Specifications
Trend Micro™ OfficeScan™ 10 Administrator’s Guide
5-66
Note: The scanning function in OfficeScan complements and may override the device
permissions. For example, if the permission allows a file to be opened but
OfficeScan detects that the file is infected with malware, a specific scan action
will be performed on the file to eliminate the malware. If the scan action is
Clean, the file opens after it is cleaned. However, if the scan action is Delete, the
file is deleted.
4. Select whether to display a notification message on the client computer when
OfficeScan detects unauthorized device access, which includes all operations that
OfficeScan blocks.
5. If you selected domain(s) or client(s) on the client tree, click Save to apply settings
to the domain(s) or client(s). If you selected the root icon , choose from the
following options:
• Apply to All Clients: Applies settings to all existing clients and to any new
client added to an existing/future domain. Future domains are domains not yet
created at the time you configure the settings.
• Apply to Future Domains Only: Applies settings only to clients added to
future domains. This option will not apply settings to new clients added to an
existing domain.
Read only Operations allowed: Copy,
Open
Operations blocked: Save,
Move, Delete, Execute
Operations blocked: Save,
Move, Copy
No access Any attempt to access the
device or network resource
is automatically blocked.
Operations blocked: Save,
Move, Copy
TABLE 5-35. Device permissions (Continued)
PERMISSIONS FILES ON THE DEVICE INCOMING FILES










