Administrator's Guide
Total Page:16
File Type:pdf, Size:1020Kb
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release notes, and/or the latest version of the applicable documentation, which are available from the Trend Micro website at: http://docs.trendmicro.com/en-us/enterprise/trend-micro-im-security.aspx Trend Micro, the Trend Micro t-ball logo, Control Manager, MacroTrap, and TrendLabs are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright © 2014. Trend Micro Incorporated. All rights reserved. Document Part No.: TIEM16346/140311 Release Date: May 2014 Protected by U.S. Patent No.: Pending This documentation introduces the main features of the product and/or provides installation instructions for a production environment. Read through the documentation before installing or using the product. Detailed information about how to use specific features within the product may be available at the Trend Micro Online Help Center and/or the Trend Micro Knowledge Base. Trend Micro always seeks to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro document, please contact us at [email protected]. Evaluate this documentation on the following site: http://www.trendmicro.com/download/documentation/rating.asp Table of Contents Preface Preface ............................................................................... vii IM Security Documentation ................................................ viii Audience ........................................................................... viii Document Conventions ........................................................ ix Part I: Introducing IM Security and Getting Started Chapter 1: Introducing Trend Micro IM Security IM Security Overview .......................................................... 1-2 Features and Benefits .......................................................... 1-3 File and Instant Messaging Protection .................................. 1-4 Trend Micro Technology in IM Security .............................. 1-11 Protection Strategy ............................................................ 1-16 Chapter 2: Getting Started with IM Security The Product Console ........................................................... 2-2 Server Management ............................................................ 2-4 Product Registration and Activation ..................................... 2-7 About IM Security Updates ................................................ 2-10 About IM Security Accounts ............................................... 2-15 Part II: Configuring Scans and Scan Filters Chapter 3: Configuring Communication Control About Communication Control ............................................ 3-2 i Trend Micro™ IM Security 1.6 Administrator's Guide Enabling Communication Control Rules .............................. 3-2 Configuring a Communication Control Rule ......................... 3-3 Chapter 4: Configuring Virus Scans Virus Scan for File Transfers ............................................... 4-2 Enabling Virus Scan ............................................................ 4-2 Configuring Virus Scan Targets ............................................ 4-2 Configuring Virus Scan Actions ........................................... 4-4 Configuring Virus Scan Notifications ................................... 4-9 Chapter 5: Configuring File Blocking About File Blocking ............................................................ 5-2 Enabling File Blocking and the Default Rule ......................... 5-3 Configuring a File Blocking Rule .......................................... 5-4 Editing a File Blocking Rule ................................................. 5-8 Chapter 6: Configuring Content Filtering About Content Filtering ...................................................... 6-2 Enabling Content Filtering Rules ......................................... 6-2 Configuring a Content Filtering Rule .................................... 6-3 Editing a Content Filtering Rule ......................................... 6-15 Chapter 7: Configuring Web Reputation About Web Reputation Services ........................................... 7-2 Connecting to Smart Protection Servers ............................... 7-2 Enabling Web Reputation .................................................... 7-3 Configuring Web Reputation Targets .................................... 7-4 Configuring Web Reputation Actions ................................... 7-5 Configuring Web Reputation Notifications ........................... 7-6 ii Table of Contents Chapter 8: Configuring Data Loss Prevention About Data Loss Prevention (DLP) ....................................... 8-2 Data Identifier Types .......................................................... 8-3 About Data Loss Prevention Templates ............................... 8-12 About Data Loss Prevention Policies ................................... 8-17 Part III: Managing IM Security Chapter 9: Monitoring IM Security The Summary Screen .......................................................... 9-2 Understanding Real-time Monitor ....................................... 9-3 Alerts ................................................................................. 9-4 About Reports .................................................................... 9-6 About Logs ....................................................................... 9-11 Chapter 10: Performing Administrative Tasks Configuring Proxy Settings ................................................ 10-2 IM Security Directories ..................................................... 10-2 Disclaimer Statements ...................................................... 10-4 Notification Settings .......................................................... 10-6 About Access Control ........................................................ 10-8 Product License .............................................................. 10-11 World Virus Tracking Program ......................................... 10-12 About Trend Micro Control Manager ................................ 10-14 Using the Debug Logs ...................................................... 10-17 Part IV: Getting Help iii Trend Micro™ IM Security 1.6 Administrator's Guide Chapter 11: Understanding Security Risks Understanding the Terms .................................................. 11-2 About Internet Security Risks ............................................ 11-2 About Spyware/Grayware ................................................. 11-12 Chapter 12: Trend Micro IM Security Tools IM Security Server Management Tool ................................. 12-2 Running Tools From a Different Location ........................... 12-4 Chapter 13: Troubleshooting and FAQs Determining the Product Version ....................................... 13-2 Product Activation Issues ................................................... 13-2 Product Console Access Issues ........................................... 13-3 Component Update Issues ................................................. 13-5 Using the Debug Logs ........................................................ 13-6 Alert Issues ....................................................................... 13-7 Report Issues .................................................................... 13-7 Log Issues ........................................................................ 13-9 Notification Issues ............................................................ 13-9 Frequently Asked Questions (FAQ) .................................... 13-10 Chapter 14: Contacting Trend Micro Contacting Technical Support ............................................ 14-2 Speeding Up Your Support Call .......................................... 14-3 Using the Support Portal ................................................... 14-3 Security Information Site .................................................. 14-4 Appendices iv Table of Contents Appendix A: Performance Counters Real-time Scan Performance Counters ................................. A-2 Virus Scan Performance Counters ....................................... A-2 File Blocking Performance Counters ................................... A-3 Content Filtering Performance Counters ............................. A-4 Web Reputation Performance Counters ............................... A-5 Data Loss Prevention Performance Counters ....................... A-6 Directory Service Access Performance Counters .................. A-7 Instant Messaging Hook Module Performance Counters ....... A-9 File Transfer Hook Module Performance Counters ............. A-10 Session Management Performance Counters ...................... A-12 Disclaimer Performance Counters ..................................... A-12 Appendix B: IM Security and Control Manager Logs and Actions Comparison IM Security and Control Manager Logs and Actions .............. B-2 Appendix C: Glossary Index Index ............................................................................... IN-1 v Preface Preface Welcome to Trend Micro™ IM Security. This book contains basic information about the tasks you need to perform to protect your servers. It is intended for novice and advanced users of IM Security who want to manage IM Security. This preface discusses