Microweb PRO Series Uživatelská příručka

Procházejte online nebo si stáhněte Uživatelská příručka pro Servery Microweb PRO Series. Microweb PRO Series User`s guide Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 72
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
Web Protection Module
1
for Endpoint Security Platform
Administrators Guide
Endpoint Security
ditS
e
e
e
e
Zobrazit stránku 0
1 2 3 4 5 6 ... 71 72

Shrnutí obsahu

Strany 1 - Web Protection Module

Web Protection Module1for Endpoint Security PlatformAdministrator’s GuideEndpoint SecurityditSeeee

Strany 2

Trend Micro™ Web Protection Module 1.0 Administrator’s Guidevi• Microsoft™ Windows™ Server 2008 Enterprise Edition (with the latest service pack)• Mic

Strany 3

PrefaceviiIncompatible Software• Trend Micro™ RUBotted (Beta)• Trend Micro™ TrendProtect 1.2• Trend Micro™ Web Protection Add-On (Any)• Trend Micro™ O

Strany 4

Trend Micro™ Web Protection Module 1.0 Administrator’s GuideviiiYou will see a new Web Protection Module entry in the Dashboards menu and links to Web

Strany 5 - Contents

1-1Chapter 1Installing Trend Micro Web Protection ModuleThis section provides instructions for performing the most common tasks with Trend Micro Web P

Strany 6

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-2Checking for Incompatible SoftwareTrend Micro Web Protection Module includes several A

Strany 7

Installing Trend Micro Web Protection Module1-34. If one of the AUDIT fixlets appears, double-click on it to display the Document tabs for the message

Strany 8 - Audience

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-4Deploying Trend Micro Web Protection Module AgentsYou will now need to deploy the appl

Strany 9 - Document Conventions

Installing Trend Micro Web Protection Module1-5An Action window appears in which you can track the progress of your deployment. When it is finished, t

Strany 10 - Compatible Software

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-63. Click the here link in the Actions box. The Take Action window appears.4. Select th

Strany 11 - Process Overview

Installing Trend Micro Web Protection Module1-7To enable log maintenance:1. From the Tasks Navigation bar, click the View Applicable Web Protection Mo

Strany 13 - Chapter 1

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-8value in the indicated drop-down. You can increase the frequency with which logs are a

Strany 14

Installing Trend Micro Web Protection Module1-9• Archive the current URL history and Web threat logs• Delete archived logs older than number of days y

Strany 15 - Protection Module agents

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-10Note: If you want to change log maintenance behavior, first find any older log mainte

Strany 16 - Private Key Password page

Installing Trend Micro Web Protection Module1-11To configure one or more of the Agent’s proxy settings:1. From the Tasks Navigation bar, click the Vie

Strany 17 - Action window

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-12Encrypting a Proxy StringIf your proxy server requires a password, you must encrypt i

Strany 18 - Configuring Log Maintenance

Installing Trend Micro Web Protection Module1-13Configuring the ProxyYou must configure the proxy settings as described in the section that follows.To

Strany 19 - To enable log maintenance:

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-143. Enter the port number and click OK. Another window appears asking for the username

Strany 20 - Take Action window

Installing Trend Micro Web Protection Module1-157. Enter your Private Key Password and click OK. An Action window appears in which you can track the p

Strany 21

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-16Note: Because ESP saves the proxy configuration for each user, you can easily re-enab

Strany 22 - Configuring Proxy Settings

Installing Trend Micro Web Protection Module1-175. Enter your Private Key Password and click OK. An Action window appears in which you can track the p

Strany 23

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing an

Strany 24 - Encrypting a Proxy String

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-18Configuring the Web Reputation Technology Security LevelTrend Micro Web Protection Mo

Strany 25 - Configuring the Proxy

Installing Trend Micro Web Protection Module1-19To set the WRT security level for one or more of your endpoints:1. From the Tasks Navigation bar, clic

Strany 26 - Action Parameter window 4

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-20helpful if individuals in your environment use something other than a Web browser to

Strany 27 - Disabling a Proxy Server

Installing Trend Micro Web Protection Module1-21To enable alert notification:1. From the Tasks Navigation bar, click the View Applicable Web Protectio

Strany 28 - To disable WRT:

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-22To disable alert notification:1. From the Tasks Navigation bar, click the View Applic

Strany 29

Installing Trend Micro Web Protection Module1-23To see the client ID for an individual endpoint, see the Properties area of the Computer Summary tab.

Strany 30 - TABLE 1-1

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-24

Strany 31

2-1Chapter 2Using Trend Micro Web Protection ModuleThis section provides instructions on using the Web Protection Module.This chapter covers the follo

Strany 32 - Threat Detection screen

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-2Blacklist and Whitelist PoliciesThe Web Protection Module Blacklist-Whitelist Wizard en

Strany 33 - To enable alert notification:

Using Trend Micro Web Protection Module2-3Creating and Deploying a New PolicyThis section describes how to create and deploy a new blacklist/whitelist

Strany 34 - Uploading Logs

The user documentation for Trend Micro™ Web Protection Module 1.0 is intended to introduce the main features of the software and installation instruct

Strany 35

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-42. Click New. The Blacklist-Whitelist Configuration – New Policy window appears with th

Strany 36

Using Trend Micro Web Protection Module2-53. Enter a name for your policy in the Policy Name field.FIGURE 2-30. Policy Name field4. In the Blacklist

Strany 37 - Chapter 2

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-6Note: You can block as many as 500 URLs per policy. If you wish to block more, create a

Strany 38

Using Trend Micro Web Protection Module2-77. When you are finished creating your policy, click Finish. The Edit Task window appears.FIGURE 2-31. Edi

Strany 39

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-811. In the Filter Panel, click My Custom Tasks. Your new Blacklist / Whitelist policy a

Strany 40

Using Trend Micro Web Protection Module2-9An Action window appears in which you can track the progress as ESP deploys your Blacklist / Whitelist polic

Strany 41 - Policy Name field

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-105. Click the Import List tab. The Import List pane appears.FIGURE 2-34. Import List

Strany 42

Using Trend Micro Web Protection Module2-119. Select the file and click Open. The path to the selected file appears in the Import pane.FIGURE 2-35.

Strany 43 - Edit Task window

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-1210. Click Import. An ActiveX warning message appears.FIGURE 2-36. ActiveX Warning me

Strany 44 - Task Pane screen

Using Trend Micro Web Protection Module2-1312. Click Finish to end the import process and start generating the relevant Custom Action. Note: To see th

Strany 45 - Importing Lists of Web Sites

iContentsPrefaceTrend Micro Web Protection Module Documentation ...ivAudience ...

Strany 46 - Import List tab

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-142. Select the name of the Blacklist / Whitelist policy you want to examine and click V

Strany 47 - Import List pane

Using Trend Micro Web Protection Module2-15keyboard. You can also return to the Policy view by clicking Back. (In this case, the Import List feature i

Strany 48 - Blacklist / Whitelist Wizard

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-16Copying and Editing a PolicyThe Web Protection Module enables you to create copies of

Strany 49 - Viewing an Existing Policy

Using Trend Micro Web Protection Module2-17The name of the policy appears in the form of “Copy of…” followed by the policy name you chose to copy. The

Strany 50

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-18To make modifications using the Edit Task window, either access it as part of the Cust

Strany 51 - Cancel or Close

Using Trend Micro Web Protection Module2-19Use the Description tab to make modifications to the task name, title, and description. Use the Actions tab

Strany 52 - Copying and Editing a Policy

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-20Use the Relevance tab to view and make modifications to the relevance of a Custom Task

Strany 53 - Editing Custom Actions

Using Trend Micro Web Protection Module2-21Use the Properties tab to view and modify the properties of this custom task.FIGURE 2-46. Properties tab

Strany 54 - FIGURE 2-43. Edit Task tabs

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-22To delete a policy:1. Click Wizards > Web Protection Module Blacklist-Whitelist Wiz

Strany 55 - FIGURE 2-44. Actions tab

Using Trend Micro Web Protection Module2-237. Click OK. The Private Key Password window appears.8. Enter your Private Key Password and click OK. ESP d

Strany 56 - FIGURE 2-45. Relevance tab

Trend Micro™ Web Protection Module 1.0 Administrator’s Guideii

Strany 57 - Deleting a Policy

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-24The Site Statistics analysis displays statistical information about the number of Web

Strany 58 - Remove Task window

Using Trend Micro Web Protection Module2-25Viewing the Client Information AnalysisThe following section describes how to view and analyze client infor

Strany 59 - Analyses

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-266. To view the details about each property, click the Applicable Computers tab.FIGURE

Strany 60 - NAME FIELD DESCRIPTION

Using Trend Micro Web Protection Module2-27Viewing the Site Statistics AnalysisYou can also view the site statistics analysis.To view the site statist

Strany 61

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-287. To view the details of each property, click the Results tab.FIGURE 2-53. Results

Strany 62 - View as Summary option

Using Trend Micro Web Protection Module2-298. To deactivate the analysis, return to the click the here link in the Action window.The Web Protection Mo

Strany 63

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-30Note: The Web Protection Module Dashboard only reports the information that is current

Strany 64 - FIGURE 2-53. Results tab

Using Trend Micro Web Protection Module2-31• Filters—Use these filters to restrict and organize Dashboard information. After you set them, these setti

Strany 65

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-32• Blocked Sites—This table lists the Web sites blocked for the endpoints specified usi

Strany 66 - <server installation

Using Trend Micro Web Protection Module2-33To further sort a display, click or double-click on a column header. The header color changes and displays

Strany 67 - CATEGORY DESCRIPTION

iiiPrefacePrefaceWelcome to the Trend Micro™ Web Protection Module User’s Guide. This guide contains information about product settings and service le

Strany 68

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-34FAQsWhat is the performance impact of the Web Protection Module Agent on network perfo

Strany 69 - Ad-Hoc Listings

Using Trend Micro Web Protection Module2-35SupportSearch the Trend Micro User Forums for discussion threads and community-based support on a wide vari

Strany 70

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-36

Strany 71

Trend Micro™ Web Protection Module 1.0 Administrator’s Guideiv• Incompatible Software• Process OverviewTrend Micro Web Protection Module Documentation

Strany 72

PrefacevDocument ConventionsTo help you locate and interpret information easily, the Web Protection Module documentation uses the following convention

Komentáře k této Příručce

Žádné komentáře