Sign In
Upload
Manuals
Brands
Trend Micro Manuals
Gateway
InterScan M Series
Trend Micro InterScan M Series Manuals
Manuals and User Guides for Trend Micro InterScan M Series. We have
1
Trend Micro InterScan M Series manual available for free PDF download: Administrator's Manual
Trend Micro InterScan M Series Administrator's Manual (480 pages)
Gateway Security Appliance
Brand:
Trend Micro
| Category:
Gateway
| Size: 8 MB
Table of Contents
Table of Contents
5
About this Manual
17
About this Administrator's Guide
18
Document Conventions
20
Chapter 1 : Introducing Trend Micro Interscan Gateway Security
22
Appliance
22
What Is Interscan Gateway Security Appliance
22
Important Features and Benefits
23
How Interscan Gateway Security Appliance Works
25
Antivirus
26
Anti-Spyware
26
Anti-Spam
27
Anti-Phishing
27
Anti-Pharming
27
Content and URL Filtering
28
Outbreak Defense
28
Web Reputation
29
The Appliance Hardware
30
The Front Panel
30
LCD Module
31
LED Indicators
32
The Back Panel
32
Port Indicators
34
Preconfiguring and Deploying the Appliance
35
Connecting to the Network
36
Testing the Appliance Connectivity
37
Activating the Appliance
37
Chapter 2 : Deployment Options
40
Overview
40
Deployment Options
41
Deployment Topologies
42
Deploying in a Single Network Segment
42
Deploying in a Network with Multiple Segments
43
Basic Deployment
46
Advanced Deployment Scenarios
47
Operation Modes
47
Deployment in a DMZ Environment
50
Failover Deployment
52
Deployment Recommendations
55
Deployment Issues
56
Preconfiguring the Appliance
56
Assigning an IP Address
57
Connecting to the Network
57
Testing the Appliance Connectivity
58
Activating the Appliance
58
Chapter 3: How Interscan Gateway Security Appliance Works
61
The Range and Types of Internet Threats
62
How Interscan Gateway Security Appliance Protects You
63
Ethernet Network Interfaces
64
The Primary Functional Components
64
Content Filtering
65
Email Notification
81
Chapter 4: Getting Started with Interscan Gateway Security Appliance
83
Preliminary Tasks
84
Accessing the Web Console
85
The Summary Screen
86
Information above the Panels
86
Outbreak Prevention Service
87
Damage Cleanup Service
87
Component Version
87
Antivirus
90
Anti-Spyware
90
Intellitrap
91
Anti-Spam: Content Scanning
91
Anti-Spam: Email Reputation Services
92
Web Reputation: SMTP/POP3
92
Web Reputation: HTTP
92
Others
93
Additional Screen Actions
93
Navigating the Web Console
94
The Online Help System
96
SMTP Services
102
Chapter 5: SMTP Services
103
Enabling Scanning of SMTP Traffic
103
Selecting an Alternative Service Port
103
Configuring SMTP Virus Scanning
104
SMTP Scanning - Target
105
SMTP Scanning - Action
107
SMTP Scanning - Notification
109
Configuring SMTP Anti-Spyware
111
SMTP Anti-Spyware - Action
114
SMTP Anti-Spyware - Notification
115
Configuring SMTP Intellitrap
116
SMTP Intellitrap - Target
116
SMTP Intellitrap - Action
117
SMTP Intellitrap - Notification
118
Configuring SMTP Web Reputation
119
SMTP Web Reputation - Target
119
SMTP Web Reputation - Action
120
SMTP Web Reputation - Notification
121
Configuring SMTP Anti-Spam: Email Reputation
122
SMTP Anti-Spam: Email Reputation - Target
123
SMTP Anti-Spam: Email Reputation - Action
125
Configuring SMTP Anti-Spam: Content Scanning
126
SMTP Anti-Spam: Content Scanning - Target
127
SMTP Anti-Spam: Content Scanning - Action
129
Configuring SMTP Anti-Phishing
130
SMTP Anti-Phishing - Target
131
SMTP Anti-Phishing - Action
132
SMTP Anti-Phishing - Notification
133
Configuring SMTP Content Filtering
134
SMTP Content Filtering - Target
135
SMTP Content Filtering - Action
137
SMTP Content Filtering - Notification
138
Chapter 6 : HTTP Services
142
Enabling Scanning of HTTP Traffic
142
Selecting an Alternative Service Port
142
Configuring the Global Access Lists
143
Configuring HTTP Virus Scanning
145
HTTP Scanning - Target
146
HTTP Scanning - Action
152
HTTP Scanning - Notification
153
Configuring HTTP Anti-Spyware
154
HTTP Anti-Spyware - Target
155
HTTP Anti-Spyware - Action
157
HTTP Anti-Spyware - Notification
158
Configuring Intellitrap for HTTP
159
HTTP Intellitrap - Target
159
HTTP Intellitrap - Action
160
HTTP Intellitrap - Notification
161
Configuring HTTP Anti-Pharming
162
HTTP Anti-Pharming - Target
162
HTTP Anti-Pharming - Action
163
HTTP Anti-Pharming - Notification
164
Configuring HTTP Anti-Phishing
165
HTTP Anti-Phishing - Target
165
HTTP Anti-Phishing - Action
166
HTTP Anti-Phishing - Notification
167
Configuring HTTP URL Filtering
168
HTTP URL Filtering - Rules
168
HTTP URL Filtering - Approved Clients List
169
HTTP URL Filtering - Settings
171
HTTP URL Filtering - Notification
173
Configuring HTTP File Blocking
174
HTTP File Blocking - Target
175
HTTP File Blocking - Notification
176
Configuring HTTP Web Reputation
176
HTTP Web Reputation - Target
177
HTTP Services
177
HTTP Web Reputation - Notification
178
Chapter 7 : FTP Services
182
Enabling Scanning of FTP Traffic
182
Selecting an Alternative Service Port
183
Configuring FTP Virus Scanning
184
FTP Scanning - Target
184
FTP Scanning - Action
186
FTP Scanning - Notification
187
Configuring FTP Anti-Spyware
188
FTP Anti-Spyware - Target
189
FTP Anti-Spyware - Action
191
FTP Anti-Spyware - Notification
192
Configuring FTP File Blocking
193
FTP File Blocking - Target
193
FTP File Blocking - Notification
194
Chapter 8 : POP3 Services
198
Enabling Scanning of POP3 Traffic
198
POP3 Services
198
Selecting an Alternative Service Port
199
Configuring POP3 Virus Scanning
200
POP3 Scanning - Target
200
POP3 Scanning - Action
202
POP3 Scanning - Notification
204
Configuring POP3 Anti-Spyware
206
POP3 Anti-Spyware - Target
206
POP3 Anti-Spyware - Action
208
POP3 Anti-Spyware - Notification
209
Configuring POP3 Intellitrap
211
POP3 Intellitrap - Target
211
POP3 Intellitrap - Action
212
POP3 Intellitrap - Notification
213
Configuring POP3 Web Reputation
214
POP3 Web Reputation - Target
214
POP3 Web Reputation - Action
215
POP3 Web Reputation - Notification
216
Configuring POP3 Anti-Spam
217
POP3 Anti-Spam - Target
218
POP3 Anti-Spam - Action
219
Configuring POP3 Anti-Phishing
220
POP3 Anti-Phishing - Target
220
POP3 Anti-Phishing - Action
221
POP3 Anti-Phishing - Notification
222
Configuring POP3 Content Filtering
223
POP3 Content Filtering - Target
224
POP3 Content Filtering - Action
226
POP3 Content Filtering - Notification
227
Chapter 9: Outbreak Defense
230
The Outbreak Defense Services
230
Current Status
231
Configuring Internal Outbreak
233
Configuring Damage Cleanup
234
Potential Threat
235
Configuring Settings
235
Outbreak Defense - Settings
236
Outbreak Defense - Notification
237
Chapter 10 : Quarantines
240
Quarantines Screen
240
Resending a Quarantined Email Message
241
Adding an Inline Notification to Re-Sent Messages
241
Querying the Quarantine Folder
243
Performing Query Maintenance
247
Manual
248
Automatic
249
Chapter 11 : Updating Interscan Gateway Security Appliance
252
Update
252
Updating Manually
253
Configuring Scheduled Updates
254
Configuring an Update Source
256
Chapter 12 : Analyzing Your Protection
260
Logs
260
Querying Logs
261
Configuring Log Settings
263
Configuring Log Maintenance
264
Manual
265
Automatic
266
Chapter 13 Administrative Functions
269
Administration
270
Access Control
271
Configuration Backup
272
Control Manager Settings
274
Registering Interscan Gateway Security Appliance to Control Manager
275
Disk SMART Test
277
Firmware Update
278
IP Address Settings
279
Managing IP Address Settings
280
Static Routes
281
Notification Settings
285
Settings
286
Events
287
Operation Mode
288
Password
289
Product License
290
Proxy Settings
294
SNMP Settings
295
System Time
296
Reboot from Web Console
299
World Virus Tracking
301
Chapter 14 Technical Support, Troubleshooting, and Faqs
303
Contacting Technical Support
304
Readme.txt
305
Troubleshooting
306
Frequently Asked Questions (FAQ)
309
Recovering a Password
310
Virus Pattern File
311
Spam Engine and Pattern File
312
Hot Fixes, Patches, and Service Packs
312
Licenses
313
Renewing Maintenance
314
EICAR Test Virus
315
Best Practices
316
Handling Compressed Files
316
Handling Large Files
318
Sending Trend Micro Suspected Internet Threats
320
Chapter 15 : Updating the Interscan Gateway Security Appliance
322
Identifying the Procedures to Follow
322
Updating the Interscan Gateway
322
Updating the Device Image through the Web Console
323
Updating the Device Image Using the AFFU
324
Preparing Interscan Gateway Security Appliance for the Device Image Update
324
Uploading the New Device Image
334
Completing the Process after the Device Image Is Uploaded
349
Reverting to the Previous Version of the Program File
350
BMC and BIOS Firmware Updates Using the Appliance Firmware Flash Utility
352
Updating the Appliance BMC Firmware
352
Updating the Interscan Gateway Security Appliance BIOS Firmware
360
Appendix A: Terminology
367
Bot
368
Grayware
368
Macro Viruses
368
Mass-Mailing Attacks
369
Network Viruses
369
Pharming
369
Phishing
370
Spam
370
Spyware
370
Trojans
370
Viruses
371
Worms
371
Appendix B: Introducing Trend Micro Control Manager
373
Control Manager Basic Features
374
Understanding Trend Micro Management Communication Protocol
375
Reduced Network Loading and Package Size
375
NAT and Firewall Traversal Support
376
HTTPS Support
377
One-Way and Two-Way Communication Support
377
Single Sign-On (SSO) Support
378
Cluster Node Support
378
Control Manager Agent Heartbeat
379
Using the Schedule Bar
380
Determining the Right Heartbeat Setting
380
Registering Interscan Gateway Security Appliance M-Series to Control Manager
381
Managing Interscan Gateway Security Appliances from Control Manager
383
Understanding Product Directory
383
Accessing a Interscan Gateway Security Appliance M-Series Default Folder
384
Configure Interscan Gateway Security Appliances and Managed Products
387
Issue Tasks to Interscan Gateway Security Appliances and Managed Products
388
Query and View Interscan Gateway Security Appliance M-Series and Managed Product Logs
389
Understanding Directory Manager
392
Using the Directory Manager Options
393
Create Folders
394
Understanding Temp
396
Using Temp
396
Download and Deploy New Components from Control Manager
400
Understanding Update Manager
400
Understanding Manual Downloads
401
Configure Scheduled Download Exceptions
409
Understanding Scheduled Downloads
409
Using Reports
417
Understanding Report Templates
418
Understanding Report Profiles
419
Generate On-Demand Scheduled Reports
426
Appendix C: Technology Reference
429
Deferred Scan
430
Diskless Mode
430
False Positives
431
LAN Bypass
431
Link State Failover
432
Enabling or Disabling LAN Bypass and Link State Failover
433
Scan Engine Technology
438
Intelliscan
438
Intellitrap
438
Macrotrap
439
Wormtrap
439
Supported DCS Clients
439
Feature Execution Order
440
SMTP Feature Execution Order
440
POP3 Feature Execution Order
440
HTTP Feature Execution Order
440
FTP Feature Execution Order
440
Appendix D: Removing the Hard Disk
441
Appendix E: System Checklist
447
Appendix F: File Formats Supported
449
Compression Types
449
Blockable File Formats
452
Malware Naming Formats
454
Appendix G: Specifications and Environment
457
Hardware Specifications
457
Dimensions and Weight
458
Power Requirements and Environment
459
Advertisement
Advertisement
Related Products
Trend Micro Internet Security
Trend Micro txOne networks EdgeIPS IPS-102-BP-TM
Trend Micro Categories
Firewall
Network Hardware
Protection Device
Gateway
Security System
More Trend Micro Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL