Microweb PRO Series Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach Server Microweb PRO Series herunter. Microweb PRO Series User`s guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 72
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
Web Protection Module
1
for Endpoint Security Platform
Administrators Guide
Endpoint Security
ditS
e
e
e
e
Seitenansicht 0
1 2 3 4 5 6 ... 71 72

Inhaltsverzeichnis

Seite 1 - Web Protection Module

Web Protection Module1for Endpoint Security PlatformAdministrator’s GuideEndpoint SecurityditSeeee

Seite 2

Trend Micro™ Web Protection Module 1.0 Administrator’s Guidevi• Microsoft™ Windows™ Server 2008 Enterprise Edition (with the latest service pack)• Mic

Seite 3

PrefaceviiIncompatible Software• Trend Micro™ RUBotted (Beta)• Trend Micro™ TrendProtect 1.2• Trend Micro™ Web Protection Add-On (Any)• Trend Micro™ O

Seite 4

Trend Micro™ Web Protection Module 1.0 Administrator’s GuideviiiYou will see a new Web Protection Module entry in the Dashboards menu and links to Web

Seite 5 - Contents

1-1Chapter 1Installing Trend Micro Web Protection ModuleThis section provides instructions for performing the most common tasks with Trend Micro Web P

Seite 6

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-2Checking for Incompatible SoftwareTrend Micro Web Protection Module includes several A

Seite 7

Installing Trend Micro Web Protection Module1-34. If one of the AUDIT fixlets appears, double-click on it to display the Document tabs for the message

Seite 8 - Audience

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-4Deploying Trend Micro Web Protection Module AgentsYou will now need to deploy the appl

Seite 9 - Document Conventions

Installing Trend Micro Web Protection Module1-5An Action window appears in which you can track the progress of your deployment. When it is finished, t

Seite 10 - Compatible Software

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-63. Click the here link in the Actions box. The Take Action window appears.4. Select th

Seite 11 - Process Overview

Installing Trend Micro Web Protection Module1-7To enable log maintenance:1. From the Tasks Navigation bar, click the View Applicable Web Protection Mo

Seite 13 - Chapter 1

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-8value in the indicated drop-down. You can increase the frequency with which logs are a

Seite 14

Installing Trend Micro Web Protection Module1-9• Archive the current URL history and Web threat logs• Delete archived logs older than number of days y

Seite 15 - Protection Module agents

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-10Note: If you want to change log maintenance behavior, first find any older log mainte

Seite 16 - Private Key Password page

Installing Trend Micro Web Protection Module1-11To configure one or more of the Agent’s proxy settings:1. From the Tasks Navigation bar, click the Vie

Seite 17 - Action window

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-12Encrypting a Proxy StringIf your proxy server requires a password, you must encrypt i

Seite 18 - Configuring Log Maintenance

Installing Trend Micro Web Protection Module1-13Configuring the ProxyYou must configure the proxy settings as described in the section that follows.To

Seite 19 - To enable log maintenance:

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-143. Enter the port number and click OK. Another window appears asking for the username

Seite 20 - Take Action window

Installing Trend Micro Web Protection Module1-157. Enter your Private Key Password and click OK. An Action window appears in which you can track the p

Seite 21

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-16Note: Because ESP saves the proxy configuration for each user, you can easily re-enab

Seite 22 - Configuring Proxy Settings

Installing Trend Micro Web Protection Module1-175. Enter your Private Key Password and click OK. An Action window appears in which you can track the p

Seite 23

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing an

Seite 24 - Encrypting a Proxy String

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-18Configuring the Web Reputation Technology Security LevelTrend Micro Web Protection Mo

Seite 25 - Configuring the Proxy

Installing Trend Micro Web Protection Module1-19To set the WRT security level for one or more of your endpoints:1. From the Tasks Navigation bar, clic

Seite 26 - Action Parameter window 4

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-20helpful if individuals in your environment use something other than a Web browser to

Seite 27 - Disabling a Proxy Server

Installing Trend Micro Web Protection Module1-21To enable alert notification:1. From the Tasks Navigation bar, click the View Applicable Web Protectio

Seite 28 - To disable WRT:

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-22To disable alert notification:1. From the Tasks Navigation bar, click the View Applic

Seite 29

Installing Trend Micro Web Protection Module1-23To see the client ID for an individual endpoint, see the Properties area of the Computer Summary tab.

Seite 30 - TABLE 1-1

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-24

Seite 31

2-1Chapter 2Using Trend Micro Web Protection ModuleThis section provides instructions on using the Web Protection Module.This chapter covers the follo

Seite 32 - Threat Detection screen

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-2Blacklist and Whitelist PoliciesThe Web Protection Module Blacklist-Whitelist Wizard en

Seite 33 - To enable alert notification:

Using Trend Micro Web Protection Module2-3Creating and Deploying a New PolicyThis section describes how to create and deploy a new blacklist/whitelist

Seite 34 - Uploading Logs

The user documentation for Trend Micro™ Web Protection Module 1.0 is intended to introduce the main features of the software and installation instruct

Seite 35

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-42. Click New. The Blacklist-Whitelist Configuration – New Policy window appears with th

Seite 36

Using Trend Micro Web Protection Module2-53. Enter a name for your policy in the Policy Name field.FIGURE 2-30. Policy Name field4. In the Blacklist

Seite 37 - Chapter 2

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-6Note: You can block as many as 500 URLs per policy. If you wish to block more, create a

Seite 38

Using Trend Micro Web Protection Module2-77. When you are finished creating your policy, click Finish. The Edit Task window appears.FIGURE 2-31. Edi

Seite 39

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-811. In the Filter Panel, click My Custom Tasks. Your new Blacklist / Whitelist policy a

Seite 40

Using Trend Micro Web Protection Module2-9An Action window appears in which you can track the progress as ESP deploys your Blacklist / Whitelist polic

Seite 41 - Policy Name field

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-105. Click the Import List tab. The Import List pane appears.FIGURE 2-34. Import List

Seite 42

Using Trend Micro Web Protection Module2-119. Select the file and click Open. The path to the selected file appears in the Import pane.FIGURE 2-35.

Seite 43 - Edit Task window

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-1210. Click Import. An ActiveX warning message appears.FIGURE 2-36. ActiveX Warning me

Seite 44 - Task Pane screen

Using Trend Micro Web Protection Module2-1312. Click Finish to end the import process and start generating the relevant Custom Action. Note: To see th

Seite 45 - Importing Lists of Web Sites

iContentsPrefaceTrend Micro Web Protection Module Documentation ...ivAudience ...

Seite 46 - Import List tab

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-142. Select the name of the Blacklist / Whitelist policy you want to examine and click V

Seite 47 - Import List pane

Using Trend Micro Web Protection Module2-15keyboard. You can also return to the Policy view by clicking Back. (In this case, the Import List feature i

Seite 48 - Blacklist / Whitelist Wizard

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-16Copying and Editing a PolicyThe Web Protection Module enables you to create copies of

Seite 49 - Viewing an Existing Policy

Using Trend Micro Web Protection Module2-17The name of the policy appears in the form of “Copy of…” followed by the policy name you chose to copy. The

Seite 50

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-18To make modifications using the Edit Task window, either access it as part of the Cust

Seite 51 - Cancel or Close

Using Trend Micro Web Protection Module2-19Use the Description tab to make modifications to the task name, title, and description. Use the Actions tab

Seite 52 - Copying and Editing a Policy

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-20Use the Relevance tab to view and make modifications to the relevance of a Custom Task

Seite 53 - Editing Custom Actions

Using Trend Micro Web Protection Module2-21Use the Properties tab to view and modify the properties of this custom task.FIGURE 2-46. Properties tab

Seite 54 - FIGURE 2-43. Edit Task tabs

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-22To delete a policy:1. Click Wizards > Web Protection Module Blacklist-Whitelist Wiz

Seite 55 - FIGURE 2-44. Actions tab

Using Trend Micro Web Protection Module2-237. Click OK. The Private Key Password window appears.8. Enter your Private Key Password and click OK. ESP d

Seite 56 - FIGURE 2-45. Relevance tab

Trend Micro™ Web Protection Module 1.0 Administrator’s Guideii

Seite 57 - Deleting a Policy

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-24The Site Statistics analysis displays statistical information about the number of Web

Seite 58 - Remove Task window

Using Trend Micro Web Protection Module2-25Viewing the Client Information AnalysisThe following section describes how to view and analyze client infor

Seite 59 - Analyses

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-266. To view the details about each property, click the Applicable Computers tab.FIGURE

Seite 60 - NAME FIELD DESCRIPTION

Using Trend Micro Web Protection Module2-27Viewing the Site Statistics AnalysisYou can also view the site statistics analysis.To view the site statist

Seite 61

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-287. To view the details of each property, click the Results tab.FIGURE 2-53. Results

Seite 62 - View as Summary option

Using Trend Micro Web Protection Module2-298. To deactivate the analysis, return to the click the here link in the Action window.The Web Protection Mo

Seite 63

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-30Note: The Web Protection Module Dashboard only reports the information that is current

Seite 64 - FIGURE 2-53. Results tab

Using Trend Micro Web Protection Module2-31• Filters—Use these filters to restrict and organize Dashboard information. After you set them, these setti

Seite 65

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-32• Blocked Sites—This table lists the Web sites blocked for the endpoints specified usi

Seite 66 - <server installation

Using Trend Micro Web Protection Module2-33To further sort a display, click or double-click on a column header. The header color changes and displays

Seite 67 - CATEGORY DESCRIPTION

iiiPrefacePrefaceWelcome to the Trend Micro™ Web Protection Module User’s Guide. This guide contains information about product settings and service le

Seite 68

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-34FAQsWhat is the performance impact of the Web Protection Module Agent on network perfo

Seite 69 - Ad-Hoc Listings

Using Trend Micro Web Protection Module2-35SupportSearch the Trend Micro User Forums for discussion threads and community-based support on a wide vari

Seite 70

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-36

Seite 71

Trend Micro™ Web Protection Module 1.0 Administrator’s Guideiv• Incompatible Software• Process OverviewTrend Micro Web Protection Module Documentation

Seite 72

PrefacevDocument ConventionsTo help you locate and interpret information easily, the Web Protection Module documentation uses the following convention

Kommentare zu diesen Handbüchern

Keine Kommentare