Trend Micro™ Scanmail™ for IBM Domino™ Administrator's Guide
Total Page:16
File Type:pdf, Size:1020Kb
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release notes, and/or the latest version of the applicable documentation, which are available from the Trend Micro website at: http://docs.trendmicro.com/ © 2019 Trend Micro Incorporated. All Rights Reserved. Trend Micro, the Trend Micro t-ball logo, and ScanMail are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Document Part No. SNEM58574/190117 Release Date: January 2019 Protected by U.S. Patent Nos. 5,951,698 and 5,889,943 i Trend Micro™ ScanMail™ for IBM Domino™ Administrator’s Guide The Administrator’s Guide for ScanMail for IBM Domino introduces the main features of the software and provides installation instructions for your production environment. Read through it before installing or using the software. Please refer to Getting Support for technical support information and contact details. Detailed information about how to use specific features within the software is also available in the Help Database and online Knowledge Base at Trend Micro’s Web site. Trend Micro is always seeking to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro documents, please contact us at [email protected]. Your feedback is always welcome. Please evaluate this documentation on the following site: www.trendmicro.com/download/documentation/rating.asp ii Privacy and Personal Data Collection Disclosure Certain features available in Trend Micro products collect and send feedback regarding product usage and detection information to Trend Micro. Some of this data is considered personal in certain jurisdictions and under certain regulations. If you do not want Trend Micro to collect personal data, you must ensure that you disable the related features. The following link outlines the types of data that ScanMail for IBM Domino collects and provides detailed instructions on how to disable the specific features that feedback the information. https://success.trendmicro.com/data-collection-disclosure Data collected by Trend Micro is subject to the conditions stated in the Trend Micro Privacy Policy: https://www.trendmicro.com/en_us/about/legal/privacy-policy-product.html iii Trend Micro™ ScanMail™ for IBM Domino™ Administrator’s Guide iv Contents Contents Preface What’s New in Version 5.8 ........................................................................ 1-xvii Audience ........................................................................................................ 1-xix Document Conventions .............................................................................. 1-xx Chapter 1: Introducing ScanMail for IBM Domino 5.8 Product Overview ........................................................................................... 1-2 ScanMail for IBM Domino Standard Features ..................................... 1-3 ScanMail for IBM Domino Suite Features ............................................ 1-4 ScanMail for IBM Domino Suite with DLP Features .......................... 1-4 ScanMail for IBM Domino Versions Comparison ............................... 1-4 How ScanMail Works ................................................................................ 1-5 ScanMail Components .............................................................................. 1-6 Types of Scans ................................................................................................. 1-7 Real-time Mail Scanning ........................................................................... 1-7 Real-time Database Scanning ................................................................... 1-8 Manual and Scheduled Database Scanning ............................................ 1-8 Understanding Policies, Rules, and Filters .................................................. 1-9 ScanMail Rules .......................................................................................... 1-11 ScanMail Filters ........................................................................................ 1-11 ScanMail Protection Strategy ...................................................................... 1-12 Planning for a Policy-Based Antivirus and Content Security Protection 1-12 Planning to Implement Rules and Filters in a Policy-Based Environment 1-13 Chapter 2: Installing ScanMail for IBM Domino Planning SMID Deployment ........................................................................ 2-2 Upgrading Domino Server ............................................................................ 2-3 v Trend Micro™ PortalProtect™ 2.0 Installation and Deployment Guide Testing SMID at One Location ....................................................................2-4 Preparing for a Test Deployment ............................................................2-4 Selecting a Pilot Site ...................................................................................2-5 Creating a Rollback Plan ...........................................................................2-5 Deploying and Evaluating SMID .............................................................2-5 Recommended System Requirements ..........................................................2-5 SMID for Microsoft Windows .................................................................2-6 SMID for Linux ..........................................................................................2-8 Installing SMID 5.8 .......................................................................................2-10 Pre-installation Tasks ...............................................................................2-11 Setup Modes ..............................................................................................2-11 Setup Options ...........................................................................................2-12 Running a Wizard-Based Installation ....................................................2-12 Installing SMID for Windows ...........................................................2-12 Installing SMID for Linux .................................................................2-26 Upgrading SMID ...........................................................................................2-39 Important SMID Files to Back Up ........................................................2-39 Running a Wizard-Based Upgrade .........................................................2-40 Upgrading SMID for Windows .........................................................2-41 Upgrading SMID for Linux ...............................................................2-55 Running a Silent Installation ...................................................................2-60 Installing SMID for Windows in Silent Mode ................................2-61 Installing SMID for Linux in Silent Mode ......................................2-62 Starting the Domino Server .........................................................................2-63 SMID and Other Antivirus Products ....................................................2-64 Registering and Activating SMID ...............................................................2-64 SMID Activation Code ............................................................................2-64 Obtaining an SMID Activation Code ...................................................2-65 Activating SMID ..................................................................................2-65 Convert to a Full Version ...................................................................2-65 Renew SMID Maintenance ................................................................2-66 Testing Installation with EICAR ................................................................2-66 Checking SMID Files and Folders .............................................................2-67 vi Contents Chapter 3: Getting Started with SMID Understanding the SMID Interface ............................................................. 3-2 Getting Help While Using ScanMail ............................................................ 3-3 Running a Manual Scan After Installation .................................................. 3-3 Adding ScanMail Database Icons to the Notes Workspace .................... 3-3 Signing ScanMail Databases with a Different ID ...................................... 3-4 Defining Access and Roles to ScanMail Databases ................................... 3-4 Accessing ScanMail Databases ...................................................................... 3-6 Accessing ScanMail Databases Using a Notes Client ........................... 3-7 Accessing ScanMail Databases Using a Web Browser ......................... 3-8 Limitations when Accessing ScanMail Databases Using a Web Browser .................................................................................... 3-9 Set the Internet Password for ScanMail Database Access through a Web Browser .......................................................................... 3-9 Accessing other ScanMail Databases through the Configuration Database .................................................................................... 3-10 Chapter 4: Configuring Scan Tasks Planning for a Policy-based Antivirus and Content Security Protection 4-2 How Policy-based Protection Works