Portalprotect 2.6 Ag
Portalprotect 2.6 Ag
i
PortalProtect Administrator's Guide
ii
Table of Contents
iii
PortalProtect Administrator's Guide
iv
Table of Contents
v
PortalProtect Administrator's Guide
vi
Table of Contents
vii
PortalProtect Administrator's Guide
viii
Table of Contents
ix
PortalProtect Administrator's Guide
x
Table of Contents
xi
PortalProtect Administrator's Guide
Index
Index ............................................................................... IN-1
xii
xiii
Preface
Preface
Welcome to the Trend Micro™ PortalProtect™ Administrator’s Guide. This
guide contains the information you need to configure PortalProtect to
protect your SharePoint servers according to your specific needs.
This preface discusses the following topics:
• PortalProtect Documentation on page 2
• Audience on page 2
• Document Conventions on page 2
1
PortalProtect Administrator's Guide
PortalProtect Documentation
PortalProtect documentation consists of the following:
• Online Help: Web-based documentation that is accessible from the
product console. The Online Help contains explanations about
PortalProtect features.
• Installation and Deployment Guide: PDF documentation that can be
downloaded from the Trend Micro Web site. This document contains
instructions about deploying PortalProtect, a task that includes planning
and testing.
• Administrator's Guide: Helps you configure all product settings.
• Readme File: Contains late-breaking product information that might not
be found in the other documentation. Topics include a description of
features, installation tips, known issues, and product release history.
Note
Trend Micro recommends checking the corresponding link from the Update
Center (http://www.trendmicro.com/download) for updates to the
documentation.
Audience
PortalProtect documentation assumes a basic knowledge of security systems
and administration of Microsoft Windows SharePoint services. The
Installation and Deployment Guide, Installation and Upgrade Guide,
Administrator's Guide, and Online Help are designed for network
administrators.
Document Conventions
The documentation uses the following conventions.
2
Preface
Monospace Sample command lines, program code, web URLs, file names,
and program output
Configuration notes
Note
Recommendations or suggestions
Tip
3
Chapter 1
1-1
PortalProtect Administrator's Guide
1-2
Welcome to Trend Micro PortalProtect
What’s New
What’s New in PortalProtect Version 2.6
This release of PortalProtect includes the following new features.
Feature Description
SharePoint Server PortalProtect 2.6 provides full support for Microsoft SharePoint
Subscription Edition Server Subscription Edition.
Support
Windows Server 2022 PortalProtect 2.6 supports Microsoft Windows Server 2022
Desktop Experience Support Desktop Experience running Microsoft SharePoint Subscription
Edition.
Windows Server 2022 Server PortalProtect 2.6 supports Microsoft Windows Server 2022
Core Support Server Core running Microsoft SharePoint Subscription Edition.
SQL Server 2019 Support PortalProtect 2.6 supports Microsoft SQL Server 2019 as the
database server.
SharePoint Server 2019 PortalProtect 2.6 provides full support for Microsoft SharePoint
Support Server 2019.
Windows Server 2019 PortalProtect 2.6 supports Microsoft Windows Server 2019
Support running Microsoft SharePoint Server.
SQL Server 2017 Support PortalProtect 2.6 supports Microsoft SQL Server 2017 as the
database server.
Using HTTPS to Connect to By default, PortalProtect 2.6 uses HTTPS to connect to the
the Trend Micro Trend Micro ActiveUpdate server.
ActiveUpdate Server
1-3
PortalProtect Administrator's Guide
1-4
Welcome to Trend Micro PortalProtect
1-5
PortalProtect Administrator's Guide
1-6
Welcome to Trend Micro PortalProtect
PortalProtect Architecture
Trend Micro designed PortalProtect to provide comprehensive security for
your SharePoint Server.
At the center of the PortalProtect security solutions is the Trend Micro
patented scan engine. The scan engine integrates with the SharePoint Server
Antivirus Manager (AVM). During real-time scanning, the Antivirus Manager
calls the Trend Micro scan engine whenever content is checked-in, checked-
out or published to a SharePoint server. The Trend Micro scan engine
responds by scanning the content. During manual or scheduled scanning,
1-7
PortalProtect Administrator's Guide
the scan engine accesses and scans all content in the SharePoint Server SQL
database.
SharePoint Server clients running applications such as Microsoft Office and
Internet Explorer communicate with the SharePoint Server environment
using Internet Information Services (IIS). The SharePoint administrator
using the PortalProtect Web Management console also communicates with
SharePoint environment using IIS.
1-8
Welcome to Trend Micro PortalProtect
Controlling Outbreaks
PortalProtect protects SharePoint Server in many ways during a virus
outbreak. The following is a list of methods you can use to protect your
Portal environment:
• Use PortalProtect notifications to create an early warning for your
administrator or IT professionals.
• Use Update Now to immediately download the latest virus pattern file
and scan engine. Configure and run a manual scan and set PortalProtect
to take action against any viruses. For fast and efficient action, select
features such as IntelliScan and ActiveAction and PortalProtect will use
Trend Micro recommended blocks and actions against viruses.
• Set the blocking options for manual or real-time scanning to detect a
specific file type or name. Set an action like: block or quarantine for
PortalProtect to take action on a file type or file name to prevent it from
infecting your SharePoint servers.
Note
This method is very effective if you know the exact name of the virus.
Virus alert information is available from TrendLabs at:
http://www.trendmicro.com/vinfo/
PortalProtect Technology
The Trend Micro scan engines detect viruses/malware and other security
threats to screen out unwanted content. This engine relies on the latest
1-10
Welcome to Trend Micro PortalProtect
1-11
PortalProtect Administrator's Guide
• Frequent updates to the scan engine’s data-file, called the virus pattern
file, can be downloaded and read by the engine without the need for any
changes to the engine code itself.
• Technological upgrades in the engine software prompted by a change in
the nature of virus threats, such as the rise in mixed-threats like SQL
Slammer. In both cases, updates can be automatically scheduled, or the
security administrator can handle them manually. International
computer security organizations, including the International Computer
Security Association (ICSA) annually certify the Trend Micro scan
engine.
1-12
Welcome to Trend Micro PortalProtect
All Trend Micro antivirus programs using the ActiveUpdate function can
detect the availability of a new virus pattern on the Trend Micro server,
and/or you can set it to automatically poll the server every week, day, or hour
to get the latest file. Trend Micro recommends that you schedule automatic
updates at least daily, which is the default setting for PortalProtect. Whether
performed in the background or on-demand, the pattern file updates without
interrupting users or network traffic.
You can manually download virus pattern files from the following Web site,
where you can also find the current version, release date, and a list of all the
new viruses definitions included in the file.
http://www.trendmicro.com/download/pattern.asp
1-13
PortalProtect Administrator's Guide
About ActiveUpdate
ActiveUpdate is a function common to many Trend Micro products. It
connects to the Trend Micro Internet update server to enable downloads of
virus pattern files, scan engines, anti-spam rules, and program files.
ActiveUpdate does not interrupt network services, or require you to reboot
your computers. Updates are available on a regularly scheduled interval, or
on-demand.
Note
New threats appear every day. Trend Micro recommends at least daily
updates.
1-14
Welcome to Trend Micro PortalProtect
Note
IntelliScan examines the header of every file, but based on certain indicators,
selects only files that it determines are susceptible for security risk scanning.
1-15
PortalProtect Administrator's Guide
use it. The smart scan solution uses the Smart Protection Network for in-the-
cloud protection.
Web Reputation
Web Reputation technology tracks the credibility of Web domains by
assigning a reputation score based on factors such as a Web site’s age,
historical location changes and indications of suspicious activities
discovered through malware behavior analysis. It will then continue to scan
sites and block users from accessing infected ones.
When a user accesses a URL, Trend Micro:
• Leverages the domain-reputation database to verify the credibility of the
Web sites and pages
• Assigns reputation scores to Web domains and individual pages or links
within sites
• Allows or blocks users from accessing sites
To increase accuracy and reduce false positives, Trend Micro Web
Reputation technology assigns reputation scores to specific pages or links
within sites instead of classifying or blocking entire sites since there are
1-16
Welcome to Trend Micro PortalProtect
times that only portions of legitimate sites are hacked and reputations can
change dynamically over time.
1-17
PortalProtect Administrator's Guide
Tip
For the highest level of security, Trend Micro recommends scanning all files.
About IntelliTrap
Virus writers often attempt to circumvent virus filtering by using real-time
compression algorithms. IntelliTrap helps reduce the risk of such viruses
entering your network by blocking real-time compressed executable files
and pairing them with other malware characteristics. Because IntelliTrap
identifies such files as security risks and may incorrectly block safe files,
Trend Micro recommends quarantining—rather than deleting or cleaning—
files when you enable IntelliTrap. You should disable IntelliTrap if your users
regularly use real-time compressed executable files.
IntelliTrap uses the following components:
• Virus Scan Engine
• IntelliTrap Pattern
• IntelliTrap Exception Pattern
1-18
Welcome to Trend Micro PortalProtect
Customized Settings
Select Customize action for detected threats to instruct PortalProtect to
execute a customized action according to the type of detected threat.
At the bottom of the screen you can configure PortalProtect to Backup
infected files before performing an action. This is a safety precaution
designed to protect the original file from damage.
Types of Threats
• Virus–A computer virus is a program that replicates by attaching itself
to other files (for example, .exe, .com, .dll) and executing whenever the
file opens or runs.
• Macros–can contain malicious code. Macro viruses are application
specific and target Microsoft Office applications. PortalProtect provides
four (4) levels of heuristic scanning for these files, or provides the option
to delete all detected macros. See About Macro Viruses on page 1-22.
• Additional Threats–additional threats include: Spyware, Dialers,
Hacking Tools, Password Cracking Applications, Adware, Joke Programs,
Remote Access Tools, and Others. The default action for additional
1-19
PortalProtect Administrator's Guide
Possible Actions
During this scan PortalProtect executes this action
If you select to use a customized action, you can set a scan action for each
type of threat. PortalProtect automatically executes the action when it
1-20
Welcome to Trend Micro PortalProtect
detects a threat with which the action is associated. Any scan action
PortalProtect performs is recorded in the Virus logs.
Scan actions for viruses include the following:
• Clean–Removes virus code from infected files. When PortalProtect
cannot clean the file, it takes the specified secondary action. Trend
Micro recommends you use the default scan action: Clean, for viruses.
Choose a secondary action for PortalProtect to execute when it cannot
clean the file. The default secondary action is Quarantine. During a
manual or scheduled scan, PortalProtect updates the database and
replaces the document content with the cleaned one.
Note
The Clean action is not available for Additional threats and Packed files.
1-21
PortalProtect Administrator's Guide
Note
PortalProtect performs a previous scan action specified while downloading a
file, if that scan action is changed later. When a file is scanned with the first
action specified, and you then change the scan action to another value, the file
will not be sent to PortalProtect for re-scan. For example, if you change the
scan action from PASS to CLEAN and then try to download the file, the
resulting action for the file is PASS instead of CLEAN.
1-22
Welcome to Trend Micro PortalProtect
Note
When PortalProtect quarantines encrypted, password protected, and
Unscannable files, it reports to SharePoint Server that the files are infected. In
some cases, PortalProtect may identify a file as being infected, when it
actually is not. Trend Micro recommends that you review your quarantine
logs from time to time for files that may have been identified with a false
positive.
Note
PortalProtect cannot clean a virus if the compression layer is greater than 1.
However, you can configure PortalProtect to block and quarantine or scan and
delete compressed files.
1-23
PortalProtect Administrator's Guide
Compression and archiving are among the most common methods of file
storage, especially for file transfers - like email attachments, FTP, and HTTP.
Compressed files must first be decompressed before any virus detection can
occur.
Recognizing the importance of decompression for detecting viruses, Trend
Micro is committed to supporting all major decompression routines, present
and future.
PortalProtect currently supports the following compression types:
• Extraction–used when multiple files have been compressed or archived
into a single file: PKZIP, LHA, LZH, ARJ, MIME, MSCF, TAR, GZIP, BZIP2,
RAR, AMG, and ACE.
• Expansion–used when only a single file has been compressed or
archived into a single file: PKLITE, PKLITE32, LZEXE, DIET, ASPACK,
UPX, MSCOMP, LZW, MACBIN, Petite, PEPack, and WWPack.
• Decoding–used when a file has been converted from binary to ASCII, a
method that is widely employed by email systems: UUCODE and
BINHEX.
For other compression file types, PortalProtect scans the entire compressed
file, rather than each individual file contained within the compressed file.
Maintenance Agreement
A Maintenance Agreement is a contract between your organization and
Trend Micro, regarding your right to receive technical support and product
updates in consideration for the payment of applicable fees. When you
purchase a Trend Micro product, the License Agreement you receive with
the product describes the terms of the Maintenance Agreement for that
product.
Note
The Maintenance Agreement has an expiration date; your License Agreement
does not.
1-24
Welcome to Trend Micro PortalProtect
A license to the Trend Micro software usually includes the right to product
updates, pattern file updates, and basic technical support (“Maintenance”)
for one (1) year from the date of purchase only. After the first year,
Maintenance must be renewed on an annual basis at Trend Micro’s then-
current Maintenance fees.
Typically, ninety (90) days before the Maintenance Agreement expires, you
will start to receive email notifications, alerting you of the pending
discontinuation.
When your Maintenance Agreement expires, you are entitled to a grace
period of 30 days during which time PortalProtect is fully functional. After
the grace period ends you will not be able to receive updated components or
support from Trend Micro.
1-25
Chapter 2
2-1
PortalProtect Administrator's Guide
Procedure
1. Click the PortalProtect Management Console shortcut on the desktop.
2. Choose Start > Programs > Trend Micro PortalProtect for Microsoft
SharePoint > PortalProtect Management Console.
The Web Management Console appears.
3. Do either of the following:
• To view the Web Management Console for a local server
Type the following URL in the address box:
https://[localhost]:[port number]/PortalProtect/Login.htm
Note
The port number depends on the user input during installation. The
default port is 16373. SSL is enabled during installation, and there is
no HTTP protocol for selection.
The server name is the name of the server on which you installed
PortalProtect, and the port number is the port number you use to
access that computer.
2-2
Getting Started with PortalProtect
Main Elements
The Web Management Console Consists of the Following Main Elements:
• The PortalProtect banner always appears at the top of the screen. It
contains a drop-down list that you can use to access online assistance.
You can also use the banner to log off.
• The sidebar is the menu on the left side of the Management Console. It
provides quick access to all PortalProtect settings.
• Main display area is where you can view and set the different
PortalProtect options.
• Screen tabs are a part of the main display area and provide access to a
various topics and options.
• Help icons provide access to context sensitive help or pop-up
information on various features.
Registering PortalProtect
When you purchase PortalProtect, you receive a Registration Key. You can
use this Registration Key to register online. After you register, you receive an
Activation Code that you can use to activate PortalProtect. When you use the
Activation Code, you gain all the benefits of a fully licensed version of
PortalProtect.
To register your product, do either of the following:
2-3
PortalProtect Administrator's Guide
Activating PortalProtect
You must activate PortalProtect to gain the full benefits of the product. The
full benefits include the right to download the most recent scan engine and
virus pattern file updates. You are also entitled to download upgrades and
hot fix patches. Without these key components, your SharePoint
environment is not protected from the latest arising virus attacks.
PortalProtect has two types of activation codes (AC): PortalProtect, and
PortalProtect Suite. Additionally, there are two types of maintenance
agreements: evaluation and full. When you register PortalProtect, you
receive one AC depending on whether you chose PortalProtect or
PortalProtect Suite and the evaluation or fully licensed version.
Using the PortalProtect AC activates PortalProtect security risk scan, file
blocking, content filtering, and Web reputation; Using the PortalProtect suite
AC, activates all the functions of thePortalProtect AC plus data loss
prevention.
Activating PortalProtect is a two-step process: first, register your product and
then activate it. Registration is accomplished with the use of your
Registration Key that you received from your vendor when you purchased
PortalProtect. You can use this Registration Key to register online. See
Registering PortalProtect on page 2-3.
After you register, you receive an Activation Code. Use your Activation Code
to activate PortalProtect during installation.
2-4
Getting Started with PortalProtect
Note
You can use a trial activation code to activate a free trial period for
PortalProtect. The trial period lasts for 30 days after which time you will no
longer be able to use PortalProtect to scan files or receive updated
components. To upgrade your trial period to a fully licensed version, contact
Trend Micro or a licensed reseller to obtain a new activation code.
You receive the following benefits when you activate your product:
• The fully licensed version of PortalProtect. This includes the latest scan
engine and virus pattern file updates. ActiveUpdate is available.
• Trend Micro technical support for the extent of your license.
To acquire a new activation code:
• Use your Registration Key to register with Trend Micro. When you
register online, you receive your Activation Code by email.
• When your Activation Code has expired, contact a Trend Micro reseller
to renew your license. Trend Micro maintains a list of vendors at:
http://www.trendmicro.com/buy/partners/reseller.asp
To activate your product from the management console:
1. From the sidebar, click Administration > Product License.
The Product License screen appears.
2. Click Enter New Activation Code.
3. Type the new Activation Code in the space provided.
4. Click Activate.
Updating PortalProtect
Antivirus software can only be effective if it is using the latest scan engine
and pattern files. Since new viruses and other malicious code are constantly
being released, it is crucial that you regularly update your scan engine, and
pattern files to protect against new security threats.
2-5
PortalProtect Administrator's Guide
Before you can update PortalProtect, you must complete the following tasks:
• Register your software. See Registering PortalProtect on page 2-3.
• If a proxy server handles Internet traffic on your network, you must type
the proxy server information. See Configuring Global Proxy Settings on
page 2-7.
• Configure your update method and source. Methods include Manual
Update and Scheduled Update. Sources include the ActiveUpdate server,
other update source, and the intranet UNC path.
Note
The management console contains three (3) update options: ActiveUpdate
server, UNC path and Other Update source.
Important
The Download Source menu is only available when you upgrade PortalProtect
from an older version where a download source other than the ActiveUpdate
server is configured. For the fresh installation of PortalProtect, the Download
Source menu is not available.
Procedure
1. Click Updates > Download Source to select the download source.
The Download Source screen appears.
• Trend Micro ActiveUpdate server: ActiveUpdate downloads new
components as soon as Trend Micro makes them available. Select
ActiveUpdate as a source if you require frequent and timely updates.
2-6
Getting Started with PortalProtect
Note
If selected, other servers can download the package from:
https://<Server IP>:<Port>/PortalProtect/Activeupdate
3. Click Save.
Click Reset to change all download source settings to their default
values.
Procedure
1. Open the PortalProtect Web console.
2-7
PortalProtect Administrator's Guide
Note
If you are updating components for the first time, be sure to select the
Download Source before updating. See Selecting the Download Source on page
2-6.
Procedure
1. On the left menu, click Updates > Manual.
The Manual Update screen appears.
2-8
Getting Started with PortalProtect
Note
Click Reset to change all download source settings to their default
values.
Note
If you are updating components for the first time, be sure to select the
Download Source before updating. See Selecting the Download Source on page
2-6.
Tip
The virus pattern updates regularly, sometimes several times per day if there
is a virus outbreak. Trend Micro recommends updating at least daily to help
ensure PortalProtect has the current component versions.
Procedure
1. On the left menu, click Updates > Scheduled.
The Scheduled Update screen appears.
2. Select Enable scheduled updates.
3. Select the check box(es) of the component(s) you want to update.
2-9
PortalProtect Administrator's Guide
4. Under Update Schedule, select the options for the frequency of the
update, whether, Minute(s), Hour(s), Day(s), or Weekly.
5. Use the drop down(s) to choose the appropriate starting schedule.
6. Click Save.
Note
Click Reset to change all download source settings to their default
values.
Managing PortalProtect
This section describes the various features and functionalities available for
managing PortalProtect.
2-10
Getting Started with PortalProtect
2-11
PortalProtect Administrator's Guide
2-12
Getting Started with PortalProtect
versus the total files and Web content scanned. Click the numeric link to
query and view the log.
Unscannable files—total number of unscannable files detected for today
along with the percentage detected versus the total files and Web
content scanned. Click the numeric link to query and view the log.
Note
A green checkmark indicates the service is enabled and a red "X" indicates the
service is disabled.
2-13
PortalProtect Administrator's Guide
Note
Click the Turn On link to open the Central Administration > Security >
Antivirus window and choose the options you want to enable or disable. Click
OK, close the window and refresh the Summary page to see the updated
settings.
• Scan documents on upload: The status column displays On, when this
service is enabled, and an exclamation icon, Off, and a Turn On link
when it is disabled.
• Scan documents on download: The status column displays On, when
this service is enabled, and an exclamation icon, Off, and a Turn On link
when it is disabled.
• Attempt to clean infected documents: The status column displays On,
when this service is enabled, and an exclamation icon, Off, and a Turn
On link when it is disabled.
• Scan Web content: Click the icon in the status column to enable or
disable Scanning for Web content. A green checkmark indicates the
service is enabled and a red "X" indicates the service is disabled.
Scan Method
• Security Risk Scan Method: Conventional Scan—Click the link to select
and configure conventional scan or smart scan. See Choosing a Security
Risk Scan Method on page 4-2.
• Web Reputation Source: Smart Protection Network—Click the link to
select and configure scanning from the global smart protection network
or a local smart protection server. See Choosing a Security Risk Scan
Method on page 4-2.
2-14
Getting Started with PortalProtect
Note
This section appears with the following ONLY if you have selected the Smart
Scan option:
• Smart Protection Service: includes the server for Security Risk Scan and
Web Reputation
• Server Name: for the smart scan server that handles PortalProtect
scanning requests
• Service Status: shows the smart scan service status for this server
• Console: click the link to access the Web console for this smart scan
server
Update Status
View the Current Version, Available Version, and Last Update Status for the
following components. Select a component(s) and click Update to manually
update, or query the update log for a complete history:
• Smart Scan Agent Pattern
• Virus pattern
• Spyware pattern
• IntelliTrap pattern
• IntelliTrap exception pattern
• Virus scan engine
• URL filtering engine
2-15
PortalProtect Administrator's Guide
2-16
Getting Started with PortalProtect
2-17
PortalProtect Administrator's Guide
Note
If you choose All settings and Overwrite server-dependent settings (such as
backup directories), the server-dependent settings will be replicated. If you
select All settings, but clear Overwrite server-dependent settings (such as
backup directories), then the server-dependent settings will not be
replicated.
2-18
Getting Started with PortalProtect
2-19
PortalProtect Administrator's Guide
Note
These options are available only after selecting Specify Settings.
2-20
Getting Started with PortalProtect
Note
The backup directories for Real-time Security Risk Scan and
Manual Scan for Security Risk Scan have server dependent
settings. See Backing Up Files Before Taking Action on page 3-7
for more information.
• Automatic Replication
Automatically replicate settings to other servers: select to
automatically replicate settings to other servers
2-21
Chapter 3
3-1
PortalProtect Administrator's Guide
3-2
Configuring Scanning and Blocking
About Scans
PortalProtect has the following three types of scans:
• Real-time
• Manual
• Scheduled
To protect your SharePoint environment, PortalProtect scans content
searching for security risks and undesirable data. When PortalProtect makes
a detection, it automatically takes action against the detection according to
your configurations.
You can configure PortalProtect to scan specific targets and configure the
actions it takes when it discovers a security risk or undesirable data. You can
also configure PortalProtect to send notifications when it takes actions
against security risks and undesirable data.
Additionally, you can configure PortalProtect to save files to the Backup
folder before it takes action on it. This is a safety precaution designed to
protect the original file from damage.
Note
Trend Micro recommends deleting backed up files once you have determined
that the original file was not damaged and that it is usable after PortalProtect
has executed an action on it. If the file becomes damaged or unusable, send it
to Trend Micro for further analysis. Even if PortalProtect has completely
cleaned and removed the virus itself, some viruses damage the original file
code beyond repair.
3-3
PortalProtect Administrator's Guide
About Scanning
Real-time scanning occurs whenever a file is saved to a SharePoint server
(check-in) or retrieved from the SharePoint server (check-out). Manual
scanning scans the SharePoint content database and occurs immediately
after you manually choose Scan Now. Scheduled scans perform the same
function as manual scans, but occur according to the schedule you set. The
duration of the scan depends on the number of files and your hardware
resources.
To optimize the performance of your SharePoint environment, Trend Micro
recommends that you NOT perform a manual or scheduled scan during peak
usage periods.
Note
When real-time scan is enabled and scan documents on download and scan
documents on upload are also enabled on the SharePoint Anti-Virus options,
then, PortalProtect will scan the files while uploading, but will not scan the
files while downloading. Since these files have already been scanned,
PortalProtect will not scan them again during download. This is due to
limitations of Microsoft SharePoint.
Tip
Refer to the Online Help for specific information about how to use the
PortalProtect Management console to configure and perform scans.
3-4
Configuring Scanning and Blocking
Note
Real-time Scanning protects your SharePoint environment in an ongoing
manner. When you enable real-time scan, it continually runs in the
background. You can configure only one real-time scan at a time.
WARNING!
Trend Micro recommends that you always keep real-time scan enabled.
However, if you must disable the real-time scan functionality, be sure to run
regular manual scans.
Note
If you disable real-time scanning, background scanning and file blocking will
not occur, which will make your Portal vulnerable to infection. If you disable
scheduled scanning, scanning and blocking of your SQL content store will not
occur. Disabling scheduled scanning makes your system vulnerable to
infected files being stored on your SharePoint servers.
3-5
PortalProtect Administrator's Guide
and load smart scan patterns and continue scanning files through your smart
scan server. You can configure your system to send an email alert whenever
the smart server becomes available or unavailable. See System Events on page
11-31 for more information.
Procedure
1. Click Smart Protection > Local Sources. The Local Sources screen
appears.
2. To add a smart protection server:
You can click Import to import a server list and Export to export one.
a. Click Add. The Add Smart Protection Server screen appears.
b. Type the following information:
• Server name or address
• File Reputation Service Port
• SSL
• Web Reputation Service Port
c. Click either the File or Web Reputation test button to test the
connection.
3-6
Configuring Scanning and Blocking
Note
If you have more than one Smart Protection Server listed, you can choose
the order in which PortalProtect will query them. As listed will query
according to the priority shown. Random will query the listed servers in
a random fashion. Whenever the system is unable to connect to a Smart
Protection Server, it will attempt to connect to next server according to
the query order you choose.
4. Do the following to add or edit a proxy server for the Local Smart
Protection network:
a. From the Local Sources screen, click the icon next to Proxy
Settings to expand the content.
b. Select Use a proxy server for PortalProtect and Local Smart
Protection Server communication.
c. Type an IP or server name in the Server name or IP address field.
d. Type a port number in the Port field.
e. Type a User ID as required.
f. Type a Password as required.
g. Click Save.
Note
These proxy settings affect only your Local Smart Protection Server(s)
and do not affect the Global Proxy Server settings found in
Administration > Proxy.
3-7
PortalProtect Administrator's Guide
Backed up files should be deleted soon after you determine whether the
modified file is usable and undamaged after PortalProtect executes an action
on it. If the file is damaged or unusable, be sure to send it to Trend Micro for
further analysis. It’s important to remember that even though PortalProtect
may completely clean and remove a virus, the virus may have damaged the
file code beyond repair.
See the following for information about how to set backup folder locations:
Specifying a Backup Folder for Security Risk Scan on page 3-8
Specifying a Backup Folder for Manual Scan on page 3-10
Specifying a Backup Folder for Scheduled Scan on page 3-13
3-8
Configuring Scanning and Blocking
Procedure
1. On the left menu, click Security Risk Scan. The Security Risk Scan
screen appears.
2. Click the Action tab, and then expand the Backup Setting at the bottom
of the screen.
3-9
PortalProtect Administrator's Guide
3. In the Backup directory field, type the full path in which to save backup
files. If the directory path does not exist, PortalProtect will create a
folder for the specified path.
4. Click Save to accept and save the current setting.
3-10
Configuring Scanning and Blocking
Procedure
1. On the left menu, click Manual Scan. The Manual Scan screen then
appears.
2. Under Select the scan type, click the Security risk scan link.
3. The Manual Scan > Security Risk Scan screen then appears.
3-11
PortalProtect Administrator's Guide
4. Click the Action tab, and then expand Backup Setting at the bottom of
the screen.
Figure 3-4. Manual Scan > Security Risk Scan (action tab)
5. In the Backup directory field, type the full path in which to save backup
files. If the directory path does not exist, PortalProtect will create a
folder for the specified path.
3-12
Configuring Scanning and Blocking
Procedure
1. On the left menu, click Scheduled Scan. The Scheduled Scan screen
then appears.
2. Add a new scheduled scan, or click an existing scheduled scan in the
Task Name column.
3-13
PortalProtect Administrator's Guide
3-14
Configuring Scanning and Blocking
4. Under Select scan type, click the Security risk scan link. The
Scheduled Scan > Security Risk Scan screen then appears.
5. Click the Action tab, and then expand Backup Setting at the bottom of
the screen.
6. In the Backup directory field, type the full path in which to save backup
files. If the directory path does not exist, PortalProtect will create a
folder for the specified path.
7. Click Save to accept and save the current setting.
3-15
Chapter 4
4-1
PortalProtect Administrator's Guide
File Reputation
File reputation technology from Trend Micro checks the reputation of each
file against an extensive in-the-cloud database before permitting user access.
Since the malware information is stored in the cloud, it is available instantly
to all users. High performance content delivery networks and local caching
servers ensure minimum latency during the checking process. The cloud-
client architecture offers more immediate protection and eliminates the
burden of pattern deployment besides significantly reducing the overall
client footprint.
Procedure
1. Click Smart Protection > Scan Service Settings from the left menu.
The Scan Service Settings screen appears.
4-2
Security Risk Scans
Note
See Choosing a Web Reputation Source on page 8-3 for information
on how to configure these settings.
3. Click Save.
Procedure
1. On the left menu, click Security Risk Scan.
The Security Risk Scan screen appears.
2. Select Enable real-time security risk scan to enable the scan or clear
the check box to disable the scan.
3. Click Save.
Note
You can also enable or disable real-time security risk scan from the
Summary screen by clicking the Status icon under Scan Services.
4-3
PortalProtect Administrator's Guide
Procedure
1. Log on to the product console.
2. Click Security Risk Scan.
The Security Risk Scan screen displays.
3. Select one of the following for security risk scan:
• All scannable files: Select this option to have PortalProtect scan all
scannable files.
• IntelliScan: Uses true file type identification to perform efficient
scans using Trend Micro recommended settings.
• Specify file types: Click the Show details link to expand the list and
select the files you want PortalProtect to scan. These files are "true
file types." The scan engine examines the file header rather than the
file name to ascertain the actual file type. Or, select to create a list of
file extensions by selecting Specify file extensions.
4-4
Security Risk Scans
• For example: If you click Specify file types and then select
Application and executables > Executable (.exe; .dll; .vxd), then
PortalProtect will scan executable, DLL, and VXD file types—even
when the file has a false file extension name; for example: the file
extension is labeled .txt when it is actually an .exe. However, if
you click Specify file extensions and type "exe", then PortalProtect
will scan only .exe type files. PortalProtect does not recognize
falsely labeled file types.
4. Select Enable IntelliTrap to use the IntelliTrap technology.
5. For Spyware/Grayware Scan, choose Select All or select from the
following:
• Spyware
• Dialers
• Hacking Tools
• Password Cracking Applications
• Adware
• Joke Programs
• Remote Access Tools
• Others
6. To modify or improve performance, click Scan Restriction Criteria to
expand the contents. Under Do not scan file if...
• File size exceeds—type a value between 1-100-MB.
If this option is not selected, files greater than 1-GB will not be
scanned.
7. Under Do not scan compressed files if, type values according to the
following:
• Decompressed file count exceeds [xxxxx]—type the total
decompressed file count (1-10000) that should not be exceeded.
When PortalProtect encounters a number of files equal to or greater
than this number it will not scan the files.
4-5
PortalProtect Administrator's Guide
Procedure
1. On the left menu, click Security Risk Scan and select the Action tab.
2. Under Advanced Options, click Macros to open the content.
3. Select Enable advanced macro scan to enable the functionality.
4. For Heuristic level, select an option according to the following:
• 1 - Lenient filtering
• 2 - Default filtering
4-6
Security Risk Scans
• 3 - Sensitive filtering
• 4 - Rigorous filtering
OR...
5. Select Delete all macros detected by advanced macro scan.
6. Click Save.
Procedure
1. Choose whether to set up a backup folder.
When you set up a backup folder, PortalProtect sends a copy of the file to
the backup directory before it performs the configured actions. See
Specifying a Backup Folder for Security Risk Scan on page 3-8.
2. Configure the action that PortalProtect executes when it detects viruses
or malicious code.
You can configure PortalProtect to use ActiveAction or configure a
custom action. ActiveAction takes the most appropriate action based on
the threat type. See Trend Micro™ ActiveAction™ on page 1-18.
4-7
PortalProtect Administrator's Guide
Tip
ActiveAction performs the primary and secondary scan actions
recommended by Trend Micro. If the primary scan action is
unsuccessful, the secondary action will be performed. ActiveAction uses
pre-configured scan actions for viruses, Trojans, and joke programs.
Procedure
1. Log on to the product console.
2. Click Security Risk Scan.
The Security Risk Scan screen displays.
3. Click the Action tab.
The Action screen displays.
4. Select one of the following:
• ActiveAction
Notify, Notify when uncleanable, or Do not notify
• Customized action for detected threats
5. To backup the infected file, select Backup infected file before
performing action.
6. Select Do not clean infected compressed files to optimize performance
if performance improvement is required.
4-8
Security Risk Scans
4-9
PortalProtect Administrator's Guide
Note
See Configuring Security Risk Scan Notifications on page 11-4 for details on
how to configure the notification settings.
Note
To optimize scanning performance when scanning compressed files, clear Do
not clean infected compressed files to optimize performance on the
Security Risk ScanAction tab.
Procedure
1. On the left menu, click Security Risk Scan and select the Target tab.
2. From the Target tab, under Advanced Options, expand the Scan
Restrictions Criteria.
Note
Select the checkbox for the items you want to scan and set the
appropriate values.
4-10
Security Risk Scans
4-11
Chapter 5
File Blocking
This chapter describes how to configure PortalProtect to block files
according to the file type and file name and select the action for all the files
that match your configuration.
Topics include:
• About File Blocking on page 5-2
• About File Blocking Action Settings on page 5-2
• Configuring File Blocking on page 5-3
• About Available File Types on page 5-15
5-1
PortalProtect Administrator's Guide
Note
File blocking options vary according to the type of scan performed. Check the
available actions for each scan type, whether Security Risk Scan, Manual
Scan, or Scheduled Scan.
The extension of a file identifies the file type, for example .txt, .exe,
or .dll. Many viruses are closely associated with certain types of files. Some
virus writers have tried to disguise their files by using extension names that
are known to be harmless, so true file type blocking scans the header of files
to determine their actual type. By configuring PortalProtect to block
according to file type, you can decrease the security risk to your SharePoint
servers from those types of files. Similarly, specific attacks are often
associated with a specific file name. If you learn the name of an infected file,
you can use PortalProtect to screen that file out of your SharePoint. Blocking
is an effective way to control virus outbreaks.
Tip
Administrators can also use file blocking to enforce their company's policy
restricting the sharing of non-work related files on their SharePoint servers.
5-2
File Blocking
event. You can view these from the Logs menu. See Query Logs on page 11-41
for more information.
Possible Actions
During this scan PortalProtect executes this action
Procedure
1. On the left menu, click File Blocking.
5-3
PortalProtect Administrator's Guide
Note
You can filter the listed policies by: Policy name, All, Enabled, or
Disabled. After choosing your filter options, click Search; to display all
search results click Display All.
3. Click Save.
Procedure
1. On the left menu, click File Blocking. The File Blocking screen appears.
2. Click Add. The File Blocking: Add Policy > Step 1: Specify Rules screen
appears.
5-4
File Blocking
Procedure
1. Under Block these files, select from the following options for Specific
files > File Types; click Show details to expand the content:
• Application and executables
• Documents
• Images
• Video
• Audio
• Compressed files
2. For Specific files > File Names; click Show details to expand the
content:
a. Select Specific file extensions to block to block the extensions that
appear in the list. Type a new extension and click Add to include it
on the list. Use a semicolon (;) to separate multiple entries.
Note
To delete entries, select the entry and click Delete. Select multiple
entries using Ctrl + click.
b. Select File names to block to block files with the name that appears
in the list. Type a new file name and click Add to include it on the
list.
3. Select Block compressed files containing the specific file types or
names to block compressed files if they contain any specified file types
or names.
4. Select Block OLE containers containing the specific file types or
names; click Show details to expand the content:
5-5
PortalProtect Administrator's Guide
Figure 5-1. File Blocking: Add Policy > Step 2: Exceptions screen
Procedure
1. To add an exception, click Add. The File Blocking: Add Policy > Step
2.a: Specify sites to be excluded screen appears.
5-6
File Blocking
Figure 5-2. File Blocking: Add Policy > Step 2.a: Specify sites to be excluded screen
Note
The All sites option enables you to choose from AD user(s)/
group(s) only.
5-7
PortalProtect Administrator's Guide
Note
The Specify a site’s URL option enables you to choose from both AD
user(s)/group(s) and SharePoint user(s)/group(s); use the Search
for drop down to choose.
• Type the URL in the Specify a site’s URL field, and click
Search.
• From the Select sites tree, choose the specific site(s) to exclude
from this policy.
• Click Next >.
3. Click Next >. The Step 2b: Specify accounts to be excluded screen
appears.
5-8
File Blocking
Figure 5-3. File Blocking: Add Policy > Step 2.b: Specify accounts to be excluded
screen
5-9
PortalProtect Administrator's Guide
Note
The Specify a site’s URL option enables you to choose from both AD
user(s)/group(s) and SharePoint user(s)/group(s); use the Search for
drop down to choose.
Figure 5-4. File Blocking: Add Policy > Step 3: Specify Action screen
5-10
File Blocking
Procedure
1. Select from the following options:
• Block or Pass
And...
• Notify or Do not notify
2. Click Next >. The File Blocking: Add Policy > Step 4: Specify
Notification screen appears.
Figure 5-5. File Blocking: Add Policy > Step 4: Specify Notification screen
Procedure
1. Follow the basic steps explained in Configuring File Blocking Notifications
on page 11-5. Click Next >. The File Blocking: Add Policy > Step 5:
Name and Priority screen appears.
5-11
PortalProtect Administrator's Guide
Figure 5-6. File Blocking: Add Policy > Step 5: Name and Priority screen
Step 5. File Blocking: Add Policy > Name and Priority screen
Procedure
1. Select Enable this policy to activate it.
2. Type a name for your policy in the Policy name field.
3. Type the priority for your policy in the Priority field.
Tip
You can review the priorities and settings for your other policies in the
review existing policies window.
4. Click Finish. The File Blocking main screen displays where your new
policy will appear in the priority you selected.
5-12
File Blocking
Procedure
1. On the left menu, click File Blocking.
The File Blocking screen appears.
2. From the File Blocking screen, click the policy name link you want to
edit.
5-13
PortalProtect Administrator's Guide
3. Select or clear the Enable this policy checkbox to enable or disable the
policy.
4. Edit the following as required:
• Policy name
• Description
5. Click the Target tab.
6. In the Block these files section, under Specific Files, click Show details
to expand the content and select File types and File names.
See Step 1. File Blocking: Add Policy > Specify Rules on page 5-5 for more
information.
7. Click the Exceptions tab and add or edit any exceptions as required.
See Step 2. File Blocking: Add Policy > Exceptions on page 5-6 for more
information.
5-14
File Blocking
Documents
Table 5-2. Document file choices
File Type Associated extension(s)
5-15
PortalProtect Administrator's Guide
Microsoft Office Excel 2007 .xlsx; .xlsm; .xltx; .xltm; .xlsb; .xlam
Microsoft Office PowerPoint 2007 .pptx; .pptm; .potx; .ppam; .ppsx; .ppsm
MSFT .msft
WordPerfect .wp
Images
Table 5-3. Image file choices
File Type Associated extension(s)
Compuserve .gif
5-16
File Blocking
Video
Table 5-4. Video file choices
File Type Associated extension(s)
Audio
Table 5-5. Audio file choices
File Type Associated extension(s)
5-17
PortalProtect Administrator's Guide
Compressed Files
Table 5-6. Compressed file choices
File Type Associated extension(s)
BINHEX .hqx
LZW/Compressed 16-bits .Z
MacBinary .bin
UUEncode .uu
WinAce .ace
5-18
Chapter 6
Content Filtering
This chapter describes how to configure PortalProtect to prevent the
undesirable content from being posted to SharePoint.
Topics include:
• About Content Filtering on page 6-2
• About Content Filtering Action Settings on page 6-3
• Content Filtering Policies on page 6-4
• Configuring Content Filtering on page 6-7
6-1
PortalProtect Administrator's Guide
6-2
Content Filtering
Note
Content filtering for files scans during uploading and downloading, whereas
content filtering for Web scans list items when they are added or modified.
Content filtering for files cannot scan the content of .eml files.
Note
PortalProtect will pass and log the
Web content that triggers the policy
in manual scan.
6-3
PortalProtect Administrator's Guide
Note
PortalProtect will pass and log the
Web content that triggers the policy
in manual scan.
Policy Exceptions
For Active Directory integrated policies, you can specify selected Active
Directory User(s) and Group(s) as policy excluded accounts. For example,
consider that AD Group1 contains an exclusion for ADuser1 and ADuser2.
In this case, ADUser1 and ADUser2 will be excluded according to the AD
Group1 policy.
Note
Exclusion only works in an AD environment. The Exception list does not
support AD users/groups across the forest and does not support global AD
groups either.
For SharePoint user(s) and Group(s) integrated policies, you can specify
selected SharePoint site(s) and user(s)/group(s) within the site(s).
6-4
Content Filtering
which the Content Filtering policies will be excluded. See Global Approved
List on page 1-3.
Procedure
1. Click Content Filtering on the left menu.
The Content Filtering screen appears.
2. Click Global Approved List.
6-5
PortalProtect Administrator's Guide
6-6
Content Filtering
Note
You can also Import or Export AD users/groups from or to an external
file.
9. Click Save.
Procedure
1. On the left menu, click Content Filtering.
6-7
PortalProtect Administrator's Guide
Note
You can filter the listed policies by: Policy name, All, Enabled, or
Disabled. After choosing your filter options, click Search; to display all
search results click Display All.
6-8
Content Filtering
3. Click Save.
Procedure
1. On the left menu, click Content Filtering.
The Content Filtering screen appears.
2. Click Add.
The Content Filtering: Add Policy > Step 1: Specify Rules screen
appears.
Figure 6-4. Content Filtering: Add Policy > Step 1: Specify Rules screen
6-9
PortalProtect Administrator's Guide
3. From the Match drop-down list, select from the following options:
• Any specified keyword—select this option if you want this rule to
trigger when any keyword is found and matched
• All keywords—select this option if you want this rule to trigger
when all keywords are found and matched
Note
You can export or import a keyword list to or from a text file (.txt) using
the Export or Import keys located next to the keyword list.
Note
See About Regular Expressions on page C-1 for more information
about using regular expressions with PortalProtect.
6-10
Content Filtering
Figure 6-5. Content Filtering: Add Policy > Step 2: Exceptions screen
Procedure
1. Click Add from the Step2: Exceptions screen.
6-11
PortalProtect Administrator's Guide
Figure 6-6. Content Filtering: Add Policy > Step 2.a Specify sites to be excluded
screen
Note
The All sites option enables you to choose from AD user(s)/group(s)
only.
6-12
Content Filtering
Note
The Specify a site's URL option enables you to choose from both AD
user(s)/group(s) and SharePoint user(s)/group(s); use the Search
for drop down to choose.
a. Type the URL in the Specify a site's URL field and click Search.
b. From the Select sites tree, choose the specific site(s) to exclude
from this policy.
c. Click Next > and go to Step 3.
3. Click Next >.
6-13
PortalProtect Administrator's Guide
Figure 6-7. Content Filtering: Add Policy > Step 2.b Specify accounts to be excluded
screen
6-14
Content Filtering
Note
The Specify a site's URL option enables you to choose from both AD
user(s)/group(s) and SharePoint user(s)/group(s); use the Search for
drop down to choose.
Procedure
1. Select an action for the content filtering policy from the following
options:
• Block or Pass
• Notify or Do not notify
• Click Next >.
6-15
PortalProtect Administrator's Guide
Figure 6-8. Content Filtering: Add Policy > Step 4: Specify Notification screen
Procedure
1. Select Notify administrator to enable notifications for this content
filtering policy.
6-16
Content Filtering
2. Under People to notify, click Show details to expand and configure the
following:
• To—the global email address(es) appear in this field. You can enter
additional email addresses, separated by a semicolon, to create
unique notifications.
• Subject—type a subject that will appear in the subject line of the
email (for example: Content Filtering Notification).
• Message—you can create a unique message using variables like:
[Server Name], [Content Rules], [Date], [Time], [File Name/Web
Content Title], [File/Web Content Location], [Action], and [Violator].
Note
The available variables appear in the left window, and the message
body in the right window.
6-17
PortalProtect Administrator's Guide
6-18
Content Filtering
Figure 6-9. Content Filtering: Add Policy > Step 5: Name and Priority screen
Procedure
1. Select Enable this policy to activate it.
6-19
PortalProtect Administrator's Guide
Tip
You can review the priorities and settings for your other policies in the
review existing policies window.
4. Click Finish.
The Content Filtering main screen displays where your new policy will
appear in the priority you selected.
Procedure
1. On the left menu, click Content Filtering.
The Content Filtering screen appears.
2. From the Content Filtering screen, click the policy name link you want
to edit.
6-20
Content Filtering
3. Select or clear the Enable this policy checkbox to enable or disable the
policy.
4. Edit the following as required:
• Policy name
• Description
5. Click the Target tab, and from the Match drop down, select from the
following options:
• Any specified keyword—select this option if you want this rule to
trigger when any keyword is found and matched
6-21
PortalProtect Administrator's Guide
Note
You can export or import a keyword list to or from a text file (.txt)
using the Export or Import keys located next to the keyword list.
Note
See About Regular Expressions on page C-1 for more information
about using regular expressions with PortalProtect.
6-22
Content Filtering
• Notify
• Do not notify
11. Click the Notification tab, and choose the appropriate settings.
See Step 4. Content Filtering: Add Policy > Specify Notification on page 6-16
for more information.
12. Click Save.
6-23
Chapter 7
7-1
PortalProtect Administrator's Guide
7-2
Data Loss Prevention
Note
Administrators cannot delete a data identifier that a Data Loss Prevention
(DLP) template is using. Delete the template before deleting the data
identifier.
Expressions
An expression is data that has a certain structure. For example, credit card
numbers typically have 16 digits and appear in the format "nnnn-nnnn-
nnnn-nnnn", making them suitable for expression-based detections.
Administrators can use predefined and customized expressions.
For details, see Predefined Expressions on page 7-3 and Customized Expressions
on page 7-4.
Predefined Expressions
Data Loss Prevention comes with a set of predefined expressions. These
expressions cannot be modified or deleted.
Data Loss Prevention verifies these expressions using pattern matching and
mathematical equations. After Data Loss Prevention matches potentially
sensitive data with an expression, the data may also undergo additional
verification checks.
For a complete list of predefined expressions, see the Data Protection Lists
document at http://docs.trendmicro.com/en-us/enterprise/data-protection-
reference-documents.aspx.
7-3
PortalProtect Administrator's Guide
Customized Expressions
Create customized expressions if none of the predefined expressions meet
the company's requirements.
Expressions are a powerful string-matching tool. Become comfortable with
expression syntax before creating expressions. Poorly written expressions
can dramatically impact performance.
When creating expressions:
• Refer to the predefined expressions for guidance on how to define valid
expressions. For example, when creating an expression that includes a
date, refer to the expressions prefixed with "Date".
• Note that Data Loss Prevention follows the expression formats defined
in Perl Compatible Regular Expressions (PCRE). For more information
on PCRE, visit the following website:
http://www.pcre.org/
• Start with simple expressions. Modify the expressions if they are causing
false alarms or fine tune them to improve detections.
Administrators can choose from several criteria when creating expressions.
An expression must satisfy the chosen criteria before Data Loss Prevention
subjects it to a DLP policy. For details about the different criteria options, see
Criteria for custom expressions on page 7-4.
7-4
Data Loss Prevention
7-5
PortalProtect Administrator's Guide
Procedure
1. Go to Data Loss Prevention > Data Identifiers.
2. Click the Expression tab.
3. Click Add.
A new screen displays.
4. Type an expression name that does not exceed 256 characters in length.
5. Type a description that does not exceed 256 characters in length.
6. Type the displayed data.
For example, if you are creating an expression for ID numbers, type a
sample ID number. This data is used for reference purposes only and
will not appear elsewhere in the product.
7. Choose one of the following criteria and configure additional settings
for the chosen criteria (see Criteria for custom expressions on page 7-4):
• None
• Specific characters
• Suffix
• Single-character separator
8. Optional: Select a validator for the expression.
Note
Data units follow semantic rules. Not every 9-digit number is a valid
social security number and not every 15- or 16-digit number is a valid
credit card number. To reduce false positives, expression validators
check if the extracted data units follow these rules.
7-6
Data Loss Prevention
Note
Save the settings only if the testing was successful. An expression that
cannot detect any data wastes system resources and may impact
performance.
Procedure
1. Go to Data Loss Prevention > Data Identifiers.
2. Click the Expression tab.
3. Click Import and then locate the .xml file containing the expressions.
4. Click Open.
A message appears, informing you if the import was successful.
7-7
PortalProtect Administrator's Guide
Note
Every customized expression is identified by its name field in the .xml
file. This name is a unique internal name that does not display on the
administrator console.
Keywords
Keywords are special words or phrases. You can add related keywords to a
keyword list to identify specific types of data. For example, "prognosis",
"blood type", "vaccination", and "physician" are keywords that may appear in
a medical certificate. If you want to prevent the transmission of medical
certificate files, you can use these keywords in a DLP policy and then
configure Data Loss Prevention to block files containing these keywords.
Commonly used words can be combined to form meaningful keywords. For
example, "end", "read", "if", and "at" can be combined to form keywords
found in source codes, such as "END-IF", "END-READ", and "AT END".
You can use predefined and customized keyword lists. For details, see
Predefined Keyword Lists on page 7-8 and Custom keyword lists on page 7-9.
7-8
Data Loss Prevention
Any keyword A file must contain at least one keyword in the keyword list.
All keywords A file must contain all the keywords in the keyword list.
7-9
PortalProtect Administrator's Guide
Criteria Rule
All keywords A file must contain all the keywords in the keyword list. In addition, each
within <x> keyword pair must be within <x> characters of each other.
characters
For example, your 3 keywords are WEB, DISK, and USB and the number of
characters you specified is 20.
If Data Loss Prevention detects all keywords in the order DISK, WEB, and
USB, the number of characters from the "D" (in DISK) to the "W" (in WEB)
and from the "W" to the "U" (in USB) must be 20 characters or less.
The following data matches the criteria: DISK####WEB############USB
The following data does not match the criteria:
DISK*******************WEB****USB(23 characters between "D" and "W")
When deciding on the number of characters, remember that a small
number, such as 10, usually results in a faster scanning time but only covers
a relatively small area. This may reduce the likelihood of detecting sensitive
data, especially in large files. As the number increases, the area covered also
increases but scanning time might be slower.
Combined A file must contain one or more keywords in the keyword list. If only one
score for keyword was detected, its score must be higher than the threshold. If there
keywords are several keywords, their combined score must be higher than the
exceeds threshold.
threshold
Assign each keyword a score of 1 to 10. A highly confidential word or phrase,
such as "salary increase" for the Human Resources department, should have
a relatively high score. Words or phrases that, by themselves, do not carry
much weight can have lower scores.
Consider the scores that you assigned to the keywords when configuring the
threshold. For example, if you have five keywords and three of those
keywords are high priority, the threshold can be equal to or lower than the
combined score of the three high priority keywords. This means that the
detection of these three keywords is enough to treat the file as sensitive.
Procedure
1. Go to Administration > Policy Objects > DLP Data Identifiers.
7-10
Data Loss Prevention
Procedure
1. Go to Administration > Policy Objects > DLP Data Identifiers.
7-11
PortalProtect Administrator's Guide
Note
Every customized keyword list is identified by its name field in the .xml
file. This name is a unique internal name that does not display on the
administrator console.
If the file contains a customized keyword list that already exists, the
existing keyword list is overwritten. If the file contains any predefined
keyword list, the predefined keyword list is skipped during the import of
the remaining customized keyword lists.
Note
It is not possible to delete a template that is being used in a DLP policy.
Remove the template from the policy before deleting it.
7-12
Data Loss Prevention
For a detailed list on the purposes of all predefined templates, and examples
of data being protected, see the Data Protection Lists document at http://
docs.trendmicro.com/en-us/enterprise/data-protection-reference-
documents.aspx.
[Data Identifier1] And [Data A file must satisfy [Data Identifier 1] and [Data Identifier 2] but
Identifier 2] Except [Data not [Data Identifier 3].
Identifier 3]
For example:
A file must be [an Adobe PDF document] and must contain [an
email address] but should not contain [all of the keywords in
the keyword list].
7-13
PortalProtect Administrator's Guide
[Data Identifier 1] Or [Data A file must satisfy [Data Identifier 1] or [Data Identifier 2].
Identifier 2]
For example:
A file must be [an Adobe PDF document] or [a Microsoft Word
document].
Except [Data Identifier 1] A file must not satisfy [Data Identifier 1].
For example:
A file must not be [a multimedia file].
As the last example in the table illustrates, the first data identifier in the
condition statement can have the "Except" operator if a file must not satisfy
all of the data identifiers in the statement. In most cases, however, the first
data identifier does not have an operator.
Creating a Template
Procedure
1. Go to Administration > Policy Objects > DLP Compliance Templates.
2. Click Add.
A new screen displays.
3. Type a template name that does not exceed 256 characters in length.
4. Type a description that does not exceed 256 characters in length.
5. Select data identifiers and then click the "add" icon.
6. If you selected an expression, type the number of occurrences, which is
the number of times an expression must occur before Data Loss
Prevention subjects it to a policy.
7. Choose a logical operator for each definition.
7-14
Data Loss Prevention
Note
Use logical operators carefully when configuring condition statements.
Incorrect usage leads to an erroneous condition statement that will likely
produce unexpected results. For examples of correct usage, see Condition
statements and logical pperators on page 7-13.
8. To remove a data identifier from the list of selected identifiers, click the
trash bin icon.
9. Click Save.
Importing Templates
Use this option if you have a properly-formatted .xml file containing the
templates. You can generate the file by exporting the templates from the
PortalProtect administrator console.
Procedure
1. Go to Administration > Policy Objects > DLP Compliance Templates.
2. Click Import and then locate the .xml file containing the templates.
3. Click Open.
A message appears, informing you if the import was successful.
Note
Every customized template is identified by its name field in the .xml file.
This name is a unique internal name that does not display on the
management console.
If the file contains a customized template that already exists, the existing
template is overwritten. If the file contains any predefined template, the
predefined template is skipped during the import of the remaining
customized templates.
7-15
PortalProtect Administrator's Guide
Procedure
1. On the left menu, click Data Loss Prevention > Policy.
The Data Loss Prevention screen appears.
7-16
Data Loss Prevention
Procedure
1. On the left menu, click Data Loss Prevention > Policy.
The Data Loss Prevention screen appears.
2. Click Add.
The Data Loss Prevention: Add Policy> Step 1: Specify Rules screen
appears.
Figure 7-2. Data Loss Prevention: Add Policy> Step 1: Specify Rules screen
7-17
PortalProtect Administrator's Guide
3. Select the DLP template(s) you want to add from the list of Available
DLP templates and click Add >>. Remove DLP templates by first
selecting and then clicking << Remove.
Note
Press and hold the Ctrl key to select multiple DLP templates.
You can import a DLP template from an XML file by clicking the Import
button.
7-18
Data Loss Prevention
Figure 7-3. Data Loss Prevention: Add Policy > Step 2: Exceptions screen
Procedure
1. Click Add from the Step2: Exceptions screen.
7-19
PortalProtect Administrator's Guide
Figure 7-4. Data Loss Prevention: New Policy> Step 2.a Specify sites to be excluded
screen
Note
The All sites option enables you to choose from AD user(s)/group(s) only.
7-20
Data Loss Prevention
Note
The Specify a site's URL option enables you to choose from both AD
user(s)/group(s) and SharePoint user(s)/group(s); use the Search
for drop down to choose.
• Type the URL in the Specify a site's URL field, and click Search.
• From the Select sites tree, choose the specific site(s) to exclude from
this policy.
3. Click Next >.
The Step 2b: Specify accounts to be excluded screen appears.
Figure 7-5. Data Loss Prevention: Add Policy > Step 2.b Specify accounts to be
excluded screen
7-21
PortalProtect Administrator's Guide
Note
The Specify a site's URL option enables you to choose from both AD
user(s)/group(s) and SharePoint user(s)/group(s); use the Search for
drop down to choose.
Procedure
1. Select an action for the data loss prevention policy from the following
options:
7-22
Data Loss Prevention
• Block or Pass
• Notify or Do not notify
• Click Next >.
Figure 7-6. Data Loss Prevention: Add Policy > Step 4: Specify Notification
7-23
PortalProtect Administrator's Guide
Procedure
1. Select Notify administrator to enable notifications for this data loss
prevention policy.
2. Under People to notify, click Show details to expand and configure the
following:
• To—the global email address(es) appear in this field. You can enter
additional email addresses, separated by a semicolon, to create
unique notifications.
• Subject—type a subject that will appear in the subject line of the
email (for example: Data Loss Prevention Notification).
• Message—you can create a unique message using variables like:
[Server Name], [Data Loss Prevention Rules], [Date], [Time], [File
Name/Web Content Title], [File/Web Content Location], [Action],
and [Violator].
Note
The available variables appear in the left window, and the message
body in the right window.
7-24
Data Loss Prevention
• IP Address
• Community
• Message—create a message as stated in Step 2 of this procedure.
6. Select Write to Windows event log to write each notification to the
Windows event log.
7. Click Next >.
Step 5. Data Loss Prevention: Add Policy > Name and Priority
Figure 7-7. Data Loss Prevention: Add Policy > Step 5: Name and Priority screen
7-25
PortalProtect Administrator's Guide
Procedure
1. Select Enable this policy to activate it.
2. Type a name for your policy in the Policy name field.
3. Type the priority for your policy in the Priority field.
Note
You can review the priorities and settings for your other policies in the
review existing policies window.
4. Click Finish.
The Data Loss Prevention main screen displays where your new policy
will appear in the priority you selected.
Procedure
1. On the left menu, click Data Loss Prevention > Policy.
The Data Loss Prevention screen appears.
2. From the Data Loss Prevention screen, click the policy name link you
want to edit.
7-26
Data Loss Prevention
Figure 7-8. Data Loss Prevention: Edit Policy screen (target tab)
3. Select or clear the Enable this policy checkbox to enable or disable the
policy.
4. Edit the following as required:
• Policy name
• Description
5. Click the Target tab.
6. Select the DLP template(s) you want to add from the list of Available
DLP templates and click Add >>. Remove DLP templates by first
selecting and then clicking << Remove.
7-27
PortalProtect Administrator's Guide
Note
Press and hold the Ctrl key to select multiple DLP templates.
You can import a DLP template from a text file (.txt) clicking the Import
button.
7-28
Data Loss Prevention
7-29
Chapter 8
Web Reputation
This chapter describes how to configure PortalProtect to protect your
network and computers from web-based threats.
Topics include:
• About Web Reputation on page 8-2
• Local and Global Smart Protection on page 8-2
• Enabling Real-time Web Reputation on page 8-4
• About Web Reputation: Target Settings on page 8-5
• About Web Reputation: Action Settings on page 8-7
• Web Reputation: Notifications on page 8-8
• Smart Protection Network on page 8-9
8-1
PortalProtect Administrator's Guide
8-2
Web Reputation
Procedure
1. Click Smart Protection > Scan Service Settings from the left menu.
The Scan Service Settings screen appears.
8-3
PortalProtect Administrator's Guide
Note
If your Local Smart Protection Server is unable to determine a URLs
reputation, you have the option of allowing your system to query the
Smart Protection Network. If you select the checkbox, Do not make
external queries to Smart Protection Network, PortalProtect will
only query the local smart scan server; if you clear the checkbox,
PortalProtect can query the Smart Protection Network.
d. Click the Smart Protection > Local Sources link to configure the
Smart Protection Server(s). Refer to Smart Protection Source on page
3-5 for instructions on how to configure this screen.
3. Click Save.
Note
Refer to Alerts on page 11-31 for information on configuring your alerts
when your smart servers are unavailable and/or come back online.
Procedure
1. Log on to the product console.
2. Click Web Reputation from the main menu.
The Web Reputation screen displays.
3. Select either or both of the following options:
• Enable real-time Web Reputation for document
• Enable real-time Web Reputation for Web content
4. Click Save.
8-4
Web Reputation
8-5
PortalProtect Administrator's Guide
• Enable approved URL list: Select to use a custom list of approved URLs.
• Enter approved URL: Type a URL.
Tip
To save network bandwidth, Trend Micro recommends adding the enterprise
internal Web sites to the Web reputation approved URL list.
Procedure
1. Log on to the product console.
2. Click Web Reputation from the main menu.
The Web Reputation screen displays.
3. Select one of the following security levels:
• High: Checks Web content for URLs that are verified threat sources,
potentially unsafe, or associated with spam.
• Medium: Checks Web content for URLs that are verified threat
sources or potentially unsafe.
8-6
Web Reputation
• Low: Checks Web content for URLs that are verified threat sources.
4. Select Enable approved URL list to avoid scanning URLs deemed safe
under your security policy.
5. Add approved URLs to the list.
6. Click Save.
• Block
• Pass
• Notify: Select to send a notification
• Do not notify: Select to not send a notification
• Take action on URLs that have not been assessed by Trend Micro:
Select to treat URLs that have not been classified as suspicious URLs and
perform the specified action
8-7
PortalProtect Administrator's Guide
Procedure
1. Log on to the product console.
2. Click Web Reputation from the main menu.
The Web Reputation screen displays.
3. Click the Action tab.
4. Select an action.
5. Select Take action on URLs that have not been assessed by Trend
Micro to apply a strict Web reputation policy.
6. Select Notify or Do not notify.
7. Click Save.
8-8
Web Reputation
8-9
Chapter 9
Manual Scan
You can run a manual scan at any time. If you try to run a manual scan when
PortalProtect is running a scheduled scan, the manual scan takes priority.
In this chapter, you will find information about:
• Configuring a Manual Scan on page 9-2
9-1
PortalProtect Administrator's Guide
Procedure
1. On the left menu, click Manual Scan.
9-2
Manual Scan
9-3
PortalProtect Administrator's Guide
3. Select from the following options under Select the scan type:
Note
Click the Security risk scan, File blocking, Content filtering, Data loss
prevention, or Web Reputation links to configure the manual scan
options. For more information, refer to:
9-4
Manual Scan
Procedure
1. On the left menu, click Manual Scan.
2. Under Select the scan type, click the Security risk scan link.
3. Select the Target tab. Under Advanced Options, expand the Scan
Restrictions Criteria.
9-5
PortalProtect Administrator's Guide
Note
Select the checkbox for the items you want to scan and set the
appropriate values.
9-6
Manual Scan
Procedure
1. On the left menu, click Manual Scan.
2. Under Select the scan type, click the Security risk scan link and select
the Action tab.
3. Under Advanced Options, click Macros to open the content.
4. Select Enable advanced macro scan, to enable the functionality.
5. For Heuristic level, select an option according to the following:
• 1 - Lenient filtering
• 2 - Default filtering
• 3 - Sensitive filtering
• 4 - Rigorous filtering
OR....
6. Select Delete all macros detected by advanced macro scan.
7. Click Save.
Procedure
1. On the left menu, click Manual Scan.
9-7
PortalProtect Administrator's Guide
Figure 9-2. Manual Scan: Security Risk Scan screen (Target tab)
9-8
Manual Scan
4. Configure the settings for the Target tab as described in About Security
Risk Scan Action Settings on page 4-7.
Procedure
1. After completing the settings for the Target tab, click the Action tab.
9-9
PortalProtect Administrator's Guide
The Manual Scan: Security Risk Scan screen appears with the Action
tab.
2. Choose from the available options for the Manual Security Risk Scan.
Refer to Configuring Security Risk Scan: Action Settings on page 4-7 and the
following table.
9-10
Manual Scan
Table 9-1. Available Actions for Manual Scan: Security Risk Scan
Procedure
1. Click the Manual Scan: Security Risk Scan > Notification tab.
2. Set up the notifications for this Manual Security Risk scan as described
in Configuring Security Risk Scan Notifications on page 11-4.
3. Click Save.
4. Click Scan Now to perform a manual scan using the saved settings.
Procedure
1. On the left menu, click Manual Scan.
9-11
PortalProtect Administrator's Guide
2. Under Select the scan type, click the File blocking link.
The Manual Scan: File Blocking screen appears.
3. Click Add to create a new policy.
The Manual Scan: File Blocking: Add Policy screen appears.
Figure 9-4. Manual Scan: File Blocking: Add Policy > Step 1. Specify Rules screen
9-12
Manual Scan
4. Continue through the steps that follow to complete the configuration for
this new policy.
Step 1. Manual Scan: File Blocking: Add Policy > Specify Rules
Procedure
1. Under Block these files > Specific Files, select from the following
options to determine which files you want to block for this rule:
• File types: select to choose all file types, or click Show details to
choose specific file types. Refer to Table 5-2 through Table 5-7 under
About Available File Types on page 5-15.
2. To add or remove specific filenames or extensions, click Show details
next to File names to expand the content.
3. Add or Delete files and/or file extensions as required.
4. Select Block file type or names within compressed files to perform that
action.
5. Click Next >.
The Manual Scan: File Blocking: Add Policy Step 2: Exceptions screen
appears.
Step 2. Manual Scan: File Blocking: Add Policy > Specify sites to
be excluded
Procedure
1. To exclude any sites and accounts as exceptions to this new policy, click
Add.
The Manual Scan: File Blocking: Add Policy (Step 2.a: Specify sites to
be excluded screen appears.
2. Select from the following options:
9-13
PortalProtect Administrator's Guide
• All sites...OR...
• Specify a site's URL: type a specific URL and click Search, and/or
select the sites from the tree.
3. Click Next >.
The Manual Scan: File Blocking: Add Policy (Step 2.b: Specify accounts
to be excluded screen appears.
4. Select from the following options:
• Anyone...OR...
• Specific accounts: from the Search for drop down, select AD
user(s)/groups or SharePoint user(s)/group(s)
5. Select Users, Groups, or select both check boxes. Then, type the name
and click Search.
6. After the search completes, select the items you want to include from
the Available Account(s) window and click Add.
7. Continue to search and add items as required, and when complete, click
Finish.
The Manual Scan: File Blocking: Add Policy Step 2: Exceptions screen
appears and displays the new sites/accounts you just added.
8. Click Next>.
The Manual Scan: File Blocking: Add Policy Step 3: Specify Action
screen appears.
Step 3. Manual Scan: File Blocking: Add Policy > Specify Action
Procedure
1. Select an action from the following options:
• Quarantine
• Delete
9-14
Manual Scan
• Pass
2. Select from the following:
• Notify
• Do not notify
3. Click Next>.
The Manual Scan: File Blocking: Add Policy Step 4: Specify
Notification screen appears.
Procedure
1. Under People to notify, select from the following:
• Notify violator
• Notify administrator
Note
Refer to Configuring File Blocking Notifications on page 11-5 for more
information about setting up notifications.
2. Click Next>.
The Manual Scan: File Blocking: Add Policy Step 5: Name and priority
screen appears.
9-15
PortalProtect Administrator's Guide
Step 5. Manual Scan: File Blocking: Add Policy > Name and
priority
Procedure
1. Select Enable this policy to activate it for the manual scan; clear to
deactivate it.
2. Type a name for this new policy in the Policy Name field (required).
3. Type a description for the policy in the Description field.
4. Type a number to indicate the processing priority in the Priority field
(required).
You can view the existing policies and status at the bottom of the screen
to assist making a choice for the priority.
5. Click Finish.
The Manual Scan: File Blocking screen appears and shows the policy
just created with the following information:
• Policy: name
• Action: Quarantine, Block, and so on
• Priority: 1, 2, 3, and so on
• Status: enabled (green checkmark) or disabled (red X); click to
change the status as needed
Note
Click Import to import a policy from Real-time Scan: File Blocking.
9-16
Manual Scan
Pass Pass
Procedure
1. On the left menu, click Manual Scan.
The Manual Scan screen appears.
2. Under Scan Type Selection, click the File blocking link.
The Manual Scan: File Blocking screen appears.
3. Click Import.
The Import from Real-time File Blocking Policy screen appears.
9-17
PortalProtect Administrator's Guide
Pass Pass
Procedure
1. On the left menu, click Manual Scan.
The Manual Scan screen appears.
2. Under Select the scan type, click the Content filtering link.
9-18
Manual Scan
3. Click Import.
9-19
PortalProtect Administrator's Guide
Figure 9-6. Import from Real time Content Filtering Policy screen
Procedure
1. On the left menu, click Manual Scan.
The Manual Scan screen appears.
2. Under Select the scan type, select whether to perform content filtering
for the following:
• Content filtering for document
• Content filtering for Web content
3. Click the Content filtering link.
9-20
Manual Scan
Note
You can filter the policies according to the Policy name, whether
Enabled, Disabled, or All (both enabled and disabled).
4. From the list, select the policies that you want to Delete or Reorder.
Click an existing policy to edit it.
5. In the Status column, click the red X, or green checkmark to enable or
disable an existing content filtering policy for manual scan.
6. Select an existing policy and configure the following options:
9-21
PortalProtect Administrator's Guide
9-22
Manual Scan
17. Select all the users/groups you want to add to exclude and click Add to
move them to the Selected Account(s) window.
18. Click Finish.
The Manual Scan: Content Filtering: Edit Policy > Exceptions screen
appears.
19. Click the Action tab, and select an action for the content filtering policy
from the following options:
• Quarantine, Delete, or Pass
• Notify or Do not notify
20. Click the Notification tab, and configure as described in Configuring
Manual Scan Notifications—Content Filtering on page 11-15.
21. Click Save.
Action in Manual or
Scan Type Action in Real-time Scan
Scheduled Scan
Pass Pass
9-23
PortalProtect Administrator's Guide
Action in Manual or
Scan Type Action in Real-time Scan
Scheduled Scan
Pass Pass
Procedure
1. On the left menu, click Manual Scan.
The Manual Scan screen appears.
2. Under Select the scan type, click the Data loss prevention link.
The Manual Scan: Data Loss Prevention screen appears.
3. Click Import.
9-24
Manual Scan
Figure 9-8. Import from Real time Data Loss Prevention Policy screen
Procedure
1. On the left menu, click Manual Scan.
The Manual Scan screen appears.
2. Under Scan Type Selection, select whether to perform content filtering
for the following:
• Data loss prevention for document
• Data loss prevention for Web content
3. Click the Data loss prevention link.
9-25
PortalProtect Administrator's Guide
4. From the list, select the policies that you want to Delete or Reorder.
Click an existing policy to edit it.
5. In the Status column, click the red X, or green checkmark to enable or
disable an existing data loss prevention policy for manual scan.
6. Select an existing policy and configure the following options:
• Enable this policy: select to activate the policy
• Policy name: type the policy name
• Description: add a description to further describe the policy
7. Configure the Target tab settings as described in Adding a Data Loss
Prevention Policy on page 7-17.
8. Click the Exceptions tab.
9. Click Add to create a new exception, or click an existing exception.
The Specify sites screen appears.
10. Choose from the following options:
• All sites: excludes all sites from this policy
9-26
Manual Scan
• Specify a site's URL: choose the specific site(s) to exclude from this
policy
11. Click Next >.
The Select Accounts to be excluded screen appears.
12. Select from the following options:
• Anyone: to exclude all accounts. Select, click Finish and proceed
to...
• Specific accounts: select to choose the specific accounts to exclude
and proceed to the next step.
13. Type an AD user or group name in the Search for AD user(s)/group(s)
field.
14. Next to Search in, select Users and/or Groups as appropriate.
15. Click Search.
Successful search results will then display in the Available Account(s)
window.
16. Repeat the search as required.
17. Select all the users/groups you want to add to exclude and click Add to
move them to the Selected Account(s) window.
18. Click Finish.
The Manual Scan: Data Loss Prevention: Edit Policy > Exceptions
screen appears.
19. Click the Action tab, and select an action for the content filtering policy
from the following options:
• Quarantine, Delete, or Pass
• Notify or Do not notify
20. Click the Notification tab, and configure.
21. Click Save.
9-27
PortalProtect Administrator's Guide
Procedure
1. On the left menu, click Manual Scan.
The Manual Scan screen appears.
2. As a prerequisite, be sure to configure the options as described in
Configuring a Manual Scan on page 9-2.
3. Under Select the scan type, click the Web Reputation link.
The Manual Scan: Web Reputation screen appears.
4. Refer to Smart Protection Source on page 3-5, About Web Reputation on page
8-2, and Choosing a Web Reputation Source on page 8-3 for more
information about configuring Web Reputation settings.
5. After completing your settings, click Save.
The Manual Scan screen appears.
6. Click Scan Now to perform the manual scan with the new settings.
9-28
Chapter 10
Scheduled Scan
Scheduled scans automate routine antivirus maintenance procedures and
improve the efficiency and control over security policies. Scheduled scans
run according to the interval and time you set. At the configured time,
scheduled scans automatically check for infected files on the SharePoint
server(s). When you enable scheduled scans, all scans will run according to
the schedule you set. You can disable any scheduled scan by clicking the
green checkmark in the Scheduled Scan, Status column. When clicked, the
green checkmark turns to a red X.
In this chapter, you will find information about:
• Configuring a Scheduled Scan on page 10-2
10-1
PortalProtect Administrator's Guide
Procedure
1. On the left menu, click Scheduled Scan, to display the Scheduled Scan
screen.
2. In the Status column, click the green checkmark to disable the scan; a
red "X" then appears.
3. To enable a Scheduled Scan, click the red "X" in the Status column to
display a green checkmark.
Note
Disabling the scan does not affect your configuration. When you decide
to resume scheduled scanning, simply enable the scan again.
10-2
Scheduled Scan
Procedure
1. On the left menu, click Scheduled Scan, to display the Scheduled Scan
screen.
2. Click Add on the Scheduled Scan toolbar.
10-3
PortalProtect Administrator's Guide
3. In the Scan task name field, type a name for the new scan task.
4. Under Schedule, select a scan schedule from the following options:
• Daily—at (hh:mm): select to perform a scan every day at the hour
and minute you choose
• Weekly, every—[day of week] at (hh:mm): select to perform a scan
every week on the day, hour and minute you choose
• Monthly, on date—[day of month] at (hh:mm): select to perform a
scan every month on the day, hour and minute you choose
5. Under Database selection, select one of the following options:
• All databases: includes databases added after you configure this
setting
• Specific databases: expand and choose which databases to scan
from those listed in the window
6. Select from the following options under Select the scan type:
Note
Click the Security risk scan, File blocking, Content filtering, Data loss
prevention, or Web Reputation links to configure the scheduled scan
options. For more information, refer to:
10-5
PortalProtect Administrator's Guide
Procedure
1. On the left menu, click Scheduled Scan.
2. Click Add, to create a new scheduled scan, or click the Task Name to
edit an existing one.
3. Under Select scan type, click the Security risk scan link and select the
Action tab.
4. Under Advanced Options, click Macros to open the content.
5. Select Enable advanced macro scan, to enable the functionality.
6. For Heuristic level, select an option according to the following:
• 1 - Lenient filtering
10-6
Scheduled Scan
• 2 - Default filtering
• 3 - Sensitive filtering
• 4 - Rigorous filtering
OR....
7. Select Delete all macros detected by advanced macro scan.
8. Click Save.
Procedure
1. On the left menu, click Scheduled Scan.
2. Click Add, to create a new scheduled scan, or click the Task Name to
edit an existing one.
3. Under Select scan type, click the Security risk scan link.
4. Select the Target tab. Under Advanced Options, expand the Scan
Restrictions Criteria.
Note
Select the checkbox for the items you want to scan and set the
appropriate values.
10-7
PortalProtect Administrator's Guide
Procedure
1. On the left menu, click Scheduled Scan.
10-8
Scheduled Scan
Note
As a prerequisite, be sure to configure the options as described in
Configuring a Scheduled Scan on page 10-2.
2. Click Add.
The Scheduled Scan: Add Scan Task screen appears.
3. Type a new name in the Scan task name field.
4. Under Select the scan type, click the Security risk scan link.
The Scheduled Scan: Security Risk Scan screen appears.
Procedure
1. Configure the settings for the Target tab as described in About Security
Risk Scan Action Settings on page 4-7.
Procedure
1. After completing the settings for the Target tab, click the Action tab.
10-9
PortalProtect Administrator's Guide
The Scheduled Scan: Security Risk Scan screen appears with the Action
tab.
2. Choose from the available options for the Scheduled Security Risk Scan.
Refer to Step 2. Configure Manual Scan: Security Risk Scan (Action tab) on
page 9-9 for more information.
3. Configure the Advanced Options as required. See Configuring Macro
Scanning Options for Scheduled Scan on page 10-6 for more information.
4. Configure the Unscannable Files settings as required. See About
Unscannable Files on page 1-23 for more information.
Procedure
1. Click the Scheduled Scan: Security Risk Scan > Notification tab.
2. Configure the Notification settings as required.
Note
Refer to Configuring Scheduled Scan Notifications—Security Risk Scan on
page 11-21 for details on how to configure notifications for this scan.
3. Click Save.
The Scheduled Scan: Add Scan Task screen appears.
4. Click Save again.
The newly created task appears in the Scheduled Scan task list.
10-10
Scheduled Scan
Procedure
1. On the left menu, click Scheduled Scan.
The Scheduled Scan screen appears.
Note
As a prerequisite, be sure to configure the options as described in
Configuring a Scheduled Scan on page 10-2.
2. Click Add.
The Scheduled Scan: Add Scan Task screen appears.
3. Type a new name in the Scan task name field.
4. Under Select the scan type, click the File Blocking link.
The Scheduled Scan: File Blocking screen appears.
5. From the Scheduled Scan: File Blocking screen, click Add.
The Scheduled Scan: File Blocking: Add Policy screen appears.
Continue through the steps that follow to complete the configuration for
this new policy.
Step 1. Scheduled Scan: File Blocking: Add Policy > Specify Rules
Procedure
1. Under Block these files > Specific Files, select from the following
options to determine which files you want to block for this rule:
10-11
PortalProtect Administrator's Guide
• File types: select to choose all file types, or click Show details to
choose specific file types. Refer to Table 5-2 through Table 5-7 under
About Available File Types on page 5-15.
2. To add or remove specific filenames or extensions, click Show details
next to File names to expand the content.
3. Add or Delete files and/or file extensions as required.
4. Select Block file type or names within compressed files to perform that
action.
5. Click Next >.
The Scheduled Scan: File Blocking: Add Policy > Step 2: Exceptions
screen appears.
Procedure
1. To exclude any sites and accounts as exceptions to this new policy, click
Add.
The Scheduled Scan: File Blocking: Add Policy (Step 2.a: Specify sites
to be excluded screen appears.
2. Select from the following options:
• All sites...OR...
• Specify a site's URL: type a specific URL and click Search, and/or
select the sites from the tree.
3. Click Next >.
The Scheduled Scan: File Blocking: Add Policy (Step 2.b: Specify
accounts to be excluded screen appears.
4. Select from the following options:
• Anyone...OR...
10-12
Scheduled Scan
Step 3. Scheduled Scan: File Blocking: Add Policy > Specify Action
Procedure
1. Select an action from the following options:
• Quarantine
• Delete
• Pass
2. Select from the following:
• Notify
• Do not notify
3. Click Next>.
The Scheduled Scan: File Blocking: Add Policy Step 4: Specify
Notification screen appears.
10-13
PortalProtect Administrator's Guide
Procedure
1. Under People to notify, select from the following:
• Notify violator
• Notify administrator
Note
Refer to Configuring Manual Scan Notifications—File Blocking on page
11-13 for details on setting notifications for this scan.
2. Click Next>.
The Scheduled Scan: File Blocking: Add Policy Step 5: Name and
priority screen appears.
Step 5. Scheduled Scan: File Blocking: Add Policy > Name and
priority
Procedure
1. Select Enable this policy to activate it for the manual scan; clear to
deactivate it.
2. Type a name for this new policy in the Policy Name field (required).
3. Type a description for the policy in the Description field.
4. Type a number to indicate the processing priority in the Priority field
(required).
Note
You can view the existing policies and status at the bottom of the screen
to assist making a choice for the priority.
10-14
Scheduled Scan
5. Click Finish.
The Scheduled Scan: File Blocking screen appears and shows the policy
just created with the following information:
• Policy: name
• Action: Quarantine, Block, and so forth
• Priority: 1, 2, 3, and so on
• Status: enabled (green checkmark) or disabled (red X); click to
change the status as needed
Note
Click Import to import a policy from Real-time Scan: File Blocking.
Procedure
1. On the left menu, click Scheduled Scan.
The Scheduled Scan screen appears.
2. Click Add.
The Scheduled Scan: Add Scan Task screen appears.
10-15
PortalProtect Administrator's Guide
Note
As a prerequisite, be sure to configure the options as described in
Configuring a Scheduled Scan on page 10-2.
4. Under Select the scan type, select whether to perform content filtering
for the following:
• Content filtering for document
• Content filtering for Web content
5. Click the Content filtering link.
The Scheduled Scan: Content Filtering screen appears.
6. Click Add to create a new policy.
The Scheduled Scan: Content Filtering: Add Policy > Step 1: Specify
Rules screen appears.
Procedure
1. Add keywords and synonyms as described in Adding a Content Filtering
Policy on page 6-9.
2. Click Next>.
The Scheduled Scan: Content Filtering: Add Policy screen appears.
10-16
Scheduled Scan
Procedure
1. Refer to Step 2. Content Filtering: Add Policy > Exceptions on page 6-11 for
details on how to configure this screen.
2. After completing any exceptions, click Next>.
The Scheduled Scan: Content Filtering: Add Policy > Step 3: Specify
Action screen appears.
Procedure
1. Select action and notification options. See Step 3. Content Filtering: Add
Policy > Specify Action on page 6-15 for details on how to configure this
screen.
2. Click Next>.
The Scheduled Scan: Content Filtering: Add Policy > Step 4: Specify
Notification screen appears.
Procedure
1. Select from the available options. See Step 4. Content Filtering: Add Policy
> Specify Notification on page 6-16 for details on how to configure this
screen.
2. Click Next>.
10-17
PortalProtect Administrator's Guide
The Scheduled Scan: Content Filtering: Add Policy > Step 5: Name and
Priority screen appears.
Step 5. Scheduled Scan: Content Filtering: Add Policy > Name and
Priority
Procedure
1. Configure the available options. See Step 5. Content Filtering: Add Policy >
Name and Priority on page 6-19 for details on how to configure this
screen.
2. Click Finish.
The Scheduled Scan: Content Filtering screen appears with the new
policy you just created.
3. Click Save.
Procedure
1. On the left menu, click Scheduled Scan.
The Scheduled Scan screen appears.
2. Click Add.
10-18
Scheduled Scan
Note
As a prerequisite, be sure to configure the options as described in
Configuring a Scheduled Scan on page 10-2.
4. Under Select the scan type, select whether to perform data loss
prevention for the following:
• Data loss prevention for document
• Data loss prevention for Web content
5. Click the Data loss prevention link.
The Scheduled Scan: Data Loss Prevention screen appears.
6. Click Add to create a new policy.
The Scheduled Scan: Data Loss Prevention: Add Policy > Step 1:
Specify Rules screen appears.
Procedure
1. Configure as described in Adding a Data Loss Prevention Policy on page
7-17.
2. Click Next>.
The Scheduled Scan: Data Loss Prevention: Add Policy screen appears.
10-19
PortalProtect Administrator's Guide
Procedure
1. Refer to Step 2. Data Loss Prevention: Add Policy > Step 2: Exceptions on
page 7-19 for details on how to configure this screen.
2. After completing any exceptions, click Next>.
The Scheduled Scan: Data Loss Prevention: Add Policy > Step 3:
Specify Action screen appears.
Procedure
1. Select action and notification options. See Step 3. Data Loss Prevention:
Add Policy > Specify Action on page 7-22 for details on how to configure
this screen.
2. Click Next>.
The Scheduled Scan: Data Loss Prevention: Add Policy > Step 4:
Specify Notification screen appears.
Procedure
1. Select from the available options. See Step 4. Data Loss Prevention: Add
Policy > Specify Notification on page 7-23 for details on how to configure
this screen.
2. Click Next>.
10-20
Scheduled Scan
The Scheduled Scan: Data Loss Prevention: Add Policy > Step 5: Name
and Priority screen appears.
Step 5. Scheduled Scan: Data Loss Prevention: Add Policy > Name
and Priority
Procedure
1. Configure the available options. See Step 5. Data Loss Prevention: Add
Policy > Name and Priority on page 7-25 for details on how to configure
this screen.
2. Click Finish.
The Scheduled Scan: Data Loss Prevention screen appears with the new
policy you just created.
3. Click Save.
Procedure
1. On the left menu, click Scheduled Scan.
The Scheduled Scan screen appears.
2. As a prerequisite, be sure to configure the options as described in
Configuring a Scheduled Scan on page 10-2.
10-21
PortalProtect Administrator's Guide
3. Under Select the scan type, click the Web Reputation link.
The Scheduled Scan: Web Reputation screen appears.
4. Refer to About Web Reputation on page 8-2 and the procedures that follow
it for more information about configuring Web Reputation settings.
5. After completing your settings, click Save.
The Scheduled Scan screen appears.
6. Click Save again.
10-22
Chapter 11
11-1
PortalProtect Administrator's Guide
Configuring Notifications
Notifications may be sent to the administrator(s) or other specified
recipients. With PortalProtect, you can configure notifications through
email, Simple Network Management Protocol (SNMP) Trap, or the Windows
Event Log. Setting Global notifications apply to all notifications. You can also
make unique settings for each notification type, which include:
• Configuring Security Risk Scan Notifications on page 11-4
• Configuring File Blocking Notifications on page 11-5
• Configuring Content Filtering Notifications on page 11-7
• Configuring Data Loss Prevention Notifications on page 11-8
• Configuring Web Reputation Notifications on page 11-10
• Configuring Manual Scan Notifications—Security Risk Scan on page 11-11
• Configuring Manual Scan Notifications—File Blocking on page 11-13
• Configuring Manual Scan Notifications—Content Filtering on page 11-15
• Configuring Manual Scan Notifications—Data Loss Prevention on page
11-17
• Configuring Manual Scan Notifications—Web Reputation on page 11-19
• Configuring Scheduled Scan Notifications—Security Risk Scan on page 11-21
• Configuring Scheduled Scan Notifications—File Blocking on page 11-23
• Configuring Scheduled Scan Notifications—Content Filtering on page 11-25
• Configuring Scheduled Scan Notifications—Data Loss Prevention on page
11-27
• Configuring Scheduled Scan Notifications—Web Reputation on page 11-29
11-2
Notifications, Alerts, Logs, and Reports
notifications for Security Risk Scan, File Blocking, Manual Scan, Scheduled
Scan, Content Filtering, Web Reputation, and Data Loss Prevention.
Procedure
1. From the left menu, click Administration > Notification Settings.
2. Under Administrator Notification, type the email address for the
administrator(s) you wish to receive all notifications. Separate multiple
addresses using a semicolon (;). Click Apply All, to update the new
settings.
3. Under Sender Settings, type the email address of the sender who sends
alerts and notifications (for example:
PortalProtect_Administrator@do.not.reply).
4. Under Email Account Settings, type the SMTP server settings that
PortalProtect will use to send email-based notifications for the
following:
• Display name: unique identifier, for example: PortalProtect
Notification
• SMTP Server
• Port
5. Under SNMP, type the following:
• IP address
• Community
6. Click Save.
11-3
PortalProtect Administrator's Guide
Event Notifications
PortalProtect provides various options for sending unique event notifications
for: Security Risk Scan, File Blocking, Content Filtering, Web Reputation,
and Data Loss Prevention.
Procedure
1. On the left menu, click Security Risk Scan. The Security Risk Scan
screen appears.
2. Click the Notification tab.
3. Under People to notify, select Notify administrator to enable security
risk scan notifications.
4. Under People to notify, click Show details and configure the following:
• To—the global email address(es) appear in this field. You can enter
additional email addresses, separated by a semicolon, to create
unique notifications.
• Subject—type a subject that will appear in the subject line of the
email (for example: Security Risk Scan Notification).
• Message—you can create a unique message using variables like:
[Server Name], [Security Risk Name], [Date], [Time], [File Name],
[File Location], [Action], and [Violator].
Note
The available variables appear in the left window, and the message
body in the right window.
11-4
Notifications, Alerts, Logs, and Reports
Procedure
1. On the left menu, click File Blocking. The File Blocking screen appears.
2. Click the Notification tab.
3. Under People to notify, select Notify administrator to enable file
blocking notifications.
11-5
PortalProtect Administrator's Guide
4. Under People to notify, click Show details and configure the following:
• To—the global email address(es) appear in this field. You can enter
additional email addresses, separated by a semicolon (;) to create
unique notifications.
• Subject—type a subject that will appear in the subject line of the
email (for example: File Blocking Notification).
• Message—you can create a unique message using variables like:
[Server Name], [File Blocking Rules], [Date], [Time], [File Name],
[File Location] [Action], and [Violator].
Note
The available variables appear in the left window, and the message
body in the right window.
11-6
Notifications, Alerts, Logs, and Reports
Procedure
1. On the left menu, click Content Filtering. The Content Filtering screen
appears.
2. Click Add, to add a new policy, or click an existing policy from the
Policy column. The Content Filtering: Edit Policy screen appears.
3. Click the Notification tab.
4. Under People to notify, select Notify administrator to enable content
filtering notifications.
5. Under People to notify, click Show details and configure the following:
• To—the global email address(es) appear in this field. You can enter
additional email addresses, separated by a semicolon (;) to create
unique notifications.
• Subject—type a subject that will appear in the subject line of the
email (for example: Content Filtering Notification).
• Message—you can create a unique message using variables like:
[Server Name], [Content Rules], [Date], [Time], [File Name/Web
Content Title], [File/Web Content Location], [Action], and [Violator].
Note
The available variables appear in the left window, and the message
body in the right window.
11-7
PortalProtect Administrator's Guide
Procedure
1. On the left menu, click Data Loss Prevention > Policies. The Data Loss
Prevention screen appears.
2. Click Add, to add a new policy, or click an existing policy from the
Policy column. The Data Loss Prevention: Edit Policy screen appears.
11-8
Notifications, Alerts, Logs, and Reports
Note
The available variables appear in the left window, and the message
body in the right window.
11-9
PortalProtect Administrator's Guide
• IP Address
• Community
• Message
9. Select Write to Windows event log to write each notification to the
Windows event log.
10. Click Save.
Procedure
1. On the left menu, click Web Reputation. The Web Reputation screen
appears.
2. Click the Notification tab.
3. Under People to notify, select Notify administrator to enable Web
Reputation notifications.
4. Under People to notify, click Show details and configure the following:
• To—the global email address(es) appear in this field. You can enter
additional email addresses, separated by a semicolon (;) to create
unique notifications.
• Subject—type a subject that will appear in the subject line of the
email (for example: Web Reputation Notification).
• Message—you can create a unique message using variables like:
[Server Name], [Suspicious URLs], [Date], [Time], [Web Content
Title], [Web Content Location], [Action], and [Violator].
Note
The available variables appear in the left window, and the message
body in the right window.
11-10
Notifications, Alerts, Logs, and Reports
11-11
PortalProtect Administrator's Guide
Procedure
1. On the left menu, click Manual Scan. The Manual Scan screen appears.
2. Under, Select the scan type, click the Security risk scan link.
3. Click the Notification tab.
4. Under People to notify, select from the following:
• Notify violator
• Notify administrator
Note
The Notify violator option only includes a Subject and a Message.
The consolidated message settings under Notify administrator do
not apply to the violator.
5. Under People to notify, click Show details next to either Notify violator
or Notify administrator and configure the following:
Note
The To field is not used for the Notify violator option.
• To—the global email address(es) appear in this field. You can enter
additional email addresses, separated by a semicolon, to create
unique notifications.
• Subject—type a subject that will appear in the subject line of the
email (for example: Security Risk Notification).
• Message—you can create a unique message using variables like:
[Server Name], [Security Risk Name], [Date], [Time], [File Name],
[File Location], [Action], and [Violator].
11-12
Notifications, Alerts, Logs, and Reports
Note
The available variables appear in the left window, and the message
body in the right window.
11-13
PortalProtect Administrator's Guide
Procedure
1. On the left menu, click Manual Scan. The Manual Scan screen appears.
2. Under, Select the scan type, click the File blocking link.
3. Select an existing policy or click Add to create a new one.
4. Click the Notification tab.
5. Under People to notify, select from the following:
• Notify violator
• Notify administrator
Note
The Notify violator option only includes a Subject and a Message.
The consolidated message settings under Notify administrator do
not apply to the violator.
6. Under People to notify, click Show details next to either Notify violator
or Notify administrator and configure the following:
• To—the global email address(es) appear in this field. You can enter
additional email addresses, separated by a semicolon, to create
unique notifications.
• Subject—type a subject that will appear in the subject line of the
email (for example: File Blocking Notification).
• Message—you can create a unique message using variables like:
[Server Name], [File Blocking Rules], [Date], [Time], [File Name],
[File Location], [Action], and [Violator].
Note
The available variables appear in the left window, and the message
body in the right window.
11-14
Notifications, Alerts, Logs, and Reports
Procedure
1. On the left menu, click Manual Scan. The Manual Scan screen appears.
2. Under, Select the scan type, click the Content filtering link.
3. Select an existing policy or click Add to create a new one.
4. Click the Notification tab.
11-15
PortalProtect Administrator's Guide
Note
The Notify violator option only includes a Subject and a Message.
The consolidated message settings under Notify administrator do
not apply to the violator.
6. Next to Notify Violator, click Show details and select from the
following:
• Subject—type a subject that will appear in the subject line of the
email (for example: Content Filtering Notification).
• Message—you can create a unique message using variables like:
[Server Name], [Content Rules], [Date], [Time], [File Name/Web
Content Title], [File/Web Content Location], [Action], and Violator.
7. Next to Notify administrator, click Show details and configure the
following:
• To—the global email address(es) appear in this field. You can enter
additional email addresses, separated by a semicolon, to create
unique notifications.
• Subject—type a subject that will appear in the subject line of the
email (for example: Content Filtering Notification).
• Message—you can create a unique message using variables like:
[Server Name], [Content Rules], [Date], [Time], [File Name/Web
Content Title], [File/Web Content Location], [Action], and [Violator].
Note
The available variables appear in the left window, and the message
body in the right window.
11-16
Notifications, Alerts, Logs, and Reports
Procedure
1. On the left menu, click Manual Scan. The Manual Scan screen appears.
2. Under, Select the scan type, click the Data loss prevention link.
11-17
PortalProtect Administrator's Guide
Note
The Notify violator option only includes a Subject and a Message.
The consolidated message settings under Notify administrator do
not apply to the violator.
6. Next to Notify Violator, click Show details and select from the
following:
• Subject—type a subject that will appear in the subject line of the
email (for example: Data Loss Prevention Notification).
• Message—you can create a unique message using variables like:
[Server Name], [Data Loss Prevention Rules], [Date], [Time], [File
Name/Web Content Title], [File/Web Content Location], [Action],
and Violator.
7. Next to Notify administrator, click Show details and configure the
following:
• To—the global email address(es) appear in this field. You can enter
additional email addresses, separated by a semicolon, to create
unique notifications.
• Subject—type a subject that will appear in the subject line of the
email (for example: Data Loss Prevention Notification).
• Message—you can create a unique message using variables like:
[Server Name], [Data Loss Prevention Rules], [Date], [Time], [File
Name/Web Content Title], [File/Web Content Location], [Action],
and [Violator].
11-18
Notifications, Alerts, Logs, and Reports
Note
The available variables appear in the left window, and the message
body in the right window.
11-19
PortalProtect Administrator's Guide
Procedure
1. On the left menu, click Manual Scan. The Manual Scan screen appears.
2. Under, Select the scan type, click the Web Reputation link.
3. Click the Notification tab.
4. Under People to notify, select from the following:
• Notify violator
• Notify administrator
Note
The Notify violator option only includes a Subject and a Message.
The consolidated message settings under Notify administrator do
not apply to the violator.
5. Under People to notify, click Show details next to either Notify violator
or Notify administrator and configure the following:
• To—the global email address(es) appear in this field. You can enter
additional email addresses, separated by a semicolon, to create
unique notifications.
• Subject—type a subject that will appear in the subject line of the
email (for example: Web Reputation Notification.
• Message—you can create a unique message using variables like:
[Server Name], [Suspicious URLs], [Date], [Time], [Web Content
Title], [Web Content Location], [Action], and [Violator].
Note
The available variables appear in the left window, and the message
body in the right window.
11-20
Notifications, Alerts, Logs, and Reports
Procedure
1. On the left menu, click Scheduled Scan. The Scheduled Scan screen
appears.
11-21
PortalProtect Administrator's Guide
2. Click Add, to add a new task, or click an existing task from the Task
Name column. The Scheduled Scan > Edit Scan Task or Scheduled Scan
> Add Scan Task screen appears.
3. Under Select scan type, click the Security risk scan link.
4. Click the Notification tab.
5. Under People to notify, select from the following:
• Notify violator
• Notify administrator
Note
The Notify violator option only includes a Subject and a Message.
The consolidated message settings under Notify administrator do
not apply to the violator.
6. Under People to notify, click Show details next to either Notify violator
or Notify administrator and configure the following:
• To—the global email address(es) appear in this field. You can enter
additional email addresses, separated by a semicolon, to create
unique notifications.
• Subject—type a subject that will appear in the subject line of the
email (for example: Security Risk Notification).
• Message—you can create a unique message using variables like:
[Server Name], [Security Risk Name], [Date], [Time], [File Name],
[File Location], [Action], and [Violator].
Note
The available variables appear in the left window, and the message
body in the right window.
11-22
Notifications, Alerts, Logs, and Reports
Procedure
1. On the left menu, click Scheduled Scan. The Scheduled Scan screen
appears.
2. Click an existing task from the Task Name column. The Scheduled Scan
> Edit Scan Task screen appears.
3. Under Select scan type, click the File blocking link.
11-23
PortalProtect Administrator's Guide
Note
The Notify violator option only includes a Subject and a Message.
The consolidated message settings under Notify administrator do
not apply to the violator.
7. Under People to notify, click Show details next to either Notify violator
or Notify administrator and configure the following:
• To—the global email address(es) appear in this field. You can enter
additional email addresses, separated by a semicolon, to create
unique notifications.
• Subject—type a subject that will appear in the subject line of the
email (for example: File Blocking Notification).
• Message—you can create a unique message using variables like:
[Server Name], [File Blocking Rules], [Date], [Time], [File Name],
[File Location], [Action], and [Violator].
Note
The available variables appear in the left window, and the message
body in the right window.
11-24
Notifications, Alerts, Logs, and Reports
Procedure
1. On the left menu, click Scheduled Scan. The Scheduled Scan screen
appears.
2. Click an existing task from the Task Name column. The Scheduled Scan
> Edit Scan Task screen appears.
3. Under Select scan type, click the Content Filtering link.
4. Select an existing policy.
5. Click the Notification tab.
11-25
PortalProtect Administrator's Guide
Note
The Notify violator option only includes a Subject and a Message.
The consolidated message settings under Notify administrator do
not apply to the violator.
7. Under People to notify, click Show details next to either Notify violator
or Notify administrator and configure the following:
• To—the global email address(es) appear in this field. You can enter
additional email addresses, separated by a semicolon, to create
unique notifications.
• Subject—type a subject that will appear in the subject line of the
email (for example: Content Filtering Notification).
• Message—you can create a unique message using variables like:
[Server Name], [Content Rules], [Date], [Time], [File Name/Web
Content Title], [File/Web Content Location], [Action], and [Violator].
Note
The available variables appear in the left window, and the message
body in the right window.
11-26
Notifications, Alerts, Logs, and Reports
Procedure
1. On the left menu, click Scheduled Scan. The Scheduled Scan screen
appears.
2. Click an existing task from the Task Name column. The Scheduled Scan
> Edit Scan Task screen appears.
3. Under Select scan type, click the Data loss prevention link.
4. Select an existing policy.
5. Click the Notification tab.
6. Under People to notify, select from the following:
• Notify violator
11-27
PortalProtect Administrator's Guide
• Notify administrator
Note
The Notify violator option only includes a Subject and a Message.
The consolidated message settings under Notify administrator do
not apply to the violator.
7. Under People to notify, click Show details next to either Notify violator
or Notify administrator and configure the following:
• To—the global email address(es) appear in this field. You can enter
additional email addresses, separated by a semicolon, to create
unique notifications.
• Subject—type a subject that will appear in the subject line of the
email (for example: Data Loss Prevention Notification).
• Message—you can create a unique message using variables like:
[Server Name], [Data Loss Prevention Rules], [Date], [Time], [File
Name/Web Content Title], [File/Web Content Location], [Action],
and [Violator].
Note
The available variables appear in the left window, and the message
body in the right window.
11-28
Notifications, Alerts, Logs, and Reports
Procedure
1. On the left menu, click Scheduled Scan. The Scheduled Scan screen
appears.
2. Click an existing task from the Task Name column. The Scheduled Scan
> Edit Scan Task screen appears.
3. Under Select scan type, click the Web Reputation link.
4. Click the Notification tab.
5. Under People to notify, select from the following:
• Notify violator
• Notify administrator
11-29
PortalProtect Administrator's Guide
Note
The Notify violator option only includes a Subject and a Message.
The consolidated message settings under Notify administrator do
not apply to the violator.
6. Under People to notify, click Show details next to either Notify violator
or Notify administrator and configure the following:
• To—the global email address(es) appear in this field. You can enter
additional email addresses, separated by a semicolon, to create
unique notifications.
• Subject—type a subject that will appear in the subject line of the
email (for example: Web Reputation Notification).
• Message—you can create a unique message using variables like:
[Server Name], [Suspicious URLs], [Date], [Time], [Web Content
Title], [Web Content Location], [Action], and [Violator].
Note
The available variables appear in the left window, and the message
body in the right window.
11-30
Notifications, Alerts, Logs, and Reports
9. Click Show details to expand the options, and configure according to the
following:
• IP Address
• Community
• Message
10. Select Write to Windows event log to write each notification to the
Windows event log.
11. Click Save.
Alerts
The Alerts function provides notifications for System Events and Outbreaks.
This section describes how to enable and configure these options.
System Events
System events enables to send notifications regarding the status of various
features in PortalProtect. These notifications include the following:
• PortalProtect Services
• PortalProtect service did not start successfully
• PortalProtect service is unavailable
• PortalProtect Events
• Smart Protection Server—Each time File Reputation service was
Unavailable or Recovered
• Smart Protection Server—Each time Web Reputation service was
Unavailable or Recovered
• Update—Each time update was Unsuccessful or Successful
• Update—Last update time is older than [x] [hour(s) or day(s)]
• Manual/Scheduled scan tasks were Unsuccessful or Successful
11-31
PortalProtect Administrator's Guide
11-32
Notifications, Alerts, Logs, and Reports
Procedure
1. Click Alerts > System Events. The System Events screen appears.
2. Under PortalProtect Services, select from the following options:
• PortalProtect service did not start successfully
• PortalProtect service is unavailable
3. After selecting an option, click the link to display the Administrator
Notification screen.
4. Create a custom message and email list as explained in Configuring
Security Risk Scan Notifications on page 11-4.
5. Click Save.
11-33
PortalProtect Administrator's Guide
11-34
Notifications, Alerts, Logs, and Reports
Note
To prevent duplicate alerts in a farm environment, enable “The size
of quarantined file exceeds” alert on only one PortalProtect server
and disable the option on all other PortalProtect servers in the farm.
Outbreak Alert
Outbreak Alert enables you to configure settings to alert administrators
when:
• Viruses detected reach a selected number within a selected time span
11-35
PortalProtect Administrator's Guide
Note
An Outbreak Alert will be triggered when the Number is reached within
the specified time span. For example: for viruses detected, a value of 25
in the Number field with a Time of 24-hours, will trigger an Outbreak
Alert if 25 or more viruses are detected within a 24-hour period.
11-36
Notifications, Alerts, Logs, and Reports
11-37
PortalProtect Administrator's Guide
11-38
Notifications, Alerts, Logs, and Reports
• Description: this field enables you to modify the description for either
the Administrator, or the Operator. The default descriptions are
Administrator and Operator.
• Select Accounts from AD: this section enables you to search for and add
AD users and AD groups to apply to the Administrator or Operator role.
11-39
PortalProtect Administrator's Guide
accordingly. Additionally, you can export the log data in .csv format for
further analysis or to share the information.
The following is a listing of the information contained within the various log
types:
• Security risk scan logs–contains information about the: Date & Time,
Violator, Security Risk Name, Action, File Name, and Location. You can
filter the Security risk scan logs for:
• All
• Detected virus/malware
• Uncleanable virus/malware
• Detected spyware/grayware
• File blocking logs–contains information about the: Date & Time,
Violator, Policy Name, Action, File Name, Triggered File Type/Name,
and Location.
• Content Filtering logs–contains information about the: Date & Time,
Violator, Policy Name, Action, File name/Web Content Title, Triggered
Keywords, and Location.
• Data loss prevention logs–contains information about the: Date & Time,
Violator, Policy Name, Action, File Name/Web Content Title,
Template(s), and Location.
• Web reputation logs–contains information about the: Date & Time,
Violator, Risk Level, Web Content Title, Suspicious URL, Action, and
Location.
• Update logs–contains information about the: Date & Time, and
Description.
• Scan events logs–contains information about the: Date & Time, and
Description.
• Backup logs–contains information about the: Date & Time, Violator,
Security Rick Name, File Name, Location, and Backup Path.
11-40
Notifications, Alerts, Logs, and Reports
Query Logs
PortalProtect enables you to view many types of logs, which you can export
and print. Use the Query function to select the type of log you want
PortalProtect to display. You can make queries about events, viruses
detected, component updates, blocked files, and files placed in the backup
folder. You can export or print the log information you obtain from a query.
Procedure
1. From the left menu, click Logs > Query. The Log Query screen appears.
2. Select the log type from the Type drop-down.
3. To query using a date range:
• Select a query date range from the Dates field. The date range
includes a from: [MM/dd/yyyy] time of day [hh] and [mm] and to:
[MM/dd/yyyy] time of day [hh] and [mm].
4. To query for Violator:
• Select All, to search all users, or...
• Select Specify user(s) and click the drop down to search for and add
specific AD users.
5. To query a Site:
• Select All, to search all sites, or...
• Select Specify site(s) and click the drop down to search for and add
specific site(s).
11-41
PortalProtect Administrator's Guide
Log Maintenance
The Log Maintenance screens enable you to set both manual and automatic
options for deleting log histories. This functionality can be useful for saving
disk space when it becomes an issue or if the information they provide is no
longer useful. PortalProtect lets you delete logs both automatically and
manually.
11-42
Notifications, Alerts, Logs, and Reports
Procedure
1. From the left menu, click Logs > Maintenance, and select the Manual
tab on the Log Maintenance screen.
2. Under the Target group, select whether to delete All logs, or select
Specified logs from the following:
• Security risk scan
• Web reputation
• Backup
• File blocking
• Updates
• Unscannable files
• Content filtering
• Scan events
• Event tracking
• Data loss prevention
3. Under the Action group, type a value in days, in the Delete event
tracking logs older than and the Delete logs older than fields.
Note
Event tracking logs will be deleted that are older than the number of days
you enter in the Delete event tracking logs older than field. Other logs
will be deleted that are older than the number of days you enter in Delete
logs older than field.
11-43
PortalProtect Administrator's Guide
Procedure
1. From the left menu, click Logs > Maintenance, and select the Automatic
tab.
2. Select Enable automatic maintenance.
3. Under the Target group, select whether to delete All logs, or select
Specified logs from the following:
• Security risk scan
• Web reputation
• Backup
11-44
Notifications, Alerts, Logs, and Reports
• File blocking
• Updates
• Unscannable files
• Content filtering
• Scan events
• Event tracking
• Data loss prevention
4. Under the Action group, type a value in days, in the Delete event
tracking logs older than and the Delete logs older than fields.
Note
Event tracking logs will be deleted that are older than the number of days
you enter in the Delete event tracking logs older than field. Other logs
will be deleted that are older than the number of days you enter in Delete
logs older than field.
5. Click Save.
11-45
PortalProtect Administrator's Guide
Quarantine Query
PortalProtect enables the administrator to query quarantined files using
specific search criteria that includes:
• Date,
• Time,
• Violator (All or Specify user(s),
• Site (All or Specify site(s),
• File name, and
11-46
Notifications, Alerts, Logs, and Reports
• Type (Security risk scan, File blocking, Content filtering, Data loss
prevention, Unscannable files).
Additionally, you can sort and display the query results by:
• Date/Time,
• File Name,
• Violator,
• Sort by Ascending or Descending order, and
• Choose the number of results to Display per page.
11-47
PortalProtect Administrator's Guide
Violator All
Note
Select specific violators from the
Active Directory.
Sites All
Note
Select specific sites from the site tree.
Note
Type a specific file name, or leave
blank to search all quarantined files
according to the other search criteria.
Sort by Date/Time
Descending
11-48
Notifications, Alerts, Logs, and Reports
Procedure
1. From the left menu, click Quarantine > Query. The Quarantine Query
screen appears.
2. To query using a date range:
• Select a query date range from the Dates field. The date range
includes a from: [MM/dd/yyyy] time of day [hh] and [mm] and to:
[MM/dd/yyyy] time of day [hh] and [mm].
3. To query for Violator:
• Select All, to search all users, or...
• Select Specify user(s) and click the drop down to search for and add
specific AD users.
4. To query a Site:
• Select All, to search all sites, or...
• Select Specify site(s) and click the drop down to search for and add
specific site(s).
Note
The default setting for Site is All. Users can select specified site(s) from
site tree. A URL search produces the position of specified URL. All URLs
must start with http or https.
11-49
PortalProtect Administrator's Guide
• Content filtering
• Unscannable files
• Data loss prevention
7. Select a sort option from the Sort by drop down; then, select Ascending
or Descending.
8. In the Display field, type the number of log entries to display per page;
the default is 15.
9. Click Search to display the query results.
The following describes the options available in the Quarantine Query results
window:
• Restore—click to restore selected files to the location indicated under
the File Location heading
• Delete—click to permanently delete selected files
• Date/Time—date and time the file was quarantined
• File Name—name of the quarantined file
• File Location—location of the quarantined file
• Violator—displays the user responsible for uploading the file
11-50
Notifications, Alerts, Logs, and Reports
• Security Risk Name (for Security risk scan only)—displays the name of
the virus/malware/spyware/grayware contained in the file
• Policy Name (for File blocking, Content filtering, and Data loss
prevention only)—displays the name of the policy responsible for the
quarantine
• Reason (for Unscannable files only)—provides a brief explanation why
the file was quarantined; for example: Over restriction (decompressed
file count)
Procedure
1. Perform a quarantine query as described in Quarantine Query on page
11-46.
2. From the Quarantined results window, select the files you want to
delete or restore and click:
• Click Delete to permanently delete the selected file(s)
• Click Restore to restore the selected files to the original location
Note
For Content filtering, File blocking, Data loss prevention, and
Unscannable files, you can click the File Name link to start a file
download. You will have the option to open or save the file to the
location you choose.
Tip
Click the column headings to sort the quarantined results according
to the heading label (Date/Time, File Name, and so on).
11-51
PortalProtect Administrator's Guide
Quarantine Maintenance
Quarantine Maintenance enables you to configure manual and automatic
settings to delete quarantined files according to the time period you choose.
WARNING!
Be sure to perform regular quarantine maintenance, and restore or delete
files to prevent losing important documents and also free disk space.
Tip
In a farm environment, enable Automatic Quarantine Maintenance on only
one PortalProtect server and disable it on all other Web front end servers in
the same farm.
Procedure
1. Click Quarantine > Maintenance > Manual tab. The Quarantine
Maintenance screen appears and displays the Manual tab.
11-52
Notifications, Alerts, Logs, and Reports
Procedure
1. Click Quarantine > Maintenance > Automatic tab. The Quarantine
Maintenance screen appears and displays the Automatic tab.
2. Select Enable automatic maintenance to enable this functionality.
3. Under Files to delete, choose from the following options:
• Quarantined by security risk scan
• Quarantined by file blocking policy
• Quarantined by content filtering policy
• Quarantined by unscannable files action
• Quarantined by data loss prevention
4. Under Action, type a value in the Delete selected files older than [xx]
days field.
5. Click Save.
11-53
PortalProtect Administrator's Guide
Procedure
1. From the left menu, click Reports > One-time Reports. The One-time
Reports screen appears.
2. From the One-time Reports screen, click Generate report. The One-
time Reports > Add/Edit a report screen appears.
3. Type a name for the report in the Report name field.
4. Select a time span to gather data for the report, in the From and To
fields.
11-54
Notifications, Alerts, Logs, and Reports
5. In the Content group, select the items you want to appear in your report
from the following options:
• Scan status summary–displays a summary of the scan status
• Security risk scan report–select to enable and choose from the
following:
• Security risk scan summary
• Viruses/malware graph–from the drop down, choose whether
the graph will display, hourly, daily, weekly or monthly data
• Top viruses/malware–type the number of top viruses/malware
to display in the report
• Top viruses/malware violators– type the number of top
viruses/malware violators to display in the report
• Virus/malware action summary–select to display a summary
of the action taken on all viruses and malware contained in the
report
• Security risk types–select to display the security risk types in
the report
• Spyware/grayware graph–from the drop down, choose
whether the graph will display, hourly, daily, weekly or monthly
data
• Top spyware/grayware–select to display the top spyware/
grayware
• Top spyware/grayware violators–select to display the top
spyware/grayware violators
• Virus/grayware action summary–select to display a summary
of the action taken on all viruses and grayware contained in the
report
• File blocking report–select to enable and choose from the
following:
• File blocking summary–select to display in the report
11-55
PortalProtect Administrator's Guide
11-56
Notifications, Alerts, Logs, and Reports
11-57
PortalProtect Administrator's Guide
11-58
Notifications, Alerts, Logs, and Reports
Procedure
1. From the left menu, click Reports > Scheduled Reports. The Scheduled
Reports screen appears.
2. From the Scheduled Reports screen, click Add. The Scheduled Reports
> Add Report screen appears.
3. Type a name for the scheduled report in the Report name field.
4. Under the Schedule group, select from the following options:
• Daily–select to generate a report every day
• Weekly, every–select to generate a weekly report on the selected
day of the week
• Monthly, every–select to generate a monthly report on the First day,
Last day, or 15th day, of the month
5. Select the time of day to generate the report from the Generate report at
fields [hh] and [mm].
6. From the Content group, select from the following options:
• Scanning status summary–displays a summary of the scan status
• Security risk scan report–select to enable and choose from the
following:
• Security risk scan summary
• Security risk types–select to display the security risk types in
the report
• Viruses/malware graph–from the drop down, choose whether
the graph will display, hourly, daily, weekly or monthly data
• Top viruses/malware–type the number of top viruses/malware
to display in the report
• Top viruses/malware violators– type the number of top
viruses/malware violators to display in the report
11-59
PortalProtect Administrator's Guide
11-60
Notifications, Alerts, Logs, and Reports
11-61
PortalProtect Administrator's Guide
11-62
Notifications, Alerts, Logs, and Reports
Tip
To create a customized report, click View Log Schema to get a copy of the
PortalProtect log schema.
Report Maintenance
Report Maintenance enables you to set the maximum number of reports to
save for each of the following:
• One-time reports: specifies the maximum number of one-time reports
PortalProtect will allow. One-time reports that exceed the set value will
be purged, beginning with the oldest first.
• Scheduled reports saved in each template: specifies the maximum
number of scheduled reports PortalProtect will allow. Scheduled reports
that exceed the set value will be purged, beginning with the oldest first
• Report templates: specifies the maximum number of report templates
PortalProtect will allow. Report templates that exceed the set value will
be purged, beginning with the oldest first
11-63
Chapter 12
Technical Support
Learn about the following topics:
• Troubleshooting Resources on page 12-2
• Contacting Trend Micro on page 12-3
• Sending Suspicious Content to Trend Micro on page 12-4
• Other Resources on page 12-5
12-1
PortalProtect Administrator's Guide
Troubleshooting Resources
Before contacting technical support, consider visiting the following Trend
Micro online resources.
Procedure
1. Go to https://success.trendmicro.com.
2. Select from the available products or click the appropriate button to
search for solutions.
3. Use the Search Support box to search for available solutions.
4. If no solution is found, click Contact Support and select the type of
support needed.
Tip
To submit a support case online, visit the following URL:
https://success.trendmicro.com/srf/SRFMain.aspx
Threat Encyclopedia
Most malware today consists of blended threats, which combine two or more
technologies, to bypass computer security protocols. Trend Micro combats
this complex malware with products that create a custom defense strategy.
The Threat Encyclopedia provides a comprehensive list of names and
symptoms for various blended threats, including known malware, spam,
malicious URLs, and known vulnerabilities.
12-2
Technical Support
Go to http://about-threats.trendmicro.com/us/threatencyclopedia#malware
to learn more about:
• Malware and malicious mobile code currently active or "in the wild"
• Correlated threat information pages to form a complete web attack story
• Internet threat advisories about targeted attacks and security threats
• Web attack and online trend information
• Weekly malware reports
Website https://www.trendmicro.com
12-3
PortalProtect Administrator's Guide
12-4
Technical Support
Other Resources
In addition to solutions and support, there are many other helpful resources
available online to stay up to date, learn about innovations, and be aware of
the latest security trends.
Download Center
From time to time, Trend Micro may release a patch for a reported known
issue or an upgrade that applies to a specific product or service. To find out
whether any patches are available, go to:
http://www.trendmicro.com/download/
If a patch has not been applied (patches are dated), open the Readme file to
determine whether it is relevant to your environment. The Readme file also
contains installation instructions.
Documentation Feedback
Trend Micro always seeks to improve its documentation. If you have
questions, comments, or suggestions about this or any Trend Micro
document, please go to the following site:
https://docs.trendmicro.com/en-us/survey.aspx
12-5
Appendix A
A-1
PortalProtect Administrator's Guide
Scanning
Note
PortalProtect skips scanning files and Web content if the Web content author
is the System account.
A-2
Frequently Asked Questions (FAQs)
I have not enabled “file blocking," but some files are never
uploaded or downloaded. Why?
Check SharePoint Server block list settings. SharePoint Server blocks files
with the suffixes you specified. Use the SharePoint Server Central
Management Page to modify the configuration.
To remove a file blocking configuration from SharePoint Server:
1. Select Security Configuration.
2. Select Define blocked file types from General Security configuration.
3. Check the extension names listed in the dialog box. Any extension name
that is included will be blocked by SharePoint Server when it is uploaded
or downloaded.
A-3
PortalProtect Administrator's Guide
A-4
Frequently Asked Questions (FAQs)
Note
Changes to this hidden key will take effect after you restart your service.
A-5
PortalProtect Administrator's Guide
Note
Changes to this hidden key will take effect after you restart your service.
ActiveUpdate
Why was the update unsuccessful from the Automatic Update
server?
If your system requires a proxy to connect to Internet, check to ensure the
settings are correct.
Does ActiveUpdate deliver the virus pattern file and the scan
engine in the same way?
Yes. In fact, PortalProtect does not care about how ActiveUpdate downloads
these files. PortalProtect sends the current engine/pattern version to
ActiveUpdate module, ActiveUpdate checks if there is any more recent
version available. It then downloads the files (in .zip format), and unzips
them automatically after a successful download. Finally, PortalProtect loads
the new engine/pattern to use.
A-6
Frequently Asked Questions (FAQs)
https://<SERVERNAME>:<PORTNUMBER>/PortalProtect/activeupdate
where:
• SERVERNAME is the server hostname or IP address that contains the
component package source.
• PORTNUMBER is the port number of PortalProtect Web console.
General Issues
Alert Issues
What the difference between the alert "PortalProtect service did not start
successfully" and "PortalProtect service is unavailable?"
• PortalProtect service did not start successfully: occurs after an
unsuccessful attempt to start PortalProtect for Microsoft SharePoint
Master Service.
• PortalProtect service is unavailable: occurs if the PortalProtect_Master
service is already started and stops suddenly.
Notification Issues
I uploaded a file that triggered a file blocking rule and did not receive an
email notification. Why?
Email notification settings for file blocking are set to provide consolidated
notifications every two-hours by default. This means PortalProtect will send
only one email notification for all files blocked within a two-hour time
period. You can change this setting as per your requirement.
A-7
PortalProtect Administrator's Guide
Other Issues
I am unable to query information from remote servers in Server Management
console. What should I do?
• Make sure affected PortalProtect servers are all in the same farm.
• Make sure PortalProtect is installed and started on your Web front end
servers.
• Make sure the service PortalProtect_Master is started with the user
who has local administrator and domain user privileges.
• Check the firewall of the remote PortalProtect servers and make sure
port 139 and 445 for TCP are open.
• Make sure the following Windows services are running on remote
servers:
• Remote Procedure Call (PRC)
• Server
• Workstation
A-8
Frequently Asked Questions (FAQs)
Note
If your are searching for the string: "test", then entering the characters "te"
will produce a hit. However, a search using the characters: "es" will not
produce a hit for the string "test".
I can access the PortalProtect Web console from the local server, but I cannot
access it from a remote machine. Why?
Check the following:
• Whether there are network firewalls that block access to the
PortalProtect Web Console through the HTTPS (default is 16373) port
you specified during installation.
• Whether the Windows firewall on the PortalProtect server blocks the
HTTPS (default is 16373) port you specified during installation.
Internet Explorer shuts down with a Data Execution Prevention alert when
accessing the PortalProtect management console. What can I do to fix this
problem?
Select Tools > Internet Options > Advanced. Scroll to Security, and clear the
check box Enable memory protection to help mitigate online attacks.
A-9
PortalProtect Administrator's Guide
• Sharedrespool folder
You can change the location of the Backup folders. The following indicates
the default locations:
• Default Backup folder:
Drive:\Program Files\Trend Micro\PortalProtect\storage
\backup
• Temp folder:
Drive:\Program Files\Trend Micro\PortalProtect\Temp
• Sharedrespool folder:
Drive:\Program Files\Trend Micro\PortalProtect
\SharedResPool
After PortalProtect reads the extension, how does it determine whether there
is a match; is there a database that contains all the user-configurations to
which it compares the extensions?
All the user configurations are saved in a database. PortalProtect compares
the file extension to see if there is a match.
Why does the Windows event log show: “Unable to connect to the
PortalProtect database. Check your network settings and make sure the
network connection between PortalProtect and the database server is
available.”
PortalProtect monitors the database connection and will stop the
PortalProtect service when it is unable to connect to it. When this happens,
PortalProtect creates an entry in the Windows event log. PortalProtect will
continue to monitor the database connection, and when the connection is
restored, PortalProtect creates another entry in the Windows event log
indicating that the database connection was restored.
A-10
Frequently Asked Questions (FAQs)
The PortalProtect single sign on was unable to log on the Web console of a
Windows 2003 server. Why?
If you use mstsc to connect to a remote server, try:
• Changing the connection mode to: mstsc/admin and re-connecting
• Or change the URL from localhost to hostname or use 127.0.0.1
What is the difference between the Smart Protection Server query order AS
LISTED and RANDOM?
The query order is only for available to the Smart Protection Server List.
When the query order is As listed, PortalProtect will use the first available
Smart Protection Server. When the query order is Random, PortalProtect
will select from the available Smart Protection Server at random.
A-11
Appendix B
B-1
PortalProtect Administrator's Guide
Procedure
1. Click Administration > Control Manager Settings and configure the
following options according to your requirements:
• Top of Screen
• Enable communication between the PortalProtect MCP agent
and Control Manager: select to enable communication between
the PortalProtect MCP agent and the Control manager
• Connection Status
• Registered Control Manager server: indicates whether the
Control Manager server is connected
B-2
Using Control Manager with PortalProtect
• Connection Settings
• Entity display name: shows the entity name that appears in the
Control Manager product tree
• Control Manager Server Settings
• Server FQDN or IP address: type the server FQDN or IP address
• Port: type the port number, and select whether or not to use
HTTPS
• Web server authentication: type the Username and Password
used for the IIS server
Note
Control Manager does not use the information provided for Web
server authentication
B-3
PortalProtect Administrator's Guide
Note
Click Test Connection, to test the current connection settings, or
Register, to register the current settings. Click Cancel to exit
without saving changes.
B-4
Appendix C
Note
Regular expressions are a powerful string matching tool. For this reason, it is
recommended that an administrator who chooses to use regular expressions
should be familiar and comfortable with regular expression syntax. Poorly
written regular expressions can have a negative performance impact. Trend
Micro’s recommendation is to start with simple regular expressions that do
not use complex syntax. When introducing new rules, use the backup action
and observe how PortalProtect applies your rule. When you are confident that
the rule has no unexpected consequences, you can change the action.
See the following tables for some common examples of regular expressions:
• Counting and Grouping on page C-2
• Character Classes (Shorthand) on page C-3
• Character Classes on page C-4
• Pattern Anchor Regular Expressions on page C-5
• Escape Sequences Regular Expressions on page C-6
C-1
PortalProtect Administrator's Guide
. The dot or period character do. matches doe, dog, don, dos, dot,
represents any character except new etc.d.r matches deer, door, etc.
line character.
* The asterisk character means zero or do* matches d, do, doo, dooo,
more instances of the preceding doooo, etc.
element.
+ The plus sign character means one or do+ matches do, doo, dooo, doooo,
more instances of the preceding etc. but not d
element.
? The question mark character means do?g matches dg or dog but not
zero or one instances of the doog, dooog, etc.
preceding element.
[] Square bracket characters indicate a d[aeiouy]+ matches da, de, di, do,
set or a range of characters. du, dy, daa, dae, dai, etc. The + sign is
applied to the set within brackets
parentheses, so the regex looks for d
followed by one or more of any of the
characters in the set [aeioy].
d[A-Z] matches dA, dB, dC, and so on
up to dZ. The set in square brackets
represents the range of all upper-
case letters between A and Z.
C-2
About Regular Expressions
\d Any digit character; functionally \d matches 1, 12, 123, etc., but not
equivalent to [0-9] or [[:digit:]] 1b7. One or more of any digit
characters.
\D Any non-digit character; functionally \D matches a, ab, ab&, but not 1. One
equivalent to [^0-9] or [^[:digit:]] or more of any character but 0, 1, 2,
3, 4, 5, 6, 7, 8, or 9.
\w Any "word" character. That is, any \w matches a, ab, a1, but not !&. One
alphanumeric character; functionally or more upper- or lower-case letters
equivalent to [_A-Za-z0-9] or or digits, but not punctuation or
[_[:alnum:]] other special characters.
C-3
PortalProtect Administrator's Guide
Character Classes
Table C-3. Character Classes
Element What It Means Example
[:digit:] Any digit character; functionally .REG. [[:digit:]] matches 1, 12, 123,
equivalent to \d etc.
[:alnum:] Any "word" character. That is, any .REG. [[:alnum:]] matches abc, 123,
alphanumeric character; functionally but not ~!@.
equivalent to \w
[:graph:] Any characters except space, control .REG. [[:graph:]] matches 123, abc,
characters or the like xxx, ><”, but not space or control
characters.
[:print:] Any characters (similar with .REG. [[:print:]] matches 123, abc,
[:graph:]) but includes the space xxx, ><”, and space characters.
character
[:cntrl:] Any control characters (e.g. CTRL + C, .REG. [[:cntrl:]] matches 0x03, 0x08,
CTRL + X) but not abc, 123, !@#.
C-4
About Regular Expressions
[:blank:] Space and tab characters .REG. [[:blank:]] matches space and
tab characters, but not 123, abc, !@#
[:lower:] Any lowercase alphabetic characters .REG. [[:lower:]] matches abc, Def,
(Note : ’r;Enable case sensitive sTress, Do, etc., but not ABC, DEF,
matching’ must be enabled or else it STRESS, DO, 123, !@#.
will function as [:alnum:])
[:upper:] Any uppercase alphabetic characters .REG. [[:upper:]] matches ABC, DEF,
(Note : ’r;Enable case sensitive STRESS, DO, Def, Stress, Do, etc., but
matching’ must be enabled or else it not abc, 123, !@#.
will function as [:alnum:])
[:xdigit:] Digits allowed in a hexadecimal .REG. [[:xdigit:]] matches 0a, 7E, 0f,
number (0-9a-fA-F) etc.
C-5
PortalProtect Administrator's Guide
C-6
About Regular Expressions
\xhh Indicates an ASCII character with \x7E(\w){6} matches any block of text
given hexadecimal code (where hh containing a "word" of exactly six
represents any two-digit hex value). alphanumeric characters preceded
with a ~ (tilde) character. So, the
words ’r;~ab12cd’, ’r;~Pa3499’ would
be matched, but ’r;~oops’ would not.
C-7
Index
C
P
condition statements, 7-13
PCRE, 7-4
criteria
Perle Compatible Regular
customized expressions, 7-4, 7-5
Expressions, 7-4
keywords, 7-9, 7-10
predefined expressions, 7-3
customized expressions, 7-4, 7-5, 7-7
criteria, 7-4, 7-5 S
importing, 7-7
customized keywords, 7-9 support
criteria, 7-9, 7-10 resolve issues faster, 12-3
importing, 7-11 T
customized templates, 7-13
creating, 7-14 templates, 7-12–7-15
importing, 7-15 condition statements, 7-13
customized, 7-13–7-15
D logical operators, 7-13
Data Loss Prevention
expressions, 7-3–7-5, 7-7
keywords, 7-8–7-11
templates, 7-12–7-15
documentation feedback, 12-5
E
expressions, 7-3
customized, 7-4, 7-7
criteria, 7-4, 7-5
predefined, 7-3
K
keywords, 7-8
customized, 7-9–7-11
predefined, 7-8
L
logical operators, 7-13
IN-1