ServerProtect5 TREND MICRO TM TM Centrally managed virus protection for enterprise-class servers and storage systems TM ServerProtect 5 TM for Windows NT / NetWare TM Item Code: SPEM51207/20719 Administrator's Guide www.trendmicro.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes and the latest version of the Getting Started Guide, which are available from the Trend Micro Web site at: www.trendmicro.
The Getting Started Guide for Trend Micro™ ServerProtect™ is intended to introduce the main features of the software and installation instructions for your production environment. You should read through it prior to installing or using the software. Detailed information about how to use specific features within the software are available in the online help file and online knowledge base at the Trend Micro Web site. At Trend Micro, we are always seeking to improve our documentation.
Contents Contents Chapter 1: Getting Started with Trend Micro ServerProtect How Does ServerProtect Work? ........................................................ 1-3 How Does ServerProtect Manage Servers? ................................... 1-3 Communication Methods ............................................................... 1-3 ServerProtect Architecture ................................................................. 1-4 The Management Console .......................................................
Trend Micro™ ServerProtect™ Getting Started Guide Viewable Scanning Statistics .......................................................1-18 Compatibility ................................................................................1-18 Chapter 2: Installing ServerProtect Recommended System Requirements ................................................2-2 Normal Server ................................................................................2-2 Information Server ..................................
Contents Side Bar ....................................................................................... 3-4 Domain Browser Tree ................................................................. 3-5 Configuration Area ..................................................................... 3-7 Managing ServerProtect Domains ..................................................... 3-8 Creating ServerProtect Domains ................................................... 3-8 Renaming ServerProtect Domains ...........
Trend Micro™ ServerProtect™ Getting Started Guide Viewing an Existing Task ............................................................3-37 Removing an Existing Task .........................................................3-38 Configuring Notification Messages ..................................................3-39 Standard Alerts .............................................................................3-39 Notification Events ....................................................................
Contents Outbreak Prevention Policy (OPP) ................................................ 5-9 Outbreak Prevention Services ............................................................ 5-9 Chapter 6: Registering and Contacting Technical Support Technical Support Information .......................................................... 6-1 Trend Micro Security Information ..................................................... 6-2 Registering Trend Micro ServerProtect ..........................................
Trend Micro™ ServerProtect™ Getting Started Guide vi
Chapter 1 Getting Started with Trend Micro™ ServerProtect™ ServerProtect is the latest generation of award-winning software for protecting file servers on corporate networks. It is designed specifically to protect the entire network from viruses of any kind by adopting advanced virus-catching technology to help ensure your network stays virus-free.
Trend Micro™ ServerProtect™ Getting Started Guide • Real-time Scan vs.
Getting Started with Trend Micro™ ServerProtect™ How Does ServerProtect Work? ServerProtect monitors all activity on Windows Server 2003/2000/NT and Novell NetWare networks. Whenever it detects that a file in its domain is being accessed, it checks the file for infection. If it finds that the file is infected, it sends notification messages to pre-defined recipients and takes action on the virus according to the ServerProtect configuration.
Trend Micro™ ServerProtect™ Getting Started Guide ServerProtect Architecture ServerProtect protects networks through a three-tier architecture: the Management Console, the Information Server, and the Normal Server. The following illustrates the relationship between these three components: FIGURE 1-1.
Getting Started with Trend Micro™ ServerProtect™ Note: Only one Management Console can manage an Information Server. This means once a Management Console is connected to an Information Server, no other Management Consoles can connect to it. The ServerProtect domain browser tree shows all the ServerProtect servers installed on Windows Server 2003/2000/NT and Novell NetWare servers with the status of each server.
Trend Micro™ ServerProtect™ Getting Started Guide available bandwidth. You may, however, choose to moderate the number of Normal Servers you assign to an Information Server for ease of management. • If you have many servers in different locations, set up an Information Server (IS) in each location. Note: Benchmark testing results have showed an Information Server can manage up to 500 Normal Servers. This figure should serve as a reference and might vary depending on available bandwidth.
Getting Started with Trend Micro™ ServerProtect™ ServerProtect Domains ServerProtect domains are virtual groupings of Normal Servers used to simplify their identification and management. You can create, rename, or delete domains according to the needs of your network. Normal Servers in a domain can only be assigned to one Information Server. Information Servers, on the other hand, can manage several domains.
Trend Micro™ ServerProtect™ Getting Started Guide computer virus or about which you want immediate information. See Using Scan Now (Manual Scan) on page 3-52. Tip: To ensure maximum protection, Trend Micro recommends using both Real-time Scan and Scan Now. Real-time Scan and Scan Now benefits include: • Redundant File Scan: If a file containing a virus is accidentally downloaded or copied, Real-time Scan will stop it. However, if for any reason Real-time Scan is disabled, Scan Now will still detect it.
Getting Started with Trend Micro™ ServerProtect™ Tasks are assigned to a "task owner" who is responsible for maintaining the task. See Managing Tasks on page 3-28. Once you install ServerProtect on a server, three default tasks already exist: Scan, Statistics, and Deploy. These tasks are essential for managing and monitoring antivirus activities on your network. You can modify the target servers of these three default tasks, as well as their definition.
Trend Micro™ ServerProtect™ Getting Started Guide Virus Logs The real power of a centralized antivirus system is its ability to record and present information regarding the network's antivirus policy from a single console. IT professionals can easily access information while they are monitoring their network servers. ServerProtect provides comprehensive information about scanning, file updating, and deploying results.
Getting Started with Trend Micro™ ServerProtect™ Deploying Updates Trend Micro update is an upgrade and update deployment module for Trend Micro antivirus software. It simplifies the maintenance of Trend Micro software and reduces the total cost of your network’s antivirus security. Because of the number of viruses that are developed monthly, a successful virus policy depends on the use of virus pattern files, programs, and scan engines, that can deal with the latest threats.
Trend Micro™ ServerProtect™ Getting Started Guide This highly efficient approach saves download time and minimizes network bandwidth. See Updating ServerProtect 5 on page 4-7 for additional information. Tip: You can automate the deployment of updates for Normal Servers by creating a scheduled update task. See Creating Tasks on page 3-29. ServerProtect Virus Detection Technology ServerProtect uses advanced virus detection technology.
Getting Started with Trend Micro™ ServerProtect™ MacroTrap™ ServerProtect includes patented MacroTrap technology to guard against macro viruses in Microsoft™ Office files and templates. Macro viruses are the fastest spreading computer viruses. Since they are harbored in files that are commonly passed around via email, these kinds of viruses are easily spread. See Configuring Real-time Scan on page 3-49 for MacroTrap configuration information.
Trend Micro™ ServerProtect™ Getting Started Guide • ARJ (.arj) & ARJ_SFX (.exe) • CABINET (.cab) • TAR • GNU ZIP (.gz) • RAR (.rar) • PKLITE (.exe or .com) • LZEXE (.exe) • DIET (.com) • UNIX PACKED (.z) • UNIX COMPACKED (.z) • UNIX LZW (.Z) • UUENCODE • BINHEX • BASE64 Note: The Trend Micro scan engine can currently only clean compressed files using the PKZIP algorithm. If a virus is found in an archive using other algorithms, they must first be decompressed in a temporary directory, then cleaned.
Getting Started with Trend Micro™ ServerProtect™ document inside an Excel sheet, and in turn this Excel sheet could be embedded in a Microsoft™ PowerPoint presentation. OLE offers a large number of benefits to developers, at the same time it can lead to potential infection. To address this issue, Trend Micro has added a new scan feature "OLE layer scan" which complements state-of-the-art ServerProtect virus protection. See Scanning Viruses on page 3-45. Tip: OLE layer scan offers five layers of protection.
Trend Micro™ ServerProtect™ Getting Started Guide When to Select ActiveAction We recommend you select ActiveAction if you are not familiar with virus actions or if you are unsure of which scan action is the most suitable for a certain virus. Viruses vary significantly from one another; this requires appropriate virus actions for each virus type. Customizing scan actions for file viruses requires knowledge of viruses and can be a tedious task. For this reason, Trend Micro recommends the use of ActiveAction.
Getting Started with Trend Micro™ ServerProtect™ Centralized Management ServerProtect provides a Windows-based console (the Management Console) to help you manage multiple Windows Server 2003/2000/NT and Novell NetWare servers on your network. The console is portable and can be run on any 32-bit Windows machine (except Windows NT 3.51).
Trend Micro™ ServerProtect™ Getting Started Guide State-of-the-Art Virus Detection Technology New configurable scanning tools like ActiveAction, IntelliScan, and OLE layer scan offer faster and more efficient scanning. Viewable Scanning Statistics ServerProtect enables you to efficiently monitor your network antivirus security.
Chapter 2 Installing ServerProtect This chapter includes the necessary information to successfully install ServerProtect on your network(s). Note: You must log on with administrator privileges in order to install an Information Server.
Trend Micro™ ServerProtect™ Getting Started Guide Recommended System Requirements The recommended system requirements are different for each ServerProtect component. Normal Server • 200MHz Intel™ Pentium™ III processor or faster (or equivalent) • Operating System: Microsoft™ Windows™ • Microsoft Windows Server 2003. Minimum 128MB RAM. • Microsoft Windows 2000 Professional/Server with SP1. Minimum 128MB RAM. • Microsoft Windows NT Server/Workstation 4.0 with SP6 or above. Minimum 64MB RAM.
Installing ServerProtect Information Server • 450MHz Intel™ Pentium™ III processor or faster (or equivalent) • Operating System: • Microsoft Windows Server 2003 • Microsoft Windows 2000 Professional/Server (if to be used in conjunction with NetWare Normal servers, requires Novell Client32™ for Windows 2000/NT). • Microsoft Windows NT Server/Workstation 4.
Trend Micro™ ServerProtect™ Getting Started Guide Installation Scenarios This section will help you select the most appropriate scenario to install ServerProtect on your network(s). The following scenarios focus on Local Area Networks (LANs), although it is also possible to manage ServerProtect across Wide Area Networks (WANs) such as, corporate intranets, using TCP/IP. See Managing ServerProtect Across a Wide Area Network on page 2-8.
Installing ServerProtect The following table shows the different installation environments for each ServerProtect setup component. Windows ServerProtect Windows Setup Component XP/Me/98/95 Information Server No Yes No Normal Server No Yes Yes Management Console Yes Yes No Server 2003 NetWare 2000/NT TABLE 2-1.
Trend Micro™ ServerProtect™ Getting Started Guide 5. Create additional ServerProtect domains to manage your Normal Servers. See Creating ServerProtect Domains on page 3-8. 6. Install the remaining Windows Server 2003/2000/NT Normal Servers using the Management Console. See Installing a Normal Server from the Management Console on page 2-23. Steps 1, 2 and 3 can be executed simultaneously during initial Setup.
Installing ServerProtect Steps 1, 2 and 3 can be executed together during initial Setup. Perform the NetWare Normal Server installation after the Information Server installation has been completed. A Mixed Environment—Windows Server 2003/2000/NT and NetWare If you are installing ServerProtect to a network that has both Windows Server 2003/2000/NT and NetWare servers, select a Windows Server 2003/2000/NT server to be the Information Server that manages the Normal Server(s).
Trend Micro™ ServerProtect™ Getting Started Guide 3. Install the Management Console on the Information Server computer. See Installing the Management Console on page 2-13. You can install additional Management Consoles on any Windows Server 2003/XP/2000/NT 4.0/Me/98/95 computer connected to your network. Note: Only one Management Console can manage an Information Server at a time. 4. Install the Normal Server on a NetWare server on the network.
Installing ServerProtect Since the Management Console uses TCP/IP to communicate with Information Servers, it’s easy to manage ServerProtect from any point inside most company intranets. Before Installing ServerProtect As with any server software installation or upgrade, Trend Micro recommends that this activity be performed when the impact to users is minimal; that is, outside business hours, and after a full system backup has been completed.
Trend Micro™ ServerProtect™ Getting Started Guide FIGURE 2-2. ServerProtect Welcome screen 2. Click Next. The Software License Agreement screen appears. You must agree to the license conditions to proceed with Setup. FIGURE 2-3.
Installing ServerProtect 3. Click Yes. ServerProtect checks your boot sector for viruses. FIGURE 2-4. Scan Result Information window 4. Click OK to continue installation. The User Information screen appears. FIGURE 2-5. ServerProtect User Information screen 5. Provide your user information including the product's serial number. If you do not have the serial number, you can leave the field blank and a 30-day trial version will be installed instead. 6. Click Next to continue the setup.
Trend Micro™ ServerProtect™ Getting Started Guide FIGURE 2-6. ServerProtect Select Components screen 7. Select the check boxes for the components you want to install. Make sure you select the adequate components for the desired setup. You can choose hidden share drives, e.g., C$ or D$, as target folders. The default installation path is: :\Program Files\Trend\Sprotect Note: To protect the Information Server, Trend Micro recommends you install a Normal Server on the same computer. 8. Click Next.
Installing ServerProtect FIGURE 2-7. Input Logon Information screen 9. Follow the instructions to complete the ServerProtect Setup. Installing the Management Console Administrators can remotely manage ServerProtect Normal Servers using the Management Console. The Management Console is the ServerProtect component users interact with; it can be installed on the same computer along with the Information Server and Normal Server or on a different computer. To install the Management Console: 1.
Trend Micro™ ServerProtect™ Getting Started Guide 3. If you want to be the only one to view the ServerProtect program from the Windows Start menu, click Personal program folder. Otherwise, click Common program folder. Click OK. The Start Copying Files window appears. 4. Click Next to continue with the setup program. Setup starts copying all program components and starts all services. After all program components have been copied, the Setup Complete screen appears. FIGURE 2-8.
Installing ServerProtect FIGURE 2-9. Select an Information Server screen 6. Select the Information Server the Management Console will control. Do one of the following: • Select a server from the list • Provide the name of the server • Provide the IP address of the server Note: If an Information Server resides on a different network segment from the one where the Management Console is installed, the server will not appear in the list. 7.
Trend Micro™ ServerProtect™ Getting Started Guide 2. Select the Install server as a ServerProtect Information Server check box on the Select Components screen. See Figure 2-6. Click Browse to locate the target server and folder where you want to install an Information Server. The ServerProtect Install Path Selection window appears. FIGURE 2-10. ServerProtect Install Path Selection screen 3. Double-click the target server and choose the installation path for ServerProtect Information Server files.
Installing ServerProtect FIGURE 2-11. ServerProtect Setup Information Server screen 6. Type a password. This prevents unauthorized access to this Information Server from either the Management Console or the setup program. 7. Click Next. The Start Copying Files window appears. Verify the information listed on the screen. 8. Click Next to continue with the setup program. ServerProtect now starts copying all program components and starts all services.
Trend Micro™ ServerProtect™ Getting Started Guide FIGURE 2-12. ServerProtect Setup Complete screen 9. Click Finish. The Install Control Management Agent now screen appears. FIGURE 2-13. Control Manager Agent Installation window 10. Click Yes to install the Control Manager agent, otherwise click No to close the setup program. Installing a Normal Server Use the setup program the first time you install a Normal Server. After that, use the Management Console to install additional Normal Servers.
Installing ServerProtect Installing a Normal Server from the setup program The setup program allows you to install a Normal Server both locally and remotely to your network. Note: Before you set up a NetWare server as a Normal Server you must have a functional Information Server. The Information Server can only be installed on a Windows Server 2003/2000/NT machine. To install a Normal Server from the setup program: 1. Execute the setup program and provide the necessary product information. 2.
Trend Micro™ ServerProtect™ Getting Started Guide FIGURE 2-14. ServerProtect Install Path Selection screen 3. Click the appropriate network to expand the tree, and then click the target server. 4. Click OK. The Enter Password window appears. FIGURE 2-15. ServerProtect Target Server Logon window 5. Type an administrator user name and password to access the target server, and then click OK. The target server’s local drives appear on the tree.
Installing ServerProtect 6. Select the installation path for your Normal Server, and then click OK. To create a new folder, click New Folder and then click OK. 7. Click Next in the Select Components screen. The Input Logon Information screen appears. See Figure 2-7. For NetWare Normal Servers, specify a communication protocol in the Select Components screen, and then click Next to go to the Input Logon Information screen. See Figure 2-16. FIGURE 2-16.
Trend Micro™ ServerProtect™ Getting Started Guide FIGURE 2-17. The ServerProtect Installation Path Selection screen 10. To locate an Information Server do one the following: • Type the name or IP address of the Information Server in the text box below the tree. Click Find Server. • Double-click the target machine for the Information Server in the browser tree Click New Domain if you want to create a new ServerProtect domain.
Installing ServerProtect 12. Type the Information Server password, and then click OK. This password was assigned during Information Server installation. FIGURE 2-18. Input ServerProtect Information Password window The Start Copying Files window appears. Verify the information listed on the screen. 13. Click Next to continue with the setup program. ServerProtect now starts copying all program components and starts all services.
Trend Micro™ ServerProtect™ Getting Started Guide • Right-click the domain that you selected in the previous step and click Install New SPNT(s) or Install New SPNW(s) (either by IPX or IP) from the pop-up menu The Select a Source Server window opens. 3. Select an existing Normal Server from the list box, and then click OK. A confirmation window appears. 4. Click OK. The Add Server(s) to Domain window opens. 5.
Installing ServerProtect The step-by-step deployment procedures listed below illustrate how to deploy ServerProtect through Microsoft SMS version 1.2. For Microsoft SMS version 2.0, the deployment procedures are similar, but the screens may be slightly different. To deploy ServerProtect through Microsoft SMS: 1. Open the Microsoft SMS Administrator. 2. Click Package on the SMS Administrator’s icon bar. 3. Click File > New on the main menu. The Package Properties window appears. FIGURE 2-19.
Trend Micro™ ServerProtect™ Getting Started Guide FIGURE 2-20. File Browser window The description of the PDF file will be displayed as ’ServerProtect 5’ in the SMS Administrator Package Properties window. FIGURE 2-21. SMS Administrator Package Properties Configuration window 5. Type the source for the installation files into the SMS Administrator. Click Workstations on the SMS Administrator Package Properties configuration window and browse to the network location of the installation source files.
Installing ServerProtect FIGURE 2-22. Setup Package for Workstations window 6. Click OK to return to the SMS Administrator Package Properties configuration window. Then click Close. All that remains to be done is choosing servers/workstations to which you want to install the software. FIGURE 2-23. SMS Administrator Packages window showing Newly Created Package Note: There is a browsing window within the SMS Administrator window.
Trend Micro™ ServerProtect™ Getting Started Guide FIGURE 2-24. Job Details Configuration window 7. Configure job details to customize your software installation/removal. The settings in the Run Phase column allow you to schedule the installation/removal of your software. After successfully configuring the job, the installation/removal is pending and will appear in the SMS Administrator Jobs window.
Installing ServerProtect FIGURE 2-25. SMS Administrator Jobs window Installing ServerProtect in Silent Mode Installing ServerProtect in silent mode can be quite useful to remotely install Windows Server 2003/2000/NT Normal Servers. To install ServerProtect in silent mode for Windows Server 2003/2000/NT: 1. Install an Information Server. See Installing an Information Server on page 2-15. 2. Locate the SMS folder in the default installation path, and share it.
Trend Micro™ ServerProtect™ Getting Started Guide e. Press Enter. Silent install will proceed and the target machine will be registered with the Information Server. For silent installation, Normal Servers are installed in the "SMS" domain. There is no way to change the domain name during the silent installation. You can, however rename the SMS domain after all the Normal Servers have been installed. You can also specify a path to which ServerProtect is installed.
Installing ServerProtect Removing ServerProtect ServerProtect’s three components can be removed either together or separately. Individual removal is discussed in the following sections. Removing a Normal Server There are different removal procedures for each environment Removing a Normal Server for Windows Server 2003/2000/NT There are two ways to remove a Normal Server from a Windows Server 2003/2000/NT environment: To remove a Normal Server remotely for Windows Server 2003/2000/NT: 1.
Trend Micro™ ServerProtect™ Getting Started Guide 2. Delete the following using the NetWare client for Windows: SYS:SYSTEM\SPNW.NCF SYS:LOGIN\SPROTECT :Sprotect directory 3.
Chapter 3 Managing ServerProtect This chapter covers the essential tools for managing ServerProtect. Additional management tools are explained in the online help section of the Management Console.
Trend Micro™ ServerProtect™ Getting Started Guide Using the Management Console ServerProtect lets you manage multiple Windows Server 2003/2000/NT/NetWare servers and workstations from a single, portable Management Console run on any 32-bit Windows machine.The console is password protected, ensuring only authorized administrators can modify ServerProtect settings. Opening the Management Console You can run the Management Console from any 32-bit Windows machine on the network.
Managing ServerProtect Main menu Information Server Side Bar Configuration Area Domain Domain Browser Tree Normal Server (ServerProtect Server) FIGURE 3-2.
Trend Micro™ ServerProtect™ Getting Started Guide • View: viewing ServerProtect log files, scanning results and the Trend Micro Virus Encyclopedia • Do: creating or modifying tasks, performing on-demand scan, updating or rolling back the virus patterns, scan engines or program files, changing the IS password, finding domains or servers, etc.
Managing ServerProtect Rollback: rolling back to a previous deployment action performed on your network View Log Group View Log: viewing historical information about antivirus events that have occurred on the network Set Scan Action Group Real-time Scan: configuring a real-time virus scan on the network Exclusion List: defining files, directories or viruses to be ignored by the ServerProtect virus scanning engine Deny Write List: preventing certain files or directories from modification Notification Group
Trend Micro™ ServerProtect™ Getting Started Guide Header The column fields above the domain browser tree display useful information, such as the computer’s operating system, virus pattern, scan engine, program versions, real-time scan direction, and so on. Right-click tree icons in the ServerProtect console to make configuration changes to selected components. The frame that contains the domain browser tree can be resized.
Managing ServerProtect An infected Novell NetWare Normal Server A Normal Server that has been disconnected or its service has been disabled A Normal Server in Outbreak Prevention Policy mode An infected Normal Server in Outbreak Prevention Policy mode Configuration Area The right-hand side of the ServerProtect screen is the configuration area where you can type in configuration data and view information about your corporate network.
Trend Micro™ ServerProtect™ Getting Started Guide Managing ServerProtect Domains ServerProtect domains are virtual groupings of Normal Servers used to simplify their identification and management. You can create, rename, or delete domains according to the needs of your network. Note: If one of the servers under a domain is infected, the domain icon will change and the infected server's icon will seem to be on fire.
Managing ServerProtect FIGURE 3-3. Create New Domain(s) Window 2. Type a name in the Domain name text box. 3. Identify the servers that you want to add to the domain. Do one of the following: • Select a server in the left-hand list • Type the server name in the Enter server name text box 4. Click Add. 5. Repeat steps 3 and 4 until the right-hand list displays all the servers that you want to add into the new domain. To remove a server, select it in the right-hand list and click Remove.
Trend Micro™ ServerProtect™ Getting Started Guide To rename a ServerProtect domain: 1. Click the domain in the domain browser tree you want to rename. 2. Do one of the following: • Right-click the selected domain, and then click Rename Domain. • Select Domain > Rename Domain on the main menu. The Rename a Domain window appears. • Press the F2 key on the keyboard. FIGURE 3-4. Rename a Domain Window 3. Type the new domain name in the To text box and then click OK.
Managing ServerProtect Moving Normal Servers between Domains To improve management, sometimes you need to move (Remove and add) Normal Servers from one existing domain to another. Select Normal Server(s) under one domain from the domain browser tree and drag and drop between domains. Alternatively, you can move a Normal Server when you create a ServerProtect domain. See Creating ServerProtect Domains on page 3-8.
Trend Micro™ ServerProtect™ Getting Started Guide Managing Information Servers The Information Server stores and delivers data to and from the Normal Servers. If the Information Server manages NetWare Normal Servers, it also delivers alert notifications. Windows Server 2003/2000/NT Normal Servers, however, perform their own delivery. Because an Information Server is simply a delivery system for information, the number of servers it can manage is, theoretically, only limited by the available bandwidth.
Managing ServerProtect FIGURE 3-5. Trend ServerProtect Management Console window 3. Click OK to save your changes or click Cancel to close the window without saving.
Trend Micro™ ServerProtect™ Getting Started Guide Managing Normal Servers In the ServerProtect architecture, the Normal Server is the first line of defense against viruses, and is managed by an Information Server. It is on the bottom of the three-tier ServerProtect structure. This section explains how to manage Normal Servers.
Managing ServerProtect Configuring Updates Trend Micro update server allows you to update ServerProtect components. The update process comprises downloading and deploying the updates.
Trend Micro™ ServerProtect™ Getting Started Guide How Updates work This section describes how ServerProtect deals with a typical request to download and deploy updates in a ServerProtect network. FIGURE 3-6.
Managing ServerProtect Verifying The Current Version of Files ServerProtect lets you check the version of the virus pattern file, scan engine, and program files currently used by an Information Server. Perform the steps below: To verify the current version do one of the following: • Click Update > Update on the side bar • Click Do > Update on the main menu FIGURE 3-7.
Trend Micro™ ServerProtect™ Getting Started Guide Downloading Updates We recommend that you regularly download updates from Trend Micro update server to ensure continued protection. Trend Micro releases new virus pattern files several times each week. The program and scan engine files, on the other hand, are updated less frequently.
Managing ServerProtect \ProgramFiles\Trend\Sprotect\spntshare To set a local or network drive as the download source: 1. Do one of the following: • Click Update > Update on the side bar • Click Do > Update from the main menu 2. Under Download, click Configure. The Download Option window appears. 3. Click From a local or network drive. 4. Type the UNC path where the files are being kept to download the update files from another server on you network.
Trend Micro™ ServerProtect™ Getting Started Guide Using Download Now If updated components are available, you can initiate an immediate download of the latest virus pattern file, scan engine files, and program files from either the Trend Micro update server or another Information Server on your network. To use Download Now: 1. Do one of the following: • Click Update > Update on the side bar • Click Do > Update on the main menu 2. Click Download Now on the Update main screen.
Managing ServerProtect FIGURE 3-8. Download Option--Schedule Setting window 4. Under Schedule in the Frequency list, click a download frequency. You can select None, Daily or Weekly. If you do not want to schedule a download, click None. If you click Weekly, in the Day of Week list, click a day. 5. In the Time box, type or select the time when you want to update the components, and then click AM or PM. 6.
Trend Micro™ ServerProtect™ Getting Started Guide • Click Update > Update on the side bar • Click Do > Update on the main menu 2. Click Configure on the Update screen to change your download configuration. The Download Option window appears. FIGURE 3-9. Download Option window 3. Configure the necessary download settings. The available download settings are: • Download Source. See Configuring a Download Source on page 3-18. • Proxy Setting. See Configuring Proxy Server Settings below. • Schedule Setting.
Managing ServerProtect 2. Under Download, click Configure. The Download Option window appears. 3. Click the Proxy Setting tab. FIGURE 3-10. Download Option--Proxy Setting window 4. Select the Connect to the Internet through a proxy server check box. 5. In the Protocol type list, Click the protocol used for downloading. The protocols supported are: HTTP and SOCKS 4. 6.
Trend Micro™ ServerProtect™ Getting Started Guide Deploying Updates When an Information Server deploys updates to Normal Servers, it sends commands to each Normal Server, requesting them to obtain a copy of the updates. ServerProtect records both the connection and deployment process in a log file. Configuring Deploy Now The Deploy Now function is used to deploy the updates saved in an Information Server to other Normal Servers. To deploy an update: 1.
Managing ServerProtect 3. Select the check box(es) of the components you want to update. To update all components in a Normal Server, select the server’s check box. 4. Click Deploy to activate the deployment process, or click Cancel to discontinue. Note: The Management Console program files are not updated unless it is installed on the same machine as the Information Server.
Trend Micro™ ServerProtect™ Getting Started Guide 3. Do one of the following: • Click New task, to create a task • Click Existing task, to edit a task See Creating Tasks on page 3-29 and Modifying an Existing Task on page 3-35 for information on how to create or edit a task. Rolling Back the Previous Deployment Action ServerProtect can roll back a deployed update action; reverting the system to the previous version of the updated file.
Managing ServerProtect FIGURE 3-14. Rollback window The screen displays information about the virus pattern file, scan engine, and program file that is currently being used by Trend Micro ServerProtect. The respective version and build numbers are also shown. 3. Select the check boxes of the items in you want to roll back, and then click Rollback. Note: You cannot roll back the virus pattern or scan engine past the immediately preceding version.
Trend Micro™ ServerProtect™ Getting Started Guide Managing Tasks Tasks allow you to schedule Normal Servers to perform multiple functions simultaneously. Using tasks automates routine antivirus maintenance procedures on your network and improves the management of your antivirus policy.
Managing ServerProtect FIGURE 3-15. Task Wizard window Default tasks Default tasks are created by ServerProtect with every Normal Server installation. When you install ServerProtect for the first time, you immediately have three default tasks: Scan, Statistics, and Deploy. You can edit default tasks, however you can’t modify the task name or the task owner. Creating Tasks New tasks let you set up routine maintenance and configuration procedures. To create a task: 1.
Trend Micro™ ServerProtect™ Getting Started Guide • Click Task > New Task on the side bar 3. Click Create. The Create New Task window appears. FIGURE 3-16. Create New Tasks window 4. Select the functions you want to include in this task in the Existing tasks list. 5. Click Add #n Task Item to add the selected function to the Selected task list. You can continue adding more functions. Alternatively, you can remove a previously selected function.
Managing ServerProtect Creating a Scheduled Task Creating scheduled tasks are easy to configure and save you time. To create a scheduled task: 1. Follow steps 1 through 6 in the Creating Tasks on page 3-29 section. Make sure you select the Create as a scheduled task check box under Scheduled task. See Figure 3-16. The Task wizard window appears. 2. Click Next. The Schedule Settings window appears. FIGURE 3-17. Schedule Settings window 3.
Trend Micro™ ServerProtect™ Getting Started Guide 5. Click Next to proceed with the task wizard configuration. Specifying a Target for Scan Now Scan tasks must be run on specific drives. When defining the target drive, you are initially given the option to scan all local drives or specific drives and/or directories. The latter option also lets you scan another drive on the network. FIGURE 3-18.
Managing ServerProtect FIGURE 3-19. Task Information window Opening the Existing Task List The Existing Task list displays information about the tasks that have been created. You can use the Existing Task list to perform, modify, delete or view the task definition. To open the existing task list do one of the following: • Click Task > Existing Task on the side bar • Click Do > Existing Task on the main menu The Existing Task list is displayed in a table format with the following fields.
Trend Micro™ ServerProtect™ Getting Started Guide FIGURE 3-20. Viewing Existing Tasks table Note: If the servers to which a task is applied are located in different time zones, the time/date displayed in the Last Perform Time and Next Schedule fields will reflect the local time for each server. Running an Existing Task The Existing Task list displays information about all the tasks that have been defined. You can use the Existing Task list to perform a task. To run an existing task: 1.
Managing ServerProtect Modifying an Existing Task Modifying existing tasks save you valuable configuration time. This way you don’t need to spend time configuring new tasks. To modify an existing task: 1. Do one of the following: • Click Task > Existing Task on the side bar • Click Do > Existing Task on the main menu The Existing Task list appears. 2. Click the task in the Existing Task list that you want to modify. 3. Click Modify. The Modify Task window appears. FIGURE 3-21. Modify Task window 4.
Trend Micro™ ServerProtect™ Getting Started Guide FIGURE 3-22. Select Servers to Apply Tasks window 3. Click Apply. To close the window without saving your changes, click Cancel. To modify a task definition for an existing task 1. Select each function you want to include in this task in the Existing Tasks list. FIGURE 3-23. Modify Tasks window 2. Click Add #n Task Item to add the function you selected to the Selected task list.
Managing ServerProtect If you want this task to be scheduled to run, make sure that you select the Create as a scheduled task check box. Tip: You can click the up or down arrow icons next to Selected task(s) to change the order the functions are performed. The Deploy function should always be the last one in the list. 3. Click Modify to start the wizard that will help you create a task with the functions that you have chosen. Click Cancel to close the Create New Task window without saving your changes.
Trend Micro™ ServerProtect™ Getting Started Guide FIGURE 3-24. View Task window This screen contains three tabbed sections labeled Apply Task to Server, Task Contents, and Task Status. • Apply Task to Server: The Task name and Task owner are displayed on the left-hand side of the tab. The Target server displays all servers on your network that the task will run upon. • Task Contents: All of the functions that make up the task are displayed.
Managing ServerProtect To remove an existing task: 1. Do one of the following: • Click Do > Existing Task on the main menu • Click Task > Existing Task on the side bar 2. In the Existing Task list, select the task you want to remove. 3. Click Remove. Configuring Notification Messages Antivirus software is quite useful if it alerts a user or an administrator when a virus is detected. ServerProtect enables you to configure both notifications and to whom they will be sent.
Trend Micro™ ServerProtect™ Getting Started Guide To configure a standard alert: 1. Select the Information Server domain, or a Normal Server on the domain browser tree. 2. Do one of the following: • Click Configure > Notifications > Standard Alert on the main menu • Click Set Notification > Standard Alert on the side bar The Standard Alert screen appears. FIGURE 3-25. ServerProtect Standard Alert Configuration window 3. Select the event type check box(es). 4.
Managing ServerProtect Note: To find out more on configuring alert messages, refer to the related topic in the online help. Outbreak Alerts Virus outbreaks have a high potential for damage on a corporate network. Whenever the number of virus events exceeds the threshold, an outbreak alert is triggered to notify the system administrator. This ensures that system administrators or other individuals who need to know about the virus outbreak are notified and can then take action against them.
Trend Micro™ ServerProtect™ Getting Started Guide FIGURE 3-26. ServerProtect Outbreak Alert Events Configuration Window 3. Define the outbreak threshold. Specify the number of viruses of to be exceeded, and the period of consideration, in hours, in the boxes provided. 4. Select the notification methods that the alert uses. 5. Click Configure to access notification settings for the selected methods. For detailed information about each modification method, please refer to Setting Alert Methods on page 3-42.
Managing ServerProtect • Message box: A standard Windows pop-up message box is displayed on the administrator’s computer • Printer: A document is sent to a local or network printer • Pager: A message is sent to a pager. This feature requires a modem to be connected to the server that is hosting Trend Micro ServerProtect. • Internet Mail: An email message is sent upon the detection of a virus or virus outbreak event • SNMP Trap: An alert message is sent to network administrators by SNMP.
Trend Micro™ ServerProtect™ Getting Started Guide FIGURE 3-27. Configure Internet Email Alerts window 4. Do the following: • Type the name of the mail server in the Mail Server text box • Type the subject of the message in the Subject field text box • Type the name of the sender in the From field text box 5. Type each recipient of this email message in the To user(s) text box and then click Add. You can remove a recipient by selecting the user, and then clicking Remove. 6.
Managing ServerProtect Scanning Viruses ServerProtect provides three scan modes for detecting viruses: Real-time Scan, Scan Now (Manual scan), and scheduled scan. Real-time Scan checks all incoming and outgoing files on the server for signs of infection. Scan Now scans on-demand, allowing you to check a machine for virus exposure -- immediately. Scheduled scan checks for infected files on selected ServerProtect servers at predetermined times.
Trend Micro™ ServerProtect™ Getting Started Guide FIGURE 3-28. Set Virus Action window To configure virus actions for a virus type: 1. Click Set Action from the Scan Now or Real-time Scan configuration area. The Set Virus Action window appears. 2. Under Boot Viruses in the Action list, click the virus action you want ServerProtect to take when it finds a boot virus. You can select Auto Clean or Bypass. 3.
Managing ServerProtect • Click Customize scan actions, to select the appropriate action to take against file and macro viruses in the Action and Action if cleaning fails lists. See When ServerProtect Finds a Virus (Virus Actions) on page 1-9. For more information about ActiveAction, see IntelliScan on page 1-15. Note: If you selected a Clean action, we recommend that you select the Backup infected file before cleaning check box.
Trend Micro™ ServerProtect™ Getting Started Guide FIGURE 3-29. Save/Delete Profile window 3. Type a profile name in the Profile name text box. 4. Click Save to save the new profile. Alternatively, click Close to close the window without saving it. To delete a scanning profile: 1. Do one of the following: • Click Scan Now > Scan Now on the side bar • Click Do > Scan Now on the main menu • Click Set Scan option > Real-time Scan on the side bar • Click Do > Scan Options > Real-time Scan on the main menu 2.
Managing ServerProtect Using Real-time Scan Real-time Scan constantly scans all files that are accessed and provides powerful virus protection that runs in the background. All incoming/outgoing files are monitored, thus infected files are prevented from being copied to or from a server. Configuring Real-time Scan The following scan options are specific to Real-time Scan: • Scan floppy at startup: Your floppy disk drive is scanned for boot viruses when you turn your computer on.
Trend Micro™ ServerProtect™ Getting Started Guide FIGURE 3-30. Real-time Scanning Configuration Window 3. Select the Enable real-time scan check box. 4. Under Scan direction choose one of the following: • Incoming: Scans files copied to the server • Outgoing: Scans files being copied from the server • Incoming and Outgoing: Scans all incoming and outgoing files on the server 5.
Managing ServerProtect • IntelliScan: Scans files using true file type identification. See IntelliScan on page 1-15. Note: The IntelliScan feature is not available for NetWare Normal Servers. • Selected files: Scans only specified files. If you choose Selected files, click Extension List to define the file types that you want to scan. Refer to Selecting File Types to Scan on page 3-56. 6.
Trend Micro™ ServerProtect™ Getting Started Guide Note: If your selected domain contains a NetWare server, or your selected server is a NetWare server, under NetWare Settings, click NetWare Options to configure MAC File Scanning Settings. 9. Click Apply to save your changes or click Save As Profile to recall your configuration settings at a later time. Using Scan Now (Manual Scan) Scan Now performs a scan upon demand. Use Scan Now if you suspect a server has been infected.
Managing ServerProtect FIGURE 3-31. Scan Now Configuration Window 3. Under Scan target, choose one of the following: • All local drives: Scans all drives in a server • Selected drives/directories: Scans specific drives or directories on a server Click Browse. The Add Drives and/or Directories window appears. Select the check box(es) for the drives or directories you want to scan, then click OK to close the window.
Trend Micro™ ServerProtect™ Getting Started Guide FIGURE 3-32. Add Drives and/or Directories window 4. Under Scan file type, choose one of the following: • All files: Scans all files • Use IntelliScan: Scans files using true file type identification. See IntelliScan on page 1-15. Note: The IntelliScan feature is not available for NetWare Normal Servers. • Selected files: Scans only specified files. Click Extension List to define the file types that you want to scan.
Managing ServerProtect 6. Under Compressed file scanning, select the Scan compressed files check box. Move the Scan level slider to set the number of compressed layers that you want to scan. For information on advanced settings, refer to the Compressed file scan topic in the online help. Advanced settings can’t be configured for NetWare Normal Servers. Note: If you chose to scan selected file types in step 4, make sure you included the extensions of compressed files in the extension list. 7.
Trend Micro™ ServerProtect™ Getting Started Guide To stop Scan Now: 1. Click Start > Run on the Normal Server. The Run window appears. 2. Click Browse and locate the ScanNow.EXE file (by default, this file can be found in C:\Program Files\Trend\SProtect). 3. Run the tool with the ’stop’ switch as shown below: C:\Program Files\Trend\SProtect\ScanNow.exe /STOP 4. Click OK. Scan Now stops.
Managing ServerProtect extensions. Since only certain kinds of files can contain viruses, you can benefit from this function by only scanning those file types that are more likely to become infected. To add a file extension for scanning: 1. In the Real-time Scan or Scan Now configuration area, under Scan file type, click Selected files, and then click Extension List to define what file types you want to scan. The Select File for scanning window then appears. FIGURE 3-33.
Trend Micro™ ServerProtect™ Getting Started Guide • Click Default to add all the default file extensions and then click OK to close the Select files for Scanning window. Any customized extensions will be lost. The default setting provides sufficient protection for most environments. The following are the default file extensions: .ARJ .CLASS .DOT .HLP .JS .MPT .OVL .PPT .SHS .VSD .XLT .BIN .COM .DRV .HTA .LZH .MSG .PIF .RAR .SYS .VST .Z .CAB .DLL .EXE .HTM .MDB .OCX .POT .RTF .TAR .XLA .ZIP .CLA .DOC .
Chapter 4 Upgrading ServerProtect Software ServerProtect supports system upgrades and updates from previous versions. Most of the configuration settings of older versions can be migrated to the newer version. Your original installation path will also be preserved. The ServerProtect setup program can detect the existence of a previous version of ServerProtect and either upgrade or update it.
Trend Micro™ ServerProtect™ Getting Started Guide • Upgrade Considerations • Upgrading from the Management Console • Updating ServerProtect 5 Upgrade Considerations To illustrate how ServerProtect can be upgraded on your network, let us look at these following scenarios: • One Information Server Managing One Normal Server • One Information Server Managing Several Normal Servers One Information Server Managing One Normal Server If your network only includes one Normal Server managed by an Information Serv
Upgrading ServerProtect Software Note: You can only upgrade Normal Servers from the Management Console. To upgrade a Normal Server from the Management Console: 1. Install the full ServerProtect package on your network. 2. Open the Management Console. 3. Do one of the following: For NT Normal Servers • In the domain browser tree right-click a ServerProtect domain, and then select Upgrade from SPNT 4.x to 5.x.
Trend Micro™ ServerProtect™ Getting Started Guide 4. Do the following: • In Information Server, type the name of the Information Server that manages the Normal Server you want to upgrade • In Username, type the user name used to access the Information Server • In Password, type the user name password 5. Click Find Servers. If the Information Server is found, all the servers that are managed by that Information Server will be shown in the left tray. FIGURE 4-2.
Upgrading ServerProtect Software FIGURE 4-3. Logon to Target Servers window 8. In Serial number, type a valid serial number. Select the Apply to all the remaining server(s) check box if the information you just entered is applicable to other server(s) running ServerProtect. Otherwise, clear the check box and click OK. The Upgrade Server(s) window appears. FIGURE 4-4. Upgraded Server(s) List window 9. Select a server and then click Remove to remove a server from the list.
Trend Micro™ ServerProtect™ Getting Started Guide server(s). After copying the files, ServerProtect starts the remote services for the target server(s). FIGURE 4-5. Remote Upgrade Progress window A Notice window listing the name of the upgraded server(s) appears. FIGURE 4-6. Notice window 11. Click OK to close the Notice window. Note: All scan profiles (real-time and manual scans) are maintained during the migration process on the upgraded ServerProtect server.
Upgrading ServerProtect Software Updating ServerProtect 5 If you have previously installed ServerProtect version 5.0 or above, there are two ways to update the existing ServerProtect components (program files, scan engine, and virus pattern file). The efficient way is to use the Management Console, however you can also use the setup program containing the updated ServerProtect version. Note: During an update process, any running tasks will be stopped.
Trend Micro™ ServerProtect™ Getting Started Guide 4-8
Chapter 5 Managing ServerProtect with Trend Micro Control Manager™ Trend Micro Control Manager (TMCM) delivers powerful centralized management of antivirus and content security solutions deployed throughout the network. With single point-of-contact administration, monitoring, and deployment, corporations can more effectively manage their antivirus and content security strategies enterprise-wide.
Trend Micro™ ServerProtect™ Getting Started Guide • Outbreak Prevention Services What is Trend Micro Control Manager? Control Manager is a software management solution that gives an administrator the ability to control antivirus and content security programs from a central location -regardless of the program’s physical location or platform. This application simplifies the administration of a corporate virus and content security policy.
Managing ServerProtect with Trend Micro Control Manager™ • Proactive outbreak prevention • Secure communication infrastructure • Task delegation • Command tracking • Real-time product control • Centralized installation of agents • Centralized update control • Centralized configuration • Centralized log reporting 5-3
Trend Micro™ ServerProtect™ Getting Started Guide Installing and Removing Control Manager Agent for ServerProtect Installing the CM agent for ServerProtect is a two-step process: 1. Obtaining the public encryption key from the Control Manager server. 2. Installing the agent on Information Servers.
Managing ServerProtect with Trend Micro Control Manager™ 5. Right-click the public encryption key link, then select Save As. Save the public encryption key in a location that is accessible to the server upon which the agent will be installed. Installing the Agent The second step is installing Control Manager agents on all ServerProtect Information Servers. To install the agent: 1.
Trend Micro™ ServerProtect™ Getting Started Guide your proxy server requires authentication, select the Authentication required check box and in User name and Password, specify the correct user name and password. 6. Click Import to set up secure communications with the Control Manager server. Locate the public encryption key, E2EPublic.dat, of the Control Manager server you are registering the agent with. 7. Follow the installation on-screen instructions to complete the installation.
Managing ServerProtect with Trend Micro Control Manager™ Control Manager Agent for ServerProtect Features Control Manager agent for ServerProtect includes the following features to manage ServerProtect. Note: Only some of the ServerProtect Management Console features are available in the Control Manager Web-console. Tasks Control Manager tasks are different from ServerProtect tasks.
Trend Micro™ ServerProtect™ Getting Started Guide Outbreak Commander Outbreak Commander delivers attack specific information and prevention policies to help enterprises deflect, isolate, and stem attacks prior to the release of the pattern file. Because Trend Micro performs rigorous quality insurance testing on all its virus patterns, there is often a delay between completion of virus analysis and the availability of the pattern.
Managing ServerProtect with Trend Micro Control Manager™ Outbreak Commander is your primary interface with the Trend Micro Outbreak Prevention Service, and is the principal means of implementing outbreak prevention policies. Outbreak Prevention Policy (OPP) Outbreak Prevention Policy (OPP) is a collection of settings that you can apply to ServerProtect using Outbreak Commander.
Trend Micro™ ServerProtect™ Getting Started Guide • Threat specific recommendations on how to contain viruses • Prompt delivery of virus-specific product settings, called "policies" 5-10
Chapter 6 Registering and Contacting Technical Support This chapter contains information to help you register and contact technical support.
Trend Micro™ ServerProtect™ Getting Started Guide Refer to the following online resources for technical support: Email: sales@trendmicro.com support@support.trendmicro.com Web Support: kb.trendmicro.com/solutions/ Knowledge Base: kb.trendmicro.com/solutions/solutionSearch.asp Virus Information Center: www.trendmicro.com/vinfo Trend Micro Security Information Comprehensive security information is available on the Internet at the Security Information section of the Trend Micro Web site: www.trendmicro.
Registering and Contacting Technical Support Registering Trend Micro ServerProtect Trend Micro or an authorized reseller provides technical support, virus pattern downloads, and program updates for one (1) year to all registered users, after which you must purchase renewal maintenance. To register ServerProtect visit the following Web site: www.trendmicro.com/support/registration.
Trend Micro™ ServerProtect™ Getting Started Guide 3. Type your name, company, phone and email address in the appropriate text boxes. 4. Type a brief description of the nature of the problem. 5. Type the name of the SMTP server that you want to use. 6. Click Browse to select the file you want to attach. The Select File window appears. 7. Select the file you want to submit, and then click OK. 8. Click Submit to send the message.
Appendix Converting the ServerProtect Trial Version A 30-day trial version of ServerProtect will be installed if no serial number is entered. This version will be fully functional but after 30 days virus scanning will be disabled. After this, you should either purchase the product or remove it. After purchasing a license, refer to the following topics to update the serial number.
Trend Micro™ ServerProtect™ Getting Started Guide The Software Evaluation Period Window If you install the trial version of ServerProtect, the Software Evaluation Period window appears every time you open the Management Console. The Software Evaluation Period window shows which Normal Servers are using the trial version and the number of days remaining until they expire. FIGURE A-1.
Viewing the Serial Number List Using the Management Console, you can view the serial number of all the ServerProtect Normal Servers. To view the serial number list: 1. Click Help > About on the main menu. The About ServerProtect Management Console window appears. FIGURE A-2. About ServerProtect Management Console window 2. Click Serial Number. The Serial Number List window appears showing you all the ServerProtect Normal Servers on your network, along with their respective serial numbers.
Trend Micro™ ServerProtect™ Getting Started Guide FIGURE A-3. ServerProtect Serial Number List Window 3. Click Close to close the Serial Number List window, and then click OK to close the About ServerProtect Management Console window.
Updating a Serial Number After you have purchased a ServerProtect license, you can update the serial number of installed ServerProtect software directly from the Management Console without reinstalling ServerProtect. To update a serial number: 1. Select the Normal Server you want to update the serial number for in the domain browser tree. 2. Click Do > Update Serial Number on the main menu. The Enter New Serial Number window appears. FIGURE A-4. Enter New Serial Number window 3.
Trend Micro™ ServerProtect™ Getting Started Guide Appendix-6
Index Index Download updates 3-18 E ActiveAction 1-15 advantages 1-16 when to select 1-16 Additional features 1-16 Existing task deleting 3-38 list 3-33 modifying 3-35 running 3-34 viewing 3-37 B I Bait folder 1-17 Benchmark testing 1-6 Icons notification group 3-5 Scan Now group 3-4 scan result group 3-4 set scan action group 3-5 task group 3-4 update group 3-4 view log group 3-5 Information Server icon 3-6 installing an 2-15 introduction 1-5 managing 3-12 recommended system requirements 2-3 remov
Trend Micro™ ServerProtect™ Getting Started Guide Internetwork Packet Exchange (IPX) 1-3 Intranets 2-9 K Knowledge Base 6-3 L Local Area Networks (LANs) 2-4 Logs 1-10 M MacroTrap 1-13 Management Console configuration area 3-7 domain browser tree 3-5 header icon 3-6 installing 2-13 introduction 1-4 main menu 3-3 main view 3-2 opening the 3-2 recommended system requirements 2-3 removing the 2-32 side bar 3-4 using the 3-2 Managing ServerProtect 3-1 Mapped network drive scan 1-16 Microsoft System Managemen
Index real-time 3-49 scheduled 3-56 statistics 1-18 viruses 3-45 Serial number updating A-5 viewing A-3 ServerProtect additional features 1-16 architecture 1-4 before installing 2-9 communication methods 1-3 compatibility 1-18 domain creating a 3-8 delete 3-10 features 1-7 filter 1-7 icons 3-6 introduction to 1-7 managing 3-8 rename 3-9 renaming 3-9 how it works 1-3 installation environment table 2-5 installing in silent mode 2-29 overview 2-9 managing with Control Manager 5-1 recommended system requiremen
Trend Micro™ ServerProtect™ Getting Started Guide W Wide Area Network (WAN) 2-8 I–4