Specifications
Trend Micro™ OfficeScan™ 10 Administrator’s Guide 
vi
Chapter 7: Using the OfficeScan Firewall
About the OfficeScan Firewall ......................................................................7-2
Firewall Policies and Profiles ......................................................................... 7-4
Firewall Policies  ..........................................................................................7-5
Adding and Modifying a Firewall Policy ............................................7-7
Editing the Firewall Exception Template ..........................................7-9
Firewall Profiles  ........................................................................................7-12
Adding and Editing a Firewall Profile ..............................................7-14
Firewall Privileges ..........................................................................................7-16
Firewall Violation Notifications for Client Users .....................................7-16
Firewall Logs ..................................................................................................7-17
Testing the OfficeScan Firewall  ..................................................................7-18
Disabling the OfficeScan Firewall  ..............................................................7-19
Section 2: Managing the OfficeScan Server and 
Clients
Chapter 8: Managing the OfficeScan Server
Role-based Administration  ............................................................................8-2
User Roles ....................................................................................................8-2
Adding and Modifying a Custom Role  .............................................. 8-5
User Accounts .............................................................................................8-6
Adding and Modifying a User Account  .............................................8-7
Adding One or Several Active Directory Accounts ......................... 8-9
Trend Micro Control Manager ....................................................................8-10
Reference Servers  ..........................................................................................8-14
System Event Logs ........................................................................................8-15
Managing Logs ...............................................................................................8-16
Log Maintenance  ......................................................................................8-18
Licenses ...........................................................................................................8-19










