CSM4SMB v3 AG
CSM4SMB v3 AG
                                 Client Server
                                 Messaging Security3
                                 for Small and Medium Business
                                                            Administrator’s Guide
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
                        Trend Micro Incorporated reserves the right to make changes to this document and to
                        the products described herein without notice. Before installing and using the
                        software, please review the readme files, release notes and the latest version of the
                        Getting Started Guide, which are available from Trend Micro's Web site at:
                        http://www.trendmicro.com/download/default.asp
                        NOTE: A license to the Trend Micro Software includes the right to product updates,
                        pattern file updates, and basic technical support for one (1) year from the date of
                        purchase only. Thereafter, you must renew Maintenance on an annual basis by
                        paying Trend Micro’s then-current Maintenance fees to have the right to continue
                        receiving product updates, pattern updates, and basic technical support.
                        To order renewal Maintenance, you may download and complete the Trend Micro
                        Maintenance Agreement at the following site:
                        http://www.trendmicro.com/en/purchase/license/overview.htm
                        Trend Micro, the Trend Micro t-ball logo, TrendLabs, Damage Cleanup Services,
                        OfficeScan, PC-cillin, and ScanMail are trademarks of Trend Micro Incorporated
                        and are registered in certain jurisdictions. All other brand and product names are
                        trademarks or registered trademarks of their respective companies or organizations.
                        Copyright © 1998-2007 Trend Micro Incorporated. All rights reserved. No part of
                        this publication may be reproduced, photocopied, stored in a retrieval system, or
                        transmitted without the express prior written consent of Trend Micro Incorporated.
                        Document Part No. CMEM33118/70305
                        Release Date: March 2007
                        Protected by U.S. Patent Nos. 5,623,600; 5,889,943; 5,951,698; and 6,119,165
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
             The Administrator’s Guide for Trend Micro Client/Server and Client Server
             Messaging Security for SMB is intended to introduce the main features of the
             software and installation instructions for your production environment. You should
             read it prior to installing or using the software.
             Detailed information about how to use specific features within the software are
             available in the online help file and online Knowledge Base at Trend Micro’s Web
             site.
             Trend Micro is always seeking to improve its documentation. If you have questions,
             comments, or suggestions about this or any Trend Micro documents, please contact
             us at docs@trendmicro.com. Your feedback is always welcome. Please
             evaluate this documentation on the following site:
             www.trendmicro.com/download/documentation/rating.asp
CSM4SMB-v3-AG.book Page i Monday, April 23, 2007 10:40 AM
Contents
                   Contents
                   Preface
                                        How this Book Is Organized ................................................................. ii
                                        Using the Trend Micro Client Server Messaging Security for SMB
                                         Documentation .................................................................................. iii
                                                                                                                                            i
CSM4SMB-v3-AG.book Page ii Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        ii
CSM4SMB-v3-AG.book Page iii Monday, April 23, 2007 10:40 AM
Contents
                                                                                                                                              iii
CSM4SMB-v3-AG.book Page iv Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        iv
CSM4SMB-v3-AG.book Page v Monday, April 23, 2007 10:40 AM
Contents
                                                                                                                                                  v
CSM4SMB-v3-AG.book Page vi Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        vi
CSM4SMB-v3-AG.book Page vii Monday, April 23, 2007 10:40 AM
Contents
                                                                                                                                              vii
CSM4SMB-v3-AG.book Page viii Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        viii
CSM4SMB-v3-AG.book Page ix Monday, April 23, 2007 10:40 AM
Contents
                                                                                                                                         ix
CSM4SMB-v3-AG.book Page x Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        x
CSM4SMB-v3-AG.book Page i Monday, April 23, 2007 10:40 AM
Preface
                   Preface
                        Welcome to the Trend Micro Client Server Messaging Security for Small and
                        Medium Businesses Version 3.6Administrator’s Guide. This book contains
                        information about the tasks you need to do to install and configure Client Server
                        Messaging Security. This book is intended for novice and experienced users of Client
                        Server Messaging Security who want to quickly configure, administer, and use the
                        product.
                                                                                                           i
CSM4SMB-v3-AG.book Page ii Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        ii
CSM4SMB-v3-AG.book Page iii Monday, April 23, 2007 10:40 AM
                        • Getting Started Guide – This guide helps you plan for and install the Trend Micro
                          Security Server program, modify important default client settings, and roll out your
                          clients. The latest version of the Getting Started Guide is available in electronic
                          form at the following location:
                                   http://www.trendmicro.com/download/
                        • Online help – The purpose of online help is to provide descriptions for performing
                          the main tasks, usage advice, and field-specific information, such as valid
                          parameter ranges and optimal values. Online help is accessible from the Trend
                          Micro Security Dashboard for SMB™.
                        • Readme file – The Readme file contains late-breaking product information not
                          found in the online or printed documentation. Topics include a description of new
                          features, installation tips, known issues and product release history.
                        • Knowledge Base – The Knowledge Base is an online database of problem-solving
                          and troubleshooting information. It provides the latest information about known
                          product issues. To access the Knowledge Base, go to the following Web site:
                                   http://esupport.trendmicro.com
                        Trend Micro is always seeking to improve its documentation. If you have questions,
                        comments, or suggestions about this or any Trend Micro documents, please contact
                        us at docs@trendmicro.com. Your feedback is always welcome. Please evaluate this
                        documentation on the following site:
                        www.trendmicro.com/download/documentation/rating.asp
                                                                                                            iii
CSM4SMB-v3-AG.book Page iv Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        iv
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 1
                   Product Overview
                        Designed to suit the needs of small- to medium-sized business IT networks, Trend
                        Micro Client Server Messaging Security for SMB provides network-wide desktop
                        and server protection.
                        Network-wide desktop and server protection helps shield servers and computers on
                        the network from virus and spyware/grayware threats. Client Server Messaging
                        Security keeps computers on your network up-to-date with the latest pattern files
                        through centralized management and automatic updates of client installations.
                                                                                                       1-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
              Replace {CD-ROM drive} with the drive letter of the CD-ROM drive on your
              computer.
        1-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
                                                                                                                   1-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        1-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
                   Single-Console Operation
                        TheTrend Micro Security Server allows you to manage your entire anti-virus system
                        through a single Web console. The Trend Micro Security Dashboard for SMB is
                        installed when you install theTrend Micro Security Server and uses standard Internet
                        technologies such as Java, CGI, HTML, and HTTP.
                   Outbreak Defense
                        Use Outbreak Defense to take preemptive steps to secure your network. Outbreak
                        Defense first informs you of the latest threats, and then takes action to shield your
                        network and clients from the threat. While Outbreak Defense is protecting your
                        network and clients, TrendLabs is busy creating a solution to the threat. As soon as
                        TrendLabs finds a solution, they release updated components. The Security Server
                        then downloads and deploys the updated components to clients. For the last step,
                                                                                                                   1-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
              Outbreak Defense cleans up any virus remnants, and repairs files and directories that
              have been damaged by the threat.
              Using Outbreak Defense, you can take the following actions in the event of an
              outbreak:
              • Block ports to help prevent viruses from infecting files on the network
              • Write-protect certain files and directories
              • Block certain attachments
        1-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
                        Infrastructure (PKI) cryptography standards. The default period for the certificate is
                        three years.
                                                                                                                   1-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
              Quarantine
              • Set the Messaging Security Agent to quarantine suspect email messages
              • Query logs for quarantine events and resend quarantined messages when you
                decide they are safe
              Web based management console
              • Access remote servers through the Security Dashboard, the secure Web console for
                Client Server Messaging Security
              Notifications
              • Send notifications to recipients or senders of messages containing detected threats
        1-8
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 2
                                                                                                        2-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               WWW/FTP         Mail/Groupware
                Server              Server           File Server
        2-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
                        • Trend Micro Security Server, which hosts the Trend Micro Security Dashboard for
                          SMB, downloads updates from the Trend Micro ActiveUpdate server, collects and
                          stores logs, and helps control virus outbreaks.
                        • Trend Micro Client Server Messaging Security Agent, which protects your
                          Windows Vista/2000/XP/Server 2003 computers from viruses, spyware/grayware,
                          Trojans, and other threats
                        • Trend Micro Messaging Security Agent, which protects Microsoft Exchange
                          servers, filters spam, and blocks content.
                                                                                                            2-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
                                                            Security Dashboard
                 Trend Micro
              Security Server with
               HTTP Web server
        2-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
                        The Client/Server Security Agent reports to the Trend Micro Security Server from
                        which it was installed. To provide the server with the very latest client information,
                        the client sends event status information in real time. Clients report events such as
                        virus and spyware detection, client startup, client shutdown, start of scan, and
                        completion of an update.
                        Configure scan settings on clients from the Trend Micro Security Dashboard for
                        SMB. To enforce uniform desktop protection across the network, choose not to grant
                        the clients privileges to modify the scan settings or to remove the client program.
                                                                                                            2-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
              • Virus cleanup template – Used by the Virus Cleanup Engine, this template helps
                identify viruses, Trojans and Trojan processes.
              • Virus cleanup engine 32-bit – The engine Damage Cleanup Services™ uses to
                scan for and remove from memory viruses, Trojans and Trojan processes, and
                other malware.
              • Messaging Security Agent scan engine – The engine that the Messaging Security
                Agent uses to identify viruses and malware.
              • IntelliTrap exception pattern – The pattern that the Virus Scan Engines and
                Messaging Security Agent scan engine uses to identify exceptions to items listed in
                the IntelliTrap pattern.
              • IntelliTrap pattern – The pattern that the Virus Scan Engines and Messaging
                Security Agent scan engine uses to detect malicious code such as bots in
                compressed files.
              • Vulnerability pattern – A file that helps Client Server Messaging Security
                identify vulnerabilities on client machines.
              • Common firewall pattern – Like the virus pattern file, this file helps Client
                Server Messaging Security identify virus signatures.
              • Common firewall engine 32-bit – The driver the Personal Firewall uses with the
                network virus pattern file to scan client machines for network viruses.
              • Spyware Pattern – Contains known spyware signatures and used by the spyware
                scan engines (both 32-bit and 64-bit) to detect spyware on clients and servers for
                manual and scheduled scans
              • Spyware Active-monitoring Pattern – Similar to spyware pattern, but is used by
                the scan engine for real-time anti-spyware scanning
              • Spyware Scan Engine (32-bit) – A separate scan engine that scans for, detects,
                and removes spyware from infected clients and servers running on i386 (32-bit)
                operating systems (for example, Windows Vista, Windows 2000, and Windows
                XP)
              • Spyware Scan Engine (64-bit) – Similar to the spyware scan engine for 32-bit
                systems, this scan engine scans for, detects, and removes spyware on x64 (64-bit)
                operating systems (for example, Windows Vista x64, Windows XP Professional
                x64 Edition, Windows 2003 x64 Edition)
              • Anti-spam pattern for Messaging Security Agent – The pattern that the
                Messaging Security Agent Anti-spam engine uses to detect spam email
        2-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
                        • Anti-spam engine for Messaging Security Agent – The engine that the
                          Messaging Security Agent uses to detect spam email
                        • Anti-Rootkit Driver (32-bit) – A module required by the spyware scan engine to
                          detect rootkits
                        • Hot fixes and security patches – Workaround solutions to customer related
                          problems or newly discovered security vulnerabilities that you can download from
                          the Trend Micro Web site and deploy to the Trend Micro Security Server and/or
                          client program.
                                                                                                              2-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        2-8
CSM4SMB-v3-AG.book Page 9 Monday, April 23, 2007 10:40 AM
                        Tip: Trend Micro recommends scheduling automatic updates at least hourly. The default
                             setting for all Trend Micro products is hourly.
                        You can download virus pattern files from the following Web site, where you can
                        also find the current version, release date, and a list of all the new virus definitions
                        included in the file:
                        http://www.trendmicro.com/download/pattern.asp
                        The scan engine works together with the virus pattern file to perform the first level of
                        detection, using a process called pattern matching. Since each virus contains a unique
                        “signature” or string of telltale characters that distinguish it from any other code, the
                        virus experts at TrendLabs™ capture inert snippets of this code in the pattern file.
                        The engine then compares certain parts of each scanned file to the pattern in the virus
                        pattern file, looking for a match. When the engine detects a match, a virus has been
                        detected and a notification is sent via an email message to the system administrator.
                                                                                                                2-9
CSM4SMB-v3-AG.book Page 10 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        2-10
CSM4SMB-v3-AG.book Page 11 Monday, April 23, 2007 10:40 AM
                           fixes include a Setup program, while non-Windows hot fixes do not. Typically,
                           you need to stop the program daemons, copy the file to overwrite its counterpart in
                           your installation, and restart the daemons.
                        • Security Patch – A hot fix focusing on security issues and that is suitable for
                          deployment to all customers. Windows security patches include a Setup program,
                          while non-Windows patches commonly have a setup script.
                        • Patch – A group of hot fixes and security patches that solve multiple program
                          issues. Trend Micro makes patches available on a regular basis. Windows patches
                          include a Setup program, while non-Windows patches commonly have a setup
                          script.
                        • Service Pack – A consolidation of hot fixes, patches, and feature enhancements
                          significant enough to be a product upgrade. Both Windows and non-Windows
                          service packs include a Setup program and setup script.
                        You can obtain hot fixes from your Technical Account Manager. Check the Trend
                        Micro Knowledge Base to search for released hot fixes:
                        http://esupport.trendmicro.com/support
                        Check the Trend Micro Web site regularly to download patches and service packs:
                        http://www.trendmicro.com/download
                        Note: All releases include a readme file with the information you need to install, deploy, and
                              configure your product. Read the readme file carefully before installing the hot fix,
                              patch, or service pack file(s).
                                                                                                                  2-11
CSM4SMB-v3-AG.book Page 12 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        2-12
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 3
                                                                                                    3-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        3-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
                                                                                                                     3-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               Trend Micro Security Server      733MHz      512MB   1GB     Win 2000   Security
                                                                            SP2        Server:
                                                                                       IE5.5
                                                                            Win XP
                                                                            SP1        Web Server:
                                                                                       IIS5.0
                                                                            Win 2003   IIS5.1
                                                                            (R2)       IIS6.0
                                                                                       Apache2.0.54
                                                                            SBS2000
                                                                                       Web
                                                                            SBS2003    Console:
                                                                            (R2)       IE5.5 (Hi-color
                                                                                       display
                                                                                       adaptor
                                                                                       w/1024x768
                                                                                       resolution)
        3-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
                                                                                             Win XP
                                                                                             Pro x64
                                                                                             Win 2003
                                                                                             (R2)
                                                                                             Win 2003
                                                                                             x64 (R2)
                                                                                             SBS
                                                                                             2000
                                                                                             SBS
                                                                                             2003 (R2)
                          Messaging Security Agent          733MHz     512MB      500MB      Win 2000     Software:
                                                                                             SP2          Exchange
                                                                                                          2000 SP3
                                                                                             Win 2003
                                                                                             (R2)         Exchange
                                                                                                          2003
                                                                                             SBS2000
                                                                                             SP1a
                                                                                             SBS2003
                                                                                             (R2)
                                                                                                                       3-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
              WARNING! You have the option of installing Apache Web server when you install the Trend
                       Micro Security Server. By default, the administrator account is the only account
                       created on the Apache Web server. Trend Micro recommends creating another
                       account from which to run the Web server; otherwise a hacker may be able to
                       take control of the Apache server and compromise the Trend Micro Security
                       Server.
                       Before installing the Apache Web server, refer to the Apache Web site for the
                       latest information on upgrades, patches, and security issues:
                       http://www.apache.org.
              Note: If using Remote install to install the Client/Server Security Agent on Windows
                    Vista/XP clients, you must disable Simple File Sharing unless they are part of a
                    domain (see your Windows documentation for instructions).
        Other Requirements
              • Administrator or Domain Administrator access on the computer hosting the
                Security Server
              • File and printer sharing for Microsoft Networks installed
              • Transmission Control Protocol/Internet Protocol (TCP/IP) support installed
              Note: If Microsoft ISA Server or a proxy product is installed on the network, you need to
                    enable the HTTP port ( 80 or 8080) and SSL port (443 or 4343) to enable access to the
                    Security Dashboard and to ensure that client-server communication can be established.
        3-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
                   Server Performance
                        Ideally, the computer on which the Trend Micro Security Server is installed would
                        have the following:
                        • Single 2.8~3.2 GHz processor
                        • 500 MB of memory
                        Note: If a firewall is located between the Trend Micro Security Server and its clients, you
                              must configure the firewall to allow traffic between the client listening port and the
                              Trend Micro Security Server’s listening port (see Understanding Client/Server
                              Security Ports on page 4-7for more information on the types of ports the client and
                              Trend Micro Security Server use to communicate)
                                                                                                                     3-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        Number of Clients
              A client is a computer that has the Client/Server Security Agent software installed on
              it. clients can be desktops, servers (even Exchange servers), and notebook computers,
              including those that belong to users who telecommute or connect to the corporate
              network from their homes.
              If you have a heterogeneous client base (that is, if your network has different
              Windows operating systems, such as Windows Vista, 2000, XP, or Server 2003),
              identify how many clients are using a specific Windows version. Use this
              information to decide which client deployment method will work best in your
              environment.
              Note: A single Trend Micro Security Server can manage up to 2500 clients. If you have
                    more then this amount, Trend Micro suggests installing more than one Trend Micro
                    Security Server.
        3-8
CSM4SMB-v3-AG.book Page 9 Monday, April 23, 2007 10:40 AM
                                                                                                                     3-9
CSM4SMB-v3-AG.book Page 10 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               For example, if your network is segmented by location, and the network link between
               segments experiences a heavy traffic load, Trend Micro recommends allowing at
               least one client on each segment to act as an Update Agent.
        Number of Groups
               A group in Client Server Messaging Security is a cluster of clients that share the
               same configuration and run the same tasks. By clustering your clients into groups,
               you can simultaneously configure, manage, and apply the same configuration to all
               group members.
               A Client Server Messaging Security group is different from a Windows domain.
               There can be several Client Server Messaging Security groups in one Windows
               domain.
               For ease of management, plan how many Client Server Messaging Security groups to
               create. You can group clients based on the departments they belong to or the
        3-10
CSM4SMB-v3-AG.book Page 11 Monday, April 23, 2007 10:40 AM
                        functions they perform. Alternatively, you can group clients that are at a greater risk
                        of infection and apply a more secure configuration to all of them.
                                                                                                                     3-11
CSM4SMB-v3-AG.book Page 12 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        3-12
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 4
                                                                                                          4-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
              Tip: You can preserve your client settings when you upgrade to this version of Client
                   Server Messaging Security or if you need to reinstall this version of Client Server
                   Messaging Security. See Upgrading from a Previous Version on page 4-37 for
                   instructions.
        4-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
Anti-spam No Yes
                                                                                                                        4-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
              Note: Client Server Messaging Security cannot uninstall the server component of any
                    third-party antivirus product, but can uninstall the client component (see Migrating
                    from Third-party Antivirus Applications on page 5-17 for instructions and for a
                    list of third party applications Client Server Messaging Security can remove).
              SQL Server
              You can scan SQL Server databases; however, this may decrease the performance of
              applications that access the databases. Trend Micro recommends excluding SQL
              Server databases and their backup folders from Real-time Scan. If you need to scan a
              database, perform a manual scan during off-peak hours to minimize the impact of the
              scan.
        4-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
                        If you do not have either the Registration Key or Activation Code, you can still
                        install the trial version. The trial version has all the same functionality as the full
                        version, and if you upgrade within 30 days all of your settings will automatically be
                        upgraded to the full version. To find out more information contact your Trend Micro
                        sales representative (see Contacting Technical Support on page 18-14).
                        Note: If you have questions about registration, please consult the Trend Micro Web site at
                              the following address:
                               http://esupport.trendmicro.com/support/viewxml.do?ContentID=e
                               n-116326
                                                                                                                  4-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
              Note: The installation program will automatically detect the name of the SMTP server and
                    fill in the field if the SMTP server is on the same computer as the CSM server
                    installation.
        4-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
                           uninstalling or upgrading the Trend Micro Messaging Security Agent, the IIS
                           Admin service and all related services will automatically be stopped and restarted.
                        WARNING! If you are installing the Messaging Security Agent on a server that is running
                                 lockdown tools (such as typically implemented for Windows 2000 server with IIS
                                 5.0), remove the lockdown tool so that it does not disable IIS service and cause
                                 the installation to be unsuccessful.
                        WARNING! Many hacker and virus attacks use HTTP and are directed at ports 80 and/or
                                 8080– commonly used in most organizations as the default Transmission
                                 Control Protocol (TCP) ports for HTTP communications.
                                       If your organization is currently using one of these ports as the HTTP port,
                                       Trend Micro recommends using another port number.
                                                                                                                      4-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
              target computer does not contain viruses, Trojans, or other potentially malicious
              code.
              The prescan targets the most vulnerable areas of the computer, which include the
              following:
              • the Boot area and boot directory (for boot viruses)
              • the Windows folder
              • the Program Files folder
              WARNING! Make sure that you do not install the Web server on a computer that is running
                       applications that might lock IIS. This could prevent successful installation. See
                       your IIS documentation for more information.
        4-8
CSM4SMB-v3-AG.book Page 9 Monday, April 23, 2007 10:40 AM
                        Tip: Trend Micro highly recommends installing Client Server Messaging Security during
                             non-peak hours to minimize the effect on your network.
                        Note: Close any running applications before installing Client Server Messaging Security. If
                              you install while other applications are running, the installation process may take
                              longer to complete.
                        Tip:      You can preserve your client settings when you upgrade to this version of Client
                                  Server Messaging Security or if you need to reinstall this version of the Client
                                  Server Messaging Security. See Upgrading from a Previous Version on page
                                  4-37 for instructions.
                        Note: If information from a previous MSA installation exists on the client, you will be
                              unable to install MSA successfully. Use the Windows Installer Cleanup Utility to
                              clean up remnants of the previous installation. To download the Windows Installer
                              Cleanup Utility, visit http://support.microsoft.com/kb/290301/en-us.
                                                                                                                  4-9
CSM4SMB-v3-AG.book Page 10 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        4-10
CSM4SMB-v3-AG.book Page 11 Monday, April 23, 2007 10:40 AM
                                                                                                              4-11
CSM4SMB-v3-AG.book Page 12 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               5. Click Register Online if the product has not been registered yet. If the product is
                  already registered, skip this step.
               6. Enter the Activation Code in the Activation Code field.
                   Note: If you do not have an Activation Code, click Next to install the trial version.
                         Upgrade to the full version before the 30-day trial period ends and all settings
                         will remain.
        4-12
CSM4SMB-v3-AG.book Page 13 Monday, April 23, 2007 10:40 AM
                         8. Choose whether to prescan your computer for threats by selecting one of the
                            following options:
                             • Prescan my computer for threats
                             • Do not prescan my computer for threats
                             Note: If you choose to prescan your computer for threats, a threat progress screen will
                                   appear while scanning is taking place. See Actions for Prescan Detections on
                                   page 4-8.
                                                                                                                 4-13
CSM4SMB-v3-AG.book Page 14 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
             10. From the Setup Type screen, choose one of the following options:
                   • Typical installation (recommended)
                   • Custom installation
                   Note: For instructions on performing an installation using the Typical method, see
                         Performing a Typical Installation on page 4-36. The default values for the
                         Custom installation are exactly the same as the values for a Typical installation.
             11. Click Next. The Setup Overview screen appears. At this time, all of the
                 pre-installation tasks are complete.
        4-14
CSM4SMB-v3-AG.book Page 15 Monday, April 23, 2007 10:40 AM
                       12. The Setup Overview screen briefly lists the tasks that you need to complete in
                           order to install the Trend Micro Security Server, Security Dashboard,
                           Client/Server Security Agent, and Messaging Security Agent.
                                                                                                              4-15
CSM4SMB-v3-AG.book Page 16 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        4-16
CSM4SMB-v3-AG.book Page 17 Monday, April 23, 2007 10:40 AM
                         3. Choose from one of the following server identification options for client-server
                            communication:
                             • Server information – Choose Domain name or IP address:
                                  • Domain name – Verify the target server domain name. You can also use
                                    the server’s fully qualified domain name (FQDN) if necessary to ensure
                                    successful client-server communication.
                                  • IP address – Verify that the target server IP address is correct.
                                                                                                               4-17
CSM4SMB-v3-AG.book Page 18 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
                            If the server has multiple network interface cards (NICs), Trend Micro
                            recommends using one of the IP addresses, instead of the domain name or
                            FQDN.
                   • Target directory – Enter the target directory where Trend Micro Security
                     Server files will be installed.
               4. Click Next. The Select Program Folder screen appears.
                   FIGURE 4-8. Select Program Folder Screen
Note: This screen will not appear if you choose the Typical installation method.
        4-18
CSM4SMB-v3-AG.book Page 19 Monday, April 23, 2007 10:40 AM
                         5. Type a location in the Program folder field where program shortcuts will be
                            stored or accept the default location.
                         6. Click Next. The Web Server screen appears allowing you to choose a Web
                            server
                             FIGURE 4-9. Web Server Selection Screen
Note: This screen will not appear if you choose the Typical installation method.
                         7. From the Web Server screen, select a Web server to host the Security
                            Dashboard. Choose from one of the following:
                             • IIS server
                             • Apache web server
                         8. Click Next. Depending on the type of server chosen, the corresponding screen
                            appears.
                                                                                                                4-19
CSM4SMB-v3-AG.book Page 20 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        4-20
CSM4SMB-v3-AG.book Page 21 Monday, April 23, 2007 10:40 AM
Note: This screen will not appear if you choose the Typical installation method.
                             Note: If using IIS server, you must specify an IIS Web site, virtual or default. Client
                                   Server Messaging will assign default values for the HTTP and SSL port settings.
                                                                                                                4-21
CSM4SMB-v3-AG.book Page 22 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Note: This screen will not appear if you choose the Typical installation method.
             11. If a proxy server is required to access the Internet, select the Use a proxy server
                 check box and then provide the following information:
                   • Proxy type
                   • Server or IP address
                   • Port
                   • User name
                   • Password
             12. Click Next. The SMTP Server and Notification Recipient(s) screen appears.
        4-22
CSM4SMB-v3-AG.book Page 23 Monday, April 23, 2007 10:40 AM
                       13. The SMTP Server and Notification Recipient(s) screen, requires the following
                           information:
                             • SMTP Server
                             • Port
                             • Recipient(s)
                             Note: The installation program will automatically detect the name of the SMTP server
                                   and fill in the SMTP Server and Port fields if the SMTP server is on the same
                                   computer as the CSM server installation.
                                                                                                                4-23
CSM4SMB-v3-AG.book Page 24 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
16. Click Next. The World Virus Tracking Program screen appears.
        4-24
CSM4SMB-v3-AG.book Page 25 Monday, April 23, 2007 10:40 AM
                                                                                                              4-25
CSM4SMB-v3-AG.book Page 26 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        4-26
CSM4SMB-v3-AG.book Page 27 Monday, April 23, 2007 10:40 AM
                             Note: If the local server does not have Exchange server on it, the Messaging Security
                                   agent option will be unavailable.
                                                                                                                4-27
CSM4SMB-v3-AG.book Page 28 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
                   Note: The installation program will automatically detect the name of the local Exchange
                         server and fill in the Exchange Server field if the Exchange server is on the same
                         computer as the CSM server installation.
        4-28
CSM4SMB-v3-AG.book Page 29 Monday, April 23, 2007 10:40 AM
Note: This screen will not appear if you choose the Typical installation method.
                                                                                                                4-29
CSM4SMB-v3-AG.book Page 30 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               Note: Anonymous Access is required for communication between the Security Server and
                     the Messaging Security Agent. The installation program will automatically enable
                     Anonymous Access Authentication Methods for the Messaging Security Agent. To
                     view the Anonymous Access Authentication Methods, access the Messaging Security
                     Agent Web site on the IIS console.
Note: This screen will not appear if you choose the Typical installation method.
        4-30
CSM4SMB-v3-AG.book Page 31 Monday, April 23, 2007 10:40 AM
Note: This screen will not appear if you choose the Typical installation method.
                             Note: The Client/Server Security Agent applies the Path and Port settings to both local
                                   and remote clients.
                                                                                                                 4-31
CSM4SMB-v3-AG.book Page 32 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               9. Click Next. The installation process begins installing the Security Server,
                  Messaging Security Agent, and Client/Server Security Agent. Upon completion,
                  the Remote Messaging Security Agent Installation Stage screen appears.
                   Note: The next step assumes that you selected install Remote Messaging Security
                         Agent from the Component Selection screen. If you chose not to select the
                         option to install the Remote Messaging Security Agent, an InstallShield Wizard
                         Complete screen will appear.
        4-32
CSM4SMB-v3-AG.book Page 33 Monday, April 23, 2007 10:40 AM
2. Click Next. The Install Remote Messaging Security Agent screen appears.
                                                                                                              4-33
CSM4SMB-v3-AG.book Page 34 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               3. To install Messaging protection to a remote Exchange server, click Yes and then
                  enter the Domain Administrator account information.
                   • Exchange Server
                   • Account
                   • Password
                   Note: If you chose No, the InstallShield Wizard Complete screen will appear, and the
                         installation process will be complete. If you chose Yes, upon completion of the
                         Remote Messaging Security Agent installation, you will be prompted to install
                         another Remote Messaging Security Agent.
4. Click Next. The Remote Messaging Security Agent Settings screen appears.
        4-34
CSM4SMB-v3-AG.book Page 35 Monday, April 23, 2007 10:40 AM
Note: This screen will not appear if you choose the Typical installation method.
                                                                                                                4-35
CSM4SMB-v3-AG.book Page 36 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        4-36
CSM4SMB-v3-AG.book Page 37 Monday, April 23, 2007 10:40 AM
                                                                                                                4-37
CSM4SMB-v3-AG.book Page 38 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               Note: If you upgrade the Client/Server Suite Server or Client Server Messaging Security
                     Server that is running of a Windows NT4 server, the upgrade process will be
                     interrupted and a warning message will appear. This happens as well if you upgrade
                     Client/Server Agent on a Windows 9x/NT client. If you continue with the upgrade, the
                     Client/Server Agent will be unable to report to the CSM Server.
               Client Server Messaging Security 3.6 does not support upgrade under the following
               conditions:
               • Upgrade to Client Server Messaging Security 3.6 from OfficeScan Enterprise
                 Edition or ScanMail for Microsoft Exchange.
               • Upgrade from one language to another.
               • Client Server Security 3.6 will not upgrade Client/Server Security Agents running
                 on Windows 9x/ME/NT clients.
               • Upgrade from Client/Server Suite 2.0 to Client Server Security 3.6
               • Upgrade from Client/Server Suite 2.0 to Client Server Messaging Security 3.6
                    Trend Micro recommends deleting all virus log files from the Trend Micro Security
                    Server before upgrading. If you want to preserve the virus log files, save them to
                    another location first.
        4-38
CSM4SMB-v3-AG.book Page 39 Monday, April 23, 2007 10:40 AM
                                                                                                                4-39
CSM4SMB-v3-AG.book Page 40 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               Tip: Before upgrading, check the size of your log files. If the log file is very large, Trend
                    Micro recommends that you run maintenance using your current version before you
                    upgrade. This will greatly reduce the amount of time required for upgrade.
               • The quarantine and backup folders are retained during upgrading; however, you
                 will no longer be able to query the quarantined log or resend the quarantined items
                 from the previous version from the Security Dashboard of the upgraded version.
               • If the previous version of Client Server Messaging Security used eManager, then
                 Client Server Messaging Security 3.6 retains the anti-spam logs from that version.
                    The old anti-spam rule           CSM 3.6 imports the rule as a Content
                                                                Filtering rule
        4-40
CSM4SMB-v3-AG.book Page 41 Monday, April 23, 2007 10:40 AM
                        Client Server Messaging Security 3.6 supports all eManager message blocking
                        actions described in the following table:
                        TABLE 4-4. Effect of Upgrading eManager Anti-spam Actions
                          Quarantine                          Quarantine
                          Archive                             Archive
Delete Quarantine
Clean Clean
                          ScanMail 6.x used Delete to remove      The behavior of the Replace with text/file action
                          the contents of a message and           is the same as the behavior of delete in
                          replace it with a warning text.         ScanMail 6.x. Client Server Messaging Security
                                                                  3.6 converts this action to replace with text/file.
Pass Pass
                                                                                                                        4-41
CSM4SMB-v3-AG.book Page 42 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
                 or if using SSL:
                        https://{Client Server Messaging Security_server_name}:{port
                        number}/SMB
        4-42
CSM4SMB-v3-AG.book Page 43 Monday, April 23, 2007 10:40 AM
                             Note: Uninstalling the Trend Micro Security Server does not uninstall clients.
                                   Uninstall or move all clients before uninstalling the Trend Micro Security
                                   Server.
                                                                                                                4-43
CSM4SMB-v3-AG.book Page 44 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        4-44
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 5
                                                                                                        5-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
              Tip: In organizations where IT policies are strictly enforced, Remote Install and Login
                    Script Setup are recommended.
              • Internal Web page – Instruct the users in your organization to go to the internal
                Web page and download the Client/Server Security Agent setup files (see
                Installing from the Internal Web Page on page 5-4)
              • Login Script Setup – Automate the installation of the Client/Server Security
                Agent to unprotected computers when they log on to the domain (see Installing
                with Login Script Setup on page 5-5)
              • Client Packager – Deploy the Client/Server Security Agent setup or update files
                to clients via email (see Installing with Client Packager on page 5-7)
              • Windows Remote Install – Install the Client/Server Security Agent program on
                all Windows Vista/2000/XP/Server 2003 clients from your Web console (see
                Installing with Windows Remote Install on page 5-11)
              • Trend Micro™ Vulnerability Scanner (TMVS) – Install the Client/Server
                Security Agent on all Windows Vista/2000/XP (Professional)/Server 2003 clients
                with the Trend Micro Vulnerability Scanner (Installing with Vulnerability Scanner
                on page 5-13)
        5-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
                        TABLE 5-1. Trend Micro Client Server Messaging Security Agent Deployment
                                       Methods
                                                                                       Windows
                                                              Login         Client
                                             Web page         scripts      packager    Remote           TMVS
                                                                                        Install
                        To use any of these Client/Server Security Agent deployment methods, you must
                        have local administrator rights on the target computers.
                                                                                                                     5-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
              Note: Close any running applications on the client computers before installing the
                    Client/Server Security Agent. If you install while other applications are running, the
                    installation process may take longer to complete.
              Tip: You can use Vulnerability Scanner to see which clients have not followed the
                   instructions to install from the Security Dashboard (see Using Vulnerability
                   Scanner to Verify the Client Installation on page 5-21 for more information).
              Users must have Microsoft Internet Explorer 5.5 or later with the security level set to
              allow ActiveX controls to successfully download the Client/Server Security Agent
              setup files. The instructions below are written from the client user perspective. Email
              your users the following instructions to install the Client/Server Security Agent from
              the internal Web server.
              To install from the internal Web page:
              1. Open an Internet Explorer window and type one of the following:
        5-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
                             The installation starts. Once installation is completed, the screen displays the
                             message, "Agent installation is complete".
                         3. Verify the installation by checking if the Client/Server Security Agent icon
                            appears in the Windows system tray.
                        Note: In order to enforce the use of login script installation method, client computers must
                              be listed in the Windows Active Directory of the server that is performing the
                              installation.
                                                                                                                     5-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        5-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
                        Note: When an unprotected computer logs on to the servers whose login scripts you
                              modified, autopcc.exe will automatically install the client to it.
                                                                                                                     5-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
              When users receive the package, all they have to do is double-click the file to run the
              setup program. Client/Server Security Agents installed using Client Packager report
              to the server where Client Packager created the setup package. This tool is especially
              useful when deploying the Client/Server Security Agent setup or update files to
              clients in low-bandwidth remote offices.
              Note: Client packager requires a minimum of 140MB free disk space on the client. Windows
                    Installer 2.0 is necessary for the client to run an MSI package.
                   Note: In Windows Vista clients, the program must be executed with Administrator
                         rights (Run as Administrator).
              • Microsoft Installer Package Format (MSI) – This file type conforms to the
                Microsoft Windows Installer package specifications. For more information on
                MSI, see the Microsoft Web site.
              Tip: Trend Micro recommends using Active Directory to deploy an MSI package with
                   Computer Configuration instead of User Configuration. This helps ensure that the
                   MSI package will be installed regardless of which user logs on to the machine.
Note: Install Microsoft Outlook to use the Client Packager send mail option.
Note: You must run the program from the Trend Micro Security Server only.
        5-8
CSM4SMB-v3-AG.book Page 9 Monday, April 23, 2007 10:40 AM
                         4. In Target operating system, select the operating system for which you want to
                            create the package.
                         5. Select the type of package you want to create:
                             • Setup – Select if installing the Client/Server Security Agent program.
                             • Update – Select if updating Client/Server Security Agent components only.
                         6. Select from among the following installation options under Options:
                             • Silent Mode – Creates a package that installs on the client machine in the
                               background, unnoticeable to the client. The installation status window will not
                               appear.
                             • MSI Package – Creates a package that conforms to the Microsoft Windows
                               Installer Package Format.
                             Note: If you select MSI Package, the package file has an .msi extension; otherwise, it
                                   has an .exe extension. The MSI package is for Active Directory deployment
                                   only. For local installation, create an .exe package.
                             • Disable Prescan (only for fresh-install) – Disables the normal file scanning
                               that Client/Server Security performs before starting setup.
                         7. Under Components, select the components to include in the installation
                            package:
                             • Program – All components (if you select Program, Client Packager
                               automatically selects the other components).
                             • Scan engine – The latest scan engine on the Trend Micro Security Server.
                             • Virus pattern – The latest virus pattern file on the Trend Micro Security
                               Server.
                             • Common Firewall Driver – The driver for Personal Firewall
                             • Network Virus Pattern – The latest pattern file specifically for network
                               viruses
                             • DCE/DCT – The latest virus cleanup engine and template on the Trend Micro
                               Security Server
                         8. Select the Client/Server Security Agent utilities to include in the package:
                                                                                                                     5-9
CSM4SMB-v3-AG.book Page 10 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
                   • POP3 Mail Scan – Performs a virus scan on the client's Post Office Protocol 3
                     (POP3) mail messages and attachments as they are downloaded from the mail
                     server.
               9. Ensure that the location of the ofcscan.ini file is correct next to Source file.
                  To modify the path, click        to browse for the ofcscan.ini file. By default,
                  this file is located in the \PCCSRV folder of the Trend Micro Security Server.
             10. In Output file, click to specify the file name (for example,
                 ClientSetup.exe) and the location to create the client package.
             11. Click Create to build the client package. When Client Packager finishes creating
                 the package, the message "Package created successfully" appears. To verify
                 successful package creation, check the output directory you specified.
             12. Send the package to your users via email, or copy it to a CD or similar media and
                 distribute among your users.
               WARNING! You can only send the package to the Client/Server Security Agents that report to
                        the server where the package was created. Do not send the package to
                        Client/Server Security Agents that report to other Trend Micro Security Servers.
Note: Microsoft Outlook is necessary to use the Client Packager email function.
        5-10
CSM4SMB-v3-AG.book Page 11 Monday, April 23, 2007 10:40 AM
                        Note: You cannot use Windows Remote Install to install the Client/Server Security Agent on
                              machines running Windows XP Home Edition.
                        Note: Installing CSA on Windows Vista requires a few additional steps. Refer to Enabling
                              CSA Remote Install on Windows Vista Clients on page 5-12 for additional
                              details.
                         1. From the Security Dashboard main menu, click Security Settings > Add. The
                            Add Computer screen appears.
                         2. Select Desktop or server from under Computer Type and then select Remote
                            install from under Method.
                         3. Click Next. The Remote Install screen appears.
                                                                                                                    5-11
CSM4SMB-v3-AG.book Page 12 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               4. From the list of computers in the Groups and Computers box, select a client,
                  and then click Add >>. A prompt for a user name and password to the target
                  computer appears. You need administrator rights to the target computer.
               5. Type your user name and password, and then click Login. The target computer
                  appears in the Selected Computers list box.
               6. Repeat these steps until the list displays all the Windows computers in the
                  Selected Computer list box.
               7. Click Install to install the Client/Server Security Agent to your target computers.
                  A confirmation box appears.
               8. Click Yes to confirm that you want to install the client to the target computers. A
                  progress screen appears as the program copies the Client/Server Security Agent
                  files to each target computer.
               When Client Server Messaging Security completes the installation to a target
               computer, the installation status will appear in the Result field of the selected
               computers list, and the computer name appears with a green check mark.
               Note: Windows Remote Install will not install the Client/Server Security Agent on a
                     machine already running a Trend Micro Security Server.
                   Note: If the company security policy is to disable Windows Firewall, proceed to step 2
                         to start the Remote Registry service.
        5-12
CSM4SMB-v3-AG.book Page 13 Monday, April 23, 2007 10:40 AM
                             c. Under the Program or port list in the Exceptions tab, make sure the File
                                and Printer Sharing check box is selected.
                             d. Click OK.
                         2. Temporarily start the Remote Registry service.
                             a. Open Microsoft Management Console.
                        Note: You can use Vulnerability Scanner on machines running Windows 2000 or Server
                              2003; however, the machines cannot be running Terminal Server.
                               You cannot install the Client/Server Security Agent with Vulnerability Scanner if an
                               installation of the Trend Micro Security Server is present on the same machine.
                                                                                                                    5-13
CSM4SMB-v3-AG.book Page 14 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               3. Under Trend Micro Security Server Setting (for Install and Log Report),
                  type the Trend Micro Security Server name and port number.
        5-14
CSM4SMB-v3-AG.book Page 15 Monday, April 23, 2007 10:40 AM
                                                                                                                    5-15
CSM4SMB-v3-AG.book Page 16 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               9. Verify that the Exchange server settings that you specified in the previous screens
                  are correct, and then click Next to start the MSA installation.
             10. To view the status of the MSA installation, click the Live Status tab.
        5-16
CSM4SMB-v3-AG.book Page 17 Monday, April 23, 2007 10:40 AM
                    Manual Scan
                    Scan type                   Full scan                           Quick scan
                                                                                                                    5-17
CSM4SMB-v3-AG.book Page 18 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               Refer to Table for a list of third-party client applications that Client Server
               Messaging Security can automatically remove.
               Note:   Client Server Messaging Security only removes the following client installations,
                       not server installations
Trend Micro
Symantec™
McAfee™
                VirusScan™ Enterprise 8.0, 7.1, 7.0, Virus Scan (MSPlus98), WebScanX v3.1.6, VirusScan
                ASaP, 95 {3.20,4.01,4.02, 4.03(#4023),4.03a (#4059)}, NT 4.03a (#4019), 5.15, 5.16, 5.21,
                6.01, 4.5, 4.51, Thin Client (TC)
Managed VirusScan
        5-18
CSM4SMB-v3-AG.book Page 19 Monday, April 23, 2007 10:40 AM
SpamKiller
SecurityCenter
                          Dr.Solomon™ 4.0.3
                          Dr.Solomon™ 4.0.3 NT
                          Dr.Solomon™ 7.77, 7.95 NT
LANDesk™
VirusProtect™ 5.0
Computer Associates™
Ahnlab™
Panda Software™
Platinum™ 7.0
                                                                                                                     5-19
CSM4SMB-v3-AG.book Page 20 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
FileSecure
CVPSecure
FileSecure Workstation
F-Sercure™
Backweb™
Management Agent™
Internet Shield
E-mail Scanning
Kaspersky™
Sophos™
Anti-Virus 9x
Authentium™
                Command AntiVirus™ win 2000/XP, 4.64 for win 9x/ME, 4.8, 4.9, 4.90.0 Standalone, 4.8, 4.9,
                4.91.0 Enterprise,
Grisoft™
Others
PER Antivirus
                eSafe Desktop v3
                Norman Virus Control
        5-20
CSM4SMB-v3-AG.book Page 21 Monday, April 23, 2007 10:40 AM
NOD32 AV
ViRobot 2k Professional
                        Note: You can use Vulnerability Scanner on machines running Windows 2000 and Server
                              2003; however, the machines cannot be running Terminal Server.
                                                                                                                    5-21
CSM4SMB-v3-AG.book Page 22 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        5-22
CSM4SMB-v3-AG.book Page 23 Monday, April 23, 2007 10:40 AM
                             change the default CSV folder, click Browse, select a target folder on your
                             computer or on the network, and then click OK.
                       10. Under Ping Settings, specify how Vulnerability Scanner will send packets to the
                           computers and wait for replies. Accept the default settings or type new values in
                           the Packet size and Timeout fields.
                       11. Click OK. The Vulnerability Scanner console appears.
                       12. To run a manual vulnerability scan on a range of IP addresses, do the following:
                             a. In IP Range to Check, type the IP address range that you want to check for
                                installed antivirus solutions and unprotected computers.
                             b. Click Start to begin checking the computers on your network.
                       13. To run a manual vulnerability scan on computers requesting IP addresses from a
                           DHCP server, do the following:
                             a. Click the DHCP Scan tab in the Results box. The DHCP Start button
                                appears.
                             b. Click DHCP Start. Vulnerability scanner begins listening for DHCP requests
                                and performing vulnerability checks on computers as they log on to the
                                network.
                        Vulnerability Scanner checks your network and displays the results in the Results
                        table. Verify that all desktop and notebook computers have the client installed.
                        If Vulnerability Scanner finds any unprotected desktop and notebook computers,
                        install the client on them using your preferred client installation method.
                                                                                                                    5-23
CSM4SMB-v3-AG.book Page 24 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               The EICAR test script is an inert text file with a .com extension. It is not a virus and
               does not contain any fragments of viral code, but most antivirus software will react to
               it as if it were a virus. Use it to simulate a virus incident and confirm that email
               notifications, HTTP scanning, and virus logs work properly.
               Note: Trend Micro also recommends testing a zipped version of the EICAR file. Using
                     compression software, zip the test script and perform the steps above.
Client/Server Security Agent should show that it detected the EICAR test file.
        5-24
CSM4SMB-v3-AG.book Page 25 Monday, April 23, 2007 10:40 AM
                                                                                                                    5-25
CSM4SMB-v3-AG.book Page 26 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        5-26
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 6
                                                                                                            6-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
              3. Type your password in the Password text box, and then click Log on. The
                 browser displays the Live Status screen of the Security Dashboard.
        6-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
                                                                                                            6-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        6-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
                        • Use different client and administrative tools to help manage security for the
                          network and clients.
                        • View product license information, maintain the administrator password, and help
                          keep the global business environment safe by joining the World Virus Tracking
                          program.
                        Help
                        • Use the help menu to get answers to Client Server Messaging Security questions,
                          view other Trend Micro security solutions, and get customer support.
                                                                                                           6-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        6-6
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 7
                                                                                                         7-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        7-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
                         2. From the Security Settings screen, select a group, and then click the Configure
                            tool. The Configure screen for the selected group appears with the
                            Antivirus/Anti-spyware configuration options displayed by default.
                             FIGURE 7-2. Security Settings - Desktop/Server Configuration Screen
                         3. To enable antivirus real-time scan, select the Enable real-time antivirus check
                            box.
                         4. To enable anti-spyware real-time scan, select the Enable real-time anti-spyware
                            check box.
                         5. Select the Target tab to specify settings for the following options:
                             • Use IntelliScan – Uses true file type identification – Click to use IntelliScan
                               (see Trend Micro IntelliScan on page B-3).
                             • All scannable files – Click to scan all files that the client opens or saves
                             • Scan files with the following extensions – Click to manually specify the files
                               to scan based on their extensions
                                You can add or delete extensions from the default set of extensions.
                                                                                                              7-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
                   Tip: You can also use ? and * as wildcards when specifying extensions. For example,
                       if you want to scan all files with extensions starting with D, you can type .D? or
                       .D*. Client/Server Security will scan all files with extensions starting with D,
                       including .DOC, .DOT, and .DAT. This option is only available for Real-time
                       Scan.
              6. From the Select a condition section, choose one of the following conditions for
                 scanning to occur:
                   • Scan files being created/modified and retrieved
                   • Scan files being retrieved
                   • Scan files being created/modified
              7. Exclusions – Select Enable Exclusions to exclude certain directories, files, and
                 extensions from scanning. See Excluding Files and Folders from Scans on page
                 7-6
              8. Advanced Settings – Select Advanced Settings to choose the following
                 advanced options:
                   For Antivirus Only
                   • Enable IntelliTrap – (Default)
                   • Scan mapped drives and shared folders on the network
                   • Scan floppy during system shutdown
                   • Scan compressed files: Up to {number}compression layers
                   For Anti-spyware Only
                   • Click the Modify Spyware/Grayware Approved List link to add to or
                     modify the list of spyware/grayware applications that are allowed to run on
                     clients and servers that belong to the group.
                        i. Use Search or the Quick Find links to locate the spyware/grayware
                           application that you want to allow.
                        ii. Select the application name in the left pane. To select multiple
                            applications, press CTRL while clicking the application names.
                        iii.Click Add.
              9. Click Save to go back to the antivirus/anti-spyware security settings page.
        7-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
                       10. Click the Action tab, and then specify how to handle Internet threats when
                           Client/Server Security detects them. Scan actions for viruses and spyware are
                           configured separately.
                             For Virus Detections
                             • ActiveAction – (see Trend Micro ActiveAction on page B-4).
                             • Perform the same action for all detected Internet threats
                             • Customized action for the following detected threats
                                In the Action list, select the action to perform on infected files. You can click
                                Pass, Delete, Rename, Quarantine, and Clean. The recommended scan
                                action is Clean.
                                In the Action for Uncleanable Threats list, select the action to perform if a
                                threat is uncleanable.
                                Client/Server Security only performs the uncleanable threats action if the
                                primary action is not successful. You can select actions for the following types
                                of Internet Threats (the default action is specified below):
                                  • Joke: Quarantine
                                  • Worm/Trojan: Quarantine
                                  • Virus: Clean
                                  • Test virus: Pass
                                  • Packer: Quarantine
                                  • Other threats: Clean
                             • Backup detected file before cleaning check box – Select this check box
                               (recommended) to save a copy of the file before it is cleaned. This saves a
                               copy of the infected file in the following directory on the client computer:
                                  C:\Program Files\Trend Micro\Client Server Security
                                  Agent\Backup
                                                                                                              7-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
                   WARNING! Denying spyware access to the computer does not remove the spyware
                           threat from infected clients and servers.
        7-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
                         6. To exclude specific directories, type the directory names under Enter the
                            directory path (E.g. c:\temp\ExcludeDir) and click Add.
                         7. To exclude specific files by file name, type the file names, or the file name with
                            full path under Enter the file name or the file name with full directory path
                            (E.g. ExcludeDoc.hlp; c:\temp\excldir\ExcludeDoc.hlp) and click Add.
Note: All subdirectories in the directory path you specify will also be excluded.
Note: Wildcard characters, such as "*", are not accepted for file extensions.
                         9. To apply this setting to all future clients that will belong to the group you
                            selected, click Save.
                             Note: If Microsoft Exchange Server is running on your client machines, Trend Micro
                                   recommends excluding all Microsoft Exchange Server folders from scanning. To
                                   exclude scanning of Exchange server folders on a global basis, go to
                                   Preferences > Global Settings, click the Server/Desktop tab, and then select
                                   Exclude Microsoft Exchange server folders when installed on Microsoft
                                   Exchange server.
                                                                                                                 7-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
                 Default Security
                      Level                                        Description
Low Inbound and outbound traffic allowed, only network viruses blocked.
                Default Exception
                                         Action       Protocol          Port                Direction
                     Name
        7-8
CSM4SMB-v3-AG.book Page 9 Monday, April 23, 2007 10:40 AM
                          Default Exception
                                                    Action   Protocol           Port              Direction
                               Name
                       Traffic Filtering
                        Personal Firewall filters all incoming and outgoing traffic, providing the ability to
                        block certain types of traffic based on the following criteria:
                        • Direction (incoming or outgoing)
                        • Protocol (TCP/UDP/ICMP)
                        • Destination ports
                        • Destination computer
                                                                                                                7-9
CSM4SMB-v3-AG.book Page 10 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               • Overlapping Fragment
               • Teardrop
               • Tiny Fragment Attack
               • Fragmented IGMP
               • LAND attack
            Exceptions
               Exceptions are comprised of specific settings that allow or block different kinds of
               traffic based on client port number(s) and IP address(es). You can configure a list of
               exceptions. The exceptions in the list override the Security level settings.
               Exception settings include the following:
               • Action – Block or allow all traffic that meets the exception criteria
               • Direction – Inbound or outbound network traffic to/from the client.
               • Protocol – The type of traffic: TCP, UDP, ICMP.
               • Port(s) – Ports on the client computer on which to perform the action.
               • Computers – The computers on the network to which the above traffic criteria
                  apply.
        7-10
CSM4SMB-v3-AG.book Page 11 Monday, April 23, 2007 10:40 AM
                         3. From the side menu, select Firewall. The Firewall Configuration screen
                            appears.
                             FIGURE 7-3. Personal Firewall – Simple Mode Screen
                                                                                                              7-11
CSM4SMB-v3-AG.book Page 12 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        7-12
CSM4SMB-v3-AG.book Page 13 Monday, April 23, 2007 10:40 AM
                         8. Under the Exceptions heading, select the ports to exclude from blocking in the
                            event of an outbreak.
                            To add, remove, or edit the port exception list, click the corresponding tool and
                            follow the onscreen instructions. To create a new exception, perform the
                            following:
                             a. Click Add. The Add Exception screen appears.
                             b. Type a name for the exception.
                             c. Next to Action, choose whether to allow or deny network traffic for this
                                exception.
                             d. Next to Direction, select Inbound and/or Outbound.
                             e. From the Protocol list, select a network traffic protocol:
                                  • All
                                  • TCP/UDP (default)
                                  • TCP
                                  • UDP
                                  • ICMP
                             f. Specify ports to exclude from blocking:
                                  • All ports (default)
                                  • Port range
                                  • Specified ports
                             g. Under Machines, specify client IP addresses.
                                  • All IP addresses (default)
                                  • Single IP – To resolve the client host name to an IP address, click
                                    Resolve.
                                  • IP range
                             h. Click Save. The Firewall Configuration screen appears with the new
                                exception in the exception list.
                         9. Click the check boxes next to the exceptions you want to include.
                                                                                                           7-13
CSM4SMB-v3-AG.book Page 14 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               Note: Deselecting the Enable Firewall check box will disable the firewall for both simple
                     and advanced mode.
        7-14
CSM4SMB-v3-AG.book Page 15 Monday, April 23, 2007 10:40 AM
                                                                                                       7-15
CSM4SMB-v3-AG.book Page 16 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
                   • Anti-spyware
                        • Manual Scan settings
                        • Scheduled Scan settings
                        • Real-time Scan settings
                   • Firewall
                        • Display Firewall tab
                        • Allow desktops to enable/disable firewall
                   Note: If you allow clients to enable or disable the firewall, you cannot change these
                         settings from Security Dashboard. If you do not grant clients this privilege, you
                         can change these settings from the Security Dashboard. The information under
                         Local Firewall settings on the client console always reflects the settings
                         configured from the client console, not the Security Dashboard.
                   • Mail Scan – Select the check boxes for the Mail Scan privileges to grant
                     users.
                        • Display mail scan tab
                        • Install/upgrade POP3 mail scan module
                        • Real-time POP3 mail scan settings
                   • Proxy Setting
                        • Allow agent user to configure proxy settings
                   • Update Privileges
                        • Perform "Update Now!"
                        • Enable/Disable Scheduled Update
                   • Update Settings
                        • Download from Trend Micro ActiveUpdate Server
                      Tip: To ensure that laptop users are updated when they are out of the office, make
                           sure that the Download from Trend Micro ActiveUpdate Server option is
                           selected.
        7-16
CSM4SMB-v3-AG.book Page 17 Monday, April 23, 2007 10:40 AM
                             Note: If you select High, the access permissions settings of the Client/Server Security
                                   Agent folders, files, and registries are inherited from the Program Files folder
                                   (for client machines running Windows Vista/2000/XP/Server 2003).
                                   Therefore, if the permissions settings (Security settings in Windows) of the
                                   WINNT file or Program Files folder are set to allow full read/write access,
                                   selecting High still allows clients full read/write access to the Client/Server
                                   Security Agent folders, files, and registries.
4. Click Save.
                   Using Quarantine
                        In Quarantine directory, type a Uniform Resource Locator (URL) or Universal
                        Naming Convention (UNC) path to store the infected files. If an invalid quarantine
                        directory is specified, Client Server Messaging Security uses the default quarantine
                        directory on the client:
                        C:\Program Files\Trend Micro\Client Server Security Agent\SUSPECT
                        To set the Quarantine directory:
                         1. On the main menu, click Security Settings. The Security Settings screen
                            appears.
                                                                                                                7-17
CSM4SMB-v3-AG.book Page 18 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               2. Select a desktop or server and click Configure. The Configuration screen for
                  the selected item appears.
               3. Click Quarantine from the side menu. The Quarantine Directory screen
                  appears.
                   FIGURE 7-6. Desktop/Server Quarantine Screen
        7-18
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 8
                                                                                                      8-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
              Note: Each detected threat generates one log entry/notification. This means that if
                    Messaging Security Agent detects multiple threats in a single email, it will generate
                    multiple log entries and notifications. There may also be instances when the same
                    threat is detected several times, especially if you are using cache mode in Outlook
                    2003. When cache mode is enabled, the same threat may be detected both in the
                    transport queue folder and Sent Items folder, or in the Outbox folder.
        8-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
Anti-spam
Content filtering
Attachment blocking
                                                                                                                     8-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
TABLE 8-1. Trend Micro Default Actions for the Messaging Security Agent
Antivirus
Other
        8-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
                             Note: The speed of real-time scanning depends on its settings. You can increase the
                                   performance of real-time scans by specifying certain file types that are
                                   vulnerable to viruses or by limiting the maximum number of compression layers
                                   to scan.
                        The following are the basic steps for configuring anti-virus. The Messaging Security
                        Agent provides identical options to configure Real-time, Manual, and Scheduled virus scans.
                        Refer to Scanning Exchange Servers for Viruses, Malware, and Other Threats on
                        page 10-5 for more information about configuring Manual and Scheduled scans.
                        Step 1: Select the Target tab and set the files to include in your scan.
                        The target for a scan is the file(s) or content contained in email messages. The
                        Messaging Security Agent usually scans the files according to the true file type
                        unless you configure the Messaging Security Agent to scan specific file types.
                        SeeFile Types Eligible for Scanning on page 8-5.
                        Step 2: Select the Action tab to set the actions that the Messaging Security Agent
                        takes when it detects a virus or other threat in the files you specified.
                        You can select ActiveAction to use the Trend Micro recommended actions or
                        customize your actions according to the type of threat detected.
                        When the Messaging Security Agent (MSA) detects a threat in an email, it can send
                        notifications to the email sender and/or recipients. From this screen, you can choose
                        who MSA should notify when it detects a threat in an email. See Sending
                        Notifications as a Course of Action on Detected Email Threats on page 8-12
                        Step 3: Select the Preferences > Notifications menu item to set who is notified
                        when virus events occur and how they receive notification. See Configuring Event
                        Notifications on page 13-2.
                                                                                                               8-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
              describes the methods that the Messaging Security Agent can use to determine which
              files to scan.
               All scannable files             Messaging Security Agent scans for viruses, worms,
                                               Trojans, and other malicious code in all file attachments -
                                               except unscannable files. Unscannable files are
                                               encrypted or password protected files.
               Specific file type              The Messaging Security Agent scans only the file types
                                               you specify. File type is determined by file extension
                                               name. For ease of use, Trend Micro has grouped file
                                               extension types in functional groups. Select file types by
                                               group or drill-down to select individual file extension
                                               types.
              For some files, such as very large attachments and compressed files, you can set
              restrictions on how the Messaging Security Agent scans (See Set Exclusions for
              Large Attachments and Compressed Files on page 8-7).
        8-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
                        Note: A compression layer is added each time a file is compressed. That is, if a file is
                              compressed and then compressed again, it has two layers of compression.
                        Tip: Trend Micro recommends using Exclusions to set scanning restrictions to protect
                             against Denial of Service attacks (DoS). DoS attacks cause a loss of service, namely
                             a network connection. Typically, DoS attacks negatively affect network bandwidth or
                             overload computer resources such as memory.
                        See Screening Out Spam on page 8-17 for more information about how the
                        Messaging Security Agent processes compressed files.
                                                                                                                    8-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
                   c. Compares the email with the Trend Micro supplied exception list
                   d. Applies heuristic scanning rules
                   e. Compares the email with the Spam signature database
              2. Scans for content filtering rule violations
              3. Scans for attachments that exceed user defined parameters
              4. Scans for viruses (Antivirus)
        8-8
CSM4SMB-v3-AG.book Page 9 Monday, April 23, 2007 10:40 AM
                                                                                                                            8-9
CSM4SMB-v3-AG.book Page 10 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               actions, you can set an action for each type of threat. The Messaging Security Agent
               executes the action you set when it detects a threat of the matching type.
Action Description
                Replace with        The Messaging Security Agent deletes the infected content and replaces
                text/file           it with text or a file. The email message is delivered to the intended
                                    recipient, but the text replacement informs them that the original content
                                    was infected and was replaced.
                Delete entire       During real-time scanning, the Messaging Security Agent deletes the
                message             entire email message. The original recipient will not receive the
                                    message. This option is not available in manual or scheduled scanning.
                                    The delete action in Client Server Messaging Security 3.6 differs from
                                    that of previous versions of Messaging Security such as ScanMail 6.21.
                                    ScanMail 6.21 used the action delete to remove the contents of a
                                    message and replace it with a warning text. The delete entire message
                                    in Client Server Messaging Security 3.6 will completely delete messages
                                    and will not send the message on to the original recipient.
        8-10
CSM4SMB-v3-AG.book Page 11 Monday, April 23, 2007 10:40 AM
Action Description
                          Pass                 Records virus infection of malicious files in the Virus logs, but takes no
                                               action.
                       Mass-mailing Behavior
                        Email-aware viruses, like the infamous Melissa, Loveletter, AnnaKournikova and
                        others, have the ability to spread through email by automating the infected
                        computer's email client. Mass-mailing behavior describes a situation when an
                        infection spreads rapidly between clients and servers in an Exchange environment.
                        Trend Micro designed the scan engine to detect behaviors that mass-mailing attacks
                        usually exhibit. The behaviors are recorded in the Virus Pattern file that is updated
                        using the TrendLabs™ ActiveUpdate Servers.
                        Enable the Messaging Security Agent to take action against these attacks whenever it
                        detects a mass-mailing behavior. The action set for mass-mailing behavior takes
                        precedence over all other actions. The default action against mass-mailing attacks is
                        Delete entire message.
                                                                                                                        8-11
CSM4SMB-v3-AG.book Page 12 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               • The Messaging Security Agent does not support the compression format used to
                 compress the file. The scan engine only cleans files compressed using pkzip and
                 only when the infection is in the first layer of compression.
                 For example, consider a compressed file titled “EuropeanBusinessTrip.zip” which
                 contains the following
               FIGURE 8-1. Compression Layers Explained
                                                             EuropeanBusinessTrip.zip is 3
                                                             compression layers deep.
        8-12
CSM4SMB-v3-AG.book Page 13 Monday, April 23, 2007 10:40 AM
                        Tip: Trend Micro recommends quickly deleting backed up files once you have determined
                              that the original file was not damaged and that it is usable. If the file becomes
                              damaged or unusable, send it to Trend Micro for further analysis. (Even if the
                              Messaging Security Agent has completely cleaned and removed the virus itself, some
                              viruses damage the original file code beyond repair.)
                                                                                                              8-13
CSM4SMB-v3-AG.book Page 14 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               WARNING! If you disable real-time scanning, you are vulnerable to infected files entering the
                         Exchange environment while the scan is disabled.
        8-14
CSM4SMB-v3-AG.book Page 15 Monday, April 23, 2007 10:40 AM
                        Tip: Using blocking is an effective way to control virus outbreaks. You can temporarily
                             quarantine all high-risk file types or those with a specific name associated with a
                             known virus. Later, when you have more time, you can examine the quarantine
                             folder and take action against infected files.
                                                                                                                   8-15
CSM4SMB-v3-AG.book Page 16 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        8-16
CSM4SMB-v3-AG.book Page 17 Monday, April 23, 2007 10:40 AM
Action Description
                          Replace with         The Messaging Security Agent deletes the attachment and replaces
                          text/file            it with a text file. The email message is delivered to the intended
                                               recipient, but the text replacement informs them that the original
                                               content was infected and was replaced.
                          Delete entire        During real-time scanning, the Messaging Security Agent deletes
                          message              the entire email message. This option is not available in manual or
                                               scheduled scanning.
                                                                                                                     8-17
CSM4SMB-v3-AG.book Page 18 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               Note: Microsoft Outlook may automatically filter and send messages that MSA detected as
                     spam to its Junk Mail folder.
               Note: The Exchange administrator maintains a separate Approved and Blocked Senders list
                     for the Exchange server. If an end-user creates an approved sender, but that sender is
                     on the administrator's Blocked Senders list, the Messaging Security Agent detects
                     messages from that blocked sender as spam and takes action against those messages.
               Note: When importing an Approved and Blocked Senders list, make sure that the text file is
                     encoded in ANSI format to avoid compatibility issues. If you import the list in
                     Unicode format, you will unable to import the list successfully.
        8-18
CSM4SMB-v3-AG.book Page 19 Monday, April 23, 2007 10:40 AM
                        • Adult
                        • Commercial
                        • Financial
                        • Spiritual
                        • Health
                        • Racial
                        • Others
                        Example: If an administrator’s clients work in the banking field, the administrator
                        might decide to set a high sensitivity level for the "sexual" category - messages in
                        this category are very likely to be classified as spam. However, it might be more
                        difficult to filter "commercial" type messages. Therefore, the administrator can set a
                        low sensitivity level for email messages in the "commercial" category.
                                                                                                            8-19
CSM4SMB-v3-AG.book Page 20 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               Messages from that sender arrive at Exchange and the Messaging Security Agent
               detects them as spam and takes action against them. If the Messaging Security Agent
               takes the Quarantine message to user’s spam folder action, it will attempt to deliver
               the message to the end user’s Spam folder, but the message will be redirected to the
               end user’s inbox instead because the end user has approved that sender.
               Note: When you are using Outlook, there is a rule size limit for the amount and size of
                     addresses on the list. To prevent a system error, the Messaging Security Agent
                     limits the amount of addresses that an end user can include in his or her approved
                     sender list (this limit is calculated according to the length and the number of email
                     addresses)
               The Messaging Security Agent supports wildcard matching for Approved and
               Blocked Senders lists. It uses the asterisk (*) as the wildcard character.
        8-20
CSM4SMB-v3-AG.book Page 21 Monday, April 23, 2007 10:40 AM
                        The Messaging Security Agent does not support the wildcard match on the username
                        part. However, if you type a pattern such as “*@trend.com”, the Messaging Security
                        Agent still treats it as “@trend.com”. This feature applies to user-defined Approved
                        Senders and Blocked Senders.
                                                                                                                8-21
CSM4SMB-v3-AG.book Page 22 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
                 of false positives. False positives are those emails that the Messaging Security
                 Agent filters as spam when they are actually legitimate emails.
               • Medium
                 This is the default setting. The Messaging Security Agent monitors at a high level
                 of spam detection with a moderate chance of filtering false positives.
               • Low
                 This is most lenient level of spam detection. The Messaging Security Agent will
                 only filter the most obvious and common spam messages, but there is a very low
                 chance that it will filter false positives.
               Note: If a significant volume of spam is not caught by the spam engine, download the Trend
                     Micro Anti-Spam Pilot for advanced protection against spam. For more information,
                     visit
                     http://www.trendmicro.com/en/products/desktop/anti-spam/evaluate/overview.htm.
        8-22
CSM4SMB-v3-AG.book Page 23 Monday, April 23, 2007 10:40 AM
                           The Messaging Security Agent adds a tag to the header information of the email
                           message that identifies it as phish and then delivers it to the intended recipient.
                                                                                                             8-23
CSM4SMB-v3-AG.book Page 24 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               When you click on an individual rule, the Edit rule page opens displaying details
               about the rule.
        8-24
CSM4SMB-v3-AG.book Page 25 Monday, April 23, 2007 10:40 AM
                           This type of rule is capable of filtering content from any message in real-time or
                           during a manual or scheduled scan.
                        • Filter message that match all conditions defined
                          This type of rule is capable of filtering content from any message during real-time
                          scanning.
                        • Monitor the message content of particular email account(s)
                          This type of rule monitors the message content of particular email account(s).
                          Monitoring rules are similar to a general content filter rules, except that they only
                          filter content from specified email account(s).
                        • Create exemption for particular email account(s)
                          This type of rule creates an exemption for particular email account(s). When you
                          exempt a particular email account, this account will not be filtered for content rule
                          violations.
                        To create a rule that filters messages that match any condition defined:
                        Step 1: Select the type of content rule
                         1. From the Content Filtering page, click Add.
                         2. Select Filter messages that match any condition defined.
                         3. Click Next.
                        Step 2: Name your rule and select the message part to filter
                         1. Type the name of your rule in the Rule name field.
                         2. Click the message part that you want to filter for undesirable content. The MSA
                            can filter email messages by Header (From, To, and CC), Subject, Body, or
                            Attachment.
                        Note: Client Server Messaging Security for SMB only supports filtering of header and
                              subject content during real-time scans. It does not support filtering of header and
                              subject content during manual and scheduled scans.
                         3. Click Next.
                        Step 3: Set the keywords for which MSA searches
                         1. Select whether the MSA filters content for "any" or for "all" of the keywords.
                                                                                                                    8-25
CSM4SMB-v3-AG.book Page 26 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
                   • "Any" keyword tells MSA to take action against content that contains any of
                     the keywords in the list.
                   • "All" tells MSA to take action against content only when the content contains
                     all of the keywords in the list.
               2. Type or import keywords.
                   • Type a keyword in the space provided.
                        • Click Add to add it to the list of keywords that MSA checks when
                          filtering content. MSA can support content filtering for Microsoft Office,
                          PDF, ZIP, RAR and text files.
                       • Click Delete to remove keywords from the list.
                      By default, MSA searches for exact matches of the keywords that you add.
                   • Click Import to import keyword lists.
                      When you import a keyword file, the imported keywords appear in the
                      keyword list. The imported file must be a text (.txt) file. The imported
                      keywords use the same format as they had in the text file.
               3. Click Match case-sensitive to have MSA disregard words that do not match the
                  keyword's case when filtering content.
               4. Set up your list of synonyms.
                   • Click Match synonym to have MSA consider all the synonyms of the
                     keyword when filtering content.
                   • Click next to Match synonym to display the list of synonyms. When you
                     select a keyword, all of the keyword’s synonyms display in the Synonyms to
                     exclude list. Use the arrow keys to add and delete synonyms for each
                     corresponding keyword.
               5. Click Next.
               Step 4: Set the action MSA takes against content that matches the keyword
               1. Select an action for MSA to take when it detects undesirable content. MSA can
                  perform the following actions when it detects content that matches the rule
                  conditions:
                   • Replace with text/file — replaces the filtered content with a text file.
                      You cannot replace text from the From, To, CC, or Subject fields.
        8-26
CSM4SMB-v3-AG.book Page 27 Monday, April 23, 2007 10:40 AM
                        Note: The actions delete entire message and quarantine are unavailable during manual or
                              scheduled scans.
                         3. Click Next.
                        Step 5: Set the notifications MSA sends when it takes an action
                         1. On the action page, select the check box for the notification that you want to send
                            to the infected recipient/sender.
                         2. Click Save.
                                                                                                              8-27
CSM4SMB-v3-AG.book Page 28 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        8-28
CSM4SMB-v3-AG.book Page 29 Monday, April 23, 2007 10:40 AM
                                                                                                            8-29
CSM4SMB-v3-AG.book Page 30 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        8-30
CSM4SMB-v3-AG.book Page 31 Monday, April 23, 2007 10:40 AM
                                                                    Also matches:
                                                                    "See young, hot, and sexy beauties"
                                                                    Matches:
                                                                    "This is a nude picture of sexy buff and bare
                                                                    naked"
                                                                                                                    8-31
CSM4SMB-v3-AG.book Page 32 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               Note: The operator has a dot immediately preceding and following. There is a space between
                     the final dot and the keyword.
                any keyword         MSA searches content that matches         Type the word and add it to
                                    the word                                  the keyword list
                OR                  MSA searches for any of the key-          Type ".OR." between all
                                    words separated by OR                     the words you want to
                                                                              include
                                    For example: apple OR orange. MSA
                                    searches for either apple or orange. If   For example:
                                    content contains either, then there is    "apple .OR. orange"
                                    a match.
                AND                 MSA searches for all of the keywords      Type ".AND." between all
                                    separated by AND                          the words you want to
                                                                              include
                                    For example: apple AND orange.
                                    MSA searches for both apple and           For example:
                                    orange. If content does not contain       "apple .AND. orange"
                                    both, then there is no match.
                NOT                 MSA excludes keywords following           Type ".NOT." before a word
                                    NOT from search.                          you want to exclude
        8-32
CSM4SMB-v3-AG.book Page 33 Monday, April 23, 2007 10:40 AM
                          WILD                WILD means wildcard. The wildcard        Type ".WILD." before the
                                              symbol replaces a missing part of the    parts of the word you want
                                              word. Any words that are spelled         to include
                                              using the remaining part of the wild-
                                              card are matched.
                                               For example, if you want to match all
                                               words containing "valu", type
                                               ".WILD.valu". The words Valu-
                                               mart, valucash, and valubucks all
                                               match.
                                               Note: MSA does not support using
                                               "?" in the wildcard command
                                               ".WILD.".
                                                                                                                    8-33
CSM4SMB-v3-AG.book Page 34 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               Note: Regular expressions are a powerful string matching tool. For this reason, Trend Micro
                     recommends that administrators who choose to use regular expressions be familiar
                     and comfortable with regular expression syntax. Poorly written regular expressions
                     can have a dramatic negative performance impact. Trend Micro’s recommendation is
                     to start with simple regular expressions that do not use complex syntax. When
                     introducing new rules, use the archive action and observe how MSA manages
                     messages using your rule. When you are confident that the rule has no unexpected
                     consequences, you can change your action.
        8-34
CSM4SMB-v3-AG.book Page 35 Monday, April 23, 2007 10:40 AM
                             • Size
                                Select an option from the Size drop list and type a number to indicate a size in
                                bytes. The maximum amount of digits for this field is 10. MSA cannot filter
                                messages that exceed 2GB.
                             Note: Client Server Messaging Security for SMB only supports filtering of header and
                                   subject content during real-time scans. It does not support filtering of header and
                                   subject content during manual and scheduled scans.
                         3. Click Next.
                        Step 3: Set the action MSA takes against content that matches the keyword
                         1. Select an action for MSA to take when it detects undesirable content during a
                            real-time scan. MSA can perform the following actions when it detects content
                            that matches the rule conditions:
                             • Quarantine — moves the message to the quarantine directory.
                             • Delete entire message — deletes the entire email message
                             • Archive — moves the message to the archive directory and delivers the
                               message to the original recipient
                             • Pass — delivers the message without triggering any action.
                         2. Select whether MSA notifies designated individuals when it takes action against
                            undesirable content.
                         3. Click Next.
                        Step 4: Set the notifications MSA sends when it takes an action
                         1. Click on the check boxes corresponding to the people MSA will notify.
                         2. Click ( ) to customize the notification for that recipient.
                         3. To set Advanced Notification:
                             • Click SNMP to send notification by SNMP. Click ( ) to customize the SNMP
                               message.
                                                                                                                 8-35
CSM4SMB-v3-AG.book Page 36 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
                   • Click Write to Windows event log to have MSA write the notification to a
                     Windows event log.
               4. Click Finish.
               Step 5: Save your configuration
               Click Save.
               To create a rule that monitors message content for a particular email account(s):
               Step 1: Select the type of content rule
               1. From the Content Filtering page, click Add.
               2. Select Monitor the message content of particular email account(s).
               3. Click Next.
               Step 2: Name your rule and enter the email account(s) you want to monitor
               1. Type a name for your rule in the space provided.
               2. Type the mailbox address for the email account that you want to monitor. You
                  can monitor an email account located in the From, To, and CC part of the header.
               3. Click Next.
               Step 3: Select the message part to filter and add keywords
               1. Click the message part that you want to filter for undesirable content. MSA can
                  filter email messages by Subject, Body, or Attachment. MSA can support
                  content filtering for Microsoft Office, PDF, and text files.
                   Note: Client Server Messaging Security for SMB only supports filtering of header and
                         subject content during real-time scans. It does not support filtering of header and
                         subject content during manual and scheduled scans.
        8-36
CSM4SMB-v3-AG.book Page 37 Monday, April 23, 2007 10:40 AM
                             By default, MSA searches for exact matches of the keywords that you add.
                         3. Click Match case-sensitive to have MSA disregard words that do not match the
                            keyword's case when filtering content.
                         4. Set up your list of synonyms.
                             • Click Match synonym to have MSA consider all the synonyms of the
                               keyword when filtering content.
                             • Click ( ) next to Match synonym to display the list of synonyms. When you
                               select a keyword, all of the keyword’s synonyms display in the Synonyms to
                               exclude list. Use the arrow keys to add and delete synonyms for each
                               corresponding keyword.
                         5. Click Next.
                                                                                                          8-37
CSM4SMB-v3-AG.book Page 38 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               Step 4: Set the action MSA takes against content that matches the keyword
               1. Select an action for MSA to take when it detects undesirable content. MSA can
                  perform the following actions when it detects content that matches the rule
                  conditions:
                   • Replace with text/file — replaces the filtered content with a text file.
                      You cannot replace text from the From, To, CC, or Subject fields.
                   • Quarantine — moves the message to the quarantine directory.
                   • Delete entire message — deletes the entire email message
                   • Archive — moves the message to the archive directory and delivers the
                     message to the original recipient
                   Note: The actions delete entire message and quarantine are unavailable during manual
                         or scheduled scans.
               2. Select whether MSA notifies designated individuals when it takes action against
                  undesirable content.
               3. Click Next.
               Step 5: Set the notifications MSA sends when it takes an action
               1. Click on the check boxes corresponding to the people MSA will notify.
               2. On the action page, select the check box for the notification that you want to send
                  to the infected recipient/sender.
               3. Click Save.
        8-38
CSM4SMB-v3-AG.book Page 39 Monday, April 23, 2007 10:40 AM
                                                                                                           8-39
CSM4SMB-v3-AG.book Page 40 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               Note: Do not confuse the quarantine folder with the end user’s spam folder. An administrator
                     sets up the quarantine folder after installing the Messaging Security Agent. The
                     quarantine folder is a file-based folder. The Messaging Security Agent creates the end
                     user’s spam folder during installation. The end user’s spam folder is located in the
                     Information Store for each user's mailbox. Whenever the Messaging Security Agent
                     does a quarantine action on an email message, it sends the message to the quarantine
                     folder. The end user’s spam folder only receives email messages resulting from an
                     anti-spam quarantine action.
        8-40
CSM4SMB-v3-AG.book Page 41 Monday, April 23, 2007 10:40 AM
                         3. Click Configure. The Antivirus screen opens for the Exchange Server.
                         4. Click Quarantine > Directory.
                         5. Type the directory path for the quarantine directory in the space provided.
                         6. Click Save.
                        WARNING! The quarantine folder contains email messages that have a high-risk of being
                                 infected. Be cautious when handling email messages from the quarantine folder
                                 so that you do not accidentally infect your computer.
                        Note: If you resend a quarantined message that was originally sent using Microsoft Outlook,
                              the recipient may receive multiple copies of the same message. This may occur
                              because VSAPI strips each message that it scans into several sections.
                                                                                                               8-41
CSM4SMB-v3-AG.book Page 42 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               Note: Client Server Messaging Security also provides administrators with an Approved
                     Senders and Blocked Senders list. The Messaging Security Agent applies the
                     administrator’s approved senders and blocked senders before considering the end user
                     list.
        8-42
CSM4SMB-v3-AG.book Page 43 Monday, April 23, 2007 10:40 AM
                                                                                                           8-43
CSM4SMB-v3-AG.book Page 44 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               How It Works
               Each Client Server Messaging Security module inserts messages into the program,
               and then records the action into log files upon execution. You can forward the logs to
               Trend Micro Technical Support staff to help them debug the actual program flow in
               your environment. All of the modules produce text files you that you can view with
               any text editor.
               You can use the debugger to generate logs on the following modules:
               • Messaging Security Agent Master Service
               • Messaging Security Agent Remote Configuration Server
        8-44
CSM4SMB-v3-AG.book Page 45 Monday, April 23, 2007 10:40 AM
                        Note: The Messaging Security Agent Debugger continues to collect debug data until you
                              clear all items you were debugging and click Save.
                                                                                                             8-45
CSM4SMB-v3-AG.book Page 46 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        8-46
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 9
                                                                                                         9-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        Current Status
              Displays the on-going status of your clients and network in response to a current
              worldwide virus outbreak. The status roughly corresponds to the outbreak lifecycle.
              Outbreak Defense first takes preventative measures such as informing you of the
              threat and taking action as prescribed in the Outbreak Prevention Policy (downloaded
              from TrendLabs). Next, your clients are protected from the threat when updated
              components are downloaded from the Trend Micro ActiveUpdate server and
              deployed. Finally, Damage Cleanup Services, using newly updated components,
              starts to clean infected and damaged files, and remove virus remnants.
        9-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
                   Threat Prevention
                        The Threat Prevention stage of the Current Status screen displays information about
                        recent threats, computers that have alerts enabled, and computers that are vulnerable
                        to the current threat.
                                                                                                          9-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
              Threat Information
              The Threat Information section displays information about viruses that are currently
              on the Internet and that could potentially affect your network and clients. Threat
              Information, using the Outbreak Prevention Policy, takes steps to protect your
              network and clients while TrendLabs develops a solution (SeeTrend Micro Outbreak
              Prevention Policy on page B-1).
              Threat Information
              This panel displays the name of the current outbreak threat. Learn more about this
              threat by clicking Help > Security Info to redirect your browser to the Trend Micro
              Web site.
              • Risk Level–the level of risk the threat poses to computers and networks based on
                the number and severity of virus and malware incident
        9-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
                        Vulnerable Computer(s)
                        The Vulnerable Computer(s) section displays a list of clients that have vulnerabilities
                        that make them susceptible to the threat displayed in the Threat Information section.
                   Threat Protection
                        The Threat Protection stage of the Current Status screen provides information about
                        the components that are affected by the threat, and the solution download and
                        deployment status.
                        FIGURE 9-3. Outbreak Defense Screen – Protection Stage
                                                                                                            9-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        Threat Cleanup
              The Threat Cleanup stage of the Current Status screen displays the status of the scan
              that takes place after the updated components have been deployed. The Threat
              Cleanup section also displays the status of computers after the scan, and lists whether
              the updates were successful in cleaning or removing threat remnants.
              FIGURE 9-4. Outbreak Defense Screen - Cleanup Stage
        9-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
                        Note: For a scan to automatically take place after the new components have been deployed,
                              it has to be enabled in the Outbreak Defense > Settings screen.
                   Potential Threat
                        The Potential Threat screen uses the information gathered from Vulnerability
                        Assessment and Damage Cleanup Services to display information about clients that,
                        because they are already infected or have vulnerabilities, are Potential Threats to the
                        security of your network. Vulnerability Assessment determines which clients have
                        vulnerabilities and Damage Cleanup Services determines which clients are still
                        infected and need to be cleaned in order to make them safe.
                        Vulnerable Computer(s)
                        The Vulnerable Computer(s) section displays a list of clients that have vulnerabilities
                        that make them susceptible to the most recent threat. Client Server Messaging
                        Security uses Vulnerability Assessment to determine which clients have
                        vulnerabilities. To learn more about Vulnerability Assessment see Vulnerability
                        Assessment on page B-3.
                        Computer(s) to Cleanup
                        The Computer(s) to Cleanup section displays information about infected computers.
                        Administrators can also perform a real-time cleanup of infected computers using
                        updated cleanup security components. The Cleanup service uses Trend Micro
                        Damage Cleanup Services. To learn more about how Damage Cleanup works, see
                        Trend Micro Damage Cleanup Services on page B-2.
                                                                                                               9-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        Settings
              Use the Settings screen to configure Outbreak Defense and Vulnerability
              Assessment options.
        Outbreak Defense
              Use Outbreak Defense to configure threat response settings, block or unblock ports,
              and schedule when and how often the Outbreak Prevention Policy is updated.
              Note: After you disable Outbreak Defense, Trend Micro recommends running Cleanup Now
                    to help rid your clients of Trojans and any running processes related to Trojans, or
                    other types of malicious code (see Computer(s) to Cleanup on page 9-7).
              Using Exception
              Use Exception to Add new ports to, and Edit or Remove existing ports from the list
              of ports to exclude from blocking.
Note: When adding a new exception, make sure that Enable this exception is checked.
        9-8
CSM4SMB-v3-AG.book Page 9 Monday, April 23, 2007 10:40 AM
                        Security Server checks for new Outbreak Prevention Policies every 30 minutes and
                        downloads new policies as required.
                        To set a Scheduled Policy Download source and time:
                         1. From the main menu, click Outbreak Defense > Settings. The Settings screen
                            appears. The Outbreak Defense tab is selected by default.
                         2. Click the plus (+) icon for the Scheduled Policy Download Settings section.
                         3. From the Scheduled Policy Download Settings section, set the following
                            options:
                             a. Frequency: The default time is every 30 minutes.
                             b. Source: Choose from where to download updates. The default is the Trend
                                Micro ActiveUpdate server:
                                  • Trend Micro ActiveUpdate server
                                  • Intranet location containing a copy of the current file
                                  • Other update source
                         4. Click Save.
                   Vulnerability Assessment
                        To set a time for Vulnerability Assessment:
                         1. Click Outbreak Defense > Settings to open the Settings screen.
                         2. Click the Vulnerability Assessment tab.
                         3. Select Enable Scheduled Vulnerability Prevention
                         4. For each client create a schedule using the following UI elements:
                             • Daily – Click to perform vulnerability assessment every day
                             • Weekly, every – Click to perform a vulnerability assessment once a week.
                               You must select a day from the list and a start time. The time selected is the
                               time that Client/Server Security will perform the scan.
                             • Monthly, on day – Click to perform a vulnerability assessment once a month.
                               You must select a date from the list and a start time.
                             Regardless of the selection, specify when to start vulnerability assessment in the
                             Start time lists.
                                                                                                            9-9
CSM4SMB-v3-AG.book Page 10 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        9-10
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 10
                                                                                                          10-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        10-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
                        • Attachment Blocking
                        To configure a Scheduled scan, click Scans > Scheduled Scan.
                                                                                                           10-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
                   b. To configure the anti-spyware scan settings, click the Anti-spyware link. The
                      manual anti-spyware scan settings page appears.
                   c. On the Target tab, select the type of anti-spyware scan to run. Available
                      options include:
                        • Full scan – Scans the entire disk and registry for spyware
                        • Quick scan – Examines common areas where spyware is typically
                          installed
                   d. On the Action tab, click an action to perform on any spyware that is detected.
                      Available options include:
                        • Clean – Remove the spyware from infected clients
                        • Pass – Only record the detected spyware in the spyware logs
                   e. Click Save to save your scan settings, and then Back to go back to the Scan
                      Now page.
               4. Click Scan Now to run a Manual Scan or click Save to save the Scheduled Scan
                  settings.
               To set a time for Scheduled scans:
               1. Click Scans > Scheduled Scan to open the Scheduled Scan screen.
               2. Click the Schedule tab. A table displaying a list of all scannable clients appears.
               3. For each client create a schedule using the following UI elements:
                   • Daily – Click to perform Scheduled Scan every day
                   • Weekly, every – Click to perform a Scheduled Scan once a week. You must
                     select a day from the list and a start time. The time selected is the time that
                     Client/Server Security will perform the scan.
                   • Monthly, on day – Click to perform a Scheduled Scan once a month. You
                     must select a date from the list and a start time.
                   Regardless of the selection, specify when to start scheduled scans in the Start
                   time lists.
               4. Click Save.
        10-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
                                                                                                           10-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               Tip: Trend Micro recommends that you do not schedule a scan to run at the same time as
                    you set for a scheduled update. This may cause the scheduled scan to stop
                    unexpectedly. Similarly, if you begin a manual scan when a scheduled scan is
                    running, the scheduled scan is interrupted. The scheduled scan aborts, but
                    runs again according to its schedule.
               Note: To disable Scheduled Scan, deselect all options for the specific desktop, server, or
                     Exchange server, and click Save.
               Note: When running manual or scheduled scan, you may see the message message from
                     "" [total 0 recipient(s)] on the real-time monitor page. These are mail
                     scan logs for Exchange System Mails.
               Tip: Trend Micro recommends that you set Client Server Messaging Security to run
                    scheduled scans at regular intervals for optimal protection of your desktops, servers,
                    or Exchange Information Store.
        10-6
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 11
                   Updating Components
                        This chapter explains how to use and configure Manual and Scheduled Updates.
                        The topics discussed in this chapter include:
                        • Choosing an Update Source on page 11-2
                        • Updating Components on page 11-2
                        • Updating the Trend Micro Security Server on page 11-4
                        • Manual and Scheduled Updates on page 11-4
                        • Setting the Update Source for the Trend Micro Security Server on page 11-6
                        • Default Update Times on page 11-7
                        • Using Update Agents on page 11-8
                        • Rolling Back Components on page 11-10
                                                                                                       11-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
                ActiveUpdate server >           The Trend Micro Security     Use this method if there are
                Trend Micro Security Server     Server receives updated      no sections of your network
                > clients.                      components from the          between the Trend Micro
                                                ActiveUpdate server (or      Security Server and clients
                                                other update source) and     you identify as
                                                deploys them directly to     ’low-bandwidth’.
                                                clients.
                ActiveUpdate server >           The Trend Micro Security     Use this method to balance
                Trend Micro Security Server     Server receives updated      the traffic load on your
                > Update Agents > clients       components from the          network if there are sections
                                                ActiveUpdate server          of your network between the
                                                (or other update source)     Trend Micro Security Server
                                                and deploys them             and clients you identify as
                                                directly to Update Agents,   ’low-bandwidth’.
                                                which deploy the
                                                components to clients.
                ActiveUpdate                    Update Agents receive        Use this method only if you
                server > Update                 updated components           are experiencing problems
                Agents > clients                directly from the            updating Update Agents
                                                ActiveUpdate server (or      from the Trend Micro
                                                other update source) and     Security Server or from
                                                deploy them to               other Update Agents.
                                                clients.                     Under most circumstances,
                                                                             Update Agents receive
                                                                             updates faster from the
                                                                             Trend Micro Security Server
                                                                             or from other Update Agents
                                                                             than from an external
                                                                             update source.
        Updating Components
               To ensure that your clients stay protected from the latest virus threats and other
               malicious code, you need to update the Client Server Messaging Security
               components regularly. To view details about the components that Client Server
        11-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
Updating Components
                        Messaging Security uses to protect your clients see Client Server Messaging Security
                        Updateable Components on page 2-5.
                        Configure the Trend Micro Security Server to download Client Server Messaging
                        Security components from the Trend Micro ActiveUpdate server. After the server
                        downloads any available updates, it automatically deploys these to the clients.
                        Client Server Messaging Security provides two methods for updating your
                        components:
                        • Update your components manually
                        • Update your components based on a schedule
                        For information on how to update your components, see To update the Trend Micro
                        Security Server components: on page 11-5.
                        For information on how to set a schedule for updates, see To set a schedule to check
                        for updated components: on page 11-6.
                        If you use a proxy server to connect to the Internet, make sure you properly configure
                        your proxy settings to download updates successfully. For information on how to
                        configure your proxy settings, see Internet Proxy Options on page 14-2.
Component Sub-component
                                                                                                            11-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Component Sub-component
        Manual Updates
               Trend Micro recommends updating the server manually immediately after deploying
               the Client/Server Security Agent and whenever there is a virus outbreak.
        Scheduled Updates
               Configure the Trend Micro Security Server to regularly check its update source and
               automatically download any available updates. Because clients normally get updates
               from the Trend Micro Security Server, using automatic scheduled update is an easy
        11-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
Updating Components
                        and effective way of ensuring that your protection against viruses is always current.
                        Because setting Scheduled updates is similar to setting Manual updates, both
                        procedures will be combined here. An additional section for setting an update time
                        will follow.
                        Note: As soon as the Trend Micro Security Server receives updated components, they are
                              automatically deployed to clients.
                                                                                                            11-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               Note: After the server downloads the updated components, it then automatically deploys
                     them to clients.
        11-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
Updating Components
                         2. From the Download updates from section, choose from where to download
                            updates:
                             • Trend Micro ActiveUpdate server
                             • An intranet location containing a copy of the current file
                             • An other update source.
                         3. Click Save.
                                                                                                          11-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               • To ensure that client computers stay up-to-date, CSA runs a scheduled update
                 every 8 hours.
               The Trend Micro recommended settings for component updates provide reasonable
               protection to small and medium-sized business. If necessary, you can run Manual
               updates or modify the Scheduled updates.
               Trend Micro updates the scan engine or program generally only during the release of
               a new Client Server Messaging Security version. However, Trend Micro releases
               pattern files every day to keep your client virus protection current.
               Note: Unless specified in the Alternative Update Source section, all Update Agents receive
                     their updates from the Trend Micro Security Server.
        11-8
CSM4SMB-v3-AG.book Page 9 Monday, April 23, 2007 10:40 AM
Updating Components
                             Note: If this option is selected, the Update Agents will download updates from the
                                   Trend Micro Security Server even if their IP address falls within one of the
                                   ranges specified in the Add an Alternative Update Source screen. In order for
                                   this option to work, Enable Alternative Update Sources must be selected.
                             Note: To specify a single Security Agent, enter the Security Agent’s IP address in both
                                   the IP from and IP to fields.
                             Note: Security Agents not specified will automatically receive their updates from the
                                   Trend Micro Security Server.
                                                                                                                11-9
CSM4SMB-v3-AG.book Page 10 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
              Note: You can roll back only the virus pattern file and scan engine. No other components
                    can be rolled back.
        11-10
CSM4SMB-v3-AG.book Page 11 Monday, April 23, 2007 10:40 AM
Updating Components
                                                                                                          11-11
CSM4SMB-v3-AG.book Page 12 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        11-12
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 12
                                                                                                       12-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Note: Use spreadsheet applications, such as Microsoft Excel, to view CSV log files.
               Client Server Messaging Security maintains logs under the following categories:
               • Management console event logs
               • Desktop/Server logs
               • Exchange server logs
        Desktop/Server Logs
               • Virus log
               • Spyware log
               • Update log
               • Network virus log
               • Outbreak Defense log
               • Event log
        12-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
                                                                                                                    12-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
                  Type (event or item that              Content (type of log to obtain content from)
                  generated the log entry)
               Client Server Messaging Security records log entries for many different events. Use
               log query to view the different logs.
               Note: An MSA sends its logs to the Security Server every five minutes (not as soon as the
                     logs are generated). This time interval between log generation and log sending helps
                     keep network traffic between the client and the server to a minimum.
        12-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
                         2. Under Time Range, select All dates or select Specified range and type a range
                            of dates.
                         3. Under Type, select from one of the following:
                                  • Management console events
                                  • Desktop/Server
                                  • Exchange Server
Note: The items displayed in the Content list will depend on the Type selected
                                                                                                              12-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        12-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
                   Scheduling Reports
                        This section describes how to create reports using the Scheduled report screen.
                        To schedule reports:
                         1. From the main menu, click Reports > Scheduled Reports, the Scheduled
                            Reports screen appears. From the Scheduled reports toolbar, click Add, the Add
                            screen appears.
                                                                                                          12-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        12-8
CSM4SMB-v3-AG.book Page 9 Monday, April 23, 2007 10:40 AM
                                                                                                             12-9
CSM4SMB-v3-AG.book Page 10 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
9. Click Save.
        Maintenance - Reports
             To conserve disk space on the server, specify the maximum number of reports to
             keep.
             To set the maximum number of reports to keep:
              1. On the main menu, click Reports > Maintenance. The Maintenance screen
                 appears.
                   FIGURE 12-4. Reports Maintenance Screen
              2. Select the Reports tab, the main body changes to display the Reports >
                 Maintenance screen.
              3. Under Maximum Reports to Keep, enter a number between 1 and 100 for each
                 type of report listed.
              4. Click Save.
        12-10
CSM4SMB-v3-AG.book Page 11 Monday, April 23, 2007 10:40 AM
                   Maintenance - Logs
                        To conserve disk space on the server, delete logs manually or schedule regular
                        deletion times.
                        To set up auto log deletion:
                         1. On the main menu, click Reports > Maintenance. The Maintenance screen
                            appears.
                         2. Select Auto Log Deletion. The Auto Log Deletions options appear.
                             FIGURE 12-5. Auto Log Deletion Screen
                                                                                                         12-11
CSM4SMB-v3-AG.book Page 12 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
              2. Select Manual Log Deletion. The Manual Log Deletion options appear.
                   FIGURE 12-6. Manual Log Deletion Screen
              3. Under the Delete Logs Older Than column, type a value for number of days
                 after which time Trend Micro Security Server will delete the specified log.
              4. Click Delete to delete the selected log immediately.
              5. Click Save to save the manual log deletion options.
        12-12
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 13
                                                                                                         13-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        Event Types
               Threat Events:
               • Outbreak Defense – An alert activated, or highly critical vulnerabilities detected
               • Antivirus – Viruses detected on clients, servers, or Exchange server exceeds a
                 certain number, actions taken against viruses are unsuccessful, Real-time scan
                 disabled on clients, servers, or Exchange server
               • Anti-spyware – Spyware detected on clients and servers, including those that
                 required the infected client to be restarted to completely remove the spyware
                 threat. You can also configure the spyware notification threshold, that is, the
                 number of spyware incidents detected within the specified time period (default is
                 one hour).
               • Anti-spam – Spam occurrences exceed a certain percentage of total email
                 messages
Note: The Anti-spam option is only available with Client Server Messaging Security.
        13-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
                             Note: The Anti-spam option will only appear if Client Server Messaging Security is
                                   installed.
                         2. To receive notification of any threat event occurrence, select the Type check box
                            under the Threat Events section.
                             To receive notification of specific threat event occurrences, select any of the
                             following:
                             • Outbreak Response
                             • Antivirus
                             • Anti-spyware
                             • Anti-spam
                             • Network Virus
                         3. To receive notification of any system event occurrences, select the Type check
                            box under the System Events section. The possible system events are:
                             • License expiration
                                                                                                               13-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
                   • Component update
                   • System unusual events
               4. Click Save.
        13-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
                                                                                                                  13-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        13-6
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 14
                                                                                    14-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               3. Select the Use a proxy server for updating components, product license
                  notifications, and World Virus Tracking check box.
               4. Type the address of the proxy server and its port number.
                   • If the proxy server uses version 4 or 5 of the SOCKS protocol to handle
                     Transmission Control Protocol (TCP), select the Use SOCKS 4/5 proxy
                     protocol check box.
        14-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
                         5. If the proxy server requires a password, type your user name and password in the
                            fields provided.
                         6. Click Save.
                                                                                                           14-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        Desktop/Server Options
               The Global Settings > Desktop/Server screen contains the following configurable
               items.
               • General Scan Settings on page 14-5
               • Virus Scan Settings on page 14-6
               • Spyware/Grayware Scan Settings on page 14-6
               • Alert Settings on page 14-7
               • Approved List for Network Virus Scanning on page 14-7
               • Watchdog Settings on page 14-7
               • Agent Uninstallation on page 14-7
               • Agent Unloading on page 14-8
               To set the Desktop/Server options:
               1. On the main menu, click Preferences > Global Settings. The Global Settings
                  screen appears.
               2. Select the Desktop/Server tab and the main frame changes to display global
                  desktop/server settings options.
        14-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
                        Note: By default, Client Server Messaging Security does not scan its own database. Trend
                              Micro recommends preserving this selection to prevent any possible corruption of the
                              database that may occur during scanning.
                                                                                                               14-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               Note: By default, Client Server Messaging Security does not scan its own database. Trend
                     Micro recommends preserving this selection to prevent any possible corruption of the
                     database that may occur during scanning.
               • Count cookie into spyware log – Select this check box to record each detected
                 spyware cookie to the spyware log
        14-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
                   Alert Settings
                        • Show the alert icon on the Windows taskbar if the virus pattern file is not
                          updated after { } days – Select this check box if you want to display the alert icon
                          on your clients when the pattern file is outdated and select a number from the list.
                   Watchdog Settings
                        • Enable the Client/Server Security Agent watchdog service – Select this check
                          box if you want to enable the CSA watchdog service.
                        • Check client status every {} minutes – Choose how often the watchdog service
                          should check client status.
                        • If the client cannot be started, retry {} times – Choose how many times the
                          watchdog service should attempt to restart the Client/Server Security Agent.
                        • Enable anti-hacking mode – Select this check box to enable anti-hacking mode.
                        Tip: Trend Micro recommends enabling the client watchdog service to help ensure that the
                              Client/Server Security Agent is protecting your client computers. If the Client/Server
                              Security Agent unexpectedly terminates, which could happen if the client is under
                              attack from a hacker, the watchdog service restarts the Client/Server Security Agent.
                        Agent Uninstallation
                        • Allow the client user to uninstall Client/Server Security Agent – Choose this
                          option if you want to allow client user to remove the CSA without supplying a
                          password.
                        • Require a password for the client user to uninstall Client/Server Security
                          Agent – Choose this option if you want to require the client user to supply a
                          password before uninstalling the CSA.
                                                                                                                  14-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               Agent Unloading
               • Allow the client user to unload Client/Server Security Agent – Choose this
                 option if you want to allow client user to unload the CSA without supplying a
                 password.
               • Require a password for the client user to unload the Client/Server Security
                 Agent – Choose this option if you want to require the client user to supply a
                 password before unloading the CSA.
        System Options
               The System section of the Global Settings screen contains the following configurable
               items.
               • Remove Inactive Client/Server Security Agents
               • Connection Verification
               • Quarantine Maintenance
               To set the System options:
               1. On the main menu, click Preferences > Global Settings. The Global Settings
                  screen appears.
               2. Select the System tab and the main frame changes to display global system
                  settings options.
        14-8
CSM4SMB-v3-AG.book Page 9 Monday, April 23, 2007 10:40 AM
                                                                                                            14-9
CSM4SMB-v3-AG.book Page 10 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
             be aware of the removal and it will display the CSA as inactive. If a user unloads or
             disables the client for an extended time, the Security Server also displays the CSA as
             inactive.
             To have the Security Groups Tree only display active clients, you can configure the
             Security Server to remove inactive CSAs from the Security Groups Tree
             automatically.
             To enable the automatic removal of inactive CSAs, configure the following options:
             • Enable automatic removal of inactive Client/Server Security Agent – Select
               this option to enable the automatic removal of clients that have not made contact
               with the Security server for a specific number of days.
             • Automatically remove a Client/Server Security Agent if inactive for {} days –
               Choose the number of days that a client is allowed to be inactive before it is
               removed from the Security Dashboard.
              Note: Verify Connection does not allow the selection of specific groups or clients. It verifies
                    the connection to all clients registered with the Trend Micro Security Server.
        14-10
CSM4SMB-v3-AG.book Page 11 Monday, April 23, 2007 10:40 AM
                        The default location of Trend Micro Security Server quarantine folder is as follows:
                        C:\Program Files\Trend Micros\Security Server\PCCSRV\Virus
                        Note: If the client is unable to send the encrypted file to the Trend Micro Security Server for
                              any reason, such as network connection problems, the encrypted file remains in the
                              client’s suspect folder. The client attempts to resend the file when it reconnects to the
                              Trend Micro Security Server.
                        For more information on configuring scan settings, or changing the location of the
                        quarantine folder, see Virus Scan Settings on page 14-6.
                        From the Global Settings screen, you can configure the capacity of the quarantine
                        folder and the maximum individual file size for every infected file that can be stored
                        in it.
                        To following options are available to help you manage the quarantine folder:
                        • Quarantine folder capacity – Type an amount in MB for the capacity of the
                          Quarantine folder.
                        • Maximum size for a single file – Type an amount for the size of single folder
                          stored in the Quarantine folder.
                        • Delete All Quarantined Files – Click this to delete all files in the Quarantine
                          folder instantly.
                                                                                                                  14-11
CSM4SMB-v3-AG.book Page 12 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        14-12
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 15
                                                                                                       15-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        Tool Types
               Client Server Messaging Security includes a set of tools that can help you easily
               accomplish various tasks, including server configuration and client management.
               These tools are classified into two categories:
               • Administrative tools – Developed to help configure the Trend Micro Security
                 Server and manage clients
               • Client tools – Developed to help enhance the performance of the Client/Server
                 Security Agent program
        Summary of Tools
               Refer to Table Note: for a complete list of tools included in this version of
               Client/Server Security
               Note:   Some tools available in previous versions of Client/Server Security are not
                       available in this version. If you require these tools, contact technical support.
                Login Script Setup: automate the installation   Client Packager (ClnPack.exe): create a
                of the Client/Server Security Agent program     self-extracting file containing the
                                                                Client/Server Security Agent program and
                                                                components
        15-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
                        Note:    You cannot run these tools from the Security Dashboard. For instructions on how
                                 to run the tools, see the relevant section below.
                   Administrative Tools
                        This section contains information about the following Client/Server Security
                        administrative tools:
                                                                                                                 15-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        Vulnerability Scanner
               Use Vulnerability Scanner to detect installed antivirus solutions and to search for
               unprotected computers on your network. To determine if computers are protected,
               Vulnerability Scanner pings ports that are normally used by antivirus solutions.
               Vulnerability Scanner can perform the following functions:
               • Perform a DHCP scan to monitor the network for DHCP requests so that when
                 computers first log on to the network, Vulnerability Scan can determine their status
               • Ping computers on your network to check their status and retrieve their computer
                 names, platform versions, and descriptions
               • Determine the antivirus solutions installed on the network. It can detect Trend
                 Micro products (including OfficeScan, ServerProtect for Windows NT and Linux,
                 ScanMail for Microsoft Exchange, InterScan Messaging Security Suite, and
                 PortalProtect) and third-party antivirus solutions (including Norton AntiVirus
                 Corporate Edition v7.5 and v7.6, and McAfee VirusScan ePolicy Orchestrator).
               • Display the server name and the version of the pattern file, scan engine and
                 program for OfficeScan and ServerProtect for Windows NT
               • Send scan results via email
               • Run in silent mode (command prompt mode)
               • Install the Client/Server Security Agent remotely on computers running Windows
                 Vista/2000/XP (Professional only)/Server 2003 (R2)
               You can also automate Vulnerability Scanner by creating scheduled tasks. For
               information on how to automate Vulnerability Scanner, see the TMVS online help.
               To run Vulnerability Scanner on a computer other than the server, copy the TMVS
               folder from the \PCCSRV\Admin\Utility folder of the server to the computer.
               Note: You cannot install the Client/Server Security Agent with Vulnerability Scanner if the
                     server component of Client/Server Security is present on the same machine.
                     Vulnerability Scanner does not install the Client/Server Security Agent on a machine
                     already running the server component of Client Server Security.
        15-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
                                                                                                              15-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               8. You can enable Vulnerability Scanner to ping computers on the network to get
                  their status. Under Ping Settings, specify how Vulnerability Scanner will send
                  packets to the computers and wait for replies. Accept the default settings or type
                  new values in the Packet size and Timeout text boxes.
               9. To remotely install the client component of Client/Server Security and send a log
                  to the server, type the server name and port number. If you want to remotely
                  install the client component of Client/Server Security automatically, select the
                  Auto-install Client/Server Security Client for unprotected computer check
                  box.
             10. Click Install Account to configure the account. The Account Information
                 screen appears.
             11. Type the user name and password and click OK.
             12. Click OK to save your settings. The Trend Micro Vulnerability Scanner
                 console appears.
               To run a manual vulnerability scan on a range of IP addresses:
               1. Under IP Range to Check, type the IP address range that you want to check for
                  installed antivirus solutions and unprotected computers. Note that the
                  Vulnerability Scanner only supports class B IP addresses.
               2. Click Start to begin checking the computers on your network. The results are
                  displayed in the Results table.
               To run Vulnerability Scanner on computers requesting IP addresses from a
               DHCP server:
               1. Click the DHCP Scan tab in the Results box. The DHCP Start button appears.
               2. Click DHCP Start. Vulnerability scanner begins listening for DHCP requests
                  and performing vulnerability checks on computers as they log on to the network.
               To create scheduled tasks:
               1. Under Scheduled Tasks, click Add/Edit. The Scheduled Task screen appears.
               2. Under Task Name, type a name for the task you are creating.
               3. Under IP Address Range, type the IP address range that you want to check for
                  installed antivirus solutions and unprotected computers.
               4. Under Task Schedule, click a frequency for the task you are creating. You can
                  set the task to run Daily, Weekly, or Monthly. If you click Weekly, you must
        15-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
                             select a day from the list. If you click Monthly, you must select a date from the
                             list.
                         5. In the Start time lists, type or select the time when the task will run. Use the
                            24-hour clock format.
                         6. Under Settings, click Use current settings if you want to use your existing
                            settings, or click Modify settings.
                             If you click Modify settings, click Settings to change the configuration. For
                             information on how to configure your settings, refer to Step 3 to Step 12 in To
                             configure Vulnerability Scanner: on page 15-4.
                         7. Click OK to save your settings. The task you have created appears under
                            Scheduled Tasks.
                       Other Settings
                        To configure the following settings you need to modify TMVS.ini:
                        • EchoNum – Set the number of computers that Vulnerability Scanner will
                          simultaneously ping.
                        • ThreadNumManual – Set the number of computers that Vulnerability Scanner
                          will simultaneously check for antivirus software.
                        • ThreadNumSchedule – Set the number of computers that Vulnerability Scanner
                          will simultaneously check for antivirus software when running scheduled tasks.
                        To modify these settings:
                         1. Open the TMVS folder and locate the TMVS.ini file.
                         2. Open TMVS.ini using Notepad or any text editor.
                         3. To set the number of computers that Vulnerability Scanner will simultaneously
                            ping, change the value for EchoNum. Specify a value between 1 and 64.
                             For example, type EchoNum=60 if you want Vulnerability Scanner to ping 60
                             computers at the same time.
                         4. To set the number of computers that Vulnerability Scanner will simultaneously
                            check for antivirus software, change the value for ThreadNumManual. Specify a
                            value between 8 and 64.
                                                                                                              15-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        Client Tools
               This section contains information about Client Server Messaging Security client
               tools.
        Client Packager
               Client Packager is a tool that can compress setup and update files into a
               self-extracting file to simplify delivery via email, CD-ROM, or similar media. It also
               includes an email function that can access your Microsoft Outlook address book and
               allow you to send the self-extracting file from within the tool’s console.
               To run Client Packager, double-click the file. Client/Server Security clients that are
               installed using Client Packager report to the server where the setup package was
               created.
        15-8
CSM4SMB-v3-AG.book Page 9 Monday, April 23, 2007 10:40 AM
                        Note: To prevent Client/Server Security from detecting the virus again when you use
                              Restore Encrypted Virus, exclude the folder to which you decrypt the file from
                              Real-time Scan.
WARNING! Decrypting an infected file may spread the virus to other files.
                        Note: Do not copy the VSEncrypt folder to the Client/Server Security folder. The
                              Vsapi32.dll file of Restore Encrypted Virus will conflict with the original
                              Vsapi32.dll.
                         3. Open a command prompt and go to the location where you copied the VSEncrypt
                            folder.
                                                                                                                15-9
CSM4SMB-v3-AG.book Page 10 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Note: You may not be able to encrypt or decrypt files that are locked.
        15-10
CSM4SMB-v3-AG.book Page 11 Monday, April 23, 2007 10:40 AM
                   Touch Tool
                        The Touch Tool synchronizes the time stamp of one file with the time stamp of
                        another file or with the system time of the computer. If you unsuccessfully attempt to
                        deploy a hot fix (an update or patch that Trend Micro releases) on the Trend Micro
                        Security Server, use the Touch Tool to change the time stamp of the hot fix. This
                        causes Client/Server Security to interpret the hot fix file as new, which makes the
                        server attempt to deploy the hot fix again automatically.
                        To run the Touch Tool:
                         1. On the Trend Micro Security Server, go to the following directory:
                                  \PCCSRV\Admin\Utility\Touch
                         2. Copy the TMTouch.exe file to the folder where the file you want to change is
                            located. If synchronizing the file time stamp with the time stamp of another file,
                            put both files in the same location with the Touch tool.
                         3. Open a command prompt and go to the location of the Touch Tool.
                         4. Type the following:
                                  TmTouch.exe <destination_filename> <source_filename>
                             where:
                                  <destination_filename> = the name of the file (the hot fix, for example) whose
                                  time stamp you want to change
                                  <source_filename> = the name of the file whose time stamp you want to replicate
                             If you do not specify a source filename, the tool sets the destination file time
                             stamp to the system time of the computer.
                        Note: You can use the wildcard character "*" in the destination file name field, but not the
                              source file name field.
                         5. To verify the time stamp changed, type dir in the command prompt or right
                            click the file in Windows explorer and select Properties.
                                                                                                                15-11
CSM4SMB-v3-AG.book Page 12 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        Client Mover
             If you have more than one Client Server Messaging Security server on the network,
             you can use Client Mover to transfer clients from one Client Server Messaging
             Security server to another.
             This is especially useful after adding a new Client Server Messaging Security server
             to the network when you want to transfer existing clients to the new server. The two
             Client Server Messaging Security servers must be of the same type and same
             language version.
             Client Mover requires the IPXfer.exe file.
             To run Client Mover:
              1. On the Client Server Messaging Security server, go to the following directory:
                 \PCCSRV\Admin\Utility\IPXfer.
              2. Copy the IPXfer.exe file to the client that you want to transfer.
              3. On the client, open a command prompt and then go to the folder where you
                 copied the file.
              4. Run Client Mover using the following syntax:
                        IPXfer.exe -s <server_name> -p <server_listening_port> -m 1
                        -c <client_listening_port>
                   where:
                   • <server_name> = the server name of the destination Client Server
                     Messaging Security server (the server to which the client will transfer)
                   • <server_listening_port> = the listening (trusted) port of the
                     destination Client Server Messaging Security server. To view the listening
                     port on the Security Dashboard, click Security Settings. The listening port is
                     shown next to the Security Server name.
                   • 1 = You must use the number "1" after "-m"
                   • <client_listening_port> = the port number of the client machine
             To confirm the client now reports to the other server, do the following:
              1. On the client, right click the CSA icon in the system tray.
              2. Click Client/Server Security Agent Console.
        15-12
CSM4SMB-v3-AG.book Page 13 Monday, April 23, 2007 10:40 AM
                                                                                                           15-13
CSM4SMB-v3-AG.book Page 14 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        15-14
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 16
                                                                                              16-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               Note: If you forget the Security Dashboard password, contact Trend Micro technical support
                     for instructions on how to gain access to the Dashboard again. The only other
                     alternative is to remove and reinstall Client Server Messaging Security.
        16-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
                                                                                                             16-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               2. Read the disclaimer and click Yes to participate in the World Virus Tracking
                  Program or click No to decline participation.
               3. Click Save.
                  To view the current Trend Micro virus map, click Virus Map or enter the
                  following address in your Web browser:
                        http://www.trendmicro.com/map
        16-4
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 17
                                                                                                     17-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        Viruses
               A computer virus is a segment of code that has the ability to replicate. Viruses
               usually replicate by infecting files. When a virus infects a file, it attaches a copy of
               itself to the file in such a way that when the former executes, the virus also runs.
               When this happens, the infected file also becomes capable of infecting other files.
               Like biological viruses, computer viruses can spread quickly and are often difficult to
               eradicate.
               In addition to replication, some computer viruses share another commonality: a
               damage routine that delivers the virus payload. While payloads may only display
               messages or images, they can also destroy files, reformat your hard drive, or cause
               other damage. Even if the virus does not contain a damage routine, it can cause
               trouble by consuming storage space and memory, and degrading the overall
               performance of your computer.
               Generally, there are three kinds of viruses:
               • File – File viruses may come in different types– there are DOS viruses, Windows
                 viruses, macro viruses, and script viruses. All of these share the same
                 characteristics of viruses except that they infect different types of host files or
                 programs.
               • Boot – Boot viruses infect the partition table of hard disks and boot sector of hard
                 disks and floppy disks.
        17-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
                        • Script – Script viruses are viruses written in script programming languages, such
                          as Visual Basic Script and JavaScript and are usually embedded in HTML
                          documents.
                          VBScript (Visual Basic Script) and Jscript (JavaScript) viruses activate themselves
                          using Microsoft's Windows Scripting Host. They then infect other files. Since
                          Windows Scripting Host is available on Windows 98, Windows 2000 and other
                          Windows operating systems, the viruses can be activated simply by
                          double-clicking a *.vbs or *.js file from Windows Explorer.
                           What is so special about script viruses? Unlike programming binary viruses, which
                           require assembly-type programming knowledge, virus authors programs script
                           viruses as text. A script virus can achieve functionality without low-level
                           programming and with code as compact as possible. It can also use predefined
                           objects in Windows to make accessing many parts of the infected system easier
                           (for example, for file infection, for mass-mailing). Furthermore, since the code is
                           text, it is easy for others to read and imitate the coding paradigm. Because of this,
                           many script viruses have several modified variants.
                           For example, shortly after the “I love you” virus appeared, antivirus vendors found
                           modified copies of the original code, which spread themselves with different
                           subject lines, or message bodies.
                        Whatever their type is, the basic mechanism remains the same. A virus contains code
                        that explicitly copies itself. In the case of file viruses, this usually entails making
                        modifications to gain control when a user accidentally executes the infected program.
                        After the virus code has finished execution, in most cases, it passes back the control
                        to the original host program to give the user an impression that nothing is wrong with
                        the infected file.
                        Take note that there are also cross-platform viruses. These types of viruses can infect
                        files belonging to different platforms (for example, Windows and Linux). However,
                        such viruses are very rare and seldom achieve 100% functionality.
                       Network Viruses
                        A virus spreading over a network is not, strictly speaking, a network virus. Only
                        some of the threats mentioned above, such as worms, qualify as network viruses.
                        Specifically, network viruses use network protocols, such as TCP, FTP, UDP, HTTP,
                        and email protocols to replicate. They often do not alter system files or modify the
                        boot sectors of hard disks. Instead, network viruses infect the memory of client
                                                                                                            17-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               machines, forcing them to flood the network with traffic, which can cause
               slowdowns and even complete network failure. Because network viruses remain in
               memory, they are often undetectable by conventional disk-based file I/O scanning
               methods.
               Personal Firewall works with a network virus pattern file to identify and block
               network viruses (see the on-line help for more information about configuring the
               Personal Firewall).
        Trojans
               A Trojan is a malicious program that masquerades as a harmless application. Unlike
               viruses, Trojans do not replicate but can be just as destructive. An application that
               claims to rid your computer of viruses when it actually introduces viruses onto your
               computer is an example of a Trojan. Traditional antivirus solutions can detect and
               remove viruses but not Trojans, especially those that are already running on the
               system.
        Bots
               Bots are compressed executable files that are designed with the intent to cause harm
               to computer systems and networks. Bots, once executed, can replicate, compress, and
               distribute copies of themselves.
        Packers
               A packer is a compressed and/or encrypted Windows or Linux executable program,
               often a Trojan. Compressing executables makes them more difficult for Antivirus
               products to detect.
        Worms
               A computer worm is a self-contained program (or set of programs) that is able to
               spread functional copies of itself or its segments to other computer systems. The
               propagation usually takes place via network connections or email attachments.
               Unlike viruses, worms do not need to attach themselves to host programs. Worms
               often use email and applications, such as Microsoft™ Outlook™, to propagate. They
        17-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
                        may also drop copies of themselves into shared folders or utilize file-sharing systems,
                        such as Kazaa, under the assumption that users will likely download them, thus
                        letting the worm propagate. In some cases, worms replicate themselves using chat
                        applications such as ICQ, AIM, mIRC, or other Peer-to-Peer (P2P) programs.
                   About ActiveX
                        ActiveX is a technology from Microsoft that handles interaction between Web
                        browsers, Microsoft applications, other third party applications, and the computer
                        operating system. ActiveX makes use of ActiveX controls– software components
                        installed on computers that add specialized functionality to Web pages, such as
                        animation and interactive programs.
                        Creators of spyware and other grayware often mask their applications as legitimate
                        ActiveX controls. When your users view Web sites that require ActiveX
                        functionality, they may knowingly or unknowingly download the ActiveX controls to
                        their computers and unwittingly install grayware applications.
                        Two related ways to help guard against spyware and other grayware that are masked
                        as ActiveX controls are as follows:
                        • Setting client Web browser security to prompt the user before installing ActiveX
                           applications
                        • Educating your users to look out for applications that could be grayware when they
                           download any files, controls, or applications to their browsers
                                                                                                           17-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               mass-mailing behavior takes precedence over all other actions. The default action
               against mass-mailing attacks is delete.
               For example, you configure the Messaging Security Agent to quarantine messages
               when it detects a worm or a Trojan in an email message. You also enable
               mass-mailing behavior and set the Messaging Security Agent to delete all messages
               that demonstrate mass-mailing behavior. The Messaging Security Agent receives a
               message containing a worm such as a variant of MyDoom. This worm uses its own
               SMTP engine to send itself to email addresses that it collects from the infected
               computer. When the Messaging Security Agent detects the MyDoom worm and
               recognizes its mass-mailing behavior, it will delete the email message containing the
               worm - as opposed to the quarantine action for worms that do not show mass-mailing
               behavior.
        17-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
                             Note: When the Messaging Security Agent does not support the compression type,
                                   then it cannot detect viruses in compression layers beyond the first compression
                                   layer.
                        When the Messaging Security Agent encounters a compressed file it does the
                        following:
                         1. The Messaging Security Agent extracts the compressed files and scans them.
                             The Messaging Security Agent begins by extracting the first compression layer.
                             After extracting the first layer, the Messaging Security Agent proceeds to the
                             second layer and so on until it has scanned all of the compression layers that the
                             user configured it to scan up to a maximum of six.
                         2. The Messaging Security Agent performs a user-configured action on infected
                            files.
                             The Messaging Security Agent performs the same action against infected files
                             detected in compressed formats as for other infected files. For example, if you
                             configure the action for infected files to be quarantine, then the Messaging
                             Security Agent quarantines messages in which it detects infected files.
                             The Messaging Security Agent can clean files from two types of compression
                             routines: PKZIP and LHA. However, the Messaging Security Agent can only
                             clean the first layer of files compressed using these compression routines.
                                                                                                               17-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        17-8
CSM4SMB-v3-AG.book Page 9 Monday, April 23, 2007 10:40 AM
                        • Disallow the use of peer-to-peer file-sharing services. Spyware and other grayware
                          applications may be masked as other types of files your users may want to
                          download, such as MP3 music files.
                        • Periodically examine the installed software on your client computers and look for
                          applications that may be spyware or other grayware. If you find an application or
                          file that Client Server Messaging Security cannot detect as grayware but you think
                          is a type of grayware, send it to Trend Micro:
                          http://subwiz.trendmicro.com/SubWiz.
                          Trend Labs will analyze the files and applications you submit.
                          If you prefer to communicate via email, send a message to the following address:
                                  virusresponse@trendmicro.com
                                                                                                         17-9
CSM4SMB-v3-AG.book Page 10 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        17-10
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Chapter 18
                                                                                                      18-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        Registration
               I have several questions on registering Client Server Messaging Security. Where can
               I find the answers?
               See the following Web site for frequently asked questions about registration:
        http://esupport.trendmicro.com/support/viewxml.do?ContentID=en-116326
               Can the Trend Micro Security Server be installed remotely using Citrix or Windows
               Terminal Services?
               Yes. The Trend Micro Security Server can be installed remotely with Citrix or
               Windows Terminal Services.
        18-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
                   Configuring Settings
                        I have several questions on configuring Client Server Messaging Security settings.
                        Where can I find the answers?
                        You can download all Client Server Messaging Security documentation from the
                        following site:
                        http://www.trendmicro.com/download/
                   Documentation
                        What documentation is available with this version of Client Server Messaging
                        Security?
                        This version of Client Server Messaging Security includes the following:
                        Administrator's Guide, Getting Started Guide, readme file, and help files for the
                        Security Dashboard, Master Installer, and Client/Server Security Agent.
                        I have questions/issues with the documentation. How can I provide feedback to Trend
                        Micro?
                        Trend Micro is always seeking to improve its documentation. If you have questions,
                        comments, or suggestions about this or any Trend Micro documents, please contact
                        us at docs@trendmicro.com. Your feedback is always welcome. Please evaluate this
                        documentation on the following site:
                                                                                                            18-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
www.trendmicro.com/download/documentation/rating.asp
        Troubleshooting
               This section helps you troubleshoot issues that may arise during installation, upgrade,
               migration, and deployment.
        18-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
                   Settings Replication
                        You can only replicate settings from a source Messaging Security Agent to a target
                        Messaging Security Agent that share the same domain. Messaging Security Agent is
                        unable to replicate settings when the source Messaging Security Agent is located in
                        the parent domain, and the target Messaging Security Agent(s) is located in the child
                        domain (or vice versa), because it lacks the required permission.
                        To solve this problem, perform the following:
                        For Windows 2003 operating system:
                         1. Execute regedit.
                         2. Go to
                                  HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\
                                  SecurePipeServers\winreg
                         3. Click winreg
                         4. Select winreg > Security > Permissions
                         5. Add Smex Admin Group of target domain, and enable Allow Read
                         6. Go to
                                                                                                          18-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               2. Manually back up the following files and folders from the folder:Program
                   Files\Trend Micro\Security Server\PCCSRV
                   • ofcScan.ini – Contains global client settings
                   • ous.ini – Contains the update source table for antivirus component
                     deployment
                   • Private folder – Contains firewall and update source settings
                   • Web\tmOPP folder – Contains Outbreak Defense settings
                   • Pccnt\Common\OfcPfw.dat – Contains firewall settings
        18-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
                             Note: If you change the Security Server installation path, you will have to update the
                                   path info in the backup files ofcscan.ini and \private/ofcserver.ini
                         7. With the backups you created, overwrite the Client Server Messaging Security
                            database and the relevant files and folders on the target machine in the PCCSRV
                            folder.
                         8. Restart the Trend Micro Security Server Master Service.
                                                                                                              18-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
            Browser Cache
               If you upgraded from a previous version of CSM, Web browser and proxy server
               cache files may prevent the Security Dashboard from loading properly. Clear the
               cache memory on your browser and on any proxy servers located between the Trend
               Micro Security Server and the computer you use to access the Security Dashboard.
            SSL Certificate
               Also, verify that your Web server is functioning properly. If you are using SSL,
               verify that the SSL certificate is still valid. See your Web server documentation for
               details.
        18-8
CSM4SMB-v3-AG.book Page 9 Monday, April 23, 2007 10:40 AM
                        However, the console may open without any problems when using the following
                        address:
                        http://<server name>/SMB/console/html/cgi/cgichkmasterpwd.exe
                        To resolve this issue, check the execute permissions of the SMB virtual directory.
                        Do the following:
                         1. Open the Internet Information Services (IIS) manager.
                         2. In the SMB virtual directory, select Properties.
                         3. Select the Virtual Directory tab and change the execute permissions to Scripts
                            instead of none.
                        Also change the execute permissions of the client install virtual directory.
                                                                                                            18-9
CSM4SMB-v3-AG.book Page 10 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        18-10
CSM4SMB-v3-AG.book Page 11 Monday, April 23, 2007 10:40 AM
                       Client Migration
                        The setup program for the Client/Server Security Agent utilizes the third-party
                        software’s uninstallation program to automatically remove it from your users’ system
                        and replace it with the Client/Server Security Agent. If automatic uninstallation is
                        unsuccessful, users get the following message:
                                  Uninstallation failed.
                                                                                                            18-11
CSM4SMB-v3-AG.book Page 12 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Note: Some product uninstallation keys are in the Product Key folder.
        18-12
CSM4SMB-v3-AG.book Page 13 Monday, April 23, 2007 10:40 AM
                        WARNING! This procedure may cause undesirable effects to your computer if performed
                                 incorrectly. Trend Micro highly recommends backing up your system first.
                                                                                                          18-13
CSM4SMB-v3-AG.book Page 14 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        Known Issues
             Known issues are features in Client Server Messaging Security software that may
             temporarily require a workaround. Known issues are typically documented in the
             Readme document you received with your product. Readmes for Trend Micro
             products can also be found in the Trend Micro Update Center:
             http://www.trendmicro.com/download/
             Trend Micro recommends that you always check the Readme text for information on
             known issues that could affect installation or performance, as well as a description of
             what is new in a particular release, system requirements, and other tips.
        18-14
CSM4SMB-v3-AG.book Page 15 Monday, April 23, 2007 10:40 AM
                        purchase only. After the first year, Maintenance must be renewed on an annual basis
                        at Trend Micro’s then-current Maintenance fees.
                        You can contact Trend Micro via fax, phone, and email, or visit us at:
                        http://www.trendmicro.com
                        If you cannot find an answer to a particular question, the Knowledge Base includes
                        an additional service that allows you to submit your question via an email message.
                        Response time is typically 24 hours or less.
                                                                                                         18-15
CSM4SMB-v3-AG.book Page 16 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Click the link under the type of submission you want to make.
              Note: Submissions made via the submission wizard/virus doctor are addressed promptly and
                    are not subject to the policies and restrictions set forth as part of the Trend Micro
                    Virus Response Service Level Agreement.
             When you submit your case, an acknowledgement screen displays. This screen also
             displays a case number. Make note of the case number for tracking purposes.
             If you prefer to communicate by email message, send a query to the following
             address:
             virusresponse@trendmicro.com
             In the United States, you can also call the following toll-free telephone number:
             (877) TRENDAV, or 877-873-6328
        About TrendLabs
             TrendLabs is Trend Micro’s global infrastructure of antivirus research and product
             support centers that provide up-to-the minute security information to Trend Micro
             customers.
             The “virus doctors” at TrendLabs monitor potential security risks around the world,
             to ensure that Trend Micro products remain secure against emerging threats. The
             daily culmination of these efforts are shared with customers through frequent virus
             pattern file updates and scan engine refinements.
             TrendLabs is staffed by a team of several hundred engineers and certified support
             personnel that provide a wide range of product and technical support services.
             Dedicated service centers and rapid-response teams are located in Tokyo, Manila,
        18-16
CSM4SMB-v3-AG.book Page 17 Monday, April 23, 2007 10:40 AM
                        Taipei, Munich, Paris, and Lake Forest, CA, to mitigate virus outbreaks and provide
                        urgent support.
                        TrendLabs’ modern headquarters, in a major Metro Manila IT park, has earned ISO
                        9002 certification for its quality management procedures in 2000—one of the first
                        antivirus research and support facilities to be so accredited. We believe TrendLabs is
                        the leading service and support team in the antivirus industry.
                                                                                                          18-17
CSM4SMB-v3-AG.book Page 18 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        18-18
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Appendix A
                   System Checklists
                        Use the checklists in this appendix to record relevant system information as a
                        reference.
IP address 10.1.104.255
                                                                                                            A-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
IP address 10.1.104.225
IP address 10.1.174.225
IP address 10.1.123.225
IP address 10.1.194.225
        A- 2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
                   Ports Checklist
                        Client Server Messaging Security uses the following ports.
                        TABLE A-2. Port Checklist
SMTP 25
                                                                                                  A-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        A- 4
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Appendix B
                                                                                                            B-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        B- 2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
                   Vulnerability Assessment
                        Vulnerability Assessment provides system administrators or other network security
                        personnel with the ability to assess security risks to their networks. The information
                        they generate by using Vulnerability Assessment gives them a clear guide as to how
                        to resolve known vulnerabilities and secure their networks.
                        Use Vulnerability Assessment to:
                        • Configure tasks that scan any or all computers attached to a network. Scans can
                          search for single vulnerabilities or a list of all known vulnerabilities.
                        • Run manual assessment tasks or set tasks to run according to a schedule.
                        • Request blocking for computers that present an unacceptable level of risk to
                          network security.
                        • Create reports that identify vulnerabilities according to individual computers and
                          describe the security risks those computers present to the overall network. The
                          reports identify the vulnerability according to standard naming conventions so that
                          security personnel can do further research to resolve the vulnerabilities and secure
                          the network.
                        • View assessment histories and compare reports to better understand the
                          vulnerabilities and the changing risk factors to network security.
                                                                                                            B-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               • Shorter scanning period – Because IntelliScan uses true file type identification, it
                 only scans files that are vulnerable to infection. The scan time is therefore
                 significantly shorter than when you scan all files.
        B- 4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
Tip: For the highest level of security, Trend Micro recommends scanning all files.
                   About ActiveAction
                        Different types of viruses require different scan actions. Customizing scan actions for
                        different types of viruses can be a tedious task. For this reason, Trend Micro created
                        ActiveAction.
                        ActiveAction is a set of pre-configured scan actions for viruses and other types of
                        threats. The recommended action for viruses is Clean, and the alternative action is
                        Quarantine. The recommended action for Trojans and joke programs is Quarantine.
                        If you are not familiar with scan actions or if you are not sure which scan action is
                        suitable for a certain type of virus, Trend Micro recommends using ActiveAction.
                        Using ActiveAction brings you the following benefits:
                                                                                                                  B-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        B- 6
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Appendix C
                        Tip: Although this phase is optional, Trend Micro highly recommends conducting a pilot
                             deployment before doing a full-scale deployment.
                                                                                                                 C-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
               This process should take into account company information security policies, as well
               as technical specifics.
        C- 2
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Appendix D
                          SMLN eManager NT
                          (ScanMail for Lotus Notes)        HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro
                                                            \ScanMail for Lotus Notes\CurrentVersion
                                                            AppDir=
                                                            DataDir=
                                                            IniDir=
                                                                                                             D-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        D- 2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
                                                            HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro
                                                            \ScanMail for Exchange\RealTimeScan\ScanOption
                                                            BackupDir=
                                                            MoveToQuarantineDir=
                                                            HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro
                                                            \ScanMail for
                                                            Exchange\RealTimeScan\ScanOption\Advance
                                                            QuarantineFolder=
                                                            HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro
                                                            \ScanMail for
                                                            Exchange\RealTimeScan\IMCScan\ScanOption
                                                            BackupDir=
                                                            MoveToQuarantineDir=
                                                            HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro
                                                            \ScanMail for
                                                            Exchange\RealTimeScan\IMCScan\ScanOption\Ad
                                                            vance
                                                            QuarantineFolder=
                                                            HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro
                                                            \ScanMail for Exchange\ManualScan\ScanOption
                                                            BackupDir=
                                                            MoveToQuarantineDir=
                                                                                                             D-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        D- 4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
                        ExcludeExchangeStoreFolders=C:\Program
                        Files\Exchsrvr\mdbdata\|C:\Program Files\Exchsrvr\Mailroot\vsi
                        1\Queue\|C:\Program Files\Exchsrvr\Mailroot\vsi
                        1\PickUp\|C:\Program Files\Exchsrvr\Mailroot\vsi 1\BadMail\|M:\
                        For other MS recommended folders, please add them to scan exclusion list manually.
                        For more information, please see http://support.microsoft.com/kb/245822/.
                                                                                                       D-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        D- 6
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Appendix E
                                                                                                              E-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        Roaming Clients
              Roaming clients are computers with the Client/Server Security Agent installation that
              do not always maintain a constant network connection with the Trend Micro Security
              Server (for example, notebook computers). These clients continue to provide
              antivirus protection, but have delays in sending their status to the server.
              Assign roaming privileges to clients that are disconnected from the Trend Micro
              Security Server for an extended period.
              Roaming clients get updated only on these occasions:
              • When the client performs Update Now or performs a Scheduled Update.
              • When client connects to the Trend Micro Security Server.
              For more information on how to update clients, see the Trend Micro Security Server
              online help.
        E-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
                        The status of a roaming client is indicated by icons that appear in its system tray. See
                        for a list of icons that appear on roaming clients.
                        TABLE E-2. Icons That Appear on a Roaming Client
                                                                                              Vista      Vista
                                                                  32-bit       64-bit
                                        Feature                   clients      clients       32-bit     64-bit
                                                                                             clients    clients
Roaming mode
                                                                                                                  E-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Anti-spyware
Note: Client/Server Security Agent does not support the Itanium 2 Architecture (IA-64).
        E-4
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Appendix F
Appendix F
                   Spyware Types
                        The Trend Micro anti-spam engine can detect 21 types of spyware. The following
                        table identifies these spyware types and provides a threat description for each type.
                        These spyware types may appear in the Spyware/Grayware Type column on the
                        Spyware/Grayware Log Details page.
                                                                                                                          F-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
          Cookie                 Cookies are small files that are created by your Web browser when you visit
                                 sites on the Internet. Typically, they are used as a convenience to
                                 remember frequently used information that is required for access to a
                                 particular Web site. They can also be used to track your visits to certain
                                 Web sites and can provide companies with information about frequency of
                                 visits and other profile information. The user is usually not aware that their
                                 surfing habits are being tracked.
                                 Trend Micro Anti-Spyware identifies cookies that are created by the most
                                 common advertising companies and allows you to clean them, which helps
                                 to ensure your privacy while surfing.
          Dialer                 A program that usually configures some sort of dial up configuration such as
                                 a dial-up-networking connection in Windows. The user either knowingly or
                                 unknowingly will end up using the dialer that calls a time-charged number
                                 that is usually billed to your credit card.
          Browser Hijacker       A type of software that changes settings in your Web browser. This often
                                 includes changing your browser's default home page.
          Parasite               A type of software that piggybacks onto other software. This type of
                                 software may be installed without the user's knowledge or consent.
          Browser Helper         A type of module that acts as a plugin to Internet Explorer browser. Some
          Object                 BHOs may monitor or manipulate your Web surfing.
          Layered Service        A type of module that acts as a plugin to your Network System. LSPs
          Provider               usually have low level access to your network and Internet data.
          URL Shortcut           A shortcut to a URL that exists in your Internet Browser or your desktop.
Peer To Peer Software that allows users to exchange shared files over the Internet.
Downloader Software that manages the download of other software onto computers.
        F-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
                    Security               A medium/high risk security weakness that exists on your computer that
                    Weakness               could be used to compromise your systems security.
                                                                                                                         F-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        F-4
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
Appendix G
Appendix G
                   Glossary of Terms
                        The following is a list of terms in this document:
Term Description
                    ActiveX                A type of virus that resides in Web pages that execute ActiveX controls.
                    malicious code
                                                                                                                      G-1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Term Description
          boot sector            A sector is a designated portion of a disk (the physical device on which data
          viruses                is written and read). The boot sector contains the data used by your
                                 computer to load and initialize the computer's operating system. A boot
                                 sector virus infects the boot sector of a partition or a disk.
          bots                   Bots are compressed executable files that are designed with the intent to
                                 cause harm to computer systems and networks. Bots, once executed, can
                                 replicate, compress, and distribute copies of themselves.
          client computers       The Client computers are all the desktops, laptops, and servers where the
                                 CSAs are installed. Exchange servers protected by Messaging Security
                                 Agents are also considered to be Client computers. CSAs perform Antivirus
                                 scanning and Firewall configurations on Client desktops and servers.
                                 Messaging Security Agents perform Antivirus scanning, Anti-spam filtering,
                                 email Content Filtering, and Attachment Blocking on Exchange servers.
          compressed file        A single file containing one or more separate files plus information to allow
                                 them to be extracted by a suitable program, such as WinZip.
          COM and EXE file       A type of virus that masquerades as an application by using a .exe or .com
          infectors              file extension.
          configuration          Selecting options for how your Trend Micro product will function, for
                                 example, selecting whether to quarantine or delete a virus-infected email
                                 message.
          Content Filtering      Scanning email messages for content (words or phrases) prohibited by your
                                 organization's Human Resources or IT messaging policies, such as hate
                                 mail, profanity, or pornography.
          content violation      An event that has triggered the content filtering policy.
          default                A value that pre-populates a field in the Security Dashboard. A default value
                                 represents a logical choice and is provided for convenience. Use default
                                 values as pre-set by Trend Micro or customize them as required.
        G-2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
Term Description
                    domain name            The full name of a system, consisting of its local host name and its domain
                                           name, for example, tellsitall.com. A domain name should be sufficient to
                                           determine a unique Internet address for any host on the Internet. This
                                           process, called “name resolution”, uses the Domain Name System (DNS).
                    encryption             Encryption is the process of changing data into a form that can be read only
                                           by the intended receiver. To decipher the message, the receiver of the
                                           encrypted data must have the proper decryption key. Lacing decryption
                                           codes, CSAs cannot scan encrypted files.
                    End User License       An End User License Agreement or EULA is a legal contract between a
                    Agreement              software publisher and the software user. It typically outlines restrictions on
                    (EULA)                 the side of the user, who can refuse to enter into the agreement by not
                                           clicking “I accept” during installation. Clicking “I do not accept” will, of
                                           course, end the installation of the software product.
                    false positives        A false positive occurs when a Web site, URL, “infected” file, or email
                                           message is incorrectly determined by filtering software to be of an
                                           unwanted type. For example, a legitimate email between colleagues may
                                           be detected as spam if a job-seeking filter does not distinguish between
                                           resume (to start again) and résumé (a summary of work experience).
                    file name              The portion of a file name (such as .dll or .xml) which indicates the kind of
                    extension              data stored in the file. Apart from informing the user what type of content the
                                           file holds, file name extensions are typically used to decide which program
                                           to launch when a file is run.
                    File Transfer          FTP is a standard protocol used for transporting files from a server to a
                    Protocol (FTP)         client over the Internet. Refer to Network Working Group RFC 959 for more
                                           information.
                    file type              The kind of data stored in a file. Most operating systems use the file name
                                           extension to determine the file type. The file type is used to choose an
                                           appropriate icon to represent the file in a user interface, and the correct
                                           application with which to view, edit, run, or print the file.
                                                                                                                        G-3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Term Description
          firewall               Firewalls create a barrier between the Internet and your local network to
                                 protect the local network from hacker attacks and network viruses.
                                 Firewalls examine data packet to determine if they are infected with a
                                 network virus.
          FQDN (fully            A fully qualified domain name (FQDN) consists of a host and domain name,
          qualified domain       including top-level domain. For example, www.trendmicro.com is a fully
          name)                  qualified domain name: www is the host, trendmicro is the second-level
                                 domain, and .com is the top-level domain.
          FTP (file transfer     FTP is a standard protocol used for transporting files from a server to a
          protocol)              client over the Internet.
          grayware               Files and programs, other than viruses, that can negatively affect the
                                 performance of the computers on your network. These include spyware,
                                 adware, dialers, joke programs, hacking tools, remote access tools,
                                 password cracking applications, and others. The OfficeScan scan engine
                                 scans for grayware as well as viruses.
          hot fixes and          Workaround solutions to customer related problems or newly discovered
          patches                security vulnerabilities that you can download from the Trend Micro Web
                                 site and deploy to the OfficeScan server and/or client program.
          Hyper Text             HTTP is a standard protocol used for transporting Web pages (including
          Transfer               graphics and multimedia content) from a server to a client over the Internet.
          Protocol (HTTP)
          Intrusion              Intrusion Detection Systems are commonly part of firewalls. An IDS can
          Detection System       help identify patterns in network packets that may indicate an attack on the
          (IDS)                  client.
          keywords               The Messaging Security Agent can filter incoming email messages for
                                 keywords that you set up using Content Filtering rules. When keywords are
                                 detected the Messaging Security Agent can take action to prevent the
                                 delivery of messages containing these keywords. Note that keywords are
                                 not strictly words, but can be numbers, typographical characters, or short
                                 phrases.
          local                  The term “local” refers to a computer on which you are directly installing or
                                 running software, as opposed to a “remote” computer which is physically
                                 distant and/or connected to your computer through a network.
        G-4
CSM4SMB-v3-AG.book Page 5 Monday, April 23, 2007 10:40 AM
Term Description
                    macro viruses          A type of virus encoded in an application macro and often included in a
                                           document.
                    Network virus          Viruses that use network protocols, such as TCP, FTP, UDP, HTTP, and
                                           email protocols to replicate. They often do not alter system files or modify
                                           the boot sectors of hard disks. Instead, network viruses infect the memory
                                           of computers, forcing them to flood the network with traffic, which can
                                           cause slowdowns and even complete network failure.
                    Notifications          The Security Server can send your system administrator a notification
                                           whenever significant abnormal events occur on your Client computers. For
                                           example: You can set up a condition that whenever the CSA detects 40
                                           viruses within one hour, the Security Server will send a notification to the
                                           system administrator.
                    Outbreak               During Outbreak Defense, the Security Server enacts the instructions
                    Defense                contained in the Outbreak Prevention Policy. The Trend Micro Outbreak
                                           Prevention Policy is a set of recommended default security configurations
                                           and settings designed by TrendLabs to give optimal protection to your
                                           computers and network during outbreak conditions. The Security Server
                                           downloads the Outbreak Prevention Policy from Trend Micro ActiveUpdate
                                           server every 30 minutes or whenever the Security Server starts up.
                                           Outbreak Defense enacts preemptive measures such as blocking shared
                                           folders, blocking ports, updating components, and running scans.
                    phishing incident      A Phish is an email message that falsely claims to be from an established or
                                           legitimate enterprise. The message encourages recipients to click on a link
                                           that will redirect their browsers to a fraudulent Web site where the user is
                                           asked to update personal information such as passwords, social security
                                           numbers, and credit card numbers in an attempt to trick a recipient into
                                           providing private information that will be used for identity theft.
                    Phish sites            A Web site that lures users into providing personal details, such as credit
                                           card information. Links to phish sites are often sent in bogus email
                                           messages disguised as legitimate messages from well-known businesses.
                    Ping of Death          A Denial of Service attack where a hacker directs an oversized ICMP
                                           packet at a target computer. This can cause the computers buffer to
                                           overflow, which can freeze or reboot the machine.
                    Post Office            POP3 is a standard protocol for storing and transporting email messages
                    Protocol 3             from a server to a client email application.
                    (POP3)
                                                                                                                      G-5
CSM4SMB-v3-AG.book Page 6 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Term Description
          port number            A port number, together with a network address - such as an IP number,
                                 allow computers to communicate across a network. Each application
                                 program has a unique port number associated with it. Blocking a port on a
                                 computer prevents an application associated with that port number from
                                 sending or receiving communications to other applications on other
                                 computers across a network. Blocking the ports on a computer is an
                                 effective way to prevent malicious software from attacking that computer.
          privileges             From the Security Dashboard, administrators can set privileges for the
          (desktop               CSAs. End users can then set the CSAs to scan their Client computers
          privileges)            according to the privileges you allowed. Use desktop privileges to enforce a
                                 uniform antivirus policy throughout your organization.
          proxy server           A World Wide Web server which accepts URLs with a special prefix, used to
                                 fetch documents from either a local cache or a remote server, then returns
                                 the URL to the requester.
          remote                 The term “remote” refers to a computer that is connected through a network
                                 to another computer, but physically distant from that computer.
          rules (content         Content filtering rules are rules that you set up to filter the content of email
          filtering)             messages. You define undesirable content and sources and set the
                                 Messaging Security Agent to detect and take action against such content
                                 violations.
          scan                   To examine items in a file in sequence to find those that meet a particular
                                 criteria.
          scan engine            The module that performs antivirus scanning and detection in the host
                                 product to which it is integrated.
          Secure Socket          SSL is a scheme proposed by Netscape Communications Corporation to
          Layer (SSL)            use RSA public-key cryptography to encrypt and authenticate content
                                 transferred on higher-level protocols such as HTTP, NNTP, and FTP.
          SSL certificate        A digital certificate that establishes secure HTTPS communication between
                                 the Policy Server and the ACS server.
        G-6
CSM4SMB-v3-AG.book Page 7 Monday, April 23, 2007 10:40 AM
Term Description
                    security server        When you first install Client Server Messaging Security, you install it on a
                                           Windows server that becomes the Security Server. The Security Server
                                           communicates with the CSAs and the Messaging Security Agents installed
                                           on Client computers. The Security Server also hosts the Security
                                           Dashboard, the centralized Web management console for the entire Client
                                           Server Messaging Security solution.
                    server                 A program which provides some service to other (client) programs. The
                                           connection between client and server is normally by means of message
                                           passing, often over a network, and uses some protocol to encode the
                                           client's requests and the server's responses. Note that the online help uses
                                           the term “Security Server” in a special way to refer to the server that forms a
                                           client-server relationship with the computers on your network to which you
                                           have installed the CSAs.
                    Simple Mail            SMTP is a standard protocol used to transport email messages from server
                    Transport              to server, and client to server, over the internet.
                    Protocol (SMTP)
                    Test virus             An inert file that acts like a real virus and is detectable by virus-scanning
                                           software. Use test files, such as the EICAR test script, to verify that your
                                           antivirus installation is scanning properly.
                    Trojan horses          Executable programs that do not replicate but instead reside on systems to
                                           perform malicious acts, such as open ports for hackers to enter.
                    virus                  A virus is a program that replicates. To do so, the virus needs to attach itself
                                           to other program files and execute whenever the host program executes.
                                                                                                                           G-7
CSM4SMB-v3-AG.book Page 8 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
Term Description
        G-8
CSM4SMB-v3-AG.book Page 1 Monday, April 23, 2007 10:40 AM
                   Index                                               E
                                                                       Encrypted and Password protected files 8-4
                                                                       End User Quarantine
                                                                          disabling 8-43
                   A
                                                                       evaluation license
                   Activation Codes 4-5
                                                                          benefits 4-5
                   administrator account
                                                                          features 4-3
                      required for installation 4-6
                                                                       Excluded files (Files over specified scanning restric-
                   administrator privileges
                                                                          tions) 8-4
                      required for installation 4-6
                                                                       F
                   C
                                                                       firewall
                   capabilities
                                                                           deploy Security Server behind 3-7
                      Client Server Messaging Security 1-2–1-8
                                                                       firewall, Windows XP
                   Client Server Messaging Security
                                                                           added to Exception list 3-7
                      capabilities 1-2, 1-8
                                                                       fully licensed
                   Client/Server Security Agent
                                                                           benefits 4-5
                      deployment considerations 3-7
                                                                           features 4-3
                      listening port 4-7
                      overview 2-4                                     G
                   Common Firewall Driver 2-10                         generating debugger reports, how to 8-45
                   compatibility issues
                      third-party applications 4-4                     H
                   Configuring Personal Firewall – Simple Mode 7-10    hostname, Security Server
                   Configuring the Personal Firewall - Advanced Mode      prepare before installing 4-6
                      7-11                                             Hot Fixes 2-10
                   content filtering rules
                      changing order 8-29                              I
                   Current Status – Cleanup 9-6                        incremental pattern file update
                   Current Status – Prevention 9-2                         size of download 3-9
                   Current Status – Protection 9-5                     installation
                                                                           overview 3-2
                   D                                                   installation path, Client/Server Security Agent
                   Damage Cleanup services                                 prepare before installing 4-6
                      how it works 2-9                                 Internet Connection Firewall (ICF)
                   debugger reports, generating 8-44                       removing 4-4
                   deleting quarantined messages 8-41                  IP address, Security Server
                   deleting spam messages from Spam folder 8-44            prepare before installing 4-6
                   deployment
                      overview 3-2                                     K
                      Security Server 3-7                              keywords
                      Security Server, on dedicated server 3-10           about 8-29
                   Disabling the Firewall 7-14                            supported 8-32
                   domain name, Security Server
                      prepare before installing 4-6                    L
                                                                       license
                                                                                                                          I–1
CSM4SMB-v3-AG.book Page 2 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
        I–2
CSM4SMB-v3-AG.book Page 3 Monday, April 23, 2007 10:40 AM
definition G-7
                   U
                   Using Antivirus to Configure Real-time Scan 7-2
                   Using Desktop Privileges 7-14
                   Using Quarantine 7-17
                   Using the Personal Firewall 7-8
                   V
                   Virus Cleanup Engine 2-9
                   Virus Cleanup Pattern 2-10
                   virus pattern file
                      size of download 3-9
                   W
                   Warning
                     back up before removing third-party antivirus
                        software 18-13
                     change port number to prevent attacks on HTTP
                        port 4-7
                     dangers of disabling real-time scanning 8-14
                     decrypting files 15-9
                     do not send installation package to wrong Client
                        computer 5-10
                     never use real virus for testing 5-24
                     quarantine folder contains email messages that
                        have a high-risk of being infected 8-41
                     remove lockdown tool during installation 4-7–4-8
                     using back up tools 18-6
                   Windows XP Firewall
                     added to Exception list 3-7
                                                                        I–3
CSM4SMB-v3-AG.book Page 4 Monday, April 23, 2007 10:40 AM
Trend Micro™ Client Server Messaging Security 3.6 for SMB™ Administrator’s Guide
I–4