Specifications
Trend Micro™ OfficeScan™ 10 Administrator’s Guide
xii
Table 3-14. Software/Hardware specifications. . . . . . . . . . . . . . . . . . . . . . . . . . 3-32
Table 3-15. Domain structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-32
Table 3-16. Network traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-33
Table 3-17. Network size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-33
Table 3-18. Security products checked by Vulnerability Scanner. . . . . . . . . . . . 3-36
Table 3-19. DHCP settings in the TMVS.ini file . . . . . . . . . . . . . . . . . . . . . . . . .3-41
Table 4-20. Server-client update options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-10
Table 4-21. Smart Scan Server update process . . . . . . . . . . . . . . . . . . . . . . . . . . 4-12
Table 4-22. Components downloaded by the OfficeScan server. . . . . . . . . . . . 4-13
Table 4-1. Server component duplication scenario. . . . . . . . . . . . . . . . . . . . . . . 4-17
Table 4-23. OfficeScan components stored by the client. . . . . . . . . . . . . . . . . . 4-23
Table 4-24. Event-triggered update options . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-29
Table 4-25. Proxy settings used during client component update . . . . . . . . . . . 4-34
Table 4-26. Update Agent system requirements . . . . . . . . . . . . . . . . . . . . . . . . . 4-37
Table 5-27. Comparison between conventional scan and smart scan . . . . . . . . . 5-8
Table 5-28. Scan types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-19
Table 5-29. Un-notified client scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-24
Table 5-30. Trend Micro recommended scan actions against
viruses/malware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-32
Table 5-31. Quarantine directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-34










