Outbreak Defense
9
-
7
spyware. InterScan Gateway Security Appliance then lists the client in the
Cleaned
computers
section of the Summary screen.
You can find the Damage Cleanup Services (DCS) Online Scan at the following
URL:
https://{The appliance IP}/nonprotect/cgi-bin/dcs_manual_cleanup.cgi
In the URL above, replace
The appliance IP
with the IP address of your appliance.
Potential Threat
A potential threat is any client that has malware or spyware on their computer. As
such, they pose a threat to the security of your network.
If InterScan Gateway Security Appliance detects that a client has malware or
spyware, it will deploy Damage Cleanup Services on the client's machine.
To configure the Damage Cleanup Setting:
1.
From the left-side menu click Outbreak Defense > Damage Cleanup.
2.
Select the
Enable Damage Cleanup
check box.
3.
Optional - Add non-Windows-based clients to the
Damage Cleanup Exception
List
by typing their IP address or the IP address range and clicking
Add
.
InterScan Gateway Security Appliance will not deploy Damage Cleanup to
clients with IP addresses that are on the
Damage Cleanup Exception List.
4.
Click
Save
.
Note:
Damage Cleanup Services only works if the HTTP, SMTP, and FTP protocols and
their anti-spyware features are enabled.
Configuring Settings
Configure Outbreak Prevention Policy (OPP) Automatic Deployment and OPP down-
load options (Setting tab). InterScan Gateway Security Appliance sends out a mes-
sage whenever a new OPP becomes available or an old OPP expires (Notification
tab).
Summary of Contents for InterScan M Series
Page 1: ...InterScan TM Gateway Security Appliance M Series...
Page 2: ......
Page 16: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide xiv...
Page 60: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 2 22...
Page 82: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 3 22...
Page 100: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 4 18...
Page 135: ...SMTP Services 5 35 SMTP Content Filtering Target FIGURE 5 20 SMTP Content Filtering Target...
Page 140: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 5 40...
Page 180: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 6 40...
Page 196: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 7 16...
Page 250: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 10 12...
Page 258: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 11 8...
Page 267: ...Analyzing Your Protection Using Logs 12 9...
Page 268: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 12 10...
Page 366: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 15 46...
Page 372: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide A 6...
Page 428: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide B 56...
Page 446: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide D 6...
Page 448: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide E 2...
Page 460: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide G 4...
Page 480: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide I 20...