Web Protection Module1for Endpoint Security PlatformAdministrator’s GuideEndpoint SecurityditSeeee
Trend Micro™ Web Protection Module 1.0 Administrator’s Guidevi• Microsoft™ Windows™ Server 2008 Enterprise Edition (with the latest service pack)• Mic
PrefaceviiIncompatible Software• Trend Micro™ RUBotted (Beta)• Trend Micro™ TrendProtect 1.2• Trend Micro™ Web Protection Add-On (Any)• Trend Micro™ O
Trend Micro™ Web Protection Module 1.0 Administrator’s GuideviiiYou will see a new Web Protection Module entry in the Dashboards menu and links to Web
1-1Chapter 1Installing Trend Micro Web Protection ModuleThis section provides instructions for performing the most common tasks with Trend Micro Web P
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-2Checking for Incompatible SoftwareTrend Micro Web Protection Module includes several A
Installing Trend Micro Web Protection Module1-34. If one of the AUDIT fixlets appears, double-click on it to display the Document tabs for the message
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-4Deploying Trend Micro Web Protection Module AgentsYou will now need to deploy the appl
Installing Trend Micro Web Protection Module1-5An Action window appears in which you can track the progress of your deployment. When it is finished, t
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-63. Click the here link in the Actions box. The Take Action window appears.4. Select th
Installing Trend Micro Web Protection Module1-7To enable log maintenance:1. From the Tasks Navigation bar, click the View Applicable Web Protection Mo
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-8value in the indicated drop-down. You can increase the frequency with which logs are a
Installing Trend Micro Web Protection Module1-9• Archive the current URL history and Web threat logs• Delete archived logs older than number of days y
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-10Note: If you want to change log maintenance behavior, first find any older log mainte
Installing Trend Micro Web Protection Module1-11To configure one or more of the Agent’s proxy settings:1. From the Tasks Navigation bar, click the Vie
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-12Encrypting a Proxy StringIf your proxy server requires a password, you must encrypt i
Installing Trend Micro Web Protection Module1-13Configuring the ProxyYou must configure the proxy settings as described in the section that follows.To
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-143. Enter the port number and click OK. Another window appears asking for the username
Installing Trend Micro Web Protection Module1-157. Enter your Private Key Password and click OK. An Action window appears in which you can track the p
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-16Note: Because ESP saves the proxy configuration for each user, you can easily re-enab
Installing Trend Micro Web Protection Module1-175. Enter your Private Key Password and click OK. An Action window appears in which you can track the p
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing an
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-18Configuring the Web Reputation Technology Security LevelTrend Micro Web Protection Mo
Installing Trend Micro Web Protection Module1-19To set the WRT security level for one or more of your endpoints:1. From the Tasks Navigation bar, clic
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-20helpful if individuals in your environment use something other than a Web browser to
Installing Trend Micro Web Protection Module1-21To enable alert notification:1. From the Tasks Navigation bar, click the View Applicable Web Protectio
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-22To disable alert notification:1. From the Tasks Navigation bar, click the View Applic
Installing Trend Micro Web Protection Module1-23To see the client ID for an individual endpoint, see the Properties area of the Computer Summary tab.
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-24
2-1Chapter 2Using Trend Micro Web Protection ModuleThis section provides instructions on using the Web Protection Module.This chapter covers the follo
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-2Blacklist and Whitelist PoliciesThe Web Protection Module Blacklist-Whitelist Wizard en
Using Trend Micro Web Protection Module2-3Creating and Deploying a New PolicyThis section describes how to create and deploy a new blacklist/whitelist
The user documentation for Trend Micro™ Web Protection Module 1.0 is intended to introduce the main features of the software and installation instruct
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-42. Click New. The Blacklist-Whitelist Configuration – New Policy window appears with th
Using Trend Micro Web Protection Module2-53. Enter a name for your policy in the Policy Name field.FIGURE 2-30. Policy Name field4. In the Blacklist
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-6Note: You can block as many as 500 URLs per policy. If you wish to block more, create a
Using Trend Micro Web Protection Module2-77. When you are finished creating your policy, click Finish. The Edit Task window appears.FIGURE 2-31. Edi
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-811. In the Filter Panel, click My Custom Tasks. Your new Blacklist / Whitelist policy a
Using Trend Micro Web Protection Module2-9An Action window appears in which you can track the progress as ESP deploys your Blacklist / Whitelist polic
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-105. Click the Import List tab. The Import List pane appears.FIGURE 2-34. Import List
Using Trend Micro Web Protection Module2-119. Select the file and click Open. The path to the selected file appears in the Import pane.FIGURE 2-35.
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-1210. Click Import. An ActiveX warning message appears.FIGURE 2-36. ActiveX Warning me
Using Trend Micro Web Protection Module2-1312. Click Finish to end the import process and start generating the relevant Custom Action. Note: To see th
iContentsPrefaceTrend Micro Web Protection Module Documentation ...ivAudience ...
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-142. Select the name of the Blacklist / Whitelist policy you want to examine and click V
Using Trend Micro Web Protection Module2-15keyboard. You can also return to the Policy view by clicking Back. (In this case, the Import List feature i
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-16Copying and Editing a PolicyThe Web Protection Module enables you to create copies of
Using Trend Micro Web Protection Module2-17The name of the policy appears in the form of “Copy of…” followed by the policy name you chose to copy. The
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-18To make modifications using the Edit Task window, either access it as part of the Cust
Using Trend Micro Web Protection Module2-19Use the Description tab to make modifications to the task name, title, and description. Use the Actions tab
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-20Use the Relevance tab to view and make modifications to the relevance of a Custom Task
Using Trend Micro Web Protection Module2-21Use the Properties tab to view and modify the properties of this custom task.FIGURE 2-46. Properties tab
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-22To delete a policy:1. Click Wizards > Web Protection Module Blacklist-Whitelist Wiz
Using Trend Micro Web Protection Module2-237. Click OK. The Private Key Password window appears.8. Enter your Private Key Password and click OK. ESP d
Trend Micro™ Web Protection Module 1.0 Administrator’s Guideii
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-24The Site Statistics analysis displays statistical information about the number of Web
Using Trend Micro Web Protection Module2-25Viewing the Client Information AnalysisThe following section describes how to view and analyze client infor
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-266. To view the details about each property, click the Applicable Computers tab.FIGURE
Using Trend Micro Web Protection Module2-27Viewing the Site Statistics AnalysisYou can also view the site statistics analysis.To view the site statist
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-287. To view the details of each property, click the Results tab.FIGURE 2-53. Results
Using Trend Micro Web Protection Module2-298. To deactivate the analysis, return to the click the here link in the Action window.The Web Protection Mo
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-30Note: The Web Protection Module Dashboard only reports the information that is current
Using Trend Micro Web Protection Module2-31• Filters—Use these filters to restrict and organize Dashboard information. After you set them, these setti
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-32• Blocked Sites—This table lists the Web sites blocked for the endpoints specified usi
Using Trend Micro Web Protection Module2-33To further sort a display, click or double-click on a column header. The header color changes and displays
iiiPrefacePrefaceWelcome to the Trend Micro™ Web Protection Module User’s Guide. This guide contains information about product settings and service le
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-34FAQsWhat is the performance impact of the Web Protection Module Agent on network perfo
Using Trend Micro Web Protection Module2-35SupportSearch the Trend Micro User Forums for discussion threads and community-based support on a wide vari
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-36
Trend Micro™ Web Protection Module 1.0 Administrator’s Guideiv• Incompatible Software• Process OverviewTrend Micro Web Protection Module Documentation
PrefacevDocument ConventionsTo help you locate and interpret information easily, the Web Protection Module documentation uses the following convention
Comentários a estes Manuais