Trend Micro™ Serverprotect™ for Linux™ Getting Started Guide
Total Page:16
File Type:pdf, Size:1020Kb
TREND MICROTM ServerProtectTM 2 Stops Viruses from Spreading through Linux Servers for Linux TM Getting Started Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes and the latest version of the Getting Started Guide, which are available from Trend Micro’s Web site at: http://www.trendmicro.com/download/documentation NOTE: A license to the Trend Micro Software usually includes the right to product updates, pattern file updates, and basic technical support for one (1) year from the date of purchase only. Maintenance must be reviewed on an annual basis at Trend Micro’s then-current Maintenance fees. Trend Micro, the Trend Micro t-ball logo, InterScan VirusWall, MacroTrap, ServerProtect, ScriptTrap, and TrendLabs are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. All other brand and product names are trademarks or registered trademarks of their respective companies or organizations. Copyright© 1997-2006 Trend Micro Incorporated. All rights reserved. No part of this publication may be reproduced, photocopied, stored in a retrieval system, or transmitted without the express prior written consent of Trend Micro Incorporated. Document Part No. SPEM22345/50715 Release Date: April 2006 Protected by U.S. Patent No. 5,951,698 The Getting Started Guide for Trend Micro™ ServerProtect™ for Linux™ is intended to introduce the main features of the software and installation instructions for your production environment. You should read through it prior to installing or using the software. For technical support, please refer to chapter 5, Troubleshooting and Contacting Technical Support, for technical support information and contact details. Detailed information about how to use specific features within the software are available in the online help file and online Knowledge Base at Trend Micro’s Web site. Trend Micro is always seeking to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro documents, please contact us at [email protected]. Your feedback is always welcome. Please evaluate this documentation on the following site: http://www.trendmicro.com/download/documentation/rating.asp Contents Contents Chapter 1: Introducing ServerProtect™ for Linux™ Protecting Linux Servers .................................................................... 1-2 Quarantines .................................................................................... 1-2 Platforms, Compression, and Encoding ......................................... 1-2 Password Protected/Encrypted Files ........................................... 1-3 Understanding How ServerProtect for Linux Works ......................... 1-5 Exploring ServerProtect Scanning Technologies .......................... 1-6 Pattern Matching ......................................................................... 1-6 MacroTrap .................................................................................. 1-6 Compressed File Scanning .......................................................... 1-7 ServerProtect for Linux Features ....................................................... 1-8 ServerProtect for Linux Benefits ..................................................... 1-11 What’s New in ServerProtect for Linux .......................................... 1-16 Using the Product Documentation .................................................. 1-19 Chapter 2: Installing ServerProtect for Linux System Requirements ......................................................................... 2-2 Hardware ..................................................................................... 2-2 Software ...................................................................................... 2-2 Supported XWindow Graphical Desktop Environments ............ 2-3 Supported Web Browsers ........................................................... 2-3 Upgrading from Previous Versions .................................................... 2-5 Running the ServerProtect Installation Program ............................... 2-5 Kernel Hook Module ..................................................................... 2-5 License Agreement ........................................................................ 2-6 Setting Up ServerProtect for Use with Control Manager .............. 2-7 Registering ServerProtect to Trend Micro Control Manager ..... 2-7 Entering Proxy Server Information ............................................. 2-8 Activating ServerProtect During Installation ................................ 2-9 i Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide Chapter 2: Installing ServerProtect for Linux—continued Installing Remotely ......................................................................2-10 RemoteInstall Features ..............................................................2-10 Extracting RemoteInstall From the ServerProtect Binary .........2-11 Options Available for Use With the RemoteInstall Tool ..........2-13 Running the RemoteInstall Tool ...............................................2-13 Logging On to the ServerProtect Web Console ...............................2-19 Setting Up an Administrator Password ........................................2-23 Registering ServerProtect .................................................................2-23 Activating ServerProtect ..................................................................2-28 Converting an Evaluation Version to Standard ................................2-29 Verifying the Installation ..................................................................2-30 Removing ServerProtect ...................................................................2-30 Installing a Kernel Hook Module ....................................................2-31 Chapter 3: Getting Started with ServerProtect Testing ServerProtect Installation ......................................................3-2 Accessing ServerProtect Using the Quick Access Console Menus ...3-2 Starting and Stopping ServerProtect ..................................................3-5 Starting ServerProtect ....................................................................3-5 Stopping ServerProtect ...................................................................3-6 Configuring Start-Up Settings ........................................................3-7 Using the ServerProtect Web Console .............................................3-10 Things to Remember About the ServerProtect Web Console ......3-11 Updating the Scan Engine and the Virus Pattern File ......................3-12 Configuring a Manual Update .....................................................3-13 Specifying a Download Source .................................................3-14 Configuring Scheduled Updates ..................................................3-16 Chapter 4: Configuring and Performing Scans with ServerProtect Configuring Scanning Options ...........................................................4-2 Kernel Dependent and Independent Modes ...................................4-2 Understanding Scanning Options ...................................................4-3 Understanding Virus Actions .........................................................4-4 Specifying Files to Scan .................................................................4-6 Scanning Compressed Files ...........................................................4-8 ii Contents Chapter 4: Configuring and Performing Scans with ServerProtect—continued Configuring Real-Time Scanning .................................................. 4-9 Enabling Real-Time Scanning .................................................... 4-9 Real-Time Scan Options ........................................................... 4-10 Setting Scan Target ................................................................... 4-11 Invoking Manual Scan (Scan Now) ............................................. 4-12 Manual Scan Options ................................................................ 4-14 Configuring a Scheduled Scan ..................................................... 4-15 Enabling Scheduled Scan .......................................................... 4-15 Invoking Scheduled Scan .......................................................... 4-15 Stopping a Scheduled Scan ....................................................... 4-16 Scheduled Scan Options ........................................................... 4-16 Scan Frequency for Scheduled Scans ....................................... 4-17 Exclusion List .............................................................................. 4-18 Viewing Scan Results (Logs) ........................................................... 4-18 Using the Scan Now Complete Window ..................................... 4-18 Viewing Scan, Virus, and System Logs ...................................... 4-19 Specifying the Log Directory Location .................................... 4-20 Specifying the Quarantine Directory Location ............................ 4-24 Specifying the Backup Directory Location ................................. 4-24 Configuring Notifications ................................................................ 4-25 Setting Alert Events ....................................................................