CSM4SMB v3 AG
CSM4SMB v3 AG
CSM4SMB v3 AG
Client Server
Messaging Security3
for Small and Medium Business
Administrator’s Guide
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Trend Micro Incorporated reserves the right to make changes to this document and to
the products described herein without notice. Before installing and using the
software, please review the readme files, release notes and the latest version of the
Getting Started Guide, which are available from Trend Micro's Web site at:
http://www.trendmicro.com/download/default.asp
NOTE: A license to the Trend Micro Software includes the right to product updates,
pattern file updates, and basic technical support for one (1) year from the date of
purchase only. Thereafter, you must renew Maintenance on an annual basis by
paying Trend Micro’s then-current Maintenance fees to have the right to continue
receiving product updates, pattern updates, and basic technical support.
To order renewal Maintenance, you may download and complete the Trend Micro
Maintenance Agreement at the following site:
http://www.trendmicro.com/en/purchase/license/overview.htm
Trend Micro, the Trend Micro t-ball logo, TrendLabs, Damage Cleanup Services,
OfficeScan, PC-cillin, and ScanMail are trademarks of Trend Micro Incorporated
and are registered in certain jurisdictions. All other brand and product names are
trademarks or registered trademarks of their respective companies or organizations.
Copyright © 1998-2007 Trend Micro Incorporated. All rights reserved. No part of
this publication may be reproduced, photocopied, stored in a retrieval system, or
transmitted without the express prior written consent of Trend Micro Incorporated.
Document Part No. CMEM33118/70305
Release Date: March 2007
Protected by U.S. Patent Nos. 5,623,600; 5,889,943; 5,951,698; and 6,119,165
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
The Administrator’s Guide for Trend Micro Client/Server and Client Server
Messaging Security for SMB is intended to introduce the main features of the
software and installation instructions for your production environment. You should
read it prior to installing or using the software.
Detailed information about how to use specific features within the software are
available in the online help file and online Knowledge Base at Trend Micro’s Web
site.
Trend Micro is always seeking to improve its documentation. If you have questions,
comments, or suggestions about this or any Trend Micro documents, please contact
us at [email protected]. Your feedback is always welcome. Please
evaluate this documentation on the following site:
www.trendmicro.com/download/documentation/rating.asp
CSM4SMB-v3-AG.book Page i Monday, April 23, 2007 10:40 AM
Contents
Contents
Preface
How this Book Is Organized ................................................................. ii
Using the Trend Micro Client Server Messaging Security for SMB
Documentation .................................................................................. iii
i
CSM4SMB-v3-AG.book Page ii Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
ii
CSM4SMB-v3-AG.book Page iii Monday, April 23, 2007 10:40 AM
Contents
iii
CSM4SMB-v3-AG.book Page iv Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
iv
CSM4SMB-v3-AG.book Page v Monday, April 23, 2007 10:40 AM
Contents
v
CSM4SMB-v3-AG.book Page vi Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
vi
CSM4SMB-v3-AG.book Page vii Monday, April 23, 2007 10:40 AM
Contents
vii
CSM4SMB-v3-AG.book Page viii Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
viii
CSM4SMB-v3-AG.book Page ix Monday, April 23, 2007 10:40 AM
Contents
ix
CSM4SMB-v3-AG.book Page x Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
x
CSM4SMB-v3-AG.book Page i Monday, April 23, 2007 10:40 AM
Preface
Preface
Welcome to the Trend Micro Client Server Messaging Security for Small and
Medium Businesses Version 3.6Administrator’s Guide. This book contains
information about the tasks you need to do to install and configure Client Server
Messaging Security. This book is intended for novice and experienced users of Client
Server Messaging Security who want to quickly configure, administer, and use the
product.
i
CSM4SMB-v3-AG.book Page ii Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
ii
CSM4SMB-v3-AG.book Page iii Monday, April 23, 2007 10:40 AM
• Getting Started Guide – This guide helps you plan for and install the Trend Micro
Security Server program, modify important default client settings, and roll out your
clients. The latest version of the Getting Started Guide is available in electronic
form at the following location:
http://www.trendmicro.com/download/
• Online help – The purpose of online help is to provide descriptions for performing
the main tasks, usage advice, and field-specific information, such as valid
parameter ranges and optimal values. Online help is accessible from the Trend
Micro Security Dashboard for SMB™.
• Readme file – The Readme file contains late-breaking product information not
found in the online or printed documentation. Topics include a description of new
features, installation tips, known issues and product release history.
• Knowledge Base – The Knowledge Base is an online database of problem-solving
and troubleshooting information. It provides the latest information about known
product issues. To access the Knowledge Base, go to the following Web site:
http://esupport.trendmicro.com
Trend Micro is always seeking to improve its documentation. If you have questions,
comments, or suggestions about this or any Trend Micro documents, please contact
us at [email protected]. Your feedback is always welcome. Please evaluate this
documentation on the following site:
www.trendmicro.com/download/documentation/rating.asp
iii
CSM4SMB-v3-AG.book Page iv Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
iv
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 1
Product Overview
Designed to suit the needs of small- to medium-sized business IT networks, Trend
Micro Client Server Messaging Security for SMB provides network-wide desktop
and server protection.
Network-wide desktop and server protection helps shield servers and computers on
the network from virus and spyware/grayware threats. Client Server Messaging
Security keeps computers on your network up-to-date with the latest pattern files
through centralized management and automatic updates of client installations.
1-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Replace {CD-ROM drive} with the drive letter of the CD-ROM drive on your
computer.
1-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
1-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
1-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
Single-Console Operation
TheTrend Micro Security Server allows you to manage your entire anti-virus system
through a single Web console. The Trend Micro Security Dashboard for SMB is
installed when you install theTrend Micro Security Server and uses standard Internet
technologies such as Java, CGI, HTML, and HTTP.
Outbreak Defense
Use Outbreak Defense to take preemptive steps to secure your network. Outbreak
Defense first informs you of the latest threats, and then takes action to shield your
network and clients from the threat. While Outbreak Defense is protecting your
network and clients, TrendLabs is busy creating a solution to the threat. As soon as
TrendLabs finds a solution, they release updated components. The Security Server
then downloads and deploys the updated components to clients. For the last step,
1-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Outbreak Defense cleans up any virus remnants, and repairs files and directories that
have been damaged by the threat.
Using Outbreak Defense, you can take the following actions in the event of an
outbreak:
• Block ports to help prevent viruses from infecting files on the network
• Write-protect certain files and directories
• Block certain attachments
1-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
Infrastructure (PKI) cryptography standards. The default period for the certificate is
three years.
1-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Quarantine
• Set the Messaging Security Agent to quarantine suspect email messages
• Query logs for quarantine events and resend quarantined messages when you
decide they are safe
Web based management console
• Access remote servers through the Security Dashboard, the secure Web console for
Client Server Messaging Security
Notifications
• Send notifications to recipients or senders of messages containing detected threats
1-8
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 2
2-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
WWW/FTP Mail/Groupware
Server Server File Server
2-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
• Trend Micro Security Server, which hosts the Trend Micro Security Dashboard for
SMB, downloads updates from the Trend Micro ActiveUpdate server, collects and
stores logs, and helps control virus outbreaks.
• Trend Micro Client Server Messaging Security Agent, which protects your
Windows Vista/2000/XP/Server 2003 computers from viruses, spyware/grayware,
Trojans, and other threats
• Trend Micro Messaging Security Agent, which protects Microsoft Exchange
servers, filters spam, and blocks content.
2-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Security Dashboard
Trend Micro
Security Server with
HTTP Web server
2-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
The Client/Server Security Agent reports to the Trend Micro Security Server from
which it was installed. To provide the server with the very latest client information,
the client sends event status information in real time. Clients report events such as
virus and spyware detection, client startup, client shutdown, start of scan, and
completion of an update.
Configure scan settings on clients from the Trend Micro Security Dashboard for
SMB. To enforce uniform desktop protection across the network, choose not to grant
the clients privileges to modify the scan settings or to remove the client program.
2-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
• Virus cleanup template – Used by the Virus Cleanup Engine, this template helps
identify viruses, Trojans and Trojan processes.
• Virus cleanup engine 32-bit – The engine Damage Cleanup Services™ uses to
scan for and remove from memory viruses, Trojans and Trojan processes, and
other malware.
• Messaging Security Agent scan engine – The engine that the Messaging Security
Agent uses to identify viruses and malware.
• IntelliTrap exception pattern – The pattern that the Virus Scan Engines and
Messaging Security Agent scan engine uses to identify exceptions to items listed in
the IntelliTrap pattern.
• IntelliTrap pattern – The pattern that the Virus Scan Engines and Messaging
Security Agent scan engine uses to detect malicious code such as bots in
compressed files.
• Vulnerability pattern – A file that helps Client Server Messaging Security
identify vulnerabilities on client machines.
• Common firewall pattern – Like the virus pattern file, this file helps Client
Server Messaging Security identify virus signatures.
• Common firewall engine 32-bit – The driver the Personal Firewall uses with the
network virus pattern file to scan client machines for network viruses.
• Spyware Pattern – Contains known spyware signatures and used by the spyware
scan engines (both 32-bit and 64-bit) to detect spyware on clients and servers for
manual and scheduled scans
• Spyware Active-monitoring Pattern – Similar to spyware pattern, but is used by
the scan engine for real-time anti-spyware scanning
• Spyware Scan Engine (32-bit) – A separate scan engine that scans for, detects,
and removes spyware from infected clients and servers running on i386 (32-bit)
operating systems (for example, Windows Vista, Windows 2000, and Windows
XP)
• Spyware Scan Engine (64-bit) – Similar to the spyware scan engine for 32-bit
systems, this scan engine scans for, detects, and removes spyware on x64 (64-bit)
operating systems (for example, Windows Vista x64, Windows XP Professional
x64 Edition, Windows 2003 x64 Edition)
• Anti-spam pattern for Messaging Security Agent – The pattern that the
Messaging Security Agent Anti-spam engine uses to detect spam email
2-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
• Anti-spam engine for Messaging Security Agent – The engine that the
Messaging Security Agent uses to detect spam email
• Anti-Rootkit Driver (32-bit) – A module required by the spyware scan engine to
detect rootkits
• Hot fixes and security patches – Workaround solutions to customer related
problems or newly discovered security vulnerabilities that you can download from
the Trend Micro Web site and deploy to the Trend Micro Security Server and/or
client program.
2-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
2-8
CSM4SMB-v3-AG.book Page 9 Monday, April 23, 2007 10:40 AM
Tip: Trend Micro recommends scheduling automatic updates at least hourly. The default
setting for all Trend Micro products is hourly.
You can download virus pattern files from the following Web site, where you can
also find the current version, release date, and a list of all the new virus definitions
included in the file:
http://www.trendmicro.com/download/pattern.asp
The scan engine works together with the virus pattern file to perform the first level of
detection, using a process called pattern matching. Since each virus contains a unique
“signature” or string of telltale characters that distinguish it from any other code, the
virus experts at TrendLabs™ capture inert snippets of this code in the pattern file.
The engine then compares certain parts of each scanned file to the pattern in the virus
pattern file, looking for a match. When the engine detects a match, a virus has been
detected and a notification is sent via an email message to the system administrator.
2-9
CSM4SMB-v3-AG.book Page 10 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
2-10
CSM4SMB-v3-AG.book Page 11 Monday, April 23, 2007 10:40 AM
fixes include a Setup program, while non-Windows hot fixes do not. Typically,
you need to stop the program daemons, copy the file to overwrite its counterpart in
your installation, and restart the daemons.
• Security Patch – A hot fix focusing on security issues and that is suitable for
deployment to all customers. Windows security patches include a Setup program,
while non-Windows patches commonly have a setup script.
• Patch – A group of hot fixes and security patches that solve multiple program
issues. Trend Micro makes patches available on a regular basis. Windows patches
include a Setup program, while non-Windows patches commonly have a setup
script.
• Service Pack – A consolidation of hot fixes, patches, and feature enhancements
significant enough to be a product upgrade. Both Windows and non-Windows
service packs include a Setup program and setup script.
You can obtain hot fixes from your Technical Account Manager. Check the Trend
Micro Knowledge Base to search for released hot fixes:
http://esupport.trendmicro.com/support
Check the Trend Micro Web site regularly to download patches and service packs:
http://www.trendmicro.com/download
Note: All releases include a readme file with the information you need to install, deploy, and
configure your product. Read the readme file carefully before installing the hot fix,
patch, or service pack file(s).
2-11
CSM4SMB-v3-AG.book Page 12 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
2-12
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 3
3-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
3-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
3-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Trend Micro Security Server 733MHz 512MB 1GB Win 2000 Security
SP2 Server:
IE5.5
Win XP
SP1 Web Server:
IIS5.0
Win 2003 IIS5.1
(R2) IIS6.0
Apache2.0.54
SBS2000
Web
SBS2003 Console:
(R2) IE5.5 (Hi-color
display
adaptor
w/1024x768
resolution)
3-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
Win XP
Pro x64
Win 2003
(R2)
Win 2003
x64 (R2)
SBS
2000
SBS
2003 (R2)
Messaging Security Agent 733MHz 512MB 500MB Win 2000 Software:
SP2 Exchange
2000 SP3
Win 2003
(R2) Exchange
2003
SBS2000
SP1a
SBS2003
(R2)
3-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
WARNING! You have the option of installing Apache Web server when you install the Trend
Micro Security Server. By default, the administrator account is the only account
created on the Apache Web server. Trend Micro recommends creating another
account from which to run the Web server; otherwise a hacker may be able to
take control of the Apache server and compromise the Trend Micro Security
Server.
Before installing the Apache Web server, refer to the Apache Web site for the
latest information on upgrades, patches, and security issues:
http://www.apache.org.
Note: If using Remote install to install the Client/Server Security Agent on Windows
Vista/XP clients, you must disable Simple File Sharing unless they are part of a
domain (see your Windows documentation for instructions).
Other Requirements
• Administrator or Domain Administrator access on the computer hosting the
Security Server
• File and printer sharing for Microsoft Networks installed
• Transmission Control Protocol/Internet Protocol (TCP/IP) support installed
Note: If Microsoft ISA Server or a proxy product is installed on the network, you need to
enable the HTTP port ( 80 or 8080) and SSL port (443 or 4343) to enable access to the
Security Dashboard and to ensure that client-server communication can be established.
3-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
Server Performance
Ideally, the computer on which the Trend Micro Security Server is installed would
have the following:
• Single 2.8~3.2 GHz processor
• 500 MB of memory
Note: If a firewall is located between the Trend Micro Security Server and its clients, you
must configure the firewall to allow traffic between the client listening port and the
Trend Micro Security Server’s listening port (see Understanding Client/Server
Security Ports on page 4-7for more information on the types of ports the client and
Trend Micro Security Server use to communicate)
3-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Number of Clients
A client is a computer that has the Client/Server Security Agent software installed on
it. clients can be desktops, servers (even Exchange servers), and notebook computers,
including those that belong to users who telecommute or connect to the corporate
network from their homes.
If you have a heterogeneous client base (that is, if your network has different
Windows operating systems, such as Windows Vista, 2000, XP, or Server 2003),
identify how many clients are using a specific Windows version. Use this
information to decide which client deployment method will work best in your
environment.
Note: A single Trend Micro Security Server can manage up to 2500 clients. If you have
more then this amount, Trend Micro suggests installing more than one Trend Micro
Security Server.
3-8
CSM4SMB-v3-AG.book Page 9 Monday, April 23, 2007 10:40 AM
3-9
CSM4SMB-v3-AG.book Page 10 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
For example, if your network is segmented by location, and the network link between
segments experiences a heavy traffic load, Trend Micro recommends allowing at
least one client on each segment to act as an Update Agent.
Number of Groups
A group in Client Server Messaging Security is a cluster of clients that share the
same configuration and run the same tasks. By clustering your clients into groups,
you can simultaneously configure, manage, and apply the same configuration to all
group members.
A Client Server Messaging Security group is different from a Windows domain.
There can be several Client Server Messaging Security groups in one Windows
domain.
For ease of management, plan how many Client Server Messaging Security groups to
create. You can group clients based on the departments they belong to or the
3-10
CSM4SMB-v3-AG.book Page 11 Monday, April 23, 2007 10:40 AM
functions they perform. Alternatively, you can group clients that are at a greater risk
of infection and apply a more secure configuration to all of them.
3-11
CSM4SMB-v3-AG.book Page 12 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
3-12
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 4
4-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Tip: You can preserve your client settings when you upgrade to this version of Client
Server Messaging Security or if you need to reinstall this version of Client Server
Messaging Security. See Upgrading from a Previous Version on page 4-37 for
instructions.
4-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
Anti-spam No Yes
4-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Note: Client Server Messaging Security cannot uninstall the server component of any
third-party antivirus product, but can uninstall the client component (see Migrating
from Third-party Antivirus Applications on page 5-17 for instructions and for a
list of third party applications Client Server Messaging Security can remove).
SQL Server
You can scan SQL Server databases; however, this may decrease the performance of
applications that access the databases. Trend Micro recommends excluding SQL
Server databases and their backup folders from Real-time Scan. If you need to scan a
database, perform a manual scan during off-peak hours to minimize the impact of the
scan.
4-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
If you do not have either the Registration Key or Activation Code, you can still
install the trial version. The trial version has all the same functionality as the full
version, and if you upgrade within 30 days all of your settings will automatically be
upgraded to the full version. To find out more information contact your Trend Micro
sales representative (see Contacting Technical Support on page 18-14).
Note: If you have questions about registration, please consult the Trend Micro Web site at
the following address:
http://esupport.trendmicro.com/support/viewxml.do?ContentID=e
n-116326
4-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Note: The installation program will automatically detect the name of the SMTP server and
fill in the field if the SMTP server is on the same computer as the CSM server
installation.
4-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
uninstalling or upgrading the Trend Micro Messaging Security Agent, the IIS
Admin service and all related services will automatically be stopped and restarted.
WARNING! If you are installing the Messaging Security Agent on a server that is running
lockdown tools (such as typically implemented for Windows 2000 server with IIS
5.0), remove the lockdown tool so that it does not disable IIS service and cause
the installation to be unsuccessful.
WARNING! Many hacker and virus attacks use HTTP and are directed at ports 80 and/or
8080– commonly used in most organizations as the default Transmission
Control Protocol (TCP) ports for HTTP communications.
If your organization is currently using one of these ports as the HTTP port,
Trend Micro recommends using another port number.
4-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
target computer does not contain viruses, Trojans, or other potentially malicious
code.
The prescan targets the most vulnerable areas of the computer, which include the
following:
• the Boot area and boot directory (for boot viruses)
• the Windows folder
• the Program Files folder
WARNING! Make sure that you do not install the Web server on a computer that is running
applications that might lock IIS. This could prevent successful installation. See
your IIS documentation for more information.
4-8
CSM4SMB-v3-AG.book Page 9 Monday, April 23, 2007 10:40 AM
Tip: Trend Micro highly recommends installing Client Server Messaging Security during
non-peak hours to minimize the effect on your network.
Note: Close any running applications before installing Client Server Messaging Security. If
you install while other applications are running, the installation process may take
longer to complete.
Tip: You can preserve your client settings when you upgrade to this version of Client
Server Messaging Security or if you need to reinstall this version of the Client
Server Messaging Security. See Upgrading from a Previous Version on page
4-37 for instructions.
Note: If information from a previous MSA installation exists on the client, you will be
unable to install MSA successfully. Use the Windows Installer Cleanup Utility to
clean up remnants of the previous installation. To download the Windows Installer
Cleanup Utility, visit http://support.microsoft.com/kb/290301/en-us.
4-9
CSM4SMB-v3-AG.book Page 10 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
4-10
CSM4SMB-v3-AG.book Page 11 Monday, April 23, 2007 10:40 AM
4-11
CSM4SMB-v3-AG.book Page 12 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
5. Click Register Online if the product has not been registered yet. If the product is
already registered, skip this step.
6. Enter the Activation Code in the Activation Code field.
Note: If you do not have an Activation Code, click Next to install the trial version.
Upgrade to the full version before the 30-day trial period ends and all settings
will remain.
4-12
CSM4SMB-v3-AG.book Page 13 Monday, April 23, 2007 10:40 AM
8. Choose whether to prescan your computer for threats by selecting one of the
following options:
• Prescan my computer for threats
• Do not prescan my computer for threats
Note: If you choose to prescan your computer for threats, a threat progress screen will
appear while scanning is taking place. See Actions for Prescan Detections on
page 4-8.
4-13
CSM4SMB-v3-AG.book Page 14 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
10. From the Setup Type screen, choose one of the following options:
• Typical installation (recommended)
• Custom installation
Note: For instructions on performing an installation using the Typical method, see
Performing a Typical Installation on page 4-36. The default values for the
Custom installation are exactly the same as the values for a Typical installation.
11. Click Next. The Setup Overview screen appears. At this time, all of the
pre-installation tasks are complete.
4-14
CSM4SMB-v3-AG.book Page 15 Monday, April 23, 2007 10:40 AM
12. The Setup Overview screen briefly lists the tasks that you need to complete in
order to install the Trend Micro Security Server, Security Dashboard,
Client/Server Security Agent, and Messaging Security Agent.
4-15
CSM4SMB-v3-AG.book Page 16 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
4-16
CSM4SMB-v3-AG.book Page 17 Monday, April 23, 2007 10:40 AM
3. Choose from one of the following server identification options for client-server
communication:
• Server information – Choose Domain name or IP address:
• Domain name – Verify the target server domain name. You can also use
the server’s fully qualified domain name (FQDN) if necessary to ensure
successful client-server communication.
• IP address – Verify that the target server IP address is correct.
4-17
CSM4SMB-v3-AG.book Page 18 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
If the server has multiple network interface cards (NICs), Trend Micro
recommends using one of the IP addresses, instead of the domain name or
FQDN.
• Target directory – Enter the target directory where Trend Micro Security
Server files will be installed.
4. Click Next. The Select Program Folder screen appears.
FIGURE 4-8. Select Program Folder Screen
Note: This screen will not appear if you choose the Typical installation method.
4-18
CSM4SMB-v3-AG.book Page 19 Monday, April 23, 2007 10:40 AM
5. Type a location in the Program folder field where program shortcuts will be
stored or accept the default location.
6. Click Next. The Web Server screen appears allowing you to choose a Web
server
FIGURE 4-9. Web Server Selection Screen
Note: This screen will not appear if you choose the Typical installation method.
7. From the Web Server screen, select a Web server to host the Security
Dashboard. Choose from one of the following:
• IIS server
• Apache web server
8. Click Next. Depending on the type of server chosen, the corresponding screen
appears.
4-19
CSM4SMB-v3-AG.book Page 20 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
4-20
CSM4SMB-v3-AG.book Page 21 Monday, April 23, 2007 10:40 AM
Note: This screen will not appear if you choose the Typical installation method.
Note: If using IIS server, you must specify an IIS Web site, virtual or default. Client
Server Messaging will assign default values for the HTTP and SSL port settings.
4-21
CSM4SMB-v3-AG.book Page 22 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Note: This screen will not appear if you choose the Typical installation method.
11. If a proxy server is required to access the Internet, select the Use a proxy server
check box and then provide the following information:
• Proxy type
• Server or IP address
• Port
• User name
• Password
12. Click Next. The SMTP Server and Notification Recipient(s) screen appears.
4-22
CSM4SMB-v3-AG.book Page 23 Monday, April 23, 2007 10:40 AM
13. The SMTP Server and Notification Recipient(s) screen, requires the following
information:
• SMTP Server
• Port
• Recipient(s)
Note: The installation program will automatically detect the name of the SMTP server
and fill in the SMTP Server and Port fields if the SMTP server is on the same
computer as the CSM server installation.
4-23
CSM4SMB-v3-AG.book Page 24 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
16. Click Next. The World Virus Tracking Program screen appears.
4-24
CSM4SMB-v3-AG.book Page 25 Monday, April 23, 2007 10:40 AM
4-25
CSM4SMB-v3-AG.book Page 26 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
4-26
CSM4SMB-v3-AG.book Page 27 Monday, April 23, 2007 10:40 AM
Note: If the local server does not have Exchange server on it, the Messaging Security
agent option will be unavailable.
4-27
CSM4SMB-v3-AG.book Page 28 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Note: The installation program will automatically detect the name of the local Exchange
server and fill in the Exchange Server field if the Exchange server is on the same
computer as the CSM server installation.
4-28
CSM4SMB-v3-AG.book Page 29 Monday, April 23, 2007 10:40 AM
Note: This screen will not appear if you choose the Typical installation method.
4-29
CSM4SMB-v3-AG.book Page 30 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Note: Anonymous Access is required for communication between the Security Server and
the Messaging Security Agent. The installation program will automatically enable
Anonymous Access Authentication Methods for the Messaging Security Agent. To
view the Anonymous Access Authentication Methods, access the Messaging Security
Agent Web site on the IIS console.
Note: This screen will not appear if you choose the Typical installation method.
4-30
CSM4SMB-v3-AG.book Page 31 Monday, April 23, 2007 10:40 AM
Note: This screen will not appear if you choose the Typical installation method.
Note: The Client/Server Security Agent applies the Path and Port settings to both local
and remote clients.
4-31
CSM4SMB-v3-AG.book Page 32 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
9. Click Next. The installation process begins installing the Security Server,
Messaging Security Agent, and Client/Server Security Agent. Upon completion,
the Remote Messaging Security Agent Installation Stage screen appears.
Note: The next step assumes that you selected install Remote Messaging Security
Agent from the Component Selection screen. If you chose not to select the
option to install the Remote Messaging Security Agent, an InstallShield Wizard
Complete screen will appear.
4-32
CSM4SMB-v3-AG.book Page 33 Monday, April 23, 2007 10:40 AM
2. Click Next. The Install Remote Messaging Security Agent screen appears.
4-33
CSM4SMB-v3-AG.book Page 34 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
3. To install Messaging protection to a remote Exchange server, click Yes and then
enter the Domain Administrator account information.
• Exchange Server
• Account
• Password
Note: If you chose No, the InstallShield Wizard Complete screen will appear, and the
installation process will be complete. If you chose Yes, upon completion of the
Remote Messaging Security Agent installation, you will be prompted to install
another Remote Messaging Security Agent.
4. Click Next. The Remote Messaging Security Agent Settings screen appears.
4-34
CSM4SMB-v3-AG.book Page 35 Monday, April 23, 2007 10:40 AM
Note: This screen will not appear if you choose the Typical installation method.
4-35
CSM4SMB-v3-AG.book Page 36 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
4-36
CSM4SMB-v3-AG.book Page 37 Monday, April 23, 2007 10:40 AM
4-37
CSM4SMB-v3-AG.book Page 38 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Note: If you upgrade the Client/Server Suite Server or Client Server Messaging Security
Server that is running of a Windows NT4 server, the upgrade process will be
interrupted and a warning message will appear. This happens as well if you upgrade
Client/Server Agent on a Windows 9x/NT client. If you continue with the upgrade, the
Client/Server Agent will be unable to report to the CSM Server.
Client Server Messaging Security 3.6 does not support upgrade under the following
conditions:
• Upgrade to Client Server Messaging Security 3.6 from OfficeScan Enterprise
Edition or ScanMail for Microsoft Exchange.
• Upgrade from one language to another.
• Client Server Security 3.6 will not upgrade Client/Server Security Agents running
on Windows 9x/ME/NT clients.
• Upgrade from Client/Server Suite 2.0 to Client Server Security 3.6
• Upgrade from Client/Server Suite 2.0 to Client Server Messaging Security 3.6
Trend Micro recommends deleting all virus log files from the Trend Micro Security
Server before upgrading. If you want to preserve the virus log files, save them to
another location first.
4-38
CSM4SMB-v3-AG.book Page 39 Monday, April 23, 2007 10:40 AM
4-39
CSM4SMB-v3-AG.book Page 40 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Tip: Before upgrading, check the size of your log files. If the log file is very large, Trend
Micro recommends that you run maintenance using your current version before you
upgrade. This will greatly reduce the amount of time required for upgrade.
• The quarantine and backup folders are retained during upgrading; however, you
will no longer be able to query the quarantined log or resend the quarantined items
from the previous version from the Security Dashboard of the upgraded version.
• If the previous version of Client Server Messaging Security used eManager, then
Client Server Messaging Security 3.6 retains the anti-spam logs from that version.
The old anti-spam rule CSM 3.6 imports the rule as a Content
Filtering rule
4-40
CSM4SMB-v3-AG.book Page 41 Monday, April 23, 2007 10:40 AM
Client Server Messaging Security 3.6 supports all eManager message blocking
actions described in the following table:
TABLE 4-4. Effect of Upgrading eManager Anti-spam Actions
Quarantine Quarantine
Archive Archive
Delete Quarantine
Clean Clean
ScanMail 6.x used Delete to remove The behavior of the Replace with text/file action
the contents of a message and is the same as the behavior of delete in
replace it with a warning text. ScanMail 6.x. Client Server Messaging Security
3.6 converts this action to replace with text/file.
Pass Pass
4-41
CSM4SMB-v3-AG.book Page 42 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
or if using SSL:
https://{Client Server Messaging Security_server_name}:{port
number}/SMB
4-42
CSM4SMB-v3-AG.book Page 43 Monday, April 23, 2007 10:40 AM
Note: Uninstalling the Trend Micro Security Server does not uninstall clients.
Uninstall or move all clients before uninstalling the Trend Micro Security
Server.
4-43
CSM4SMB-v3-AG.book Page 44 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
4-44
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 5
5-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Tip: In organizations where IT policies are strictly enforced, Remote Install and Login
Script Setup are recommended.
• Internal Web page – Instruct the users in your organization to go to the internal
Web page and download the Client/Server Security Agent setup files (see
Installing from the Internal Web Page on page 5-4)
• Login Script Setup – Automate the installation of the Client/Server Security
Agent to unprotected computers when they log on to the domain (see Installing
with Login Script Setup on page 5-5)
• Client Packager – Deploy the Client/Server Security Agent setup or update files
to clients via email (see Installing with Client Packager on page 5-7)
• Windows Remote Install – Install the Client/Server Security Agent program on
all Windows Vista/2000/XP/Server 2003 clients from your Web console (see
Installing with Windows Remote Install on page 5-11)
• Trend Micro™ Vulnerability Scanner (TMVS) – Install the Client/Server
Security Agent on all Windows Vista/2000/XP (Professional)/Server 2003 clients
with the Trend Micro Vulnerability Scanner (Installing with Vulnerability Scanner
on page 5-13)
5-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
TABLE 5-1. Trend Micro Client Server Messaging Security Agent Deployment
Methods
Windows
Login Client
Web page scripts packager Remote TMVS
Install
To use any of these Client/Server Security Agent deployment methods, you must
have local administrator rights on the target computers.
5-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Note: Close any running applications on the client computers before installing the
Client/Server Security Agent. If you install while other applications are running, the
installation process may take longer to complete.
Tip: You can use Vulnerability Scanner to see which clients have not followed the
instructions to install from the Security Dashboard (see Using Vulnerability
Scanner to Verify the Client Installation on page 5-21 for more information).
Users must have Microsoft Internet Explorer 5.5 or later with the security level set to
allow ActiveX controls to successfully download the Client/Server Security Agent
setup files. The instructions below are written from the client user perspective. Email
your users the following instructions to install the Client/Server Security Agent from
the internal Web server.
To install from the internal Web page:
1. Open an Internet Explorer window and type one of the following:
5-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
The installation starts. Once installation is completed, the screen displays the
message, "Agent installation is complete".
3. Verify the installation by checking if the Client/Server Security Agent icon
appears in the Windows system tray.
Note: In order to enforce the use of login script installation method, client computers must
be listed in the Windows Active Directory of the server that is performing the
installation.
5-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
5-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
Note: When an unprotected computer logs on to the servers whose login scripts you
modified, autopcc.exe will automatically install the client to it.
5-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
When users receive the package, all they have to do is double-click the file to run the
setup program. Client/Server Security Agents installed using Client Packager report
to the server where Client Packager created the setup package. This tool is especially
useful when deploying the Client/Server Security Agent setup or update files to
clients in low-bandwidth remote offices.
Note: Client packager requires a minimum of 140MB free disk space on the client. Windows
Installer 2.0 is necessary for the client to run an MSI package.
Note: In Windows Vista clients, the program must be executed with Administrator
rights (Run as Administrator).
• Microsoft Installer Package Format (MSI) – This file type conforms to the
Microsoft Windows Installer package specifications. For more information on
MSI, see the Microsoft Web site.
Tip: Trend Micro recommends using Active Directory to deploy an MSI package with
Computer Configuration instead of User Configuration. This helps ensure that the
MSI package will be installed regardless of which user logs on to the machine.
Note: Install Microsoft Outlook to use the Client Packager send mail option.
Note: You must run the program from the Trend Micro Security Server only.
5-8
CSM4SMB-v3-AG.book Page 9 Monday, April 23, 2007 10:40 AM
4. In Target operating system, select the operating system for which you want to
create the package.
5. Select the type of package you want to create:
• Setup – Select if installing the Client/Server Security Agent program.
• Update – Select if updating Client/Server Security Agent components only.
6. Select from among the following installation options under Options:
• Silent Mode – Creates a package that installs on the client machine in the
background, unnoticeable to the client. The installation status window will not
appear.
• MSI Package – Creates a package that conforms to the Microsoft Windows
Installer Package Format.
Note: If you select MSI Package, the package file has an .msi extension; otherwise, it
has an .exe extension. The MSI package is for Active Directory deployment
only. For local installation, create an .exe package.
• Disable Prescan (only for fresh-install) – Disables the normal file scanning
that Client/Server Security performs before starting setup.
7. Under Components, select the components to include in the installation
package:
• Program – All components (if you select Program, Client Packager
automatically selects the other components).
• Scan engine – The latest scan engine on the Trend Micro Security Server.
• Virus pattern – The latest virus pattern file on the Trend Micro Security
Server.
• Common Firewall Driver – The driver for Personal Firewall
• Network Virus Pattern – The latest pattern file specifically for network
viruses
• DCE/DCT – The latest virus cleanup engine and template on the Trend Micro
Security Server
8. Select the Client/Server Security Agent utilities to include in the package:
5-9
CSM4SMB-v3-AG.book Page 10 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
• POP3 Mail Scan – Performs a virus scan on the client's Post Office Protocol 3
(POP3) mail messages and attachments as they are downloaded from the mail
server.
9. Ensure that the location of the ofcscan.ini file is correct next to Source file.
To modify the path, click to browse for the ofcscan.ini file. By default,
this file is located in the \PCCSRV folder of the Trend Micro Security Server.
10. In Output file, click to specify the file name (for example,
ClientSetup.exe) and the location to create the client package.
11. Click Create to build the client package. When Client Packager finishes creating
the package, the message "Package created successfully" appears. To verify
successful package creation, check the output directory you specified.
12. Send the package to your users via email, or copy it to a CD or similar media and
distribute among your users.
WARNING! You can only send the package to the Client/Server Security Agents that report to
the server where the package was created. Do not send the package to
Client/Server Security Agents that report to other Trend Micro Security Servers.
Note: Microsoft Outlook is necessary to use the Client Packager email function.
5-10
CSM4SMB-v3-AG.book Page 11 Monday, April 23, 2007 10:40 AM
Note: You cannot use Windows Remote Install to install the Client/Server Security Agent on
machines running Windows XP Home Edition.
Note: Installing CSA on Windows Vista requires a few additional steps. Refer to Enabling
CSA Remote Install on Windows Vista Clients on page 5-12 for additional
details.
1. From the Security Dashboard main menu, click Security Settings > Add. The
Add Computer screen appears.
2. Select Desktop or server from under Computer Type and then select Remote
install from under Method.
3. Click Next. The Remote Install screen appears.
5-11
CSM4SMB-v3-AG.book Page 12 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
4. From the list of computers in the Groups and Computers box, select a client,
and then click Add >>. A prompt for a user name and password to the target
computer appears. You need administrator rights to the target computer.
5. Type your user name and password, and then click Login. The target computer
appears in the Selected Computers list box.
6. Repeat these steps until the list displays all the Windows computers in the
Selected Computer list box.
7. Click Install to install the Client/Server Security Agent to your target computers.
A confirmation box appears.
8. Click Yes to confirm that you want to install the client to the target computers. A
progress screen appears as the program copies the Client/Server Security Agent
files to each target computer.
When Client Server Messaging Security completes the installation to a target
computer, the installation status will appear in the Result field of the selected
computers list, and the computer name appears with a green check mark.
Note: Windows Remote Install will not install the Client/Server Security Agent on a
machine already running a Trend Micro Security Server.
Note: If the company security policy is to disable Windows Firewall, proceed to step 2
to start the Remote Registry service.
5-12
CSM4SMB-v3-AG.book Page 13 Monday, April 23, 2007 10:40 AM
c. Under the Program or port list in the Exceptions tab, make sure the File
and Printer Sharing check box is selected.
d. Click OK.
2. Temporarily start the Remote Registry service.
a. Open Microsoft Management Console.
Note: You can use Vulnerability Scanner on machines running Windows 2000 or Server
2003; however, the machines cannot be running Terminal Server.
You cannot install the Client/Server Security Agent with Vulnerability Scanner if an
installation of the Trend Micro Security Server is present on the same machine.
5-13
CSM4SMB-v3-AG.book Page 14 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
3. Under Trend Micro Security Server Setting (for Install and Log Report),
type the Trend Micro Security Server name and port number.
5-14
CSM4SMB-v3-AG.book Page 15 Monday, April 23, 2007 10:40 AM
5-15
CSM4SMB-v3-AG.book Page 16 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
9. Verify that the Exchange server settings that you specified in the previous screens
are correct, and then click Next to start the MSA installation.
10. To view the status of the MSA installation, click the Live Status tab.
5-16
CSM4SMB-v3-AG.book Page 17 Monday, April 23, 2007 10:40 AM
Manual Scan
Scan type Full scan Quick scan
5-17
CSM4SMB-v3-AG.book Page 18 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Refer to Table for a list of third-party client applications that Client Server
Messaging Security can automatically remove.
Note: Client Server Messaging Security only removes the following client installations,
not server installations
Trend Micro
Symantec™
McAfee™
VirusScan™ Enterprise 8.0, 7.1, 7.0, Virus Scan (MSPlus98), WebScanX v3.1.6, VirusScan
ASaP, 95 {3.20,4.01,4.02, 4.03(#4023),4.03a (#4059)}, NT 4.03a (#4019), 5.15, 5.16, 5.21,
6.01, 4.5, 4.51, Thin Client (TC)
Managed VirusScan
5-18
CSM4SMB-v3-AG.book Page 19 Monday, April 23, 2007 10:40 AM
SpamKiller
SecurityCenter
Dr.Solomon™ 4.0.3
Dr.Solomon™ 4.0.3 NT
Dr.Solomon™ 7.77, 7.95 NT
LANDesk™
VirusProtect™ 5.0
Computer Associates™
Ahnlab™
Panda Software™
Platinum™ 7.0
5-19
CSM4SMB-v3-AG.book Page 20 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
FileSecure
CVPSecure
FileSecure Workstation
F-Sercure™
Backweb™
Management Agent™
Internet Shield
E-mail Scanning
Kaspersky™
Sophos™
Anti-Virus 9x
Authentium™
Command AntiVirus™ win 2000/XP, 4.64 for win 9x/ME, 4.8, 4.9, 4.90.0 Standalone, 4.8, 4.9,
4.91.0 Enterprise,
Grisoft™
Others
PER Antivirus
eSafe Desktop v3
Norman Virus Control
5-20
CSM4SMB-v3-AG.book Page 21 Monday, April 23, 2007 10:40 AM
NOD32 AV
ViRobot 2k Professional
Note: You can use Vulnerability Scanner on machines running Windows 2000 and Server
2003; however, the machines cannot be running Terminal Server.
5-21
CSM4SMB-v3-AG.book Page 22 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
5-22
CSM4SMB-v3-AG.book Page 23 Monday, April 23, 2007 10:40 AM
change the default CSV folder, click Browse, select a target folder on your
computer or on the network, and then click OK.
10. Under Ping Settings, specify how Vulnerability Scanner will send packets to the
computers and wait for replies. Accept the default settings or type new values in
the Packet size and Timeout fields.
11. Click OK. The Vulnerability Scanner console appears.
12. To run a manual vulnerability scan on a range of IP addresses, do the following:
a. In IP Range to Check, type the IP address range that you want to check for
installed antivirus solutions and unprotected computers.
b. Click Start to begin checking the computers on your network.
13. To run a manual vulnerability scan on computers requesting IP addresses from a
DHCP server, do the following:
a. Click the DHCP Scan tab in the Results box. The DHCP Start button
appears.
b. Click DHCP Start. Vulnerability scanner begins listening for DHCP requests
and performing vulnerability checks on computers as they log on to the
network.
Vulnerability Scanner checks your network and displays the results in the Results
table. Verify that all desktop and notebook computers have the client installed.
If Vulnerability Scanner finds any unprotected desktop and notebook computers,
install the client on them using your preferred client installation method.
5-23
CSM4SMB-v3-AG.book Page 24 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
The EICAR test script is an inert text file with a .com extension. It is not a virus and
does not contain any fragments of viral code, but most antivirus software will react to
it as if it were a virus. Use it to simulate a virus incident and confirm that email
notifications, HTTP scanning, and virus logs work properly.
Note: Trend Micro also recommends testing a zipped version of the EICAR file. Using
compression software, zip the test script and perform the steps above.
Client/Server Security Agent should show that it detected the EICAR test file.
5-24
CSM4SMB-v3-AG.book Page 25 Monday, April 23, 2007 10:40 AM
5-25
CSM4SMB-v3-AG.book Page 26 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
5-26
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 6
6-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
3. Type your password in the Password text box, and then click Log on. The
browser displays the Live Status screen of the Security Dashboard.
6-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
6-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
6-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
• Use different client and administrative tools to help manage security for the
network and clients.
• View product license information, maintain the administrator password, and help
keep the global business environment safe by joining the World Virus Tracking
program.
Help
• Use the help menu to get answers to Client Server Messaging Security questions,
view other Trend Micro security solutions, and get customer support.
6-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
6-6
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 7
7-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
7-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
2. From the Security Settings screen, select a group, and then click the Configure
tool. The Configure screen for the selected group appears with the
Antivirus/Anti-spyware configuration options displayed by default.
FIGURE 7-2. Security Settings - Desktop/Server Configuration Screen
3. To enable antivirus real-time scan, select the Enable real-time antivirus check
box.
4. To enable anti-spyware real-time scan, select the Enable real-time anti-spyware
check box.
5. Select the Target tab to specify settings for the following options:
• Use IntelliScan – Uses true file type identification – Click to use IntelliScan
(see Trend Micro IntelliScan on page B-3).
• All scannable files – Click to scan all files that the client opens or saves
• Scan files with the following extensions – Click to manually specify the files
to scan based on their extensions
You can add or delete extensions from the default set of extensions.
7-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Tip: You can also use ? and * as wildcards when specifying extensions. For example,
if you want to scan all files with extensions starting with D, you can type .D? or
.D*. Client/Server Security will scan all files with extensions starting with D,
including .DOC, .DOT, and .DAT. This option is only available for Real-time
Scan.
6. From the Select a condition section, choose one of the following conditions for
scanning to occur:
• Scan files being created/modified and retrieved
• Scan files being retrieved
• Scan files being created/modified
7. Exclusions – Select Enable Exclusions to exclude certain directories, files, and
extensions from scanning. See Excluding Files and Folders from Scans on page
7-6
8. Advanced Settings – Select Advanced Settings to choose the following
advanced options:
For Antivirus Only
• Enable IntelliTrap – (Default)
• Scan mapped drives and shared folders on the network
• Scan floppy during system shutdown
• Scan compressed files: Up to {number}compression layers
For Anti-spyware Only
• Click the Modify Spyware/Grayware Approved List link to add to or
modify the list of spyware/grayware applications that are allowed to run on
clients and servers that belong to the group.
i. Use Search or the Quick Find links to locate the spyware/grayware
application that you want to allow.
ii. Select the application name in the left pane. To select multiple
applications, press CTRL while clicking the application names.
iii.Click Add.
9. Click Save to go back to the antivirus/anti-spyware security settings page.
7-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
10. Click the Action tab, and then specify how to handle Internet threats when
Client/Server Security detects them. Scan actions for viruses and spyware are
configured separately.
For Virus Detections
• ActiveAction – (see Trend Micro ActiveAction on page B-4).
• Perform the same action for all detected Internet threats
• Customized action for the following detected threats
In the Action list, select the action to perform on infected files. You can click
Pass, Delete, Rename, Quarantine, and Clean. The recommended scan
action is Clean.
In the Action for Uncleanable Threats list, select the action to perform if a
threat is uncleanable.
Client/Server Security only performs the uncleanable threats action if the
primary action is not successful. You can select actions for the following types
of Internet Threats (the default action is specified below):
• Joke: Quarantine
• Worm/Trojan: Quarantine
• Virus: Clean
• Test virus: Pass
• Packer: Quarantine
• Other threats: Clean
• Backup detected file before cleaning check box – Select this check box
(recommended) to save a copy of the file before it is cleaned. This saves a
copy of the infected file in the following directory on the client computer:
C:\Program Files\Trend Micro\Client Server Security
Agent\Backup
7-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
WARNING! Denying spyware access to the computer does not remove the spyware
threat from infected clients and servers.
7-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
6. To exclude specific directories, type the directory names under Enter the
directory path (E.g. c:\temp\ExcludeDir) and click Add.
7. To exclude specific files by file name, type the file names, or the file name with
full path under Enter the file name or the file name with full directory path
(E.g. ExcludeDoc.hlp; c:\temp\excldir\ExcludeDoc.hlp) and click Add.
Note: All subdirectories in the directory path you specify will also be excluded.
Note: Wildcard characters, such as "*", are not accepted for file extensions.
9. To apply this setting to all future clients that will belong to the group you
selected, click Save.
Note: If Microsoft Exchange Server is running on your client machines, Trend Micro
recommends excluding all Microsoft Exchange Server folders from scanning. To
exclude scanning of Exchange server folders on a global basis, go to
Preferences > Global Settings, click the Server/Desktop tab, and then select
Exclude Microsoft Exchange server folders when installed on Microsoft
Exchange server.
7-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Default Security
Level Description
Low Inbound and outbound traffic allowed, only network viruses blocked.
Default Exception
Action Protocol Port Direction
Name
7-8
CSM4SMB-v3-AG.book Page 9 Monday, April 23, 2007 10:40 AM
Default Exception
Action Protocol Port Direction
Name
Traffic Filtering
Personal Firewall filters all incoming and outgoing traffic, providing the ability to
block certain types of traffic based on the following criteria:
• Direction (incoming or outgoing)
• Protocol (TCP/UDP/ICMP)
• Destination ports
• Destination computer
7-9
CSM4SMB-v3-AG.book Page 10 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
• Overlapping Fragment
• Teardrop
• Tiny Fragment Attack
• Fragmented IGMP
• LAND attack
Exceptions
Exceptions are comprised of specific settings that allow or block different kinds of
traffic based on client port number(s) and IP address(es). You can configure a list of
exceptions. The exceptions in the list override the Security level settings.
Exception settings include the following:
• Action – Block or allow all traffic that meets the exception criteria
• Direction – Inbound or outbound network traffic to/from the client.
• Protocol – The type of traffic: TCP, UDP, ICMP.
• Port(s) – Ports on the client computer on which to perform the action.
• Computers – The computers on the network to which the above traffic criteria
apply.
7-10
CSM4SMB-v3-AG.book Page 11 Monday, April 23, 2007 10:40 AM
3. From the side menu, select Firewall. The Firewall Configuration screen
appears.
FIGURE 7-3. Personal Firewall – Simple Mode Screen
7-11
CSM4SMB-v3-AG.book Page 12 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
7-12
CSM4SMB-v3-AG.book Page 13 Monday, April 23, 2007 10:40 AM
8. Under the Exceptions heading, select the ports to exclude from blocking in the
event of an outbreak.
To add, remove, or edit the port exception list, click the corresponding tool and
follow the onscreen instructions. To create a new exception, perform the
following:
a. Click Add. The Add Exception screen appears.
b. Type a name for the exception.
c. Next to Action, choose whether to allow or deny network traffic for this
exception.
d. Next to Direction, select Inbound and/or Outbound.
e. From the Protocol list, select a network traffic protocol:
• All
• TCP/UDP (default)
• TCP
• UDP
• ICMP
f. Specify ports to exclude from blocking:
• All ports (default)
• Port range
• Specified ports
g. Under Machines, specify client IP addresses.
• All IP addresses (default)
• Single IP – To resolve the client host name to an IP address, click
Resolve.
• IP range
h. Click Save. The Firewall Configuration screen appears with the new
exception in the exception list.
9. Click the check boxes next to the exceptions you want to include.
7-13
CSM4SMB-v3-AG.book Page 14 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Note: Deselecting the Enable Firewall check box will disable the firewall for both simple
and advanced mode.
7-14
CSM4SMB-v3-AG.book Page 15 Monday, April 23, 2007 10:40 AM
7-15
CSM4SMB-v3-AG.book Page 16 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
• Anti-spyware
• Manual Scan settings
• Scheduled Scan settings
• Real-time Scan settings
• Firewall
• Display Firewall tab
• Allow desktops to enable/disable firewall
Note: If you allow clients to enable or disable the firewall, you cannot change these
settings from Security Dashboard. If you do not grant clients this privilege, you
can change these settings from the Security Dashboard. The information under
Local Firewall settings on the client console always reflects the settings
configured from the client console, not the Security Dashboard.
• Mail Scan – Select the check boxes for the Mail Scan privileges to grant
users.
• Display mail scan tab
• Install/upgrade POP3 mail scan module
• Real-time POP3 mail scan settings
• Proxy Setting
• Allow agent user to configure proxy settings
• Update Privileges
• Perform "Update Now!"
• Enable/Disable Scheduled Update
• Update Settings
• Download from Trend Micro ActiveUpdate Server
Tip: To ensure that laptop users are updated when they are out of the office, make
sure that the Download from Trend Micro ActiveUpdate Server option is
selected.
7-16
CSM4SMB-v3-AG.book Page 17 Monday, April 23, 2007 10:40 AM
Note: If you select High, the access permissions settings of the Client/Server Security
Agent folders, files, and registries are inherited from the Program Files folder
(for client machines running Windows Vista/2000/XP/Server 2003).
Therefore, if the permissions settings (Security settings in Windows) of the
WINNT file or Program Files folder are set to allow full read/write access,
selecting High still allows clients full read/write access to the Client/Server
Security Agent folders, files, and registries.
4. Click Save.
Using Quarantine
In Quarantine directory, type a Uniform Resource Locator (URL) or Universal
Naming Convention (UNC) path to store the infected files. If an invalid quarantine
directory is specified, Client Server Messaging Security uses the default quarantine
directory on the client:
C:\Program Files\Trend Micro\Client Server Security Agent\SUSPECT
To set the Quarantine directory:
1. On the main menu, click Security Settings. The Security Settings screen
appears.
7-17
CSM4SMB-v3-AG.book Page 18 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
2. Select a desktop or server and click Configure. The Configuration screen for
the selected item appears.
3. Click Quarantine from the side menu. The Quarantine Directory screen
appears.
FIGURE 7-6. Desktop/Server Quarantine Screen
7-18
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 8
8-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Note: Each detected threat generates one log entry/notification. This means that if
Messaging Security Agent detects multiple threats in a single email, it will generate
multiple log entries and notifications. There may also be instances when the same
threat is detected several times, especially if you are using cache mode in Outlook
2003. When cache mode is enabled, the same threat may be detected both in the
transport queue folder and Sent Items folder, or in the Outbox folder.
8-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
Anti-spam
Content filtering
Attachment blocking
8-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
TABLE 8-1. Trend Micro Default Actions for the Messaging Security Agent
Antivirus
Other
8-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
Note: The speed of real-time scanning depends on its settings. You can increase the
performance of real-time scans by specifying certain file types that are
vulnerable to viruses or by limiting the maximum number of compression layers
to scan.
The following are the basic steps for configuring anti-virus. The Messaging Security
Agent provides identical options to configure Real-time, Manual, and Scheduled virus scans.
Refer to Scanning Exchange Servers for Viruses, Malware, and Other Threats on
page 10-5 for more information about configuring Manual and Scheduled scans.
Step 1: Select the Target tab and set the files to include in your scan.
The target for a scan is the file(s) or content contained in email messages. The
Messaging Security Agent usually scans the files according to the true file type
unless you configure the Messaging Security Agent to scan specific file types.
SeeFile Types Eligible for Scanning on page 8-5.
Step 2: Select the Action tab to set the actions that the Messaging Security Agent
takes when it detects a virus or other threat in the files you specified.
You can select ActiveAction to use the Trend Micro recommended actions or
customize your actions according to the type of threat detected.
When the Messaging Security Agent (MSA) detects a threat in an email, it can send
notifications to the email sender and/or recipients. From this screen, you can choose
who MSA should notify when it detects a threat in an email. See Sending
Notifications as a Course of Action on Detected Email Threats on page 8-12
Step 3: Select the Preferences > Notifications menu item to set who is notified
when virus events occur and how they receive notification. See Configuring Event
Notifications on page 13-2.
8-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
describes the methods that the Messaging Security Agent can use to determine which
files to scan.
All scannable files Messaging Security Agent scans for viruses, worms,
Trojans, and other malicious code in all file attachments -
except unscannable files. Unscannable files are
encrypted or password protected files.
Specific file type The Messaging Security Agent scans only the file types
you specify. File type is determined by file extension
name. For ease of use, Trend Micro has grouped file
extension types in functional groups. Select file types by
group or drill-down to select individual file extension
types.
For some files, such as very large attachments and compressed files, you can set
restrictions on how the Messaging Security Agent scans (See Set Exclusions for
Large Attachments and Compressed Files on page 8-7).
8-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
Note: A compression layer is added each time a file is compressed. That is, if a file is
compressed and then compressed again, it has two layers of compression.
Tip: Trend Micro recommends using Exclusions to set scanning restrictions to protect
against Denial of Service attacks (DoS). DoS attacks cause a loss of service, namely
a network connection. Typically, DoS attacks negatively affect network bandwidth or
overload computer resources such as memory.
See Screening Out Spam on page 8-17 for more information about how the
Messaging Security Agent processes compressed files.
8-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
c. Compares the email with the Trend Micro supplied exception list
d. Applies heuristic scanning rules
e. Compares the email with the Spam signature database
2. Scans for content filtering rule violations
3. Scans for attachments that exceed user defined parameters
4. Scans for viruses (Antivirus)
8-8
CSM4SMB-v3-AG.book Page 9 Monday, April 23, 2007 10:40 AM
8-9
CSM4SMB-v3-AG.book Page 10 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
actions, you can set an action for each type of threat. The Messaging Security Agent
executes the action you set when it detects a threat of the matching type.
Action Description
Replace with The Messaging Security Agent deletes the infected content and replaces
text/file it with text or a file. The email message is delivered to the intended
recipient, but the text replacement informs them that the original content
was infected and was replaced.
Delete entire During real-time scanning, the Messaging Security Agent deletes the
message entire email message. The original recipient will not receive the
message. This option is not available in manual or scheduled scanning.
The delete action in Client Server Messaging Security 3.6 differs from
that of previous versions of Messaging Security such as ScanMail 6.21.
ScanMail 6.21 used the action delete to remove the contents of a
message and replace it with a warning text. The delete entire message
in Client Server Messaging Security 3.6 will completely delete messages
and will not send the message on to the original recipient.
8-10
CSM4SMB-v3-AG.book Page 11 Monday, April 23, 2007 10:40 AM
Action Description
Pass Records virus infection of malicious files in the Virus logs, but takes no
action.
Mass-mailing Behavior
Email-aware viruses, like the infamous Melissa, Loveletter, AnnaKournikova and
others, have the ability to spread through email by automating the infected
computer's email client. Mass-mailing behavior describes a situation when an
infection spreads rapidly between clients and servers in an Exchange environment.
Trend Micro designed the scan engine to detect behaviors that mass-mailing attacks
usually exhibit. The behaviors are recorded in the Virus Pattern file that is updated
using the TrendLabs™ ActiveUpdate Servers.
Enable the Messaging Security Agent to take action against these attacks whenever it
detects a mass-mailing behavior. The action set for mass-mailing behavior takes
precedence over all other actions. The default action against mass-mailing attacks is
Delete entire message.
8-11
CSM4SMB-v3-AG.book Page 12 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
• The Messaging Security Agent does not support the compression format used to
compress the file. The scan engine only cleans files compressed using pkzip and
only when the infection is in the first layer of compression.
For example, consider a compressed file titled “EuropeanBusinessTrip.zip” which
contains the following
FIGURE 8-1. Compression Layers Explained
EuropeanBusinessTrip.zip is 3
compression layers deep.
8-12
CSM4SMB-v3-AG.book Page 13 Monday, April 23, 2007 10:40 AM
Tip: Trend Micro recommends quickly deleting backed up files once you have determined
that the original file was not damaged and that it is usable. If the file becomes
damaged or unusable, send it to Trend Micro for further analysis. (Even if the
Messaging Security Agent has completely cleaned and removed the virus itself, some
viruses damage the original file code beyond repair.)
8-13
CSM4SMB-v3-AG.book Page 14 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
WARNING! If you disable real-time scanning, you are vulnerable to infected files entering the
Exchange environment while the scan is disabled.
8-14
CSM4SMB-v3-AG.book Page 15 Monday, April 23, 2007 10:40 AM
Tip: Using blocking is an effective way to control virus outbreaks. You can temporarily
quarantine all high-risk file types or those with a specific name associated with a
known virus. Later, when you have more time, you can examine the quarantine
folder and take action against infected files.
8-15
CSM4SMB-v3-AG.book Page 16 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
8-16
CSM4SMB-v3-AG.book Page 17 Monday, April 23, 2007 10:40 AM
Action Description
Replace with The Messaging Security Agent deletes the attachment and replaces
text/file it with a text file. The email message is delivered to the intended
recipient, but the text replacement informs them that the original
content was infected and was replaced.
Delete entire During real-time scanning, the Messaging Security Agent deletes
message the entire email message. This option is not available in manual or
scheduled scanning.
8-17
CSM4SMB-v3-AG.book Page 18 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Note: Microsoft Outlook may automatically filter and send messages that MSA detected as
spam to its Junk Mail folder.
Note: The Exchange administrator maintains a separate Approved and Blocked Senders list
for the Exchange server. If an end-user creates an approved sender, but that sender is
on the administrator's Blocked Senders list, the Messaging Security Agent detects
messages from that blocked sender as spam and takes action against those messages.
Note: When importing an Approved and Blocked Senders list, make sure that the text file is
encoded in ANSI format to avoid compatibility issues. If you import the list in
Unicode format, you will unable to import the list successfully.
8-18
CSM4SMB-v3-AG.book Page 19 Monday, April 23, 2007 10:40 AM
• Adult
• Commercial
• Financial
• Spiritual
• Health
• Racial
• Others
Example: If an administrator’s clients work in the banking field, the administrator
might decide to set a high sensitivity level for the "sexual" category - messages in
this category are very likely to be classified as spam. However, it might be more
difficult to filter "commercial" type messages. Therefore, the administrator can set a
low sensitivity level for email messages in the "commercial" category.
8-19
CSM4SMB-v3-AG.book Page 20 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Messages from that sender arrive at Exchange and the Messaging Security Agent
detects them as spam and takes action against them. If the Messaging Security Agent
takes the Quarantine message to user’s spam folder action, it will attempt to deliver
the message to the end user’s Spam folder, but the message will be redirected to the
end user’s inbox instead because the end user has approved that sender.
Note: When you are using Outlook, there is a rule size limit for the amount and size of
addresses on the list. To prevent a system error, the Messaging Security Agent
limits the amount of addresses that an end user can include in his or her approved
sender list (this limit is calculated according to the length and the number of email
addresses)
The Messaging Security Agent supports wildcard matching for Approved and
Blocked Senders lists. It uses the asterisk (*) as the wildcard character.
8-20
CSM4SMB-v3-AG.book Page 21 Monday, April 23, 2007 10:40 AM
The Messaging Security Agent does not support the wildcard match on the username
part. However, if you type a pattern such as “*@trend.com”, the Messaging Security
Agent still treats it as “@trend.com”. This feature applies to user-defined Approved
Senders and Blocked Senders.
8-21
CSM4SMB-v3-AG.book Page 22 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
of false positives. False positives are those emails that the Messaging Security
Agent filters as spam when they are actually legitimate emails.
• Medium
This is the default setting. The Messaging Security Agent monitors at a high level
of spam detection with a moderate chance of filtering false positives.
• Low
This is most lenient level of spam detection. The Messaging Security Agent will
only filter the most obvious and common spam messages, but there is a very low
chance that it will filter false positives.
Note: If a significant volume of spam is not caught by the spam engine, download the Trend
Micro Anti-Spam Pilot for advanced protection against spam. For more information,
visit
http://www.trendmicro.com/en/products/desktop/anti-spam/evaluate/overview.htm.
8-22
CSM4SMB-v3-AG.book Page 23 Monday, April 23, 2007 10:40 AM
The Messaging Security Agent adds a tag to the header information of the email
message that identifies it as phish and then delivers it to the intended recipient.
8-23
CSM4SMB-v3-AG.book Page 24 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
When you click on an individual rule, the Edit rule page opens displaying details
about the rule.
8-24
CSM4SMB-v3-AG.book Page 25 Monday, April 23, 2007 10:40 AM
This type of rule is capable of filtering content from any message in real-time or
during a manual or scheduled scan.
• Filter message that match all conditions defined
This type of rule is capable of filtering content from any message during real-time
scanning.
• Monitor the message content of particular email account(s)
This type of rule monitors the message content of particular email account(s).
Monitoring rules are similar to a general content filter rules, except that they only
filter content from specified email account(s).
• Create exemption for particular email account(s)
This type of rule creates an exemption for particular email account(s). When you
exempt a particular email account, this account will not be filtered for content rule
violations.
To create a rule that filters messages that match any condition defined:
Step 1: Select the type of content rule
1. From the Content Filtering page, click Add.
2. Select Filter messages that match any condition defined.
3. Click Next.
Step 2: Name your rule and select the message part to filter
1. Type the name of your rule in the Rule name field.
2. Click the message part that you want to filter for undesirable content. The MSA
can filter email messages by Header (From, To, and CC), Subject, Body, or
Attachment.
Note: Client Server Messaging Security for SMB only supports filtering of header and
subject content during real-time scans. It does not support filtering of header and
subject content during manual and scheduled scans.
3. Click Next.
Step 3: Set the keywords for which MSA searches
1. Select whether the MSA filters content for "any" or for "all" of the keywords.
8-25
CSM4SMB-v3-AG.book Page 26 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
• "Any" keyword tells MSA to take action against content that contains any of
the keywords in the list.
• "All" tells MSA to take action against content only when the content contains
all of the keywords in the list.
2. Type or import keywords.
• Type a keyword in the space provided.
• Click Add to add it to the list of keywords that MSA checks when
filtering content. MSA can support content filtering for Microsoft Office,
PDF, ZIP, RAR and text files.
• Click Delete to remove keywords from the list.
By default, MSA searches for exact matches of the keywords that you add.
• Click Import to import keyword lists.
When you import a keyword file, the imported keywords appear in the
keyword list. The imported file must be a text (.txt) file. The imported
keywords use the same format as they had in the text file.
3. Click Match case-sensitive to have MSA disregard words that do not match the
keyword's case when filtering content.
4. Set up your list of synonyms.
• Click Match synonym to have MSA consider all the synonyms of the
keyword when filtering content.
• Click next to Match synonym to display the list of synonyms. When you
select a keyword, all of the keyword’s synonyms display in the Synonyms to
exclude list. Use the arrow keys to add and delete synonyms for each
corresponding keyword.
5. Click Next.
Step 4: Set the action MSA takes against content that matches the keyword
1. Select an action for MSA to take when it detects undesirable content. MSA can
perform the following actions when it detects content that matches the rule
conditions:
• Replace with text/file — replaces the filtered content with a text file.
You cannot replace text from the From, To, CC, or Subject fields.
8-26
CSM4SMB-v3-AG.book Page 27 Monday, April 23, 2007 10:40 AM
Note: The actions delete entire message and quarantine are unavailable during manual or
scheduled scans.
3. Click Next.
Step 5: Set the notifications MSA sends when it takes an action
1. On the action page, select the check box for the notification that you want to send
to the infected recipient/sender.
2. Click Save.
8-27
CSM4SMB-v3-AG.book Page 28 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
8-28
CSM4SMB-v3-AG.book Page 29 Monday, April 23, 2007 10:40 AM
8-29
CSM4SMB-v3-AG.book Page 30 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
8-30
CSM4SMB-v3-AG.book Page 31 Monday, April 23, 2007 10:40 AM
Also matches:
"See young, hot, and sexy beauties"
Matches:
"This is a nude picture of sexy buff and bare
naked"
8-31
CSM4SMB-v3-AG.book Page 32 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Note: The operator has a dot immediately preceding and following. There is a space between
the final dot and the keyword.
any keyword MSA searches content that matches Type the word and add it to
the word the keyword list
OR MSA searches for any of the key- Type ".OR." between all
words separated by OR the words you want to
include
For example: apple OR orange. MSA
searches for either apple or orange. If For example:
content contains either, then there is "apple .OR. orange"
a match.
AND MSA searches for all of the keywords Type ".AND." between all
separated by AND the words you want to
include
For example: apple AND orange.
MSA searches for both apple and For example:
orange. If content does not contain "apple .AND. orange"
both, then there is no match.
NOT MSA excludes keywords following Type ".NOT." before a word
NOT from search. you want to exclude
8-32
CSM4SMB-v3-AG.book Page 33 Monday, April 23, 2007 10:40 AM
WILD WILD means wildcard. The wildcard Type ".WILD." before the
symbol replaces a missing part of the parts of the word you want
word. Any words that are spelled to include
using the remaining part of the wild-
card are matched.
For example, if you want to match all
words containing "valu", type
".WILD.valu". The words Valu-
mart, valucash, and valubucks all
match.
Note: MSA does not support using
"?" in the wildcard command
".WILD.".
8-33
CSM4SMB-v3-AG.book Page 34 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Note: Regular expressions are a powerful string matching tool. For this reason, Trend Micro
recommends that administrators who choose to use regular expressions be familiar
and comfortable with regular expression syntax. Poorly written regular expressions
can have a dramatic negative performance impact. Trend Micro’s recommendation is
to start with simple regular expressions that do not use complex syntax. When
introducing new rules, use the archive action and observe how MSA manages
messages using your rule. When you are confident that the rule has no unexpected
consequences, you can change your action.
8-34
CSM4SMB-v3-AG.book Page 35 Monday, April 23, 2007 10:40 AM
• Size
Select an option from the Size drop list and type a number to indicate a size in
bytes. The maximum amount of digits for this field is 10. MSA cannot filter
messages that exceed 2GB.
Note: Client Server Messaging Security for SMB only supports filtering of header and
subject content during real-time scans. It does not support filtering of header and
subject content during manual and scheduled scans.
3. Click Next.
Step 3: Set the action MSA takes against content that matches the keyword
1. Select an action for MSA to take when it detects undesirable content during a
real-time scan. MSA can perform the following actions when it detects content
that matches the rule conditions:
• Quarantine — moves the message to the quarantine directory.
• Delete entire message — deletes the entire email message
• Archive — moves the message to the archive directory and delivers the
message to the original recipient
• Pass — delivers the message without triggering any action.
2. Select whether MSA notifies designated individuals when it takes action against
undesirable content.
3. Click Next.
Step 4: Set the notifications MSA sends when it takes an action
1. Click on the check boxes corresponding to the people MSA will notify.
2. Click ( ) to customize the notification for that recipient.
3. To set Advanced Notification:
• Click SNMP to send notification by SNMP. Click ( ) to customize the SNMP
message.
8-35
CSM4SMB-v3-AG.book Page 36 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
• Click Write to Windows event log to have MSA write the notification to a
Windows event log.
4. Click Finish.
Step 5: Save your configuration
Click Save.
To create a rule that monitors message content for a particular email account(s):
Step 1: Select the type of content rule
1. From the Content Filtering page, click Add.
2. Select Monitor the message content of particular email account(s).
3. Click Next.
Step 2: Name your rule and enter the email account(s) you want to monitor
1. Type a name for your rule in the space provided.
2. Type the mailbox address for the email account that you want to monitor. You
can monitor an email account located in the From, To, and CC part of the header.
3. Click Next.
Step 3: Select the message part to filter and add keywords
1. Click the message part that you want to filter for undesirable content. MSA can
filter email messages by Subject, Body, or Attachment. MSA can support
content filtering for Microsoft Office, PDF, and text files.
Note: Client Server Messaging Security for SMB only supports filtering of header and
subject content during real-time scans. It does not support filtering of header and
subject content during manual and scheduled scans.
8-36
CSM4SMB-v3-AG.book Page 37 Monday, April 23, 2007 10:40 AM
By default, MSA searches for exact matches of the keywords that you add.
3. Click Match case-sensitive to have MSA disregard words that do not match the
keyword's case when filtering content.
4. Set up your list of synonyms.
• Click Match synonym to have MSA consider all the synonyms of the
keyword when filtering content.
• Click ( ) next to Match synonym to display the list of synonyms. When you
select a keyword, all of the keyword’s synonyms display in the Synonyms to
exclude list. Use the arrow keys to add and delete synonyms for each
corresponding keyword.
5. Click Next.
8-37
CSM4SMB-v3-AG.book Page 38 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Step 4: Set the action MSA takes against content that matches the keyword
1. Select an action for MSA to take when it detects undesirable content. MSA can
perform the following actions when it detects content that matches the rule
conditions:
• Replace with text/file — replaces the filtered content with a text file.
You cannot replace text from the From, To, CC, or Subject fields.
• Quarantine — moves the message to the quarantine directory.
• Delete entire message — deletes the entire email message
• Archive — moves the message to the archive directory and delivers the
message to the original recipient
Note: The actions delete entire message and quarantine are unavailable during manual
or scheduled scans.
2. Select whether MSA notifies designated individuals when it takes action against
undesirable content.
3. Click Next.
Step 5: Set the notifications MSA sends when it takes an action
1. Click on the check boxes corresponding to the people MSA will notify.
2. On the action page, select the check box for the notification that you want to send
to the infected recipient/sender.
3. Click Save.
8-38
CSM4SMB-v3-AG.book Page 39 Monday, April 23, 2007 10:40 AM
8-39
CSM4SMB-v3-AG.book Page 40 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Note: Do not confuse the quarantine folder with the end user’s spam folder. An administrator
sets up the quarantine folder after installing the Messaging Security Agent. The
quarantine folder is a file-based folder. The Messaging Security Agent creates the end
user’s spam folder during installation. The end user’s spam folder is located in the
Information Store for each user's mailbox. Whenever the Messaging Security Agent
does a quarantine action on an email message, it sends the message to the quarantine
folder. The end user’s spam folder only receives email messages resulting from an
anti-spam quarantine action.
8-40
CSM4SMB-v3-AG.book Page 41 Monday, April 23, 2007 10:40 AM
3. Click Configure. The Antivirus screen opens for the Exchange Server.
4. Click Quarantine > Directory.
5. Type the directory path for the quarantine directory in the space provided.
6. Click Save.
WARNING! The quarantine folder contains email messages that have a high-risk of being
infected. Be cautious when handling email messages from the quarantine folder
so that you do not accidentally infect your computer.
Note: If you resend a quarantined message that was originally sent using Microsoft Outlook,
the recipient may receive multiple copies of the same message. This may occur
because VSAPI strips each message that it scans into several sections.
8-41
CSM4SMB-v3-AG.book Page 42 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Note: Client Server Messaging Security also provides administrators with an Approved
Senders and Blocked Senders list. The Messaging Security Agent applies the
administrator’s approved senders and blocked senders before considering the end user
list.
8-42
CSM4SMB-v3-AG.book Page 43 Monday, April 23, 2007 10:40 AM
8-43
CSM4SMB-v3-AG.book Page 44 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
How It Works
Each Client Server Messaging Security module inserts messages into the program,
and then records the action into log files upon execution. You can forward the logs to
Trend Micro Technical Support staff to help them debug the actual program flow in
your environment. All of the modules produce text files you that you can view with
any text editor.
You can use the debugger to generate logs on the following modules:
• Messaging Security Agent Master Service
• Messaging Security Agent Remote Configuration Server
8-44
CSM4SMB-v3-AG.book Page 45 Monday, April 23, 2007 10:40 AM
Note: The Messaging Security Agent Debugger continues to collect debug data until you
clear all items you were debugging and click Save.
8-45
CSM4SMB-v3-AG.book Page 46 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
8-46
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 9
9-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Current Status
Displays the on-going status of your clients and network in response to a current
worldwide virus outbreak. The status roughly corresponds to the outbreak lifecycle.
Outbreak Defense first takes preventative measures such as informing you of the
threat and taking action as prescribed in the Outbreak Prevention Policy (downloaded
from TrendLabs). Next, your clients are protected from the threat when updated
components are downloaded from the Trend Micro ActiveUpdate server and
deployed. Finally, Damage Cleanup Services, using newly updated components,
starts to clean infected and damaged files, and remove virus remnants.
9-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
Threat Prevention
The Threat Prevention stage of the Current Status screen displays information about
recent threats, computers that have alerts enabled, and computers that are vulnerable
to the current threat.
9-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Threat Information
The Threat Information section displays information about viruses that are currently
on the Internet and that could potentially affect your network and clients. Threat
Information, using the Outbreak Prevention Policy, takes steps to protect your
network and clients while TrendLabs develops a solution (SeeTrend Micro Outbreak
Prevention Policy on page B-1).
Threat Information
This panel displays the name of the current outbreak threat. Learn more about this
threat by clicking Help > Security Info to redirect your browser to the Trend Micro
Web site.
• Risk Level–the level of risk the threat poses to computers and networks based on
the number and severity of virus and malware incident
9-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
Vulnerable Computer(s)
The Vulnerable Computer(s) section displays a list of clients that have vulnerabilities
that make them susceptible to the threat displayed in the Threat Information section.
Threat Protection
The Threat Protection stage of the Current Status screen provides information about
the components that are affected by the threat, and the solution download and
deployment status.
FIGURE 9-3. Outbreak Defense Screen – Protection Stage
9-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Threat Cleanup
The Threat Cleanup stage of the Current Status screen displays the status of the scan
that takes place after the updated components have been deployed. The Threat
Cleanup section also displays the status of computers after the scan, and lists whether
the updates were successful in cleaning or removing threat remnants.
FIGURE 9-4. Outbreak Defense Screen - Cleanup Stage
9-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
Note: For a scan to automatically take place after the new components have been deployed,
it has to be enabled in the Outbreak Defense > Settings screen.
Potential Threat
The Potential Threat screen uses the information gathered from Vulnerability
Assessment and Damage Cleanup Services to display information about clients that,
because they are already infected or have vulnerabilities, are Potential Threats to the
security of your network. Vulnerability Assessment determines which clients have
vulnerabilities and Damage Cleanup Services determines which clients are still
infected and need to be cleaned in order to make them safe.
Vulnerable Computer(s)
The Vulnerable Computer(s) section displays a list of clients that have vulnerabilities
that make them susceptible to the most recent threat. Client Server Messaging
Security uses Vulnerability Assessment to determine which clients have
vulnerabilities. To learn more about Vulnerability Assessment see Vulnerability
Assessment on page B-3.
Computer(s) to Cleanup
The Computer(s) to Cleanup section displays information about infected computers.
Administrators can also perform a real-time cleanup of infected computers using
updated cleanup security components. The Cleanup service uses Trend Micro
Damage Cleanup Services. To learn more about how Damage Cleanup works, see
Trend Micro Damage Cleanup Services on page B-2.
9-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Settings
Use the Settings screen to configure Outbreak Defense and Vulnerability
Assessment options.
Outbreak Defense
Use Outbreak Defense to configure threat response settings, block or unblock ports,
and schedule when and how often the Outbreak Prevention Policy is updated.
Note: After you disable Outbreak Defense, Trend Micro recommends running Cleanup Now
to help rid your clients of Trojans and any running processes related to Trojans, or
other types of malicious code (see Computer(s) to Cleanup on page 9-7).
Using Exception
Use Exception to Add new ports to, and Edit or Remove existing ports from the list
of ports to exclude from blocking.
Note: When adding a new exception, make sure that Enable this exception is checked.
9-8
CSM4SMB-v3-AG.book Page 9 Monday, April 23, 2007 10:40 AM
Security Server checks for new Outbreak Prevention Policies every 30 minutes and
downloads new policies as required.
To set a Scheduled Policy Download source and time:
1. From the main menu, click Outbreak Defense > Settings. The Settings screen
appears. The Outbreak Defense tab is selected by default.
2. Click the plus (+) icon for the Scheduled Policy Download Settings section.
3. From the Scheduled Policy Download Settings section, set the following
options:
a. Frequency: The default time is every 30 minutes.
b. Source: Choose from where to download updates. The default is the Trend
Micro ActiveUpdate server:
• Trend Micro ActiveUpdate server
• Intranet location containing a copy of the current file
• Other update source
4. Click Save.
Vulnerability Assessment
To set a time for Vulnerability Assessment:
1. Click Outbreak Defense > Settings to open the Settings screen.
2. Click the Vulnerability Assessment tab.
3. Select Enable Scheduled Vulnerability Prevention
4. For each client create a schedule using the following UI elements:
• Daily – Click to perform vulnerability assessment every day
• Weekly, every – Click to perform a vulnerability assessment once a week.
You must select a day from the list and a start time. The time selected is the
time that Client/Server Security will perform the scan.
• Monthly, on day – Click to perform a vulnerability assessment once a month.
You must select a date from the list and a start time.
Regardless of the selection, specify when to start vulnerability assessment in the
Start time lists.
9-9
CSM4SMB-v3-AG.book Page 10 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
9-10
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 10
10-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
10-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
• Attachment Blocking
To configure a Scheduled scan, click Scans > Scheduled Scan.
10-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
b. To configure the anti-spyware scan settings, click the Anti-spyware link. The
manual anti-spyware scan settings page appears.
c. On the Target tab, select the type of anti-spyware scan to run. Available
options include:
• Full scan – Scans the entire disk and registry for spyware
• Quick scan – Examines common areas where spyware is typically
installed
d. On the Action tab, click an action to perform on any spyware that is detected.
Available options include:
• Clean – Remove the spyware from infected clients
• Pass – Only record the detected spyware in the spyware logs
e. Click Save to save your scan settings, and then Back to go back to the Scan
Now page.
4. Click Scan Now to run a Manual Scan or click Save to save the Scheduled Scan
settings.
To set a time for Scheduled scans:
1. Click Scans > Scheduled Scan to open the Scheduled Scan screen.
2. Click the Schedule tab. A table displaying a list of all scannable clients appears.
3. For each client create a schedule using the following UI elements:
• Daily – Click to perform Scheduled Scan every day
• Weekly, every – Click to perform a Scheduled Scan once a week. You must
select a day from the list and a start time. The time selected is the time that
Client/Server Security will perform the scan.
• Monthly, on day – Click to perform a Scheduled Scan once a month. You
must select a date from the list and a start time.
Regardless of the selection, specify when to start scheduled scans in the Start
time lists.
4. Click Save.
10-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
10-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Tip: Trend Micro recommends that you do not schedule a scan to run at the same time as
you set for a scheduled update. This may cause the scheduled scan to stop
unexpectedly. Similarly, if you begin a manual scan when a scheduled scan is
running, the scheduled scan is interrupted. The scheduled scan aborts, but
runs again according to its schedule.
Note: To disable Scheduled Scan, deselect all options for the specific desktop, server, or
Exchange server, and click Save.
Note: When running manual or scheduled scan, you may see the message message from
"" [total 0 recipient(s)] on the real-time monitor page. These are mail
scan logs for Exchange System Mails.
Tip: Trend Micro recommends that you set Client Server Messaging Security to run
scheduled scans at regular intervals for optimal protection of your desktops, servers,
or Exchange Information Store.
10-6
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 11
Updating Components
This chapter explains how to use and configure Manual and Scheduled Updates.
The topics discussed in this chapter include:
• Choosing an Update Source on page 11-2
• Updating Components on page 11-2
• Updating the Trend Micro Security Server on page 11-4
• Manual and Scheduled Updates on page 11-4
• Setting the Update Source for the Trend Micro Security Server on page 11-6
• Default Update Times on page 11-7
• Using Update Agents on page 11-8
• Rolling Back Components on page 11-10
11-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
ActiveUpdate server > The Trend Micro Security Use this method if there are
Trend Micro Security Server Server receives updated no sections of your network
> clients. components from the between the Trend Micro
ActiveUpdate server (or Security Server and clients
other update source) and you identify as
deploys them directly to ’low-bandwidth’.
clients.
ActiveUpdate server > The Trend Micro Security Use this method to balance
Trend Micro Security Server Server receives updated the traffic load on your
> Update Agents > clients components from the network if there are sections
ActiveUpdate server of your network between the
(or other update source) Trend Micro Security Server
and deploys them and clients you identify as
directly to Update Agents, ’low-bandwidth’.
which deploy the
components to clients.
ActiveUpdate Update Agents receive Use this method only if you
server > Update updated components are experiencing problems
Agents > clients directly from the updating Update Agents
ActiveUpdate server (or from the Trend Micro
other update source) and Security Server or from
deploy them to other Update Agents.
clients. Under most circumstances,
Update Agents receive
updates faster from the
Trend Micro Security Server
or from other Update Agents
than from an external
update source.
Updating Components
To ensure that your clients stay protected from the latest virus threats and other
malicious code, you need to update the Client Server Messaging Security
components regularly. To view details about the components that Client Server
11-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
Updating Components
Messaging Security uses to protect your clients see Client Server Messaging Security
Updateable Components on page 2-5.
Configure the Trend Micro Security Server to download Client Server Messaging
Security components from the Trend Micro ActiveUpdate server. After the server
downloads any available updates, it automatically deploys these to the clients.
Client Server Messaging Security provides two methods for updating your
components:
• Update your components manually
• Update your components based on a schedule
For information on how to update your components, see To update the Trend Micro
Security Server components: on page 11-5.
For information on how to set a schedule for updates, see To set a schedule to check
for updated components: on page 11-6.
If you use a proxy server to connect to the Internet, make sure you properly configure
your proxy settings to download updates successfully. For information on how to
configure your proxy settings, see Internet Proxy Options on page 14-2.
Component Sub-component
11-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Component Sub-component
Manual Updates
Trend Micro recommends updating the server manually immediately after deploying
the Client/Server Security Agent and whenever there is a virus outbreak.
Scheduled Updates
Configure the Trend Micro Security Server to regularly check its update source and
automatically download any available updates. Because clients normally get updates
from the Trend Micro Security Server, using automatic scheduled update is an easy
11-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
Updating Components
and effective way of ensuring that your protection against viruses is always current.
Because setting Scheduled updates is similar to setting Manual updates, both
procedures will be combined here. An additional section for setting an update time
will follow.
Note: As soon as the Trend Micro Security Server receives updated components, they are
automatically deployed to clients.
11-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Note: After the server downloads the updated components, it then automatically deploys
them to clients.
11-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
Updating Components
2. From the Download updates from section, choose from where to download
updates:
• Trend Micro ActiveUpdate server
• An intranet location containing a copy of the current file
• An other update source.
3. Click Save.
11-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
• To ensure that client computers stay up-to-date, CSA runs a scheduled update
every 8 hours.
The Trend Micro recommended settings for component updates provide reasonable
protection to small and medium-sized business. If necessary, you can run Manual
updates or modify the Scheduled updates.
Trend Micro updates the scan engine or program generally only during the release of
a new Client Server Messaging Security version. However, Trend Micro releases
pattern files every day to keep your client virus protection current.
Note: Unless specified in the Alternative Update Source section, all Update Agents receive
their updates from the Trend Micro Security Server.
11-8
CSM4SMB-v3-AG.book Page 9 Monday, April 23, 2007 10:40 AM
Updating Components
Note: If this option is selected, the Update Agents will download updates from the
Trend Micro Security Server even if their IP address falls within one of the
ranges specified in the Add an Alternative Update Source screen. In order for
this option to work, Enable Alternative Update Sources must be selected.
Note: To specify a single Security Agent, enter the Security Agent’s IP address in both
the IP from and IP to fields.
Note: Security Agents not specified will automatically receive their updates from the
Trend Micro Security Server.
11-9
CSM4SMB-v3-AG.book Page 10 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Note: You can roll back only the virus pattern file and scan engine. No other components
can be rolled back.
11-10
CSM4SMB-v3-AG.book Page 11 Monday, April 23, 2007 10:40 AM
Updating Components
11-11
CSM4SMB-v3-AG.book Page 12 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
11-12
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 12
12-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Note: Use spreadsheet applications, such as Microsoft Excel, to view CSV log files.
Client Server Messaging Security maintains logs under the following categories:
• Management console event logs
• Desktop/Server logs
• Exchange server logs
Desktop/Server Logs
• Virus log
• Spyware log
• Update log
• Network virus log
• Outbreak Defense log
• Event log
12-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
12-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Type (event or item that Content (type of log to obtain content from)
generated the log entry)
Client Server Messaging Security records log entries for many different events. Use
log query to view the different logs.
Note: An MSA sends its logs to the Security Server every five minutes (not as soon as the
logs are generated). This time interval between log generation and log sending helps
keep network traffic between the client and the server to a minimum.
12-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
2. Under Time Range, select All dates or select Specified range and type a range
of dates.
3. Under Type, select from one of the following:
• Management console events
• Desktop/Server
• Exchange Server
Note: The items displayed in the Content list will depend on the Type selected
12-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
12-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
Scheduling Reports
This section describes how to create reports using the Scheduled report screen.
To schedule reports:
1. From the main menu, click Reports > Scheduled Reports, the Scheduled
Reports screen appears. From the Scheduled reports toolbar, click Add, the Add
screen appears.
12-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
12-8
CSM4SMB-v3-AG.book Page 9 Monday, April 23, 2007 10:40 AM
12-9
CSM4SMB-v3-AG.book Page 10 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
9. Click Save.
Maintenance - Reports
To conserve disk space on the server, specify the maximum number of reports to
keep.
To set the maximum number of reports to keep:
1. On the main menu, click Reports > Maintenance. The Maintenance screen
appears.
FIGURE 12-4. Reports Maintenance Screen
2. Select the Reports tab, the main body changes to display the Reports >
Maintenance screen.
3. Under Maximum Reports to Keep, enter a number between 1 and 100 for each
type of report listed.
4. Click Save.
12-10
CSM4SMB-v3-AG.book Page 11 Monday, April 23, 2007 10:40 AM
Maintenance - Logs
To conserve disk space on the server, delete logs manually or schedule regular
deletion times.
To set up auto log deletion:
1. On the main menu, click Reports > Maintenance. The Maintenance screen
appears.
2. Select Auto Log Deletion. The Auto Log Deletions options appear.
FIGURE 12-5. Auto Log Deletion Screen
12-11
CSM4SMB-v3-AG.book Page 12 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
2. Select Manual Log Deletion. The Manual Log Deletion options appear.
FIGURE 12-6. Manual Log Deletion Screen
3. Under the Delete Logs Older Than column, type a value for number of days
after which time Trend Micro Security Server will delete the specified log.
4. Click Delete to delete the selected log immediately.
5. Click Save to save the manual log deletion options.
12-12
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 13
13-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Event Types
Threat Events:
• Outbreak Defense – An alert activated, or highly critical vulnerabilities detected
• Antivirus – Viruses detected on clients, servers, or Exchange server exceeds a
certain number, actions taken against viruses are unsuccessful, Real-time scan
disabled on clients, servers, or Exchange server
• Anti-spyware – Spyware detected on clients and servers, including those that
required the infected client to be restarted to completely remove the spyware
threat. You can also configure the spyware notification threshold, that is, the
number of spyware incidents detected within the specified time period (default is
one hour).
• Anti-spam – Spam occurrences exceed a certain percentage of total email
messages
Note: The Anti-spam option is only available with Client Server Messaging Security.
13-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
Note: The Anti-spam option will only appear if Client Server Messaging Security is
installed.
2. To receive notification of any threat event occurrence, select the Type check box
under the Threat Events section.
To receive notification of specific threat event occurrences, select any of the
following:
• Outbreak Response
• Antivirus
• Anti-spyware
• Anti-spam
• Network Virus
3. To receive notification of any system event occurrences, select the Type check
box under the System Events section. The possible system events are:
• License expiration
13-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
• Component update
• System unusual events
4. Click Save.
13-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
13-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
13-6
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 14
14-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
3. Select the Use a proxy server for updating components, product license
notifications, and World Virus Tracking check box.
4. Type the address of the proxy server and its port number.
• If the proxy server uses version 4 or 5 of the SOCKS protocol to handle
Transmission Control Protocol (TCP), select the Use SOCKS 4/5 proxy
protocol check box.
14-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
5. If the proxy server requires a password, type your user name and password in the
fields provided.
6. Click Save.
14-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Desktop/Server Options
The Global Settings > Desktop/Server screen contains the following configurable
items.
• General Scan Settings on page 14-5
• Virus Scan Settings on page 14-6
• Spyware/Grayware Scan Settings on page 14-6
• Alert Settings on page 14-7
• Approved List for Network Virus Scanning on page 14-7
• Watchdog Settings on page 14-7
• Agent Uninstallation on page 14-7
• Agent Unloading on page 14-8
To set the Desktop/Server options:
1. On the main menu, click Preferences > Global Settings. The Global Settings
screen appears.
2. Select the Desktop/Server tab and the main frame changes to display global
desktop/server settings options.
14-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
Note: By default, Client Server Messaging Security does not scan its own database. Trend
Micro recommends preserving this selection to prevent any possible corruption of the
database that may occur during scanning.
14-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Note: By default, Client Server Messaging Security does not scan its own database. Trend
Micro recommends preserving this selection to prevent any possible corruption of the
database that may occur during scanning.
• Count cookie into spyware log – Select this check box to record each detected
spyware cookie to the spyware log
14-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
Alert Settings
• Show the alert icon on the Windows taskbar if the virus pattern file is not
updated after { } days – Select this check box if you want to display the alert icon
on your clients when the pattern file is outdated and select a number from the list.
Watchdog Settings
• Enable the Client/Server Security Agent watchdog service – Select this check
box if you want to enable the CSA watchdog service.
• Check client status every {} minutes – Choose how often the watchdog service
should check client status.
• If the client cannot be started, retry {} times – Choose how many times the
watchdog service should attempt to restart the Client/Server Security Agent.
• Enable anti-hacking mode – Select this check box to enable anti-hacking mode.
Tip: Trend Micro recommends enabling the client watchdog service to help ensure that the
Client/Server Security Agent is protecting your client computers. If the Client/Server
Security Agent unexpectedly terminates, which could happen if the client is under
attack from a hacker, the watchdog service restarts the Client/Server Security Agent.
Agent Uninstallation
• Allow the client user to uninstall Client/Server Security Agent – Choose this
option if you want to allow client user to remove the CSA without supplying a
password.
• Require a password for the client user to uninstall Client/Server Security
Agent – Choose this option if you want to require the client user to supply a
password before uninstalling the CSA.
14-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Agent Unloading
• Allow the client user to unload Client/Server Security Agent – Choose this
option if you want to allow client user to unload the CSA without supplying a
password.
• Require a password for the client user to unload the Client/Server Security
Agent – Choose this option if you want to require the client user to supply a
password before unloading the CSA.
System Options
The System section of the Global Settings screen contains the following configurable
items.
• Remove Inactive Client/Server Security Agents
• Connection Verification
• Quarantine Maintenance
To set the System options:
1. On the main menu, click Preferences > Global Settings. The Global Settings
screen appears.
2. Select the System tab and the main frame changes to display global system
settings options.
14-8
CSM4SMB-v3-AG.book Page 9 Monday, April 23, 2007 10:40 AM
14-9
CSM4SMB-v3-AG.book Page 10 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
be aware of the removal and it will display the CSA as inactive. If a user unloads or
disables the client for an extended time, the Security Server also displays the CSA as
inactive.
To have the Security Groups Tree only display active clients, you can configure the
Security Server to remove inactive CSAs from the Security Groups Tree
automatically.
To enable the automatic removal of inactive CSAs, configure the following options:
• Enable automatic removal of inactive Client/Server Security Agent – Select
this option to enable the automatic removal of clients that have not made contact
with the Security server for a specific number of days.
• Automatically remove a Client/Server Security Agent if inactive for {} days –
Choose the number of days that a client is allowed to be inactive before it is
removed from the Security Dashboard.
Note: Verify Connection does not allow the selection of specific groups or clients. It verifies
the connection to all clients registered with the Trend Micro Security Server.
14-10
CSM4SMB-v3-AG.book Page 11 Monday, April 23, 2007 10:40 AM
The default location of Trend Micro Security Server quarantine folder is as follows:
C:\Program Files\Trend Micros\Security Server\PCCSRV\Virus
Note: If the client is unable to send the encrypted file to the Trend Micro Security Server for
any reason, such as network connection problems, the encrypted file remains in the
client’s suspect folder. The client attempts to resend the file when it reconnects to the
Trend Micro Security Server.
For more information on configuring scan settings, or changing the location of the
quarantine folder, see Virus Scan Settings on page 14-6.
From the Global Settings screen, you can configure the capacity of the quarantine
folder and the maximum individual file size for every infected file that can be stored
in it.
To following options are available to help you manage the quarantine folder:
• Quarantine folder capacity – Type an amount in MB for the capacity of the
Quarantine folder.
• Maximum size for a single file – Type an amount for the size of single folder
stored in the Quarantine folder.
• Delete All Quarantined Files – Click this to delete all files in the Quarantine
folder instantly.
14-11
CSM4SMB-v3-AG.book Page 12 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
14-12
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 15
15-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Tool Types
Client Server Messaging Security includes a set of tools that can help you easily
accomplish various tasks, including server configuration and client management.
These tools are classified into two categories:
• Administrative tools – Developed to help configure the Trend Micro Security
Server and manage clients
• Client tools – Developed to help enhance the performance of the Client/Server
Security Agent program
Summary of Tools
Refer to Table Note: for a complete list of tools included in this version of
Client/Server Security
Note: Some tools available in previous versions of Client/Server Security are not
available in this version. If you require these tools, contact technical support.
Login Script Setup: automate the installation Client Packager (ClnPack.exe): create a
of the Client/Server Security Agent program self-extracting file containing the
Client/Server Security Agent program and
components
15-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
Note: You cannot run these tools from the Security Dashboard. For instructions on how
to run the tools, see the relevant section below.
Administrative Tools
This section contains information about the following Client/Server Security
administrative tools:
15-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Vulnerability Scanner
Use Vulnerability Scanner to detect installed antivirus solutions and to search for
unprotected computers on your network. To determine if computers are protected,
Vulnerability Scanner pings ports that are normally used by antivirus solutions.
Vulnerability Scanner can perform the following functions:
• Perform a DHCP scan to monitor the network for DHCP requests so that when
computers first log on to the network, Vulnerability Scan can determine their status
• Ping computers on your network to check their status and retrieve their computer
names, platform versions, and descriptions
• Determine the antivirus solutions installed on the network. It can detect Trend
Micro products (including OfficeScan, ServerProtect for Windows NT and Linux,
ScanMail for Microsoft Exchange, InterScan Messaging Security Suite, and
PortalProtect) and third-party antivirus solutions (including Norton AntiVirus
Corporate Edition v7.5 and v7.6, and McAfee VirusScan ePolicy Orchestrator).
• Display the server name and the version of the pattern file, scan engine and
program for OfficeScan and ServerProtect for Windows NT
• Send scan results via email
• Run in silent mode (command prompt mode)
• Install the Client/Server Security Agent remotely on computers running Windows
Vista/2000/XP (Professional only)/Server 2003 (R2)
You can also automate Vulnerability Scanner by creating scheduled tasks. For
information on how to automate Vulnerability Scanner, see the TMVS online help.
To run Vulnerability Scanner on a computer other than the server, copy the TMVS
folder from the \PCCSRV\Admin\Utility folder of the server to the computer.
Note: You cannot install the Client/Server Security Agent with Vulnerability Scanner if the
server component of Client/Server Security is present on the same machine.
Vulnerability Scanner does not install the Client/Server Security Agent on a machine
already running the server component of Client Server Security.
15-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
15-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
8. You can enable Vulnerability Scanner to ping computers on the network to get
their status. Under Ping Settings, specify how Vulnerability Scanner will send
packets to the computers and wait for replies. Accept the default settings or type
new values in the Packet size and Timeout text boxes.
9. To remotely install the client component of Client/Server Security and send a log
to the server, type the server name and port number. If you want to remotely
install the client component of Client/Server Security automatically, select the
Auto-install Client/Server Security Client for unprotected computer check
box.
10. Click Install Account to configure the account. The Account Information
screen appears.
11. Type the user name and password and click OK.
12. Click OK to save your settings. The Trend Micro Vulnerability Scanner
console appears.
To run a manual vulnerability scan on a range of IP addresses:
1. Under IP Range to Check, type the IP address range that you want to check for
installed antivirus solutions and unprotected computers. Note that the
Vulnerability Scanner only supports class B IP addresses.
2. Click Start to begin checking the computers on your network. The results are
displayed in the Results table.
To run Vulnerability Scanner on computers requesting IP addresses from a
DHCP server:
1. Click the DHCP Scan tab in the Results box. The DHCP Start button appears.
2. Click DHCP Start. Vulnerability scanner begins listening for DHCP requests
and performing vulnerability checks on computers as they log on to the network.
To create scheduled tasks:
1. Under Scheduled Tasks, click Add/Edit. The Scheduled Task screen appears.
2. Under Task Name, type a name for the task you are creating.
3. Under IP Address Range, type the IP address range that you want to check for
installed antivirus solutions and unprotected computers.
4. Under Task Schedule, click a frequency for the task you are creating. You can
set the task to run Daily, Weekly, or Monthly. If you click Weekly, you must
15-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
select a day from the list. If you click Monthly, you must select a date from the
list.
5. In the Start time lists, type or select the time when the task will run. Use the
24-hour clock format.
6. Under Settings, click Use current settings if you want to use your existing
settings, or click Modify settings.
If you click Modify settings, click Settings to change the configuration. For
information on how to configure your settings, refer to Step 3 to Step 12 in To
configure Vulnerability Scanner: on page 15-4.
7. Click OK to save your settings. The task you have created appears under
Scheduled Tasks.
Other Settings
To configure the following settings you need to modify TMVS.ini:
• EchoNum – Set the number of computers that Vulnerability Scanner will
simultaneously ping.
• ThreadNumManual – Set the number of computers that Vulnerability Scanner
will simultaneously check for antivirus software.
• ThreadNumSchedule – Set the number of computers that Vulnerability Scanner
will simultaneously check for antivirus software when running scheduled tasks.
To modify these settings:
1. Open the TMVS folder and locate the TMVS.ini file.
2. Open TMVS.ini using Notepad or any text editor.
3. To set the number of computers that Vulnerability Scanner will simultaneously
ping, change the value for EchoNum. Specify a value between 1 and 64.
For example, type EchoNum=60 if you want Vulnerability Scanner to ping 60
computers at the same time.
4. To set the number of computers that Vulnerability Scanner will simultaneously
check for antivirus software, change the value for ThreadNumManual. Specify a
value between 8 and 64.
15-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Client Tools
This section contains information about Client Server Messaging Security client
tools.
Client Packager
Client Packager is a tool that can compress setup and update files into a
self-extracting file to simplify delivery via email, CD-ROM, or similar media. It also
includes an email function that can access your Microsoft Outlook address book and
allow you to send the self-extracting file from within the tool’s console.
To run Client Packager, double-click the file. Client/Server Security clients that are
installed using Client Packager report to the server where the setup package was
created.
15-8
CSM4SMB-v3-AG.book Page 9 Monday, April 23, 2007 10:40 AM
Note: To prevent Client/Server Security from detecting the virus again when you use
Restore Encrypted Virus, exclude the folder to which you decrypt the file from
Real-time Scan.
WARNING! Decrypting an infected file may spread the virus to other files.
Note: Do not copy the VSEncrypt folder to the Client/Server Security folder. The
Vsapi32.dll file of Restore Encrypted Virus will conflict with the original
Vsapi32.dll.
3. Open a command prompt and go to the location where you copied the VSEncrypt
folder.
15-9
CSM4SMB-v3-AG.book Page 10 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Note: You may not be able to encrypt or decrypt files that are locked.
15-10
CSM4SMB-v3-AG.book Page 11 Monday, April 23, 2007 10:40 AM
Touch Tool
The Touch Tool synchronizes the time stamp of one file with the time stamp of
another file or with the system time of the computer. If you unsuccessfully attempt to
deploy a hot fix (an update or patch that Trend Micro releases) on the Trend Micro
Security Server, use the Touch Tool to change the time stamp of the hot fix. This
causes Client/Server Security to interpret the hot fix file as new, which makes the
server attempt to deploy the hot fix again automatically.
To run the Touch Tool:
1. On the Trend Micro Security Server, go to the following directory:
\PCCSRV\Admin\Utility\Touch
2. Copy the TMTouch.exe file to the folder where the file you want to change is
located. If synchronizing the file time stamp with the time stamp of another file,
put both files in the same location with the Touch tool.
3. Open a command prompt and go to the location of the Touch Tool.
4. Type the following:
TmTouch.exe <destination_filename> <source_filename>
where:
<destination_filename> = the name of the file (the hot fix, for example) whose
time stamp you want to change
<source_filename> = the name of the file whose time stamp you want to replicate
If you do not specify a source filename, the tool sets the destination file time
stamp to the system time of the computer.
Note: You can use the wildcard character "*" in the destination file name field, but not the
source file name field.
5. To verify the time stamp changed, type dir in the command prompt or right
click the file in Windows explorer and select Properties.
15-11
CSM4SMB-v3-AG.book Page 12 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Client Mover
If you have more than one Client Server Messaging Security server on the network,
you can use Client Mover to transfer clients from one Client Server Messaging
Security server to another.
This is especially useful after adding a new Client Server Messaging Security server
to the network when you want to transfer existing clients to the new server. The two
Client Server Messaging Security servers must be of the same type and same
language version.
Client Mover requires the IPXfer.exe file.
To run Client Mover:
1. On the Client Server Messaging Security server, go to the following directory:
\PCCSRV\Admin\Utility\IPXfer.
2. Copy the IPXfer.exe file to the client that you want to transfer.
3. On the client, open a command prompt and then go to the folder where you
copied the file.
4. Run Client Mover using the following syntax:
IPXfer.exe -s <server_name> -p <server_listening_port> -m 1
-c <client_listening_port>
where:
• <server_name> = the server name of the destination Client Server
Messaging Security server (the server to which the client will transfer)
• <server_listening_port> = the listening (trusted) port of the
destination Client Server Messaging Security server. To view the listening
port on the Security Dashboard, click Security Settings. The listening port is
shown next to the Security Server name.
• 1 = You must use the number "1" after "-m"
• <client_listening_port> = the port number of the client machine
To confirm the client now reports to the other server, do the following:
1. On the client, right click the CSA icon in the system tray.
2. Click Client/Server Security Agent Console.
15-12
CSM4SMB-v3-AG.book Page 13 Monday, April 23, 2007 10:40 AM
15-13
CSM4SMB-v3-AG.book Page 14 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
15-14
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 16
16-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Note: If you forget the Security Dashboard password, contact Trend Micro technical support
for instructions on how to gain access to the Dashboard again. The only other
alternative is to remove and reinstall Client Server Messaging Security.
16-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
16-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
2. Read the disclaimer and click Yes to participate in the World Virus Tracking
Program or click No to decline participation.
3. Click Save.
To view the current Trend Micro virus map, click Virus Map or enter the
following address in your Web browser:
http://www.trendmicro.com/map
16-4
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 17
17-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Viruses
A computer virus is a segment of code that has the ability to replicate. Viruses
usually replicate by infecting files. When a virus infects a file, it attaches a copy of
itself to the file in such a way that when the former executes, the virus also runs.
When this happens, the infected file also becomes capable of infecting other files.
Like biological viruses, computer viruses can spread quickly and are often difficult to
eradicate.
In addition to replication, some computer viruses share another commonality: a
damage routine that delivers the virus payload. While payloads may only display
messages or images, they can also destroy files, reformat your hard drive, or cause
other damage. Even if the virus does not contain a damage routine, it can cause
trouble by consuming storage space and memory, and degrading the overall
performance of your computer.
Generally, there are three kinds of viruses:
• File – File viruses may come in different types– there are DOS viruses, Windows
viruses, macro viruses, and script viruses. All of these share the same
characteristics of viruses except that they infect different types of host files or
programs.
• Boot – Boot viruses infect the partition table of hard disks and boot sector of hard
disks and floppy disks.
17-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
• Script – Script viruses are viruses written in script programming languages, such
as Visual Basic Script and JavaScript and are usually embedded in HTML
documents.
VBScript (Visual Basic Script) and Jscript (JavaScript) viruses activate themselves
using Microsoft's Windows Scripting Host. They then infect other files. Since
Windows Scripting Host is available on Windows 98, Windows 2000 and other
Windows operating systems, the viruses can be activated simply by
double-clicking a *.vbs or *.js file from Windows Explorer.
What is so special about script viruses? Unlike programming binary viruses, which
require assembly-type programming knowledge, virus authors programs script
viruses as text. A script virus can achieve functionality without low-level
programming and with code as compact as possible. It can also use predefined
objects in Windows to make accessing many parts of the infected system easier
(for example, for file infection, for mass-mailing). Furthermore, since the code is
text, it is easy for others to read and imitate the coding paradigm. Because of this,
many script viruses have several modified variants.
For example, shortly after the “I love you” virus appeared, antivirus vendors found
modified copies of the original code, which spread themselves with different
subject lines, or message bodies.
Whatever their type is, the basic mechanism remains the same. A virus contains code
that explicitly copies itself. In the case of file viruses, this usually entails making
modifications to gain control when a user accidentally executes the infected program.
After the virus code has finished execution, in most cases, it passes back the control
to the original host program to give the user an impression that nothing is wrong with
the infected file.
Take note that there are also cross-platform viruses. These types of viruses can infect
files belonging to different platforms (for example, Windows and Linux). However,
such viruses are very rare and seldom achieve 100% functionality.
Network Viruses
A virus spreading over a network is not, strictly speaking, a network virus. Only
some of the threats mentioned above, such as worms, qualify as network viruses.
Specifically, network viruses use network protocols, such as TCP, FTP, UDP, HTTP,
and email protocols to replicate. They often do not alter system files or modify the
boot sectors of hard disks. Instead, network viruses infect the memory of client
17-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
machines, forcing them to flood the network with traffic, which can cause
slowdowns and even complete network failure. Because network viruses remain in
memory, they are often undetectable by conventional disk-based file I/O scanning
methods.
Personal Firewall works with a network virus pattern file to identify and block
network viruses (see the on-line help for more information about configuring the
Personal Firewall).
Trojans
A Trojan is a malicious program that masquerades as a harmless application. Unlike
viruses, Trojans do not replicate but can be just as destructive. An application that
claims to rid your computer of viruses when it actually introduces viruses onto your
computer is an example of a Trojan. Traditional antivirus solutions can detect and
remove viruses but not Trojans, especially those that are already running on the
system.
Bots
Bots are compressed executable files that are designed with the intent to cause harm
to computer systems and networks. Bots, once executed, can replicate, compress, and
distribute copies of themselves.
Packers
A packer is a compressed and/or encrypted Windows or Linux executable program,
often a Trojan. Compressing executables makes them more difficult for Antivirus
products to detect.
Worms
A computer worm is a self-contained program (or set of programs) that is able to
spread functional copies of itself or its segments to other computer systems. The
propagation usually takes place via network connections or email attachments.
Unlike viruses, worms do not need to attach themselves to host programs. Worms
often use email and applications, such as Microsoft™ Outlook™, to propagate. They
17-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
may also drop copies of themselves into shared folders or utilize file-sharing systems,
such as Kazaa, under the assumption that users will likely download them, thus
letting the worm propagate. In some cases, worms replicate themselves using chat
applications such as ICQ, AIM, mIRC, or other Peer-to-Peer (P2P) programs.
About ActiveX
ActiveX is a technology from Microsoft that handles interaction between Web
browsers, Microsoft applications, other third party applications, and the computer
operating system. ActiveX makes use of ActiveX controls– software components
installed on computers that add specialized functionality to Web pages, such as
animation and interactive programs.
Creators of spyware and other grayware often mask their applications as legitimate
ActiveX controls. When your users view Web sites that require ActiveX
functionality, they may knowingly or unknowingly download the ActiveX controls to
their computers and unwittingly install grayware applications.
Two related ways to help guard against spyware and other grayware that are masked
as ActiveX controls are as follows:
• Setting client Web browser security to prompt the user before installing ActiveX
applications
• Educating your users to look out for applications that could be grayware when they
download any files, controls, or applications to their browsers
17-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
mass-mailing behavior takes precedence over all other actions. The default action
against mass-mailing attacks is delete.
For example, you configure the Messaging Security Agent to quarantine messages
when it detects a worm or a Trojan in an email message. You also enable
mass-mailing behavior and set the Messaging Security Agent to delete all messages
that demonstrate mass-mailing behavior. The Messaging Security Agent receives a
message containing a worm such as a variant of MyDoom. This worm uses its own
SMTP engine to send itself to email addresses that it collects from the infected
computer. When the Messaging Security Agent detects the MyDoom worm and
recognizes its mass-mailing behavior, it will delete the email message containing the
worm - as opposed to the quarantine action for worms that do not show mass-mailing
behavior.
17-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
Note: When the Messaging Security Agent does not support the compression type,
then it cannot detect viruses in compression layers beyond the first compression
layer.
When the Messaging Security Agent encounters a compressed file it does the
following:
1. The Messaging Security Agent extracts the compressed files and scans them.
The Messaging Security Agent begins by extracting the first compression layer.
After extracting the first layer, the Messaging Security Agent proceeds to the
second layer and so on until it has scanned all of the compression layers that the
user configured it to scan up to a maximum of six.
2. The Messaging Security Agent performs a user-configured action on infected
files.
The Messaging Security Agent performs the same action against infected files
detected in compressed formats as for other infected files. For example, if you
configure the action for infected files to be quarantine, then the Messaging
Security Agent quarantines messages in which it detects infected files.
The Messaging Security Agent can clean files from two types of compression
routines: PKZIP and LHA. However, the Messaging Security Agent can only
clean the first layer of files compressed using these compression routines.
17-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
17-8
CSM4SMB-v3-AG.book Page 9 Monday, April 23, 2007 10:40 AM
• Disallow the use of peer-to-peer file-sharing services. Spyware and other grayware
applications may be masked as other types of files your users may want to
download, such as MP3 music files.
• Periodically examine the installed software on your client computers and look for
applications that may be spyware or other grayware. If you find an application or
file that Client Server Messaging Security cannot detect as grayware but you think
is a type of grayware, send it to Trend Micro:
http://subwiz.trendmicro.com/SubWiz.
Trend Labs will analyze the files and applications you submit.
If you prefer to communicate via email, send a message to the following address:
[email protected]
17-9
CSM4SMB-v3-AG.book Page 10 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
17-10
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 18
18-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Registration
I have several questions on registering Client Server Messaging Security. Where can
I find the answers?
See the following Web site for frequently asked questions about registration:
http://esupport.trendmicro.com/support/viewxml.do?ContentID=en-116326
Can the Trend Micro Security Server be installed remotely using Citrix or Windows
Terminal Services?
Yes. The Trend Micro Security Server can be installed remotely with Citrix or
Windows Terminal Services.
18-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
Configuring Settings
I have several questions on configuring Client Server Messaging Security settings.
Where can I find the answers?
You can download all Client Server Messaging Security documentation from the
following site:
http://www.trendmicro.com/download/
Documentation
What documentation is available with this version of Client Server Messaging
Security?
This version of Client Server Messaging Security includes the following:
Administrator's Guide, Getting Started Guide, readme file, and help files for the
Security Dashboard, Master Installer, and Client/Server Security Agent.
I have questions/issues with the documentation. How can I provide feedback to Trend
Micro?
Trend Micro is always seeking to improve its documentation. If you have questions,
comments, or suggestions about this or any Trend Micro documents, please contact
us at [email protected]. Your feedback is always welcome. Please evaluate this
documentation on the following site:
18-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
www.trendmicro.com/download/documentation/rating.asp
Troubleshooting
This section helps you troubleshoot issues that may arise during installation, upgrade,
migration, and deployment.
18-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
Settings Replication
You can only replicate settings from a source Messaging Security Agent to a target
Messaging Security Agent that share the same domain. Messaging Security Agent is
unable to replicate settings when the source Messaging Security Agent is located in
the parent domain, and the target Messaging Security Agent(s) is located in the child
domain (or vice versa), because it lacks the required permission.
To solve this problem, perform the following:
For Windows 2003 operating system:
1. Execute regedit.
2. Go to
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\
SecurePipeServers\winreg
3. Click winreg
4. Select winreg > Security > Permissions
5. Add Smex Admin Group of target domain, and enable Allow Read
6. Go to
18-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
2. Manually back up the following files and folders from the folder:Program
Files\Trend Micro\Security Server\PCCSRV
• ofcScan.ini – Contains global client settings
• ous.ini – Contains the update source table for antivirus component
deployment
• Private folder – Contains firewall and update source settings
• Web\tmOPP folder – Contains Outbreak Defense settings
• Pccnt\Common\OfcPfw.dat – Contains firewall settings
18-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
Note: If you change the Security Server installation path, you will have to update the
path info in the backup files ofcscan.ini and \private/ofcserver.ini
7. With the backups you created, overwrite the Client Server Messaging Security
database and the relevant files and folders on the target machine in the PCCSRV
folder.
8. Restart the Trend Micro Security Server Master Service.
18-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Browser Cache
If you upgraded from a previous version of CSM, Web browser and proxy server
cache files may prevent the Security Dashboard from loading properly. Clear the
cache memory on your browser and on any proxy servers located between the Trend
Micro Security Server and the computer you use to access the Security Dashboard.
SSL Certificate
Also, verify that your Web server is functioning properly. If you are using SSL,
verify that the SSL certificate is still valid. See your Web server documentation for
details.
18-8
CSM4SMB-v3-AG.book Page 9 Monday, April 23, 2007 10:40 AM
However, the console may open without any problems when using the following
address:
http://<server name>/SMB/console/html/cgi/cgichkmasterpwd.exe
To resolve this issue, check the execute permissions of the SMB virtual directory.
Do the following:
1. Open the Internet Information Services (IIS) manager.
2. In the SMB virtual directory, select Properties.
3. Select the Virtual Directory tab and change the execute permissions to Scripts
instead of none.
Also change the execute permissions of the client install virtual directory.
18-9
CSM4SMB-v3-AG.book Page 10 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
18-10
CSM4SMB-v3-AG.book Page 11 Monday, April 23, 2007 10:40 AM
Client Migration
The setup program for the Client/Server Security Agent utilizes the third-party
software’s uninstallation program to automatically remove it from your users’ system
and replace it with the Client/Server Security Agent. If automatic uninstallation is
unsuccessful, users get the following message:
Uninstallation failed.
18-11
CSM4SMB-v3-AG.book Page 12 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Note: Some product uninstallation keys are in the Product Key folder.
18-12
CSM4SMB-v3-AG.book Page 13 Monday, April 23, 2007 10:40 AM
WARNING! This procedure may cause undesirable effects to your computer if performed
incorrectly. Trend Micro highly recommends backing up your system first.
18-13
CSM4SMB-v3-AG.book Page 14 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Known Issues
Known issues are features in Client Server Messaging Security software that may
temporarily require a workaround. Known issues are typically documented in the
Readme document you received with your product. Readmes for Trend Micro
products can also be found in the Trend Micro Update Center:
http://www.trendmicro.com/download/
Trend Micro recommends that you always check the Readme text for information on
known issues that could affect installation or performance, as well as a description of
what is new in a particular release, system requirements, and other tips.
18-14
CSM4SMB-v3-AG.book Page 15 Monday, April 23, 2007 10:40 AM
purchase only. After the first year, Maintenance must be renewed on an annual basis
at Trend Micro’s then-current Maintenance fees.
You can contact Trend Micro via fax, phone, and email, or visit us at:
http://www.trendmicro.com
If you cannot find an answer to a particular question, the Knowledge Base includes
an additional service that allows you to submit your question via an email message.
Response time is typically 24 hours or less.
18-15
CSM4SMB-v3-AG.book Page 16 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Click the link under the type of submission you want to make.
Note: Submissions made via the submission wizard/virus doctor are addressed promptly and
are not subject to the policies and restrictions set forth as part of the Trend Micro
Virus Response Service Level Agreement.
When you submit your case, an acknowledgement screen displays. This screen also
displays a case number. Make note of the case number for tracking purposes.
If you prefer to communicate by email message, send a query to the following
address:
[email protected]
In the United States, you can also call the following toll-free telephone number:
(877) TRENDAV, or 877-873-6328
About TrendLabs
TrendLabs is Trend Micro’s global infrastructure of antivirus research and product
support centers that provide up-to-the minute security information to Trend Micro
customers.
The “virus doctors” at TrendLabs monitor potential security risks around the world,
to ensure that Trend Micro products remain secure against emerging threats. The
daily culmination of these efforts are shared with customers through frequent virus
pattern file updates and scan engine refinements.
TrendLabs is staffed by a team of several hundred engineers and certified support
personnel that provide a wide range of product and technical support services.
Dedicated service centers and rapid-response teams are located in Tokyo, Manila,
18-16
CSM4SMB-v3-AG.book Page 17 Monday, April 23, 2007 10:40 AM
Taipei, Munich, Paris, and Lake Forest, CA, to mitigate virus outbreaks and provide
urgent support.
TrendLabs’ modern headquarters, in a major Metro Manila IT park, has earned ISO
9002 certification for its quality management procedures in 2000—one of the first
antivirus research and support facilities to be so accredited. We believe TrendLabs is
the leading service and support team in the antivirus industry.
18-17
CSM4SMB-v3-AG.book Page 18 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
18-18
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Appendix A
System Checklists
Use the checklists in this appendix to record relevant system information as a
reference.
IP address 10.1.104.255
A-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
IP address 10.1.104.225
IP address 10.1.174.225
IP address 10.1.123.225
IP address 10.1.194.225
A- 2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
Ports Checklist
Client Server Messaging Security uses the following ports.
TABLE A-2. Port Checklist
SMTP 25
A-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
A- 4
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Appendix B
B-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
B- 2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
Vulnerability Assessment
Vulnerability Assessment provides system administrators or other network security
personnel with the ability to assess security risks to their networks. The information
they generate by using Vulnerability Assessment gives them a clear guide as to how
to resolve known vulnerabilities and secure their networks.
Use Vulnerability Assessment to:
• Configure tasks that scan any or all computers attached to a network. Scans can
search for single vulnerabilities or a list of all known vulnerabilities.
• Run manual assessment tasks or set tasks to run according to a schedule.
• Request blocking for computers that present an unacceptable level of risk to
network security.
• Create reports that identify vulnerabilities according to individual computers and
describe the security risks those computers present to the overall network. The
reports identify the vulnerability according to standard naming conventions so that
security personnel can do further research to resolve the vulnerabilities and secure
the network.
• View assessment histories and compare reports to better understand the
vulnerabilities and the changing risk factors to network security.
B-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
• Shorter scanning period – Because IntelliScan uses true file type identification, it
only scans files that are vulnerable to infection. The scan time is therefore
significantly shorter than when you scan all files.
B- 4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
Tip: For the highest level of security, Trend Micro recommends scanning all files.
About ActiveAction
Different types of viruses require different scan actions. Customizing scan actions for
different types of viruses can be a tedious task. For this reason, Trend Micro created
ActiveAction.
ActiveAction is a set of pre-configured scan actions for viruses and other types of
threats. The recommended action for viruses is Clean, and the alternative action is
Quarantine. The recommended action for Trojans and joke programs is Quarantine.
If you are not familiar with scan actions or if you are not sure which scan action is
suitable for a certain type of virus, Trend Micro recommends using ActiveAction.
Using ActiveAction brings you the following benefits:
B-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
B- 6
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Appendix C
Tip: Although this phase is optional, Trend Micro highly recommends conducting a pilot
deployment before doing a full-scale deployment.
C-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
This process should take into account company information security policies, as well
as technical specifics.
C- 2
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Appendix D
SMLN eManager NT
(ScanMail for Lotus Notes) HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro
\ScanMail for Lotus Notes\CurrentVersion
AppDir=
DataDir=
IniDir=
D-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
D- 2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro
\ScanMail for Exchange\RealTimeScan\ScanOption
BackupDir=
MoveToQuarantineDir=
HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro
\ScanMail for
Exchange\RealTimeScan\ScanOption\Advance
QuarantineFolder=
HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro
\ScanMail for
Exchange\RealTimeScan\IMCScan\ScanOption
BackupDir=
MoveToQuarantineDir=
HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro
\ScanMail for
Exchange\RealTimeScan\IMCScan\ScanOption\Ad
vance
QuarantineFolder=
HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro
\ScanMail for Exchange\ManualScan\ScanOption
BackupDir=
MoveToQuarantineDir=
D-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
D- 4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
ExcludeExchangeStoreFolders=C:\Program
Files\Exchsrvr\mdbdata\|C:\Program Files\Exchsrvr\Mailroot\vsi
1\Queue\|C:\Program Files\Exchsrvr\Mailroot\vsi
1\PickUp\|C:\Program Files\Exchsrvr\Mailroot\vsi 1\BadMail\|M:\
For other MS recommended folders, please add them to scan exclusion list manually.
For more information, please see http://support.microsoft.com/kb/245822/.
D-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
D- 6
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Appendix E
E-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Roaming Clients
Roaming clients are computers with the Client/Server Security Agent installation that
do not always maintain a constant network connection with the Trend Micro Security
Server (for example, notebook computers). These clients continue to provide
antivirus protection, but have delays in sending their status to the server.
Assign roaming privileges to clients that are disconnected from the Trend Micro
Security Server for an extended period.
Roaming clients get updated only on these occasions:
• When the client performs Update Now or performs a Scheduled Update.
• When client connects to the Trend Micro Security Server.
For more information on how to update clients, see the Trend Micro Security Server
online help.
E-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
The status of a roaming client is indicated by icons that appear in its system tray. See
for a list of icons that appear on roaming clients.
TABLE E-2. Icons That Appear on a Roaming Client
Vista Vista
32-bit 64-bit
Feature clients clients 32-bit 64-bit
clients clients
Roaming mode
E-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Anti-spyware
Note: Client/Server Security Agent does not support the Itanium 2 Architecture (IA-64).
E-4
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Appendix F
Appendix F
Spyware Types
The Trend Micro anti-spam engine can detect 21 types of spyware. The following
table identifies these spyware types and provides a threat description for each type.
These spyware types may appear in the Spyware/Grayware Type column on the
Spyware/Grayware Log Details page.
F-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Cookie Cookies are small files that are created by your Web browser when you visit
sites on the Internet. Typically, they are used as a convenience to
remember frequently used information that is required for access to a
particular Web site. They can also be used to track your visits to certain
Web sites and can provide companies with information about frequency of
visits and other profile information. The user is usually not aware that their
surfing habits are being tracked.
Trend Micro Anti-Spyware identifies cookies that are created by the most
common advertising companies and allows you to clean them, which helps
to ensure your privacy while surfing.
Dialer A program that usually configures some sort of dial up configuration such as
a dial-up-networking connection in Windows. The user either knowingly or
unknowingly will end up using the dialer that calls a time-charged number
that is usually billed to your credit card.
Browser Hijacker A type of software that changes settings in your Web browser. This often
includes changing your browser's default home page.
Parasite A type of software that piggybacks onto other software. This type of
software may be installed without the user's knowledge or consent.
Browser Helper A type of module that acts as a plugin to Internet Explorer browser. Some
Object BHOs may monitor or manipulate your Web surfing.
Layered Service A type of module that acts as a plugin to your Network System. LSPs
Provider usually have low level access to your network and Internet data.
URL Shortcut A shortcut to a URL that exists in your Internet Browser or your desktop.
Peer To Peer Software that allows users to exchange shared files over the Internet.
Downloader Software that manages the download of other software onto computers.
F-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
Security A medium/high risk security weakness that exists on your computer that
Weakness could be used to compromise your systems security.
F-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
F-4
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Appendix G
Appendix G
Glossary of Terms
The following is a list of terms in this document:
Term Description
ActiveX A type of virus that resides in Web pages that execute ActiveX controls.
malicious code
G-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Term Description
boot sector A sector is a designated portion of a disk (the physical device on which data
viruses is written and read). The boot sector contains the data used by your
computer to load and initialize the computer's operating system. A boot
sector virus infects the boot sector of a partition or a disk.
bots Bots are compressed executable files that are designed with the intent to
cause harm to computer systems and networks. Bots, once executed, can
replicate, compress, and distribute copies of themselves.
client computers The Client computers are all the desktops, laptops, and servers where the
CSAs are installed. Exchange servers protected by Messaging Security
Agents are also considered to be Client computers. CSAs perform Antivirus
scanning and Firewall configurations on Client desktops and servers.
Messaging Security Agents perform Antivirus scanning, Anti-spam filtering,
email Content Filtering, and Attachment Blocking on Exchange servers.
compressed file A single file containing one or more separate files plus information to allow
them to be extracted by a suitable program, such as WinZip.
COM and EXE file A type of virus that masquerades as an application by using a .exe or .com
infectors file extension.
configuration Selecting options for how your Trend Micro product will function, for
example, selecting whether to quarantine or delete a virus-infected email
message.
Content Filtering Scanning email messages for content (words or phrases) prohibited by your
organization's Human Resources or IT messaging policies, such as hate
mail, profanity, or pornography.
content violation An event that has triggered the content filtering policy.
default A value that pre-populates a field in the Security Dashboard. A default value
represents a logical choice and is provided for convenience. Use default
values as pre-set by Trend Micro or customize them as required.
G-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
Term Description
domain name The full name of a system, consisting of its local host name and its domain
name, for example, tellsitall.com. A domain name should be sufficient to
determine a unique Internet address for any host on the Internet. This
process, called “name resolution”, uses the Domain Name System (DNS).
encryption Encryption is the process of changing data into a form that can be read only
by the intended receiver. To decipher the message, the receiver of the
encrypted data must have the proper decryption key. Lacing decryption
codes, CSAs cannot scan encrypted files.
End User License An End User License Agreement or EULA is a legal contract between a
Agreement software publisher and the software user. It typically outlines restrictions on
(EULA) the side of the user, who can refuse to enter into the agreement by not
clicking “I accept” during installation. Clicking “I do not accept” will, of
course, end the installation of the software product.
false positives A false positive occurs when a Web site, URL, “infected” file, or email
message is incorrectly determined by filtering software to be of an
unwanted type. For example, a legitimate email between colleagues may
be detected as spam if a job-seeking filter does not distinguish between
resume (to start again) and résumé (a summary of work experience).
file name The portion of a file name (such as .dll or .xml) which indicates the kind of
extension data stored in the file. Apart from informing the user what type of content the
file holds, file name extensions are typically used to decide which program
to launch when a file is run.
File Transfer FTP is a standard protocol used for transporting files from a server to a
Protocol (FTP) client over the Internet. Refer to Network Working Group RFC 959 for more
information.
file type The kind of data stored in a file. Most operating systems use the file name
extension to determine the file type. The file type is used to choose an
appropriate icon to represent the file in a user interface, and the correct
application with which to view, edit, run, or print the file.
G-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Term Description
firewall Firewalls create a barrier between the Internet and your local network to
protect the local network from hacker attacks and network viruses.
Firewalls examine data packet to determine if they are infected with a
network virus.
FQDN (fully A fully qualified domain name (FQDN) consists of a host and domain name,
qualified domain including top-level domain. For example, www.trendmicro.com is a fully
name) qualified domain name: www is the host, trendmicro is the second-level
domain, and .com is the top-level domain.
FTP (file transfer FTP is a standard protocol used for transporting files from a server to a
protocol) client over the Internet.
grayware Files and programs, other than viruses, that can negatively affect the
performance of the computers on your network. These include spyware,
adware, dialers, joke programs, hacking tools, remote access tools,
password cracking applications, and others. The OfficeScan scan engine
scans for grayware as well as viruses.
hot fixes and Workaround solutions to customer related problems or newly discovered
patches security vulnerabilities that you can download from the Trend Micro Web
site and deploy to the OfficeScan server and/or client program.
Hyper Text HTTP is a standard protocol used for transporting Web pages (including
Transfer graphics and multimedia content) from a server to a client over the Internet.
Protocol (HTTP)
Intrusion Intrusion Detection Systems are commonly part of firewalls. An IDS can
Detection System help identify patterns in network packets that may indicate an attack on the
(IDS) client.
keywords The Messaging Security Agent can filter incoming email messages for
keywords that you set up using Content Filtering rules. When keywords are
detected the Messaging Security Agent can take action to prevent the
delivery of messages containing these keywords. Note that keywords are
not strictly words, but can be numbers, typographical characters, or short
phrases.
local The term “local” refers to a computer on which you are directly installing or
running software, as opposed to a “remote” computer which is physically
distant and/or connected to your computer through a network.
G-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
Term Description
macro viruses A type of virus encoded in an application macro and often included in a
document.
Network virus Viruses that use network protocols, such as TCP, FTP, UDP, HTTP, and
email protocols to replicate. They often do not alter system files or modify
the boot sectors of hard disks. Instead, network viruses infect the memory
of computers, forcing them to flood the network with traffic, which can
cause slowdowns and even complete network failure.
Notifications The Security Server can send your system administrator a notification
whenever significant abnormal events occur on your Client computers. For
example: You can set up a condition that whenever the CSA detects 40
viruses within one hour, the Security Server will send a notification to the
system administrator.
Outbreak During Outbreak Defense, the Security Server enacts the instructions
Defense contained in the Outbreak Prevention Policy. The Trend Micro Outbreak
Prevention Policy is a set of recommended default security configurations
and settings designed by TrendLabs to give optimal protection to your
computers and network during outbreak conditions. The Security Server
downloads the Outbreak Prevention Policy from Trend Micro ActiveUpdate
server every 30 minutes or whenever the Security Server starts up.
Outbreak Defense enacts preemptive measures such as blocking shared
folders, blocking ports, updating components, and running scans.
phishing incident A Phish is an email message that falsely claims to be from an established or
legitimate enterprise. The message encourages recipients to click on a link
that will redirect their browsers to a fraudulent Web site where the user is
asked to update personal information such as passwords, social security
numbers, and credit card numbers in an attempt to trick a recipient into
providing private information that will be used for identity theft.
Phish sites A Web site that lures users into providing personal details, such as credit
card information. Links to phish sites are often sent in bogus email
messages disguised as legitimate messages from well-known businesses.
Ping of Death A Denial of Service attack where a hacker directs an oversized ICMP
packet at a target computer. This can cause the computers buffer to
overflow, which can freeze or reboot the machine.
Post Office POP3 is a standard protocol for storing and transporting email messages
Protocol 3 from a server to a client email application.
(POP3)
G-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Term Description
port number A port number, together with a network address - such as an IP number,
allow computers to communicate across a network. Each application
program has a unique port number associated with it. Blocking a port on a
computer prevents an application associated with that port number from
sending or receiving communications to other applications on other
computers across a network. Blocking the ports on a computer is an
effective way to prevent malicious software from attacking that computer.
privileges From the Security Dashboard, administrators can set privileges for the
(desktop CSAs. End users can then set the CSAs to scan their Client computers
privileges) according to the privileges you allowed. Use desktop privileges to enforce a
uniform antivirus policy throughout your organization.
proxy server A World Wide Web server which accepts URLs with a special prefix, used to
fetch documents from either a local cache or a remote server, then returns
the URL to the requester.
remote The term “remote” refers to a computer that is connected through a network
to another computer, but physically distant from that computer.
rules (content Content filtering rules are rules that you set up to filter the content of email
filtering) messages. You define undesirable content and sources and set the
Messaging Security Agent to detect and take action against such content
violations.
scan To examine items in a file in sequence to find those that meet a particular
criteria.
scan engine The module that performs antivirus scanning and detection in the host
product to which it is integrated.
Secure Socket SSL is a scheme proposed by Netscape Communications Corporation to
Layer (SSL) use RSA public-key cryptography to encrypt and authenticate content
transferred on higher-level protocols such as HTTP, NNTP, and FTP.
SSL certificate A digital certificate that establishes secure HTTPS communication between
the Policy Server and the ACS server.
G-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
Term Description
security server When you first install Client Server Messaging Security, you install it on a
Windows server that becomes the Security Server. The Security Server
communicates with the CSAs and the Messaging Security Agents installed
on Client computers. The Security Server also hosts the Security
Dashboard, the centralized Web management console for the entire Client
Server Messaging Security solution.
server A program which provides some service to other (client) programs. The
connection between client and server is normally by means of message
passing, often over a network, and uses some protocol to encode the
client's requests and the server's responses. Note that the online help uses
the term “Security Server” in a special way to refer to the server that forms a
client-server relationship with the computers on your network to which you
have installed the CSAs.
Simple Mail SMTP is a standard protocol used to transport email messages from server
Transport to server, and client to server, over the internet.
Protocol (SMTP)
Test virus An inert file that acts like a real virus and is detectable by virus-scanning
software. Use test files, such as the EICAR test script, to verify that your
antivirus installation is scanning properly.
Trojan horses Executable programs that do not replicate but instead reside on systems to
perform malicious acts, such as open ports for hackers to enter.
virus A virus is a program that replicates. To do so, the virus needs to attach itself
to other program files and execute whenever the host program executes.
G-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Term Description
G-8
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Index E
Encrypted and Password protected files 8-4
End User Quarantine
disabling 8-43
A
evaluation license
Activation Codes 4-5
benefits 4-5
administrator account
features 4-3
required for installation 4-6
Excluded files (Files over specified scanning restric-
administrator privileges
tions) 8-4
required for installation 4-6
F
C
firewall
capabilities
deploy Security Server behind 3-7
Client Server Messaging Security 1-2–1-8
firewall, Windows XP
Client Server Messaging Security
added to Exception list 3-7
capabilities 1-2, 1-8
fully licensed
Client/Server Security Agent
benefits 4-5
deployment considerations 3-7
features 4-3
listening port 4-7
overview 2-4 G
Common Firewall Driver 2-10 generating debugger reports, how to 8-45
compatibility issues
third-party applications 4-4 H
Configuring Personal Firewall – Simple Mode 7-10 hostname, Security Server
Configuring the Personal Firewall - Advanced Mode prepare before installing 4-6
7-11 Hot Fixes 2-10
content filtering rules
changing order 8-29 I
Current Status – Cleanup 9-6 incremental pattern file update
Current Status – Prevention 9-2 size of download 3-9
Current Status – Protection 9-5 installation
overview 3-2
D installation path, Client/Server Security Agent
Damage Cleanup services prepare before installing 4-6
how it works 2-9 Internet Connection Firewall (ICF)
debugger reports, generating 8-44 removing 4-4
deleting quarantined messages 8-41 IP address, Security Server
deleting spam messages from Spam folder 8-44 prepare before installing 4-6
deployment
overview 3-2 K
Security Server 3-7 keywords
Security Server, on dedicated server 3-10 about 8-29
Disabling the Firewall 7-14 supported 8-32
domain name, Security Server
prepare before installing 4-6 L
license
I–1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
I–2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
definition G-7
U
Using Antivirus to Configure Real-time Scan 7-2
Using Desktop Privileges 7-14
Using Quarantine 7-17
Using the Personal Firewall 7-8
V
Virus Cleanup Engine 2-9
Virus Cleanup Pattern 2-10
virus pattern file
size of download 3-9
W
Warning
back up before removing third-party antivirus
software 18-13
change port number to prevent attacks on HTTP
port 4-7
dangers of disabling real-time scanning 8-14
decrypting files 15-9
do not send installation package to wrong Client
computer 5-10
never use real virus for testing 5-24
quarantine folder contains email messages that
have a high-risk of being infected 8-41
remove lockdown tool during installation 4-7–4-8
using back up tools 18-6
Windows XP Firewall
added to Exception list 3-7
I–3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
I–4