Specifications
Trend Micro™ OfficeScan™ 10 Administrator’s Guide
iv
Update Source for Update Agents .........................................................4-39
Update Agent Customized Update Source ......................................4-39
Update Agent Standard Update Source ...........................................4-41
Update Agent Component Duplication ...........................................4-42
Update Methods for Update Agents .....................................................4-42
Component Update Summary .....................................................................4-43
Chapter 5: Protecting Computers from Security Risks
About Security Risks .......................................................................................5-2
Viruses and Malware .................................................................................. 5-2
Spyware and Grayware .............................................................................. 5-4
How Spyware/Grayware Gets into a Network ................................5-5
Potential Risks and Threats .................................................................5-6
Guarding Against Spyware/Grayware ............................................... 5-7
Scan Methods ................................................................................................... 5-8
Smart Scan Source ....................................................................................5-15
Standard List ........................................................................................5-16
Custom Lists ........................................................................................5-17
Scan Types ......................................................................................................5-19
Real-time Scan ...........................................................................................5-19
Manual Scan ..............................................................................................5-21
Scheduled Scan .........................................................................................5-22
Scan Now ...................................................................................................5-23
Initiating Scan Now ............................................................................5-24
Settings Common to All Scan Types ..........................................................5-25
Scan Criteria ..............................................................................................5-25
Scan Exclusions ........................................................................................5-27
Scan Actions ..............................................................................................5-30
Virus/Malware Scan Actions .............................................................5-30
Spyware/Grayware Scan Actions ......................................................5-40
Scan-related Privileges ..................................................................................5-43
Global Scan Settings .....................................................................................5-43
Security Risk Notifications ...........................................................................5-44
Administrator Notification Settings ......................................................5-44










