Specifications
Trend Micro™ OfficeScan™ 10 Administrator’s Guide 
iv
Update Source for Update Agents .........................................................4-39
Update Agent Customized Update Source ......................................4-39
Update Agent Standard Update Source ...........................................4-41
Update Agent Component Duplication ...........................................4-42
Update Methods for Update Agents  .....................................................4-42
Component Update Summary .....................................................................4-43
Chapter 5: Protecting Computers from Security Risks
About Security Risks .......................................................................................5-2
Viruses and Malware .................................................................................. 5-2
Spyware and Grayware  .............................................................................. 5-4
How Spyware/Grayware Gets into a Network ................................5-5
Potential Risks and Threats .................................................................5-6
Guarding Against Spyware/Grayware  ............................................... 5-7
Scan Methods ................................................................................................... 5-8
Smart Scan Source ....................................................................................5-15
Standard List ........................................................................................5-16
Custom Lists  ........................................................................................5-17
Scan Types ......................................................................................................5-19
Real-time Scan ...........................................................................................5-19
Manual Scan  ..............................................................................................5-21
Scheduled Scan  .........................................................................................5-22
Scan Now ...................................................................................................5-23
Initiating Scan Now ............................................................................5-24
Settings Common to All Scan Types ..........................................................5-25
Scan Criteria  ..............................................................................................5-25
Scan Exclusions  ........................................................................................5-27
Scan Actions ..............................................................................................5-30
Virus/Malware Scan Actions .............................................................5-30
Spyware/Grayware Scan Actions ......................................................5-40
Scan-related Privileges  ..................................................................................5-43
Global Scan Settings  .....................................................................................5-43
Security Risk Notifications ...........................................................................5-44
Administrator Notification Settings  ......................................................5-44










