Specifications

Trend Micro™ OfficeScan™ 10 Administrator’s Guide
vi
Chapter 7: Using the OfficeScan Firewall
About the OfficeScan Firewall ......................................................................7-2
Firewall Policies and Profiles ......................................................................... 7-4
Firewall Policies ..........................................................................................7-5
Adding and Modifying a Firewall Policy ............................................7-7
Editing the Firewall Exception Template ..........................................7-9
Firewall Profiles ........................................................................................7-12
Adding and Editing a Firewall Profile ..............................................7-14
Firewall Privileges ..........................................................................................7-16
Firewall Violation Notifications for Client Users .....................................7-16
Firewall Logs ..................................................................................................7-17
Testing the OfficeScan Firewall ..................................................................7-18
Disabling the OfficeScan Firewall ..............................................................7-19
Section 2: Managing the OfficeScan Server and
Clients
Chapter 8: Managing the OfficeScan Server
Role-based Administration ............................................................................8-2
User Roles ....................................................................................................8-2
Adding and Modifying a Custom Role .............................................. 8-5
User Accounts .............................................................................................8-6
Adding and Modifying a User Account .............................................8-7
Adding One or Several Active Directory Accounts ......................... 8-9
Trend Micro Control Manager ....................................................................8-10
Reference Servers ..........................................................................................8-14
System Event Logs ........................................................................................8-15
Managing Logs ...............................................................................................8-16
Log Maintenance ......................................................................................8-18
Licenses ...........................................................................................................8-19