Trend Micro™ Worry-Free™ Business Security Installation Guide

[Pages:192]Worry-Fre7eTM

Business Security

Standard and Advanced Editions

#1 at stopping threats before they reach your business

Administrator's Guide

Installation Guide

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes, and the latest version of the applicable user documentation, which are available from the Trend Micro website at:



Trend Micro, the Trend Micro t-ball logo, TrendProtect, TrendSecure, Worry-Free, OfficeScan, ServerProtect, PC-cillin, InterScan, and ScanMail are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.

Copyright? 2010. Trend Micro Incorporated. All rights reserved.

Document Part Number: WBEM74599/100819

Release Date: October 2010

Product Name and Version No.: Trend MicroTM Worry-FreeTM Business Security 7.0

Document Version No.: 1.02

Protected by U.S. Patent Nos. 5,951,698 and 7,188,369

Trend MicroTM Worry-FreeTM Business Security 7.0 Installation Guide

The user documentation for Trend MicroTM Worry-FreeTM Business Security is intended to introduce the main features of the software and installation instructions for your production environment. You should read through it prior to installing or using the software. Detailed information about how to use specific features within the software are available in the online help file and the Knowledge Base at Trend Micro website. Trend Micro is always seeking to improve its documentation. Your feedback is always welcome. Please evaluate this documentation on the following site:

Contents

Contents

Chapter 1: Introducing Trend MicroTM Worry-FreeTMBusiness Security Standard and Advanced

Overview of Trend Micro Worry-Free Business Security ........................ 1-2 What's New ...................................................................................................... 1-2

Version 7.0 .................................................................................................. 1-2 Key Features .................................................................................................... 1-3

The Trend Micro Smart Protection Network ....................................... 1-3 Smart Feedback .......................................................................................... 1-3 Web Reputation ......................................................................................... 1-4 Email Reputation (Advanced only) ......................................................... 1-4 File Reputation ........................................................................................... 1-4 Smart Scan ................................................................................................... 1-5 URL Filtering .............................................................................................. 1-5 Benefits of Protection .................................................................................... 1-5 Defense Components ..................................................................................... 1-6 Understanding Threats ................................................................................. 1-10 Network Components ................................................................................. 1-15 Sending Trend Micro Your Viruses ........................................................... 1-16

Chapter 2: Preparing for Installation

Before You Begin ........................................................................................... 2-2 Phase 1: Deployment Planning ................................................................ 2-2 Phase 2: Installing the Security Server .................................................... 2-2 Phase 3: Installing Agents ......................................................................... 2-3 Phase 4: Configuring Security Options .................................................. 2-3

i

Trend MicroTM Worry-FreeTM Business Security 7.0 Installation Guide

Server and Agent System Requirements ...................................................... 2-4 Notes ..........................................................................................................2-11 Other Requirements .................................................................................2-11

Choosing Your Edition ................................................................................2-12 Installing Worry-Free Business Security ...............................................2-12

Protecting Your Network ............................................................................2-16 Installation Overview ....................................................................................2-23

Ports ...........................................................................................................2-24 Trend Micro Security Server Prescan ....................................................2-25 Other Installation Notes .........................................................................2-26 Compatibility Issues ......................................................................................2-27 Deployment Checklist ..................................................................................2-28 Determining Where to Install the Security Server ..............................2-28 Identifying the Number of Clients ........................................................2-29 Planning for Network Traffic .................................................................2-29 Deciding on a Dedicated Server ............................................................2-31 Location of the Program Files ................................................................2-31 Determining the Number of Desktop and Server Groups ...............2-31 Choosing Deployment Options for Security Agents ..........................2-32 Ports Checklist ...............................................................................................2-33 Security Server Address Checklist ..............................................................2-34

Chapter 3: Installing the Server

Installation Overview ......................................................................................3-2 Installing the Scan Server .......................................................................... 3-2

Typical Installation Walkthrough .................................................................. 3-3 Custom Installation Walkthrough ................................................................. 3-3

Part 1: Pre-configuration Tasks ................................................................ 3-4 Part 2: Security Server Settings ..............................................................3-10 Part 3: Security Agent Installation Options .........................................3-18 Part 4: Messaging Security Agent Installation Options ......................3-23 Part 5: Installation Process .....................................................................3-31

ii

Contents

Silent Installation Walkthrough .................................................................. 3-33 Verifying the Installation ............................................................................. 3-35 Installing the Trend Micro Worry-Free Remote Manager Agent .......... 3-36

Chapter 4: Upgrading and Migrating

Upgrading from a Previous Version ............................................................ 4-2 Supported Upgrades .................................................................................. 4-2 Unsupported Upgrades ............................................................................. 4-3

Upgrading Best Practices ............................................................................... 4-3 Upgrading Walkthrough ................................................................................ 4-4 Migrating from Other Anti-Malware Applications .................................... 4-4 Upgrading the Security Agent ....................................................................... 4-8

Preventing Upgrade for Selected Clients ................................................ 4-9

Chapter 5: Getting Started

Registering ........................................................................................................ 5-2 Introducing the Web Console ....................................................................... 5-2 Live Status ....................................................................................................... 5-7 Viewing Computers ...................................................................................... 5-11 Key Components .......................................................................................... 5-13

Security Server .......................................................................................... 5-13 Security Agent ........................................................................................... 5-13 Web Console ............................................................................................ 5-14 Clients ........................................................................................................ 5-14 Virus Scan Engine .................................................................................... 5-14

iii

Trend MicroTM Worry-FreeTM Business Security 7.0 Installation Guide

Chapter 6: Managing Basic Security Settings

Options for Desktop and Server Groups .................................................... 6-2 Configuring Real-time Scan ........................................................................... 6-4 Managing the Firewall ..................................................................................... 6-4

Configuring the Firewall ............................................................................ 6-7 Working with Firewall Exceptions .......................................................... 6-9 Disabling the Firewall ..............................................................................6-11 Intrusion Detection System ....................................................................6-11 Web Reputation .............................................................................................6-13 Configuring Web Reputation .................................................................6-14 URL Filtering .................................................................................................6-16 Behavior Monitoring .....................................................................................6-17 Device Control ..............................................................................................6-20 User Tools ......................................................................................................6-22 Configuring User Tools ...........................................................................6-22 Configuring Client Privileges .......................................................................6-23 Configuring the Quarantine .........................................................................6-25 Configuring the Quarantine Directory ..................................................6-26

iv

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download