Trend Micro Worry-Free Business Security 9.0 SP1 Administrator's
Total Page:16
File Type:pdf, Size:1020Kb
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release notes, and/or the latest version of the applicable documentation, which are available from the Trend Micro website at: http://docs.trendmicro.com/en-us/smb/worry-free-business-security.aspx Trend Micro, the Trend Micro t-ball logo, TrendProtect, TrendSecure, Worry-Free, OfficeScan, ServerProtect, PC-cillin, InterScan, and ScanMail are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright © 2014. Trend Micro Incorporated. All rights reserved. Document Part No.: WFEM96626/140825 Release Date: September 2014 Protected by U.S. Patent No.: 5,951,698 and 7,188,369 This documentation introduces the main features of the product and/or provides installation instructions for a production environment. Read through the documentation before installing or using the product. Detailed information about how to use specific features within the product may be available at the Trend Micro Online Help Center and/or the Trend Micro Knowledge Base. Trend Micro always seeks to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro document, please contact us at [email protected]. Evaluate this documentation on the following site: http://www.trendmicro.com/download/documentation/rating.asp Table of Contents Preface Preface ................................................................................................................. xi Worry-Free Business Security Documentation ........................................... xii Audience ............................................................................................................ xii Document Conventions ................................................................................. xiii Chapter 1: Introducing Worry-Free Business Security Standard and Advanced Overview of Trend Micro Worry-Free Business Security ........................ 1-2 New in this Release (WFBS 9.0 SP1) ........................................................... 1-2 What's New in WFBS 9.0 ................................................................... 1-11 Key Features and Benefits ........................................................................... 1-12 Trend Micro Smart Protection Network .......................................... 1-13 File Reputation Services ...................................................................... 1-13 Web Reputation Services ..................................................................... 1-13 Email Reputation (Advanced only) ................................................... 1-14 Smart Feedback .................................................................................... 1-15 URL Filtering ........................................................................................ 1-16 Benefits of Protection .................................................................................. 1-16 Understanding Threats ................................................................................ 1-17 Viruses and Malware ............................................................................ 1-17 Spyware and Grayware ........................................................................ 1-18 Spam ....................................................................................................... 1-19 Intrusions ............................................................................................... 1-20 Malicious Behavior ............................................................................... 1-20 Fake Access Points ............................................................................... 1-20 Phishing Incidents ................................................................................ 1-20 Mass Mailing Attacks ........................................................................... 1-21 Web Threats .......................................................................................... 1-21 i Worry-Free Business Security 9.0 SP1 Administrator’s Guide Chapter 2: Getting Started The Worry-Free Business Security Network .............................................. 2-2 Security Server ................................................................................................. 2-2 Scan Server .............................................................................................. 2-2 Agents ............................................................................................................... 2-3 Web Console .................................................................................................... 2-4 Opening the Web Console .................................................................... 2-5 Web Console Navigation ....................................................................... 2-7 Web Console Icons .............................................................................. 2-10 Live Status ............................................................................................. 2-11 Chapter 3: Installing Agents Security Agent Installation ............................................................................ 3-2 Security Agent Installation Requirements ........................................... 3-2 Security Agent Installation Considerations ........................................ 3-2 Available Security Agent Features ........................................................ 3-3 Security Agent Installation and IPv6 Support ................................... 3-5 Security Agent Installation Methods ........................................................... 3-7 Installing from the Internal Web Page ................................................ 3-9 Installing with Login Script Setup ..................................................... 3-12 Installing with Client Packager ........................................................... 3-13 Installing with Remote Install ............................................................. 3-17 Installing with Vulnerability Scanner ................................................. 3-20 Installing with Email Notification ..................................................... 3-31 Migrating to the Security Agent ......................................................... 3-32 Performing Post-installation Tasks on Security Agents ................. 3-33 Messaging Security Agent Installation ....................................................... 3-35 Messaging Security Agent Installation Requirements ..................... 3-35 Installing the Messaging Security Agent (Advanced only) ............. 3-35 Removing Agents ......................................................................................... 3-37 Removing Agents from the Web Console ........................................ 3-38 Uninstalling Agents from the Web Console .................................... 3-39 Uninstalling the Security Agent from the Client ............................. 3-40 Using the SA Uninstall Tool ............................................................... 3-40 ii Table of Contents Uninstalling the Messaging Security Agent from the Microsoft Exchange Server (Advanced Only) ................................................... 3-42 Chapter 4: Managing Groups Groups .............................................................................................................. 4-2 Adding Groups ............................................................................................. 4-10 Adding Agents to Groups ........................................................................... 4-11 Moving Agents .............................................................................................. 4-12 Moving Security Agents Between Groups ....................................... 4-13 Moving Agents Between Security Servers Using the Web Console .................................................................................................................. 4-14 Moving a Security Agent Between Security Servers Using Client Mover ..................................................................................................... 4-15 Replicating Settings ...................................................................................... 4-17 Replicating Security Agent Group Settings ...................................... 4-17 Replicating Messaging Security Agent Settings (Advanced only) . 4-18 Importing and Exporting the Settings of Security Agent Groups ....... 4-19 Exporting Settings ................................................................................ 4-21 Importing Settings ................................................................................ 4-22 Chapter 5: Managing Basic Security Settings for Security Agents Summary of Basic Security Settings for Security Agents ......................... 5-2 Scan Methods .................................................................................................. 5-3 Configuring Scan Methods ................................................................... 5-5 Real-time Scan for Security Agents .............................................................. 5-7 Configuring Real-time Scan for Security Agents ............................... 5-7 Firewall ............................................................................................................