall Policies and Profiles ........................................................................ 7-4<br />

v

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!