Microweb PRO Series Guide de l'utilisateur Page 1

Naviguer en ligne ou télécharger Guide de l'utilisateur pour Serveurs Microweb PRO Series. Microweb PRO Series User`s guide Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 72
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
Web Protection Module
1
for Endpoint Security Platform
Administrators Guide
Endpoint Security
ditS
e
e
e
e
Vue de la page 0
1 2 3 4 5 6 ... 71 72

Résumé du contenu

Page 1 - Web Protection Module

Web Protection Module1for Endpoint Security PlatformAdministrator’s GuideEndpoint SecurityditSeeee

Page 2

Trend Micro™ Web Protection Module 1.0 Administrator’s Guidevi• Microsoft™ Windows™ Server 2008 Enterprise Edition (with the latest service pack)• Mic

Page 3

PrefaceviiIncompatible Software• Trend Micro™ RUBotted (Beta)• Trend Micro™ TrendProtect 1.2• Trend Micro™ Web Protection Add-On (Any)• Trend Micro™ O

Page 4

Trend Micro™ Web Protection Module 1.0 Administrator’s GuideviiiYou will see a new Web Protection Module entry in the Dashboards menu and links to Web

Page 5 - Contents

1-1Chapter 1Installing Trend Micro Web Protection ModuleThis section provides instructions for performing the most common tasks with Trend Micro Web P

Page 6

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-2Checking for Incompatible SoftwareTrend Micro Web Protection Module includes several A

Page 7

Installing Trend Micro Web Protection Module1-34. If one of the AUDIT fixlets appears, double-click on it to display the Document tabs for the message

Page 8 - Audience

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-4Deploying Trend Micro Web Protection Module AgentsYou will now need to deploy the appl

Page 9 - Document Conventions

Installing Trend Micro Web Protection Module1-5An Action window appears in which you can track the progress of your deployment. When it is finished, t

Page 10 - Compatible Software

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-63. Click the here link in the Actions box. The Take Action window appears.4. Select th

Page 11 - Process Overview

Installing Trend Micro Web Protection Module1-7To enable log maintenance:1. From the Tasks Navigation bar, click the View Applicable Web Protection Mo

Page 13 - Chapter 1

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-8value in the indicated drop-down. You can increase the frequency with which logs are a

Page 14

Installing Trend Micro Web Protection Module1-9• Archive the current URL history and Web threat logs• Delete archived logs older than number of days y

Page 15 - Protection Module agents

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-10Note: If you want to change log maintenance behavior, first find any older log mainte

Page 16 - Private Key Password page

Installing Trend Micro Web Protection Module1-11To configure one or more of the Agent’s proxy settings:1. From the Tasks Navigation bar, click the Vie

Page 17 - Action window

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-12Encrypting a Proxy StringIf your proxy server requires a password, you must encrypt i

Page 18 - Configuring Log Maintenance

Installing Trend Micro Web Protection Module1-13Configuring the ProxyYou must configure the proxy settings as described in the section that follows.To

Page 19 - To enable log maintenance:

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-143. Enter the port number and click OK. Another window appears asking for the username

Page 20 - Take Action window

Installing Trend Micro Web Protection Module1-157. Enter your Private Key Password and click OK. An Action window appears in which you can track the p

Page 21

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-16Note: Because ESP saves the proxy configuration for each user, you can easily re-enab

Page 22 - Configuring Proxy Settings

Installing Trend Micro Web Protection Module1-175. Enter your Private Key Password and click OK. An Action window appears in which you can track the p

Page 23

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing an

Page 24 - Encrypting a Proxy String

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-18Configuring the Web Reputation Technology Security LevelTrend Micro Web Protection Mo

Page 25 - Configuring the Proxy

Installing Trend Micro Web Protection Module1-19To set the WRT security level for one or more of your endpoints:1. From the Tasks Navigation bar, clic

Page 26 - Action Parameter window 4

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-20helpful if individuals in your environment use something other than a Web browser to

Page 27 - Disabling a Proxy Server

Installing Trend Micro Web Protection Module1-21To enable alert notification:1. From the Tasks Navigation bar, click the View Applicable Web Protectio

Page 28 - To disable WRT:

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-22To disable alert notification:1. From the Tasks Navigation bar, click the View Applic

Page 29

Installing Trend Micro Web Protection Module1-23To see the client ID for an individual endpoint, see the Properties area of the Computer Summary tab.

Page 30 - TABLE 1-1

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide 1-24

Page 31

2-1Chapter 2Using Trend Micro Web Protection ModuleThis section provides instructions on using the Web Protection Module.This chapter covers the follo

Page 32 - Threat Detection screen

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-2Blacklist and Whitelist PoliciesThe Web Protection Module Blacklist-Whitelist Wizard en

Page 33 - To enable alert notification:

Using Trend Micro Web Protection Module2-3Creating and Deploying a New PolicyThis section describes how to create and deploy a new blacklist/whitelist

Page 34 - Uploading Logs

The user documentation for Trend Micro™ Web Protection Module 1.0 is intended to introduce the main features of the software and installation instruct

Page 35

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-42. Click New. The Blacklist-Whitelist Configuration – New Policy window appears with th

Page 36

Using Trend Micro Web Protection Module2-53. Enter a name for your policy in the Policy Name field.FIGURE 2-30. Policy Name field4. In the Blacklist

Page 37 - Chapter 2

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-6Note: You can block as many as 500 URLs per policy. If you wish to block more, create a

Page 38

Using Trend Micro Web Protection Module2-77. When you are finished creating your policy, click Finish. The Edit Task window appears.FIGURE 2-31. Edi

Page 39

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-811. In the Filter Panel, click My Custom Tasks. Your new Blacklist / Whitelist policy a

Page 40

Using Trend Micro Web Protection Module2-9An Action window appears in which you can track the progress as ESP deploys your Blacklist / Whitelist polic

Page 41 - Policy Name field

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-105. Click the Import List tab. The Import List pane appears.FIGURE 2-34. Import List

Page 42

Using Trend Micro Web Protection Module2-119. Select the file and click Open. The path to the selected file appears in the Import pane.FIGURE 2-35.

Page 43 - Edit Task window

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-1210. Click Import. An ActiveX warning message appears.FIGURE 2-36. ActiveX Warning me

Page 44 - Task Pane screen

Using Trend Micro Web Protection Module2-1312. Click Finish to end the import process and start generating the relevant Custom Action. Note: To see th

Page 45 - Importing Lists of Web Sites

iContentsPrefaceTrend Micro Web Protection Module Documentation ...ivAudience ...

Page 46 - Import List tab

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-142. Select the name of the Blacklist / Whitelist policy you want to examine and click V

Page 47 - Import List pane

Using Trend Micro Web Protection Module2-15keyboard. You can also return to the Policy view by clicking Back. (In this case, the Import List feature i

Page 48 - Blacklist / Whitelist Wizard

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-16Copying and Editing a PolicyThe Web Protection Module enables you to create copies of

Page 49 - Viewing an Existing Policy

Using Trend Micro Web Protection Module2-17The name of the policy appears in the form of “Copy of…” followed by the policy name you chose to copy. The

Page 50

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-18To make modifications using the Edit Task window, either access it as part of the Cust

Page 51 - Cancel or Close

Using Trend Micro Web Protection Module2-19Use the Description tab to make modifications to the task name, title, and description. Use the Actions tab

Page 52 - Copying and Editing a Policy

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-20Use the Relevance tab to view and make modifications to the relevance of a Custom Task

Page 53 - Editing Custom Actions

Using Trend Micro Web Protection Module2-21Use the Properties tab to view and modify the properties of this custom task.FIGURE 2-46. Properties tab

Page 54 - FIGURE 2-43. Edit Task tabs

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-22To delete a policy:1. Click Wizards > Web Protection Module Blacklist-Whitelist Wiz

Page 55 - FIGURE 2-44. Actions tab

Using Trend Micro Web Protection Module2-237. Click OK. The Private Key Password window appears.8. Enter your Private Key Password and click OK. ESP d

Page 56 - FIGURE 2-45. Relevance tab

Trend Micro™ Web Protection Module 1.0 Administrator’s Guideii

Page 57 - Deleting a Policy

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-24The Site Statistics analysis displays statistical information about the number of Web

Page 58 - Remove Task window

Using Trend Micro Web Protection Module2-25Viewing the Client Information AnalysisThe following section describes how to view and analyze client infor

Page 59 - Analyses

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-266. To view the details about each property, click the Applicable Computers tab.FIGURE

Page 60 - NAME FIELD DESCRIPTION

Using Trend Micro Web Protection Module2-27Viewing the Site Statistics AnalysisYou can also view the site statistics analysis.To view the site statist

Page 61

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-287. To view the details of each property, click the Results tab.FIGURE 2-53. Results

Page 62 - View as Summary option

Using Trend Micro Web Protection Module2-298. To deactivate the analysis, return to the click the here link in the Action window.The Web Protection Mo

Page 63

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-30Note: The Web Protection Module Dashboard only reports the information that is current

Page 64 - FIGURE 2-53. Results tab

Using Trend Micro Web Protection Module2-31• Filters—Use these filters to restrict and organize Dashboard information. After you set them, these setti

Page 65

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-32• Blocked Sites—This table lists the Web sites blocked for the endpoints specified usi

Page 66 - <server installation

Using Trend Micro Web Protection Module2-33To further sort a display, click or double-click on a column header. The header color changes and displays

Page 67 - CATEGORY DESCRIPTION

iiiPrefacePrefaceWelcome to the Trend Micro™ Web Protection Module User’s Guide. This guide contains information about product settings and service le

Page 68

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-34FAQsWhat is the performance impact of the Web Protection Module Agent on network perfo

Page 69 - Ad-Hoc Listings

Using Trend Micro Web Protection Module2-35SupportSearch the Trend Micro User Forums for discussion threads and community-based support on a wide vari

Page 70

Trend Micro™ Web Protection Module 1.0 Administrator’s Guide2-36

Page 71

Trend Micro™ Web Protection Module 1.0 Administrator’s Guideiv• Incompatible Software• Process OverviewTrend Micro Web Protection Module Documentation

Page 72

PrefacevDocument ConventionsTo help you locate and interpret information easily, the Web Protection Module documentation uses the following convention

Commentaires sur ces manuels

Pas de commentaire