i-i i-ii Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes and the latest version of the Installation Guide, which are available from Trend Micro’s Web site at: http://www.trendmicro.com/download/documentation/ Trend Micro, the Trend Micro t-ball logo, InterScan, TrendLabs, Trend Micro Control Manager, and Trend Micro Damage Cleanup Services are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright© 2011 Trend Micro Incorporated. All rights reserved. No part of this publication may be reproduced, photocopied, stored in a retrieval system, or transmitted without the express prior written consent of Trend Micro Incorporated. Release Date: January 2011 Protected by U.S. Patent No. 5,951,698 The Administrator’s Guide for Trend Micro is intended to provide in-depth information about the main features of the software. You should read through it prior to installing or using the software. For technical support, please refer to the Technical Support and Troubleshooting chapter for information and contact details. Detailed information about how to use specific features within the software are available in the online help file and online Knowledge Base at Trend Micro’s Web site. Trend Micro is always seeking to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro documents, please contact us at [email protected]. Your feedback is always welcome. Please evaluate this documentation on the following site: http://www.trendmicro.com/download/documentation/rating.asp ii Contents Preface IWSVA Documentation ................................................................................xxii Audience ..........................................................................................................xxiii Document Conventions ...............................................................................xxiii About Trend Micro .......................................................................................xxiv Chapter 1: Introducing Trend Micro™ InterScan™ Web Security Virtual Appliance Web Traffic Security Risk Overview ........................................................... 1-2 Smart Search Support ................................................................................ 1-3 Hardware Specifications ................................................................................ 1-4 Compatible Directory Servers .................................................................. 1-5 Integration with ICAP 1.0-compliant Caching Devices ...................... 1-5 X-Authenticated ICAP Headers Support .......................................... 1-5 What’s New .................................................................................................... 1-6 High Availability ......................................................................................... 1-6 Cluster Management .................................................................................. 1-6 Hardware Event Monitoring .................................................................... 1-6 Network Packet Capturing ....................................................................... 1-6 System Updates .......................................................................................... 1-7 Hyper-V Installation Supported .............................................................. 1-7 Prevention of Brute Force Attacks against Password .......................... 1-7 Advanced Reports and Management (ARM) Database Failover Support ........................................................................................ 1-7 Updates for URL Categories .................................................................... 1-7 Main Features .................................................................................................. 1-8 Support for Multiple Trend Micro™ InterScan™ Web Security Virtual Appliance Installations .............................................................. 1-8 HTTP Virus Scanning ............................................................................... 1-8 iii FTP Scanning ..............................................................................................1-8 Improved Deferred Scanning for HTTP and FTP Large File Scans .1-9 Applets and ActiveX Security ...................................................................1-9 URL Filtering ..............................................................................................1-9 Direct URL Filter Category Selection .....................................................1-9 URL Filtering Category Mapping .....................................................1-10 Access Quota Policies ..............................................................................1-16 URL Access Control ................................................................................1-16 IP Address, Host Name and LDAP Client Identification .................1-16 Server and Port Access Control Restrictions .......................................1-16 Notifications ..............................................................................................1-16 PhishTrap ..................................................................................................1-17 Web Reputation ........................................................................................1-17 Anti-phishing and Anti-pharming Based on Web Reputation .....1-18 IntelliTrap ..................................................................................................1-18 IntelliTunnel ..............................................................................................1-18 Easier Collection of System Information for Support Diagnosis .....1-19 True File-type Blocking Within Compressed Files .............................1-19 Real-time Statistics and Alerts ................................................................1-19 Configurable Threshold Warning ..........................................................1-20 Reverse Proxy Support ............................................................................1-20 Logs and Reports ......................................................................................1-20 Additional Reporting Information .........................................................1-21 Integration with Cisco WCCP ................................................................1-22 Command Line Interface ........................................................................1-22 HTTPS Decryption ..................................................................................1-23 Secure Shell (SSH) Configuration in Web Console ............................1-23 Per-policy Exception ...............................................................................1-23 Compressed File Handling Actions .......................................................1-23 Custom Category ......................................................................................1-23 URL Monitoring Mode ...........................................................................1-23 Reporting ...................................................................................................1-24 Web Page Analysis ...................................................................................1-24 Safe Search Engine ...................................................................................1-24 User/group Name Authentication in Transparent Mode (WCCP and Bridge mode) ............................................................................1-24 White List for User/group Name Authentication ..............................1-24 iv Network Interface Configuration and PING Management .............. 1-25 System Event Logs .................................................................................. 1-25 Syslog Support .......................................................................................... 1-25 System Shutdown or Restart .................................................................. 1-25 Configuration Backup and Restore ....................................................... 1-25 License Management in Control Manager ........................................... 1-26 Manual Component Update Button ..................................................... 1-26 Advanced Reporting and Management Integration ........................... 1-26 Deployment Wizard ................................................................................ 1-26 Fail Open/LAN Bypass .......................................................................... 1-26 Notification Message Enhancement ..................................................... 1-26 Smart Search ............................................................................................. 1-27 URL Filtering Access Warning Mode ................................................... 1-27 LDAP Integration Policy Improvement .............................................. 1-27 Product License ........................................................................................ 1-27 Content Cache .......................................................................................... 1-27 HTTPS Scanning ....................................................................................
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages568 Page
-
File Size-