Endpoint Security Platform Console
Total Page:16
File Type:pdf, Size:1020Kb
Trend Micro® Endpoint Security Platform Console Operator's Guide Version 8.0 August 2010 Trend Micro Endpoint Security Platform Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes, and the latest version of the applicable user documentation. Trend Micro, the Trend Micro t-ball logo, OfficeScan, Control Manager, Damage Cleanup Services, eManager, InterScan, Network VirusWall, ScanMail, ServerProtect, and TrendLabs are service marks, trademarks or registered trademarks of Trend Micro, Incorporated. BigFix® , Fixlet® and "Fix it before it fails"® are registered trademarks of BigFix, Inc. iprevention, Powered by BigFix, Relevance Engine, and related BigFix logos are trademarks of BigFix, Inc. All other product or company names may be trademarks or registered trademarks of their respective owners. Copyright © 2010 Trend Micro Incorporated. All rights reserved. Document Part No. APEM74056/90320 Release Date: ?? 2010 Protected by U.S. Patent Nos: 5,623,600; 5,889,943; 5,951,698; 6.119,165 Administrator's Guide ii © 2010 BigFix, Inc. Trend Micro Endpoint Security Platform The user documentation for Trend Micro Endpoint Security Platform introduces the main features of the software and installation instructions for your production environment. Read through it before installing or using the software. Detailed information about how to use specific features within the software are available in the online help file and the online Knowledge Base at Trend Micro’s Web site. Trend Micro always seeks to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro document, please contact us at [email protected]. Please evaluate this documentation on the following site: http://www.trendmicro.com/download/documentation/rating.asp Administrator's Guide iii © 2010 BigFix, Inc. Trend Micro Endpoint Security Platform Contents CONTENTS Part One ................................................................................................................................................................................................. 1 Introduction ................................................................................... 1 Audience ................................................................................................................................. 1 System Requirements .......................................................................................................... 1 Part Two ................................................................................................................................................................................................ 3 Using the Application .................................................................. 3 Overview of the BigFix Enterprise Suite........................................................................3 A Typical Installation ........................................................................................................3 Getting Started .................................................................................................................. 2 Introducing the BigFix Console .......................................................................................3 Operating Basics.............................................................................................................. 6 Fixlets and Tasks ................................................................................................................. 8 Introducing Fixlets and Tasks ........................................................................................ 8 Viewing Fixlets and Tasks .............................................................................................. 9 Monitoring Fixlets and Tasks ........................................................................................ 10 Commenting on Fixlets and Tasks ................................................................................ 11 Creating or Customizing Fixlets and Tasks ................................................................ 12 Hiding Fixlets and Tasks ............................................................................................... 16 Viewing Relevance Expressions .................................................................................. 19 Introducing Relevance .................................................................................................. 20 Sites ...................................................................................................................................... 22 Introducing Sites ............................................................................................................. 22 Selecting Sites................................................................................................................. 22 Viewing Site Properties .................................................................................................. 22 Restricting Computers ................................................................................................... 23 Restricting Readers ........................................................................................................24 Creating Custom Sites ................................................................................................... 25 Canceling a Subscription .............................................................................................. 28 Domains ............................................................................................................................... 28 Introducing Domains ..................................................................................................... 28 Domain Sites ................................................................................................................... 31 Selecting Domains ......................................................................................................... 34 Navigating Domains ....................................................................................................... 35 Minimizing the Domain Panel ...................................................................................... 39 Deleting Domains .......................................................................................................... 40 Actions .................................................................................................................................. 41 Introducing Actions ......................................................................................................... 41 Viewing Actions ...............................................................................................................42 Deploying the Action ..................................................................................................... 43 Monitoring Actions ......................................................................................................... 46 Stopping an Action ........................................................................................................ 48 Administrator's Guide iv © 2010 BigFix, Inc. Trend Micro Endpoint Security Platform Restarting an Action ...................................................................................................... 48 Commenting on Actions ................................................................................................ 49 Default Actions ............................................................................................................... 50 Custom Actions .............................................................................................................. 50 Making an Offer............................................................................................................... 52 Client Computers................................................................................................................. 53 Introducing Client Computers ....................................................................................... 53 Monitoring Computer Status ......................................................................................... 53 Grouping Computers ...................................................................................................... 55 Commenting on Computers ......................................................................................... 56 Creating Retrieved Properties ..................................................................................... 56 Creating Client Dashboards .......................................................................................... 57 Locking Computers........................................................................................................ 60 Removing Computers .................................................................................................... 61 Computer Groups ............................................................................................................... 62 Introducing Computer Groups ..................................................................................... 62 Creating Manual Computer Groups ............................................................................ 62 Creating Automatic Computer Groups ......................................................................