Specifications

Trend Micro™ OfficeScan™ 10 Administrator’s Guide
IN-6
user accounts 8-6
user roles 8-2
rootkit protection 4-7
S
scan actions
5-30
spyware/grayware 5-40
virus/malware 9-20
scan criteria
CPU usage
5-27
file compression 5-26
files to scan 5-26
schedule 5-27
user activity on files 5-25
Scan Engine
ICSA certification
4-4
scan exclusions 5-27
directories 5-28
file extensions 5-29
files 5-29
scan method 3-20, 5-8
switching 5-10, 5-14
Scan Now 5-23
scan privileges 5-43
scan types 1-9, 5-19
Scheduled Scan 5-22
postpone 9-8, 9-24
reminder 9-23
resume 9-24
skip and stop 9-9, 9-24
stop automatically 9-24
SCV Editor 11-2
Secure Configuration Verification 11-2
SecureClient 1-10, 11-2
integrating with OfficeScan 11-3
Policy Servers 11-2
SCV Editor 11-2
Security Compliance 1-3, 2-22
Security Information Center 12-17
security patches 4-8
security posture 10-4
security risks
phish attacks
A-7
protection from 1-5
spyware and grayware 5-4
virus/malware 5-2
security summary 2-5
components and programs 2-10
networked computers 2-6
outbreak status 2-10
product license status 2-5
top 10 security risks 2-9
server logs
client packager log
12-5
component update log 12-5
debug log 12-3
local installation/upgrade log 12-4
MCP Agent debug log 12-6
remote installation/upgrade log 12-4
ServerProtect Migration Tool debug log
12-6
Virus Scan Engine debug log 12-8
VSEncrypt debug log 12-6
Server Tuner 8-25
server update
component duplication
4-16
logs 4-20
manual update 4-20
proxy settings 4-16
scheduled update 4-19
update methods 4-19
ServerProtect 3-45
service restart 9-26
smart scan 1-2, 1-5, 1-10, 2-8, 5-8