- Page 1: TM TREND MICRO TM ScanMail TM for M
- Page 6 and 7: Contents Preface ScanMail Documenta
- Page 8 and 9: Updating ScanMail .................
- Page 10 and 11: Configure ScanMail for Microsoft Ex
- Page 12 and 13: Preface Preface Welcome to the Tren
- Page 14 and 15: About This Getting Started Guide Th
- Page 16 and 17: Chapter 1 Introducing Trend Micro S
- Page 18 and 19: Introducing Trend Micro ScanMail fo
- Page 20 and 21: Introducing Trend Micro ScanMail fo
- Page 22 and 23: Version Comparison Introducing Tren
- Page 24 and 25: ScanMail Technology Introducing Tre
- Page 26 and 27: Pattern file numbering Introducing
- Page 28 and 29: Trend Micro IntelliScan Introducing
- Page 30 and 31: Chapter 2 Installing and Removing S
- Page 32 and 33: Java software Java 2 Runtime Enviro
- Page 34 and 35: Before you Begin Installing and Rem
- Page 36 and 37: Installing and Removing ScanMail fa
- Page 38 and 39: Server Role Recommendation Front-en
- Page 40 and 41: Mailbox server: Located within the
- Page 42 and 43: Exchange Version Exchange Server 20
- Page 44 and 45: Exchange Version Exchange 2000 Serv
- Page 46 and 47: Performing a Fresh Install Installi
- Page 48 and 49: Upgrade effect on configurations an
- Page 50 and 51: FIGURE 2-1. Welcome screen Installi
- Page 52 and 53: 4. Select one of the following acti
- Page 54 and 55:
Installing and Removing ScanMail b.
- Page 56 and 57:
Installing and Removing ScanMail 8.
- Page 58 and 59:
10. Select one of following for Sca
- Page 60 and 61:
Installing and Removing ScanMail 12
- Page 62 and 63:
Installing and Removing ScanMail 14
- Page 64 and 65:
Installing and Removing ScanMail 16
- Page 66 and 67:
FIGURE 2-17. Web Management Console
- Page 68 and 69:
Installing and Removing ScanMail 18
- Page 70 and 71:
Installing and Removing ScanMail In
- Page 72 and 73:
4. Select one of the following acti
- Page 74 and 75:
Installing and Removing ScanMail b.
- Page 76 and 77:
Installing and Removing ScanMail 8.
- Page 78 and 79:
10. Select one of following for Sca
- Page 80 and 81:
Installing and Removing ScanMail 12
- Page 82 and 83:
Installing and Removing ScanMail 14
- Page 84 and 85:
Installing and Removing ScanMail 16
- Page 86 and 87:
Installing and Removing ScanMail 18
- Page 88 and 89:
Installing and Removing ScanMail 3.
- Page 90 and 91:
Installing and Removing ScanMail 5.
- Page 92 and 93:
Installing and Removing ScanMail 7.
- Page 94 and 95:
Installing and Removing ScanMail 9.
- Page 96 and 97:
Installing and Removing ScanMail 11
- Page 98 and 99:
Installing and Removing ScanMail 13
- Page 100 and 101:
Installing and Removing ScanMail 15
- Page 102 and 103:
Installing and Removing ScanMail 17
- Page 104 and 105:
Installing and Removing ScanMail No
- Page 106 and 107:
Silent Installation This version of
- Page 108 and 109:
Performing Silent Installation Inst
- Page 110 and 111:
Installing and Removing ScanMail Re
- Page 112 and 113:
Installing and Removing ScanMail 4.
- Page 114 and 115:
Installing and Removing ScanMail 6.
- Page 116 and 117:
Installing and Removing ScanMail 8.
- Page 118 and 119:
Installing and Removing ScanMail 10
- Page 120 and 121:
Installing and Removing ScanMail 12
- Page 122 and 123:
Installing and Removing ScanMail Mi
- Page 124 and 125:
Chapter 3 Registering, Activating,
- Page 126 and 127:
Activating ScanMail The following c
- Page 128 and 129:
Suite Activation Code Registering,
- Page 130 and 131:
Virus pattern Additional threat pat
- Page 132 and 133:
Manually Updating Your Components R
- Page 134 and 135:
Download Source Registering, Activa
- Page 136 and 137:
Rolling Back a Component Update Reg
- Page 138 and 139:
Managing ScanMail Servers Chapter 4
- Page 140 and 141:
Product Console Elements Banner Man
- Page 142 and 143:
Managing ScanMail Servers Configura
- Page 144 and 145:
Managing ScanMail Servers Each node
- Page 146 and 147:
Understanding the Server Management
- Page 148 and 149:
Managing ScanMail Servers Directory
- Page 150 and 151:
Managing ScanMail Servers Manually
- Page 152 and 153:
Allow from all iv. When using SSL,
- Page 154 and 155:
Chapter 5 Establishing and Maintain
- Page 156 and 157:
Establishing and Maintaining Securi
- Page 158 and 159:
Managing Outbreak Situations Establ
- Page 160 and 161:
Getting Support and Contacting Tren
- Page 162 and 163:
Before Contacting Technical Support
- Page 164 and 165:
Getting Support and Contacting Tren
- Page 166 and 167:
Understanding Threats to an Exchang
- Page 168 and 169:
Understanding Threats to an Exchang
- Page 170 and 171:
About Mass-Mailing Attacks Understa
- Page 172 and 173:
Understanding Threats to an Exchang
- Page 174 and 175:
Understanding Threats to an Exchang
- Page 176 and 177:
Windows Event Log Codes Appendix A
- Page 178 and 179:
Event ID Facility Type/ Severity Wi
- Page 180 and 181:
Pre-configured Files Appendix B Pre
- Page 182 and 183:
Section Contents EUQ ActivateEUQ=0
- Page 184 and 185:
Introducing Trend Micro Control Man
- Page 186 and 187:
FEATURE DESCRIPTION Centralized upd
- Page 188 and 189:
Introducing Trend Micro Control Man
- Page 190 and 191:
Introducing Trend Micro Control Man
- Page 192 and 193:
Introducing Trend Micro Control Man
- Page 194 and 195:
Introducing Trend Micro Control Man
- Page 196 and 197:
Introducing Trend Micro Control Man
- Page 198 and 199:
Introducing Trend Micro Control Man
- Page 200 and 201:
Introducing Trend Micro Control Man
- Page 202 and 203:
Introducing Trend Micro Control Man
- Page 204 and 205:
Introducing Trend Micro Control Man
- Page 206 and 207:
Introducing Trend Micro Control Man
- Page 208 and 209:
Introducing Trend Micro Control Man
- Page 210 and 211:
Introducing Trend Micro Control Man
- Page 212 and 213:
Introducing Trend Micro Control Man
- Page 214 and 215:
Introducing Trend Micro Control Man
- Page 216 and 217:
Introducing Trend Micro Control Man
- Page 218 and 219:
Step 4: Configure the download sett
- Page 220 and 221:
4. Click Save. Understanding Schedu
- Page 222 and 223:
Introducing Trend Micro Control Man
- Page 224 and 225:
Introducing Trend Micro Control Man
- Page 226 and 227:
Introducing Trend Micro Control Man
- Page 228 and 229:
To access Global Reports: 1. Click
- Page 230 and 231:
To create local or global report pr
- Page 232 and 233:
Introducing Trend Micro Control Man
- Page 234 and 235:
4. Click Next > to proceed to the R
- Page 236 and 237:
Enable Scheduled Report Profiles In
- Page 238 and 239:
Glossary of Terms The following is
- Page 240 and 241:
End-User License Agreement (EULA) E
- Page 242 and 243:
Term Description Notification A mes
- Page 244 and 245:
Glossary of Terms Telnet Telnet is
- Page 246 and 247:
Index A account privileges, require
- Page 248 and 249:
egistering ScanMail, methods 3-2 Re