Spfs 6.0 GSG New
Spfs 6.0 GSG New
i
Trend Micro ServerProtect for Storage Getting Started Guide
ii
Table of Contents
iii
Trend Micro ServerProtect for Storage Getting Started Guide
iv
Table of Contents
v
Trend Micro ServerProtect for Storage Getting Started Guide
vi
Table of Contents
vii
Trend Micro ServerProtect for Storage Getting Started Guide
Index
Index ............................................................................... IN-1
viii
ix
Chapter 1
1-1
Trend Micro ServerProtect for Storage Getting Started Guide
1-2
Getting Started with Trend Micro ServerProtect
multiple scanning options to a profile and use the profile for special
circumstances, for example: scanning incoming files only.
Communication Methods
The Management Console uses Transmission Control Protocol/Internet
Protocol (TCP/IP) with a password-protected logon to communicate with the
Information Server. The Information Server uses a remote Procedure Call
(RPC) to connect to Windows or the NetWare Normal Servers.
1-3
Trend Micro ServerProtect for Storage Getting Started Guide
ServerProtect Architecture
ServerProtect protects networks through a three-tier architecture: the
Management Console, the Information Server, and the Normal Server. The
following illustrates the relationship between these three components:
1-4
Getting Started with Trend Micro ServerProtect
Tip
You can use the Management Console to remotely install one or more Normal
Servers. See Installing a Normal Server on page 2-23.
WARNING!
An Information Server by itself is defenseless unless a Normal Server is
installed on the same computer.
1-5
Trend Micro ServerProtect for Storage Getting Started Guide
Note
Benchmark testing results have verified that an Information Server can
manage up to 250 Normal Servers. This number serves as a reference only.
The Information Server can manage more Normal Servers depending on the
available bandwidth.
Note
The Information Server and the Management Console are native 32-bit
components of ServerProtect. However, on the 64-bit platform, these
components of ServerProtect will run on Windows On Windows (WOW) 64
mode.
1-6
Getting Started with Trend Micro ServerProtect
Note
If the operating system is 32-bit, then 32-bit binaries of the Normal Server
component of ServerProtect will be installed. If the operating system is 64-bit,
then 64-bit binaries of Normal Server component of ServerProtect will be
installed.
WARNING!
Because it is time-consuming to install servers individually from the setup
program, Trend Micro recommends that you install your servers from the
ServerProtect Management Console.
ServerProtect Domains
ServerProtect domains are virtual groupings of Normal Servers used to
simplify their identification and management. You can create, rename, or
delete domains according to the needs of your network.
Normal Servers in a domain can only be assigned to one Information Server.
Information Servers, on the other hand, can manage several domains.
The most efficient way to manage network protection is to group all servers
in relevant ServerProtect domains. For example, you can create a
ServerProtect domain called "NS" to manage Normal Servers more efficiently.
See Managing ServerProtect Domains on page 3-10.
WARNING!
The concept of ServerProtect domains are not that of a Microsoft Windows
domain; it is simply a logical grouping of Normal Servers running
ServerProtect.
1-7
Trend Micro ServerProtect for Storage Getting Started Guide
Note
The main feature of the Management Console is to centralize the control
multiple Normal Servers via a number of Information Server. However a
Management console can only connect to and control one Information Server
at any given time.
1-8
Getting Started with Trend Micro ServerProtect
ServerProtect for Storage with RPC Scanner scans viruses using "on-access"
mode, which takes place on a Scan Server. In turn, the Information Server
manages the Scan Servers.
When a user tries to access a file or store a new file in a NetApp 7-Mode
Device, the NetApp 7-Mode Device performs a virus check. If the filename
extension matches the file scanning criteria (for example, an ".EXE" or a
".VBS" file), the NetApp 7-Mode Device sends a manual scan request (Scan
Now) to the Scan Server(s). The Scan Server then passes back the scan result
to the NetApp 7-Mode Device and according to the scan result, the user is
either allowed to open, save, or is denied to access the file.
1-9
Trend Micro ServerProtect for Storage Getting Started Guide
Note
Since only specific file types contain viruses, establishing the right file
scanning criteria can help optimize Scan Server performance, reduce
bandwidth usage, and minimize scanning time. To learn how ServerProtect
for Storage can efficiently and safely scan files, see IntelliScan on page 1-28.
1-10
Getting Started with Trend Micro ServerProtect
Note
The NetApp Device "trusts" registered Scan Servers. Therefore, if a Scan
Server also functions as a Normal Server (as a file or data server) and happens
to send a file to the NetApp Device, it will not request the file to be scanned.
To protect both the NetApp Device and the Normal Server, set the
ServerProtect Real-time Scan to "Incoming & outgoing." See Using Real-Time
Scan on page 3-80 to set Real-time Scan to "Incoming & outgoing."
Organizational Overview
This section provides an explanation of the ServerProtect for Storage
organizational flow in 7-Mode.
1-11
Trend Micro ServerProtect for Storage Getting Started Guide
1-12
Getting Started with Trend Micro ServerProtect
Figure 1-5. ServerProtect for Storage with EMC CAVA Scanner Architecture
1-13
Trend Micro ServerProtect for Storage Getting Started Guide
1-14
Getting Started with Trend Micro ServerProtect
Organizational Overview
ServerProtect for Storage communicates with the EMC VNX/VNXe File Server
via Remote Procedure Call (RPC).
1-15
Trend Micro ServerProtect for Storage Getting Started Guide
WARNING!
Trend Micro recommends using only the Clean, Delete, and Quarantine
actions, rather than using the Bypass action. If a file is infected and the virus
action is set to Bypass, the file will remain infected after entering the EMC
VNX/VNXe File Server system.
1-16
Getting Started with Trend Micro ServerProtect
When a user attempts to access a file located on a storage device, the storage
device sends a scan request to ServerProtect through ICAP. ServerProtect
scans the file for viruses, and then according to the scan result, either allows
or denies the access to the file.
Scan Actions
The ICAP Scanner in ServerProtect for Storage provides the following scan
actions:
• Clean: The ICAP Scanner cleans an infected file and sends the cleaned
file back to the storage device.
• Block: If the infected file is not cleanable, the ICAP Scanner notifies the
storage device that the file is not cleanable, without sending back the
infected file.
Deployment
ServerProtect for Storage enables you to deploy multiple scan servers with
multiple storage devices. An ICAP scanner in ServerProtect for Storage can
1-17
Trend Micro ServerProtect for Storage Getting Started Guide
Figure 1-8. A storage device can send scan requests to multiple ServerProtect ICAP
Scanners
Figure 1-9. A ServerProtect ICAP Scanner can handle scan requests from multiple storage
devices
1-18
Getting Started with Trend Micro ServerProtect
Tip
To ensure maximum protection, Trend Micro recommends using both Real-
time Scan and Scan Now.
1-19
Trend Micro ServerProtect for Storage Getting Started Guide
1-20
Getting Started with Trend Micro ServerProtect
Note
If you select Clean as the virus action, you can specify a secondary action if
the cleaning process is unsuccessful.
Note
On a 64-bit operating system, ServerProtect detects both 32-bit viruses and 64-
bit viruses.
1-21
Trend Micro ServerProtect for Storage Getting Started Guide
Note
ServerProtect 5.8 does not support clean action against spyware infected files.
When using ActiveAction, the actual effect of an action applied to a spyware
infected file will be equivalent to that of the Bypass action.
Note
For ICAP Scanner, ServerProtect for Storage only provides Clean and Block
actions for an infected file.
Virus Logs
The real power of a centralized antivirus system is its ability to record and
present information regarding the network's antivirus policy from a single
console. IT professionals can easily access information while they are
monitoring their network servers.
ServerProtect provides comprehensive information about scanning, file
updating, and deploying results. Furthermore, ServerProtect saves the
information in a log file which can be either retrieved or exported. For
example, you can analyze the scanning statistics for virus scanning on your
network. These statistics include information such as what the most
common viruses are or which users introduced viruses to the network. In
addition, you can export the log information to a database or spreadsheet
application for further analysis.
On each Normal Server, ServerProtect supports backing up of log database
file when it exceeds the default size limit of 10-MB or after configured
number of days. The default size for the log file is 10,000 entries, or up to 10-
MB. After the log file exceeds 10,000 entries or 10-MB, which ever is smaller
in size, ServerProtect automatically renames the log file and creates a new
log file. ServerProtect, however, does not impose number of days limit,
unless it is configured. For information on configuring log backup, refer to
Configuring the Log Database Backup Options topic in Online Help.
You can also take action on the infected files directly from the Scan Result
window, providing you a convenient way to take appropriate actions on a
virus infection event. For more information about log files, refer to the
1-22
Getting Started with Trend Micro ServerProtect
Deploying Updates
Trend Micro update is an upgrade and update deployment module for Trend
Micro antivirus software. It simplifies the maintenance of Trend Micro
software and reduces the total cost of your network’s antivirus security.
Because of the number of viruses that are developed monthly, a successful
virus policy depends on the use of virus pattern files and scan engine files,
that can deal with the latest threats. See Configuring Updates on page 3-31.
Note
Trend Micro releases new versions of these downloadable update files on a
regular basis.
1-23
Trend Micro ServerProtect for Storage Getting Started Guide
Tip
You can automate the deployment of updates for Normal Servers by creating a
scheduled update task. See Creating Tasks on page 3-50.
Pattern Matching
Using a process called "pattern matching," ServerProtect draws on an
extensive database of virus patterns to identify known virus signatures. Key
areas of suspect files are examined for tell-tale strings of virus code and
compared against thousands of virus signatures that Trend Micro has on
record.
For polymorphic or mutation viruses, the ServerProtect scan engine permits
suspicious files to execute in a protected area within which it is decrypted.
ServerProtect then scans the entire file, including the freshly decrypted code,
and looks for strings of mutation-virus code.
1-24
Getting Started with Trend Micro ServerProtect
Note
It is important to keep the Spyware pattern and virus pattern files up to date.
More than a thousand new viruses are created each year. Trend Micro makes
it easy to update the pattern file by supporting scheduled updates. See
Configuring a Scheduled Deployment on page 3-44 for more information.
MacroTrap™
ServerProtect includes patented MacroTrap™ technology to guard against
macro viruses in Microsoft™ Office files and templates. Macro viruses are the
fastest spreading computer viruses. Because they are harbored in files that
are commonly passed around by email, these kinds of viruses are easily
spread. See Configuring Real-Time Scan on page 3-81 for MacroTrap
configuration information.
Note
Trend Micro MacroTrap protects network users from receiving and sending
macro viruses.
1-25
Trend Micro ServerProtect for Storage Getting Started Guide
Compressed Files
Compressed file archives (that is, a single file composed of many separate
compressed files) are the preferred form to distribute files by email and the
Internet. Because some antivirus software is not able to scan these kinds of
files, compressed file archives are sometimes used as a way to "smuggle" a
virus into a protected network or computer.
The Trend Micro scan engine can scan files inside compressed archives. It
can even scan compressed files that are composed of other compressed files
-- up to a maximum of five compression layers.
The Trend Micro scan engine used in ServerProtect can detect viruses in files
compressed using the following formats:
• ARJ (.arj) and ARJ_SFX (.exe)
• BINHEX
• BASE64
• CABINET (.cab)
• DIET (.com)
• GNU ZIP (.gz)
• LHA (.lzh) and LHA_SFX (.exe)
• LZEXE (.exe)
• Microsoft Office Open XML format (.docx, .xlsx, .pptx, .one)
• PKLITE (.exe or .com)
• PKZIP (.zip) and PKZIP_SFX (.exe)
• RAR (.rar)
• TAR
• UNIX COMPACKED (.z)
• UNIX LZW (.Z)
• UNIX PACKED (.z)
1-26
Getting Started with Trend Micro ServerProtect
• UUENCODE
Note
The Trend Micro scan engine can currently only clean compressed files using
the PKZIP algorithm. If a virus is found in an archive using other algorithms,
they must first be decompressed in a temporary directory, then cleaned.
Note
If a spyware infected file is detected, only bypass can be applied. The file will
be bypassed without any other treatment. Clean function does not apply to
spyware infection.
1-27
Trend Micro ServerProtect for Storage Getting Started Guide
Tip
OLE layer scan offers five layers of protection. Trend Micro recommends a
setting of two OLE layers for Scan Now and a setting of one for a Real-time
Scan. A lower setting will improve server performance.
IntelliScan
IntelliScan is a new method of identifying which files to scan that is both
more secure, and more efficient, than the standard "Scan All files" option.
For executable files (that is, .zip, .exe), the true file type is determined
from the file content. In the event that a file is not executable (such as .txt),
IntelliScan will use the file header to verify the true file type. See Scanning
Viruses for Normal Server on page 3-71.
The following are just a couple of the benefits IntelliScan offers to
administrators:
• Performance optimization: Server system resources allotted to scan will
be minimal, thus using IntelliScan will not interfere with other crucial
applications running on the server.
• Time saving: Because IntelliScan uses true file type identification,
IntelliScan scan time is significantly less than that of all files scan (this
means that only files with a greater risk of being infected are scanned).
This time difference is noticeable when you use IntelliScan with Scan
Now. See Configuring Scan Now on page 3-85.
ActiveAction
ActiveAction is a set of pre-configured scan actions that can be performed on
viruses and other types of malware. ActiveAction can be configured for both
Scan Now and Real-time Scan.
1-28
Getting Started with Trend Micro ServerProtect
Viruses vary significantly from one another; this requires appropriate virus
actions for each virus type. Customizing scan actions for file viruses requires
knowledge of viruses and can be a tedious task. For this reason, Trend Micro
recommends the use of ActiveAction.
Some advantages of using ActiveAction versus customized scan actions are:
• Time saving: You spend no time customizing virus actions.
• Worry-free maintenance: ActiveAction uses Trend Micro recommended
scan actions so you can concentrate on other tasks and not worry about
making mistakes.
• Updateable scan actions: Trend Micro includes new ActiveAction scan
actions with every new pattern. Viruses constantly change how they
attack, thus scan actions should be frequently modified to prevent
possible infection.
For ActiveAction configuration information, see Defining Actions Against
Viruses on page 3-73.
Note
When using ActiveAction, the action for spyware virus is bypass/bypass.
Additional Features
To help IT professionals protect their networks with more flexibility,
ServerProtect includes additional features.
1-29
Trend Micro ServerProtect for Storage Getting Started Guide
Centralized Management
ServerProtect provides a Windows-based console (the Management Console)
to help you manage virus protection for multiple servers on your network.
The console is portable and can be run on any 32-bit or 64-bit Windows
server.
NetworkTrap Tool
Certain viruses actively seek out shared folders (an example of this type of
virus is PE.FunLove.4099) to infect as many connected users as possible.
The NetworkTrap tool lets you share a folder and automatically copies the
contents of the Bait folder to the newly created shared folder (the Bait’ folder
contains files that viruses are likely to infect). This shared folder works with
the new virus notification to create an effective virus trap. For more
1-30
Getting Started with Trend Micro ServerProtect
Compatibility
ServerProtect is fully compatible with versions of Microsoft Windows 2008,
2008 R2, 2012, 2012 R2, 2016, 2019, and 2022 Server operating systems. It also
supports Network File System (NFS) drivers, and SOCKS 4 for the Trend
Micro update server.
ServerProtect is compatible with 32-bit and 64-bit operating systems.
ServerProtect automatically detects 32-bit and 64-bit Windows Servers. If the
operating system is 32-bit, then 32-bit binaries of the Normal Server
component of ServerProtect will be installed or uninstalled. If the operating
system is 64-bit, then 64-bit binaries of the Normal Server component of
ServerProtect will be installed or uninstalled.
1-31
Chapter 2
Note
You must log on with administrator privileges in order to install an
Information Server.
Note
Trend Micro recommends not installing a previous version of Normal Server
and register it to the ServerProtect Information Server.
2-1
Trend Micro ServerProtect for Storage Getting Started Guide
System Requirements
Normal Server
• CPU: 2.5 GHz Intel™ Pentium™ IV processor or 3.0 GHz EM64T Intel™
processor or 2.0 GHz AMD Athlon™ 64-bit processor (or equivalent)
• DRAM: Minimum 1-GB, 2-GB recommended
• Operating System:
• Microsoft Windows Server 2008 Standard/Enterprise SP2 (x86 or
x64)
• Microsoft Windows Server 2008 R2 Standard/Enterprise SP1 (x64)
• Microsoft Windows 2008 Server Core
• Microsoft Windows Server 2012 Foundation, Essentials, Standard or
Datacenter (x64)
• Microsoft Windows Server 2012 R2 Foundation, Essentials, Standard
or Datacenter (x64)
• Microsoft Windows Storage Server 2012 Standard or Workgroup
(x64)
• Microsoft Windows Storage Server 2012 R2 Standard or Workgroup
(x64)
• Microsoft Windows Server 2016 Essentials, Standard, Datacenter
(x64)
• Microsoft Windows Storage Server 2016 Standard or Workgroup
(x64)
• Microsoft Windows Server 2019 Essentials, Standard, Datacenter
(x64)
• Microsoft Windows Server IoT 2019 (x64)
• Microsoft Windows Server 2022 Essentials, Standard, Datacenter
(x64)
2-2
Installing ServerProtect for Storage
Information Server
• CPU: 3.0 GHz Intel™ Pentium™ IV processor or 3.0 GHz EM64T Intel™
processor or 2.0 GHz AMD Athlon™ 64-bit processor (or equivalent)
• DRAM: Minimum 1-GB, 2-GB recommended
• Operating System:
• Microsoft Windows Server 2008 Standard/Enterprise SP2 (x86 or
x64)
• Microsoft Windows Server 2008 R2 Standard/Enterprise SP1 (x64)
• Microsoft Windows 2008 Server Core
• Microsoft Windows Server 2012 Foundation, Essentials, Standard or
Datacenter (x64)
• Microsoft Windows Server 2012 R2 Foundation, Essentials, Standard
or Datacenter (x64)
• Microsoft Windows Storage Server 2012 Standard or Workgroup
(x64)
• Microsoft Windows Storage Server 2012 R2 Standard or Workgroup
(x64)
• Microsoft Windows Server 2016 Essentials, Standard, Datacenter
(x64)
• Microsoft Windows Storage Server 2016 Standard or Workgroup
(x64)
• Microsoft Windows Server 2019 Essentials, Standard, Datacenter
(x64)
2-3
Trend Micro ServerProtect for Storage Getting Started Guide
Note
For ActiveUpdate 2.8, additional 3-GB disk space is required if Smart Duplicate
is needed to be turned on, in which case the cashed pattern number must be
set to value of 14.
Management Console
• CPU: 2.5 GHz Intel™ Pentium™ IV processor or 3.0 GHz EM64T Intel™
processor or 2.0 GHz AMD Athlon™ 64-bit processor (or equivalent)
For Server Environment:
• DRAM: Minimum 1-GB, 2-GB recommended
• Operating System:
• Microsoft Windows Server 2008 Standard/Enterprise SP2 (x86 or
x64)
2-4
Installing ServerProtect for Storage
2-5
Trend Micro ServerProtect for Storage Getting Started Guide
VMWare
• Any version of VMware ESX/ESXi running on any operating system
supported by ServerProtect for Storage
• Any version of VMware vSphere™ running on any operating system
supported by ServerProtect for Storage
Hyper-Visor
• Microsoft Windows Server 2008 R2 Standard/Enterprise with Hyper-V
• Microsoft Windows Server 2008 Standard/Enterprise with Hyper-V
Storage Devices
• EMC VNX/VNXe
• EMC Celerra
• EMC Isilon
• EMC Unity
• EMC PowerScale
• NetApp Storage Devices running Data ONTAP 7.x and 8.x
• NetApp Storage Devices running ONTAP 9.x
• NetApp ONTAP Select 9.x Cluster-Mode
• NetApp Cloud Volumes ONTAP 9.x
• Amazon FSx for NetApp ONTAP
• IBM N Series running Data ONTAP
• Hitachi NAS
• HP 3PAR File Persona
2-6
Installing ServerProtect for Storage
Installation Scenarios
This section will help you select the most appropriate scenario to install
ServerProtect on your network(s). The following scenarios focus on Local
Area Networks (LANs), although it is also possible to manage ServerProtect
across Wide Area Networks (WANs) such as, corporate Intranets, using
TCP/IP. See Managing ServerProtect Across a Wide Area Network on page 2-11.
Note
If you have many servers concentrated in different geographical locations, set
up an Information Server (IS) in each location. See Information Server Tips on
page 1-5.
The following table shows the different installation environments for each
ServerProtect setup component on Microsoft Windows platforms.
Table 2-1. Installation Scenarios on MS Windows
2-7
Trend Micro ServerProtect for Storage Getting Started Guide
2-8
Installing ServerProtect for Storage
Note
Windows Vista desktop family means Business edition, Enterprise edition,
and Ultimate edition.
Windows Server 2008 family and Windows Server 2008 R2 family both mean
Standard version, enterprise version, storage and datacenter server.
Windows Server 2012 family and Windows Server 2012 R2 family both mean
Standard version, essentials version, foundation version, storage and
datacenter server.
Windows Server 2019 family means Standard version, essentials version, IoT
and datacenter server.
Windows Server 2022 family means Standard version, essentials version, IoT
and datacenter server.
Note
Hyper-V is supported by Windows Server 2008 and Windows Server 2012.
2-9
Trend Micro ServerProtect for Storage Getting Started Guide
Note
These ports are opened to enable ServerProtect to use Remote
Procedure Call (RPC) Over named pipe protocol to communicate.
2-10
Installing ServerProtect for Storage
• Open 3628(TCP)
Port 3628 is used to receive event response messages.
• Open 1921 for SPX/TCP with Netware
Port 1921 is used to communicate with Netware through the
SPX/TCP protocol.
• Firewall Setting for Windows with Normal Server
• Open 5168 for listening RPC over TCP/IP from Information Server
Port 5168 is used to receive commands from Information Server.
• Open 137 - 139 and 445 for named pipe.
• 137 (UDP)
• 138 (UDP)
• 139 (TCP)
• 445 (TCP)
• Firewall Setting for the Netware Machine with Normal Server
• Open port 9921 (SPX/TCP)
This port is used to receive commands from Information Server.
2-11
Trend Micro ServerProtect for Storage Getting Started Guide
Installing ServerProtect
For a server network system on which ServerProtect has never been installed
or already has been uninstalled, it is recommended that the user choose the
complete ServerProtect package installation, which includes installing the
Management Console, Information Server and the Normal Server. The
program installed in this way will guarantee that the ServerProtect be readily
operational, and that the installation operation itself be straight forward and
smoothly carried out.
This section guides you through the ServerProtect installation process.
Note
You must be logged on with administrator privileges in order to install
ServerProtect.
2-12
Installing ServerProtect for Storage
Procedure
1. Insert the Enterprise CD-ROM and run SETUP.EXE. The ServerProtect
Welcome screen appears.
2. Click Next. The Software License Agreement screen appears. You must
agree to the license conditions to proceed with Setup.
3. Click Yes. ServerProtect checks the boot sector of the storage hardware
for viruses.
2-13
Trend Micro ServerProtect for Storage Getting Started Guide
2-14
Installing ServerProtect for Storage
7. Select all the check boxes to install complete package for ServerProtect
for Storage.
Note
If you choose to install a Normal Server, you must select the scanner type
you want to install.
For details, see Installing ServerProtect for Storage with EMC CAVA Scanner
on page 2-31.
Make sure the selection of the components is adequate for the desired
setup. You can choose hidden shared storage devices, such as C$ or D$,
as destination folders.
The default installation path is:
<drive>:\Program Files\Trend\SProtect
2-15
Trend Micro ServerProtect for Storage Getting Started Guide
Note
To protect the Information Server, Trend Micro recommends that you
install a Normal Server on the computer where the Information Server
managing is installed.
2-16
Installing ServerProtect for Storage
10. Follow the instructions given in the following sections to complete the
Installation.
Procedure
1. Execute the setup program and complete the necessary steps to provide
product information.
2. Select the Install server as a ServerProtect Information Server check
box on the ServerProtect Select Components screen. See ServerProtect
Select Components screen on page 2-15.
3. Click Browse to specify the path where you want to install the
Information Server. The ServerProtect Install Path Selection screen
appears.
2-17
Trend Micro ServerProtect for Storage Getting Started Guide
4. Double-click the target server and choose the installation path for
ServerProtect Information Server files. Click New Folder if installation
needs to be installed in a new folder. Click OK to bring back the
ServerProtect Select Components screen. See ServerProtect Select
Components screen on page 2-15.
5. Click Next. The Input Logon Information screen appears. Under Logon
Information, type the valid data in the fields of Domain name, User
name, Password, and Confirm Password and click Next. The
ServerProtect Setup Information Server screen appears.
2-18
Installing ServerProtect for Storage
2-19
Trend Micro ServerProtect for Storage Getting Started Guide
9. Click Finish.
Procedure
1. Execute the setup program and complete the necessary steps to provide
product information.
2. At the Select Components screen, select the Install Management
Console to local machine check box. You can change the local
installation path by clicking Browse. The Management Console must be
installed in a Windows Storage Server environment.
Note
Trend Micro does not currently support remote installation of the
Management Console.
2-20
Installing ServerProtect for Storage
3. If you want to be the only one to view the ServerProtect program from
the Windows Start menu, click Personal program folder. Otherwise,
click Common program folder.
4. Click Next. The Select Program Folder screen appears.
5. Select the folder where you want to install the program, and then click
Next. The Start Copying Files screen appears.
6. Click Next to continue with the setup program. Setup starts copying all
program components and starts all services. After all program
components have been copied, the ServerProtect Setup screen appears.
2-21
Trend Micro ServerProtect for Storage Getting Started Guide
8. Select the Information Server that the Management Console will control.
Do one of the following:
• Select a server from the list.
• Provide the name of the server.
• Provide the IP address of the server.
Note
If an Information Server resides on a different network segment from the
one where the Management Console is installed, the server will not
appear in the list.
2-22
Installing ServerProtect for Storage
Procedure
1. Execute the setup program and provide the necessary product
information.
2. Select the Install server as a ServerProtect Normal Server check box on
the Select Components screen, and then select a scanner type you want
to install. See ServerProtect Select Components screen on page 2-15. Click
Browse to locate the target server and folder where you want to install a
Normal Server. The ServerProtect Install Path Selection screen
appears.
2-23
Trend Micro ServerProtect for Storage Getting Started Guide
Figure 2-12. ServerProtect Install Path Selection screen with Windows Server
3. Click the appropriate network to expand the directory tree and select a
target server.
4. Double-click on the target server. In the Enter Password screen
subsequently appears, type an administrator user name and password
and click OK. The target server’s local drives appear on the tree.
2-24
Installing ServerProtect for Storage
5. Select the installation path for the Normal Server. Click New Folder if
installation needs to be installed in a new folder. Click OK to continue.
6. Click Next in the ServerProtect Select Components screen. The Input
Logon Information screen appears.
7. Under Logon Information, type the appropriate data next to the
Domain name, User name, Password, and Confirm Password fields.
8. Click Next, the Select Information Server screen appears.
2-25
Trend Micro ServerProtect for Storage Getting Started Guide
Note
If an Information Server resides on a network different from the one the
Normal Server does, the server does not show up in the list. To locate the
Information Server in this case, type the server name or the IP address in
the Information Server fields.
11. Type the Information Server password and click OK. This password was
assigned during Information Server installation.
Click Next. The Start Copying Files dialog appears. Verify the
information listed on the screen.
12. Click Next to continue with the setup program. ServerProtect now starts
copying all program components and starts all services. After all
program components have been copied and all services have started
successfully, the Setup Complete screen appears.
2-26
Installing ServerProtect for Storage
Note
While installing a Windows Normal Server from the Management Console,
ensure that the operating system of the source and the target servers are of
the same platform. For example, if the operating system of the source server
is 32-bit, then the operating system of the target server should also be 32-bit.
Ensure that ServerProtect was not installed on the target server before.
Procedure
1. From the domain browser tree, select the domain to which you want to
add a server. Do one of the following:
• Select Domain > Install New SPFS(s) from the main menu.
• Right-click the domain that you selected in the previous step and
click Install New SPFS(s).
The Select a Source Server window opens.
2. Select an existing Windows Normal Server and a scanner type that you
want to install from the list box, and then click OK. A confirmation
window appears. Click OK to bring up the Add Server(s) to Domain
window.
2-27
Trend Micro ServerProtect for Storage Getting Started Guide
Procedure
1. Install an Information Server. See Installing an Information Server on page
2-17.
2. Locate the SMS folder in the default installation path, and share it.
Note
Share the SMS folder with read and write permissions.
Make sure the target servers you want to install as Normal Servers can
access the folder. If you want to perform more than one silent
installation, map the SMS folder on the target servers.
3. At the target server, navigate to the SMS folder or drive that is mapped to
the folder, open the file Setup.ini, and then add one of the following
lines at the end of the file to specify the scanner type:
• To install Normal Server as RPC Scanner:
2-28
Installing ServerProtect for Storage
[CommonSection]
NormalServerType=1
NormalServerType=2
NormalServerType=4
Note
If the NormalServerType in Setup.ini is not specified, the setup installs
the Normal Server as EMC CAVA Scanner by default.
2-29
Trend Micro ServerProtect for Storage Getting Started Guide
[CommonSection]
ServerTargetUNCPath=D$\Utility\AntiVirus\SProtect
Where:
ServerTargetUNCPath: Sets the location where the Normal Server
is installed.
To license the installed Normal Server, add the following lines to the
Setup.ini file in the source folder.
[CommonSection]
ServerTargetSN=XXXX-XXXX-XXXX-XXXX-XXXX
Where:
XXXX-XXXX-XXXX-XXXX-XXXX: Represents the legal serial number.
You may not be able to register a Normal Server under the "SMS" domain
due to the use of a domain controller on the Information Server. To
resolve this issue, configure an IP address before using silent install.
To configure an IP address, do the following:
a. Go to the Setup.ini file in the SMS folder.
b. Replace the host name with its IP address next to AgentName then
save the file.
2-30
Installing ServerProtect for Storage
Procedure
1. Install the Information Server. See Installing an Information Server on
page 2-17.
2. Install the Normal Server. See Installing a Normal Server from the Setup
Program on page 2-23.
3. Install the Management Console. See Installing the Management Console
on page 2-20. You can install additional Management Consoles on any
Windows server or desktop system computer in the network.
Note
Only one Management Console can manage an Information Server at any
given time.
2-31
Trend Micro ServerProtect for Storage Getting Started Guide
2-32
Installing ServerProtect for Storage
Procedure
1. Install the Information Server. See Installing an Information Server on
page 2-17.
2. Install the Normal Server. See Installing a Normal Server from the Setup
Program on page 2-23.
3. Install the Management Console. See Installing the Management Console
on page 2-20. You can install additional Management Consoles on any
Windows server or desktop system computer in the network.
Note
Only one Management Console can manage an Information Server at any
given time.
Removing ServerProtect
ServerProtect’s three components can be removed either together or
separately. Individual removal is discussed in the following sections.
2-33
Trend Micro ServerProtect for Storage Getting Started Guide
1. Select the Normal Servers intended for removal from the Management
Console.
2. From the main menu, navigate from Domain > Uninstall ServerProtect.
To remove a Normal Server locally:
1. Navigate from Windows Desktop’s Control Panel > Add/Remove
Programs.
2. Select the Normal Servers intended for removal and click the Remove
button.
Procedure
1. Click Start > Control Panel > Add/Remove Programs.
2. Click ServerProtect Information Server, and then click Remove.
Procedure
1. Click Start > Control Panel > Add/Remove Programs.
2. Click ServerProtect Management Console, and then click Remove.
2-34
Chapter 3
Managing ServerProtect
This chapter covers the essential tools for managing ServerProtect.
Additional management tools are explained in the online help of the
Management Console.
The topics included in this chapter are:
• Using the Management Console on page 3-3
• Managing ServerProtect Domains on page 3-10
• Managing Information Servers on page 3-14
• Managing Normal Servers on page 3-16
• Configuring Updates on page 3-31
• Deploying Updates on page 3-42
• Managing Tasks on page 3-47
• Configuring Notification Messages on page 3-64
• Scanning Viruses for Normal Server on page 3-71
• Using Real-Time Scan on page 3-80
• Using Scan Now (Manual Scan) on page 3-84
• Scheduled Scanning on page 3-90
3-1
Trend Micro ServerProtect for Storage Getting Started Guide
3-2
Managing ServerProtect
Procedure
1. Click Start > Trend Micro ServerProtect Management Console. The
system prompts for the administration password to log on to the
selected Information Server.
Note
If you are managing more than one Information Server, you will be
prompted to choose one from a list before proceeding.
2. Provide the valid password which is designated during the course of the
Information Server installation. Click OK to continue. Note that the
password is case-sensitive and that only one Information Server can be
logged on at any given time.
3. If it is the first time for the ServerProtect to run on the system, a
message box appears, indicating that new updates may be available on
the Trend Micro ActiveUpdate Server to download and deploy. It is
3-3
Trend Micro ServerProtect for Storage Getting Started Guide
3-4
Managing ServerProtect
• Domain Browser Tree: located on the right of the Side Bar and below
the Main Menu; the tree view presents the ServerProtect organization,
including the Information Server, Domain elements, and Normal
Servers
• Configuration Area: has a light gray background color on the right side
of the main Window; provides information and UI elements to configure
the virus scan and log report systems
Main Menu
The Main menu at the top of the screen includes:
• Information Server: Information Server configuration; for example,
back up or restore the Information Server or move it on the network
• Domain: change the domain and server organization shown on the
domain browser tree
• Configure: modify the scanning and log file configuration or set the
console refresh frequency
• View: view ServerProtect log files, scan results, and the Trend Micro
Virus Encyclopedia.
• Do:
• Create Task / Existing Task: create or modify tasks
• Scan Now: perform on-demand scans
• Update / Rollback: update or roll back various ServerProtect
antivirus elements
• Control Manager (CM) Agent Settings: register, unregister and
configure Trend Micro Control Manager settings
• Update Serial Number: type a new serial number to replace an
expired one
• Change Password: change the IS password
• Find Domain: find domains or servers
3-5
Trend Micro ServerProtect for Storage Getting Started Guide
• Connect to Server with STOP Sign: use when the Normal Server is
running and managed by one Information Server, but displays STOP
in the Management Console
• Submit File: submit a suspicious file or a file that cannot be cleaned
to the virus doctor at Trend Micro free of charge; virus doctor will
clean the file and return it to you via e-mail
• Create Debug Info: manage log files that contain detailed
debugging information and send them to Trend Micro technical
support engineers for assistance
• Send Feature Request: use to send requests for new features that
you would like to see added to ServerProtect
• Help: open the online help system or view the ServerProtect product
information
Side Bar
The side bar is on the left side of the ServerProtect screen and includes seven
groups of items. It provides shortcuts to different functional areas of the
program.
• Task Group
• New Task: To create a new task
3-6
Managing ServerProtect
• Update Group
• Update: To download and deploy updates to the Normal Servers
located on the network
• Rollback: To roll back to a previous deployment action
performed on your network
• View Log Group
• View Log: To view historical information about antivirus events
that have occurred on the network
• Set Scan Option Group
• Real-time Scan: To configure a real-time virus scan on the
network
• Storage Scanner: To configure Storage Scanner virus scan
3-7
Trend Micro ServerProtect for Storage Getting Started Guide
Header
The column fields above the domain browser tree display useful
information, such as the computer’s operating system, virus pattern, scan
engine, program versions, real-time scan direction, and so on.
Information Server
An Information Server is the server that handles key information and
communication for domains. In addition, the Information Server links
domains together.
An Information Server
Domain
Domains are groupings of servers on your ServerProtect network. Normal
Servers that belong to a domain are managed together. ServerProtect
domains are different from Windows domains.
3-8
Managing ServerProtect
• A ServerProtect domain
Normal Server
The Normal Server can be any server in which ServerProtect is installed on a
network. In the ServerProtect architecture, a Normal Server is managed by
the Information Server.
• A Normal Server of 32-bit Microsoft Windows Server type
• A Normal Server that has been disconnected or its service has been
disabled
3-9
Trend Micro ServerProtect for Storage Getting Started Guide
Configuration Area
On the right side of the ServerProtect screen is the configuration area, where
you can type configuration data and view information about your corporate
network.
3-10
Managing ServerProtect
Note
If one of the servers in a domain is infected, the domain icon will change and
the infected server's icon will appear with a flame. This is to remind you to
scan the infected server and prevent the virus from spreading throughout
your network. To eliminate the infection icon(s), you need to purge all log
entries under Scan Result in the Management Console, or simply open all
these log entries.
Procedure
1. Do one of the following:
• Select the Information Server you want to add a domain. Navigate
from the main menu Domain > Add New Domain.
• Right-click the Information Server icon on the domain browser tree
and then click Add New Domain.
3-11
Trend Micro ServerProtect for Storage Getting Started Guide
3-12
Managing ServerProtect
Procedure
1. Select the domain you want to rename in the domain browser tree.
2. Do one of the following:
• Right-click the selected domain, and then click Rename Domain.
• Select Domain > Rename Domain on the main menu.
• Press the F2 key on the keyboard.
The Rename a Domain window appears.
3. Type the new domain name in the To text box and then click OK. Click
Cancel to close the window without saving.
3-13
Trend Micro ServerProtect for Storage Getting Started Guide
Procedure
1. Select the domain that you want to delete on the domain browser tree.
2. Do one of the following:
• Right-click the domain and then click Delete Domain.
• Click Domain > Delete Domain on the main menu.
• Press the Delete key of the keyboard.
Note
You cannot delete a domain if it contains any Normal Servers.
3-14
Managing ServerProtect
Tip
For large networks such as WANs, Trend Micro recommends that you install
an Information Server in each network segment. This will reduce the impact
on traffic.
Procedure
1. Click Information Server > Select Information Server on the main
menu.
The Select Information Server window appears.
2. Do one of the following:
• Type the name or IP address of the Information Server.
• Select the Information Server from the list.
Note that if more than one network interface cards (NIC) are installed on
the computer, only those Information Servers that connect to the
primary NIC are visible in the list box window. To refresh the view of
servers in the list, click Refresh button.
3-15
Trend Micro ServerProtect for Storage Getting Started Guide
3-16
Managing ServerProtect
Note
You can not use Move NS(s) to Another IS function to move one old normal
server into ServerProtect 6.0 Information Server.
Procedure
1. Do one of the following:
• Right-click the Normal Server that you want to move and then click
Move NS(s) to Another IS.
• Select the Normal Server that you want to move and then click
Domain > Move NS(s) to Another IS in the main menu. The Select
Destination Information Server window appears.
2. Select the destination Information Server and submit it by clicking on
the OK button. A dialog box Move NS(s) to Another IS dialog box
appears.
3. Fill either the User Name/Password fields or that of GUID with proper
values. Submit the dialog box by clicking on the OK button.
3-17
Trend Micro ServerProtect for Storage Getting Started Guide
Procedure
1. Right-click a Normal Server, and then select Devices List on the domain
browser tree.
The Devices List screen appears.
2. Click Add.
The Add Devices screen appears.
3-18
Managing ServerProtect
3. Do the following:
• Select 7-Mode Devices from the Devices mode drop-down list box.
• In the Devices name or IP address text box, type the name or IP
address of the NetApp 7-Mode Devices.
• In the Domain name text box, type the name of the domain where
the NetApp 7-Mode Devices is located.
Note
The domain name refers to the Windows domain in which NetApp
7-Mode Devices will authenticate registered users.
• In the User name and Password text boxes, type your NetApp 7-
Mode Devices logon credentials (requires backup operator or above
privileges).
4. Click OK.
Procedure
1. Right-click a Normal Server, and then select Devices List on the domain
browser tree.
The Devices List screen appears.
2. Click Add.
3-19
Trend Micro ServerProtect for Storage Getting Started Guide
3. Do the following:
• Select Cluster-Mode AV Connector from the Devices mode drop-
down list box.
• In the Domain name text box, type the name of the domain where
the NetApp Cluster-Mode AV Connector is located.
• In the User name and Password text boxes, type your NetApp
Cluster-Mode AV Connector logon credentials.
Note
If a Cluster-Mode AV Connector manages multiple Cluster-Mode Devices,
the logon account must be one of the privileged users on all Cluster-
Mode Devices managed by the Cluster-Mode AV Connector. Refer to your
NetApp Devices documentation for details.
4. Click OK.
3-20
Managing ServerProtect
Note
If the server computer, on which ServerProtect is to be installed, is
running Windows Server 2008 or later releases of Microsoft Windows,
add the Devices and the Scan Server into certain specified domains, and
add their IP addresses in Forward Lookup and Reverse Lookup zones.
Moreover, if the Devices and Scan Server are in different domains, you
must add the two domains in the Trust list by creating domain Trust.
Procedure
1. Open the command prompt for the NetApp Device that you want to
verify.
2. At the command prompt, type:
netapp> vscan scanners
3-21
Trend Micro ServerProtect for Storage Getting Started Guide
Procedure
1. Right-click a Scan Server, and then select Device List on the domain
browser tree. The Device List screen appears.
2. Select one or more NetApp 7-Mode Devices or Cluster-Mode AV
Connectors from the list. To select multiple several NetApp 7-Mode
Devices or Cluster-Mode AV Connectors, press the CTRL key as you
select.
3. Click Remove. The Remove Device confirmation screen appears.
4. Click OK.
3-22
Managing ServerProtect
Procedure
1. Right-click a Scan Server, and then select Device List on the domain
browser tree.
The Device List screen appears.
2. Select one or more NetApp 7-Mode Devices from the list. To select
multiple NetApp 7-Mode Devices, press the CTRL key as you select.
3. Click Logon Info.
The Logon Information screen appears.
4. Do the following:
• In the Domain name text box, type the name of the domain where
the NetApp 7-Mode Device is located.
• In the User name and Password text boxes, type your NetApp 7-
Mode Device logon credentials (requires backup operator or above
privileges).
5. Click Apply to update the NetApp 7-Mode Device information.
The confirmation screen appears.
6. Click OK.
The following information is necessary to update a Cluster-Mode AV
Connector’s system information in ServerProtect for Storage:
• An account that has been added to privileged users on all Cluster-
Mode Devices managed by the Cluster-Mode AV Connector
3-23
Trend Micro ServerProtect for Storage Getting Started Guide
Note
For the highest level of security set Real-time Scan to Incoming & outgoing.
However, if the computer only performs as a Scan Server, you can use the
default setting (Incoming).
The following procedure describes hot to set Real-time Scan to Incoming &
outgoing.
Procedure
1. Select either the Information Server, domain, or a Normal Server (Scan
Server) on the domain browser tree.
2. Do one of the following:
• Click Set Scan Option > Real-time Scan on the side bar
3-24
Managing ServerProtect
• Click Configure > Scan Options > Real-time Scan on the main
menu
The Real-time Scan configuration screen appears.
3-25
Trend Micro ServerProtect for Storage Getting Started Guide
Procedure
1. Right-click a Scan Server, and then select Device List on the domain
browser tree. The Device List screen appears.
2. Click Options. The Global Device Options screen appears.
Note
This setting will affect all the NetApp Devices in the Devices list.
Procedure
1. Right-click a Scan Server, and then select Device List on the domain
browser tree. The Device List screen appears.
3-26
Managing ServerProtect
Procedure
1. Select the Information Server, domain, or a Normal Server on the
domain browser tree.
2. Do one of the following:
• Select Configure > Notifications > Standard Alert from the main
menu.
• Click Set Notification, and then Standard Alert on the side bar.
3. Select Device RPC Connection Success/Failure.
3-27
Trend Micro ServerProtect for Storage Getting Started Guide
3-28
Managing ServerProtect
Procedure
1. Right-click a Normal Server, and then select ICAP Client List on the
domain browser tree.
The ICAP Client List screen appears.
3-29
Trend Micro ServerProtect for Storage Getting Started Guide
Procedure
1. Right-click a Normal Server, and then select ICAP Client List on the
domain browser tree.
The ICAP Client List screen appears.
2. Click Add.
The Add ICAP Client Address screen appears.
3. Do one of the following:
• Select IP/Hostname and type the IP address or the Hostname to add
single ICAP Client.
• Select IP Range and type the IP range to add multiple ICAP clients.
4. Click OK.
Procedure
1. Right-click a Normal Server, and then select ICAP Client List on the
domain browser tree.
The ICAP Client List screen appears.
2. Select an ICAP client or the IP range from the list. To select multiple
entries, press the CTRL key as you select.
The Add ICAP Client Address screen appears.
3. Click Remove.
3-30
Managing ServerProtect
Configuring Updates
Trend Micro update server allows you to update ServerProtect components.
The update process comprises downloading and deploying the updates.
Update Components
The following are the ServerProtect components that you can update:
• Virus pattern file: Trend Micro antivirus scan software uses a detection
method called pattern matching. Files on a computer are examined and
compared to the virus pattern file that contains the "electronic
fingerprint" of thousands of known computer viruses. If a file on your
computer matches one in the pattern file, the antivirus scan software
detects it as being infected.
• Spyware pattern file: The spyware pattern identifies spyware/grayware
in files, programs and modules in memory, Windows registry and URL
shortcuts.
• Scan engine (for 32-bit and 64-bit Windows and NetWare platform):
The scan engine is the software component that performs the actual
virus detect operations.
• Virus Cleanup Engine (for 32-bit and 64-bit Windows): the Engine
scans for and removes Trojans and Trojan processes. It supports 32-bit
and 64-bit platforms.
• Virus Cleanup Template: The Virus Cleanup Template is used by the
Virus Cleanup Engine to identify Trojan files and processes so the VCE
can eliminate them.
• Anti-Rootkit Driver (for 32-bit Windows only): Anti-rootkit Driver is a
kernel mode driver used by the Damage Cleanup Engine that provides
functionality to bypass any potential redirection by rootkits.
3-31
Trend Micro ServerProtect for Storage Getting Started Guide
3-32
Managing ServerProtect
The following version information used by the system are shown at the top
of the Update screen.
• ServerProtect version
• Virus Pattern version
• Spyware Pattern version
• Virus Scan Engine version (32-bit /64-bit)
• Virus Cleanup Template version
3-33
Trend Micro ServerProtect for Storage Getting Started Guide
Downloading Updates
We recommend that you regularly download updates from the Trend Micro
update server to ensure continued protection. Trend Micro releases new
virus pattern files several times each week. The scan engine files, on the
other hand, are updated less frequently.
After downloading updates from the Trend Micro update server, you can
designate a network drive to act as a download source (mirror) for other
Information Servers on your network. This will avoid redundant downloads.
Downloading updates from a network drive is ideal for large networks (such
as Intranets) with multiple Information Servers. Before attempting to
download update files from another server, you must make sure the source
server has the updated files.
Procedure
1. Do one of the following:
• Click Update > Update on the side bar.
• Click Do > Update from the main menu.
3-34
Managing ServerProtect
4. Click OK. The downloaded files will be saved in the following directory
of the Information Server:
\ProgramFiles\Trend\SProtect\SpntShare
WARNING!
In order to download updates from a local or network drive, you must first
create a download source folder. For details, see Creating a Download Source
Folder on page 3-36.
Procedure
1. Do one of the following:
• Click Update > Update on the side bar.
• Click Do > Update from the main menu.
2. Under Download, click Configure.
The Download Option window appears.
3. Click From a local or network drive.
4. Type the UNC path where the files are being kept to download the
update files from another server on you network. Use UNC format,
rather than mapped drive format to identify the source server.
For example:
\\servername\foldername
3-35
Trend Micro ServerProtect for Storage Getting Started Guide
5. Type the User name and Password to access the source server. The
server you are updating from must have previously downloaded a copy
of the update files.
6. Click OK.
Procedure
1. Execute an update from the Internet by clicking Download Now.
2. Do one of the following:
• Make the SpntShare folder, located under <drive>:\ProgramFiles
\Trend\SProtect\ in the designated Information Server, a shared
folder.
• Create a shared folder on a network server and then copy all the
files in the SpntShare folder to the mentioned shared folder.
Note
If you do not select the SpntShare folder as your download source, you
need to copy all the files in the SpntShare folder of the designated
Information Server to the mentioned shared folder every time you
execute an update from the Internet.
Procedure
1. Do one of the following:
3-36
Managing ServerProtect
Note
Before you use Download Now for the first time, you need to configure
the download settings. Failure to do so, could prompt an "Source network
generic failure" or "HTTP timeout" message when you click Download
Now. For details, see Configuring Download Settings on page 3-39.
Procedure
1. Do one of the following:
• Click Update > Update on the side bar.
• Click Do > Update from the main menu.
2. Under Download, click Configure.
The Download Option window appears.
3. Click the Schedule Setting tab.
3-37
Trend Micro ServerProtect for Storage Getting Started Guide
3-38
Managing ServerProtect
Procedure
1. Do one of the following:
• Click Update > Update on the side bar.
• Click Do > Update from the main menu.
2. Click Configure on the Update screen to change your download
configuration.
The Download Option window appears.
3-39
Trend Micro ServerProtect for Storage Getting Started Guide
Procedure
1. Do one of the following:
• Click Update > Update on the side bar.
• Click Do > Update from the main menu.
2. Under Download, click Configure.
The Download Option window appears.
3. Click the Proxy Setting tab.
3-40
Managing ServerProtect
4. Select the Connect to the Internet through a proxy server check box.
5. In the Protocol type list, click the protocol used for downloading. The
protocols supported are: HTTP and SOCK4.
6. Under Proxy Setting do the following:
• In the Proxy Server and Port no text boxes, type the name of the
proxy server and the port number used.
• In the User name and Password text boxes, type the appropriate
information for the proxy server.
7. Click OK.
3-41
Trend Micro ServerProtect for Storage Getting Started Guide
Deploying Updates
When an Information Server deploys updates to Normal Servers, it sends
commands to each Normal Server, requesting them to obtain a copy of the
updates. ServerProtect records both the connection and deployment process
in a log file.
Procedure
1. Do one of the following:
• Click Update > Update on the side bar.
• Click Do > Update from the main menu.
2. Click Deploy Now. A confirmation window appears. Click Yes to proceed
with the manual update deployment.
3-42
Managing ServerProtect
3-43
Trend Micro ServerProtect for Storage Getting Started Guide
Tip
When setting the time for downloading and deploying updates, be sure to set
the download time before the deployment.
Procedure
1. Do one of the following:
• Click Update > Update on the side bar.
• Click Do > Update from the main menu.
2. Click Configure in the Deploy section.
3-44
Managing ServerProtect
Note
If both the virus pattern and the scan engine files were originally deployed,
you must roll both of them back.
3-45
Trend Micro ServerProtect for Storage Getting Started Guide
Procedure
1. Do one of the following:
• Click Update > Rollback on the side bar.
• Click Do > Rollback from the main menu.
The Rollback screen appears.
2. Click Rollback.
3-46
Managing ServerProtect
The screen displays information about the virus pattern file and scan
engine that is currently being used by ServerProtect. The respective
version and build numbers are also shown.
3. Select the check boxes of the items you want to roll back, and then click
Rollback.
Note
You can only roll back the components which is most recently updated,
The components can either be a virus pattern or a scan engine.
Managing Tasks
Tasks allow you to schedule Normal Servers to perform multiple functions
simultaneously. Using tasks automates routine antivirus maintenance
procedures on your network and improves the management of your antivirus
policy.
You can define a task to run several procedures at one time in the same
manner as macros automate word processing programs, or scripts automate
routine network administration tasks.
3-47
Trend Micro ServerProtect for Storage Getting Started Guide
Tasks are assigned to a "task owner" who is responsible for maintaining the
task.
3-48
Managing ServerProtect
3-49
Trend Micro ServerProtect for Storage Getting Started Guide
Default Tasks
Default tasks are created by ServerProtect with every Normal Server
installation. When you install ServerProtect for the first time, you
immediately have three default tasks: Scan, Statistics, and Deploy. You can
edit default tasks, however, you cannot modify the task name or the task
owner.
Creating Tasks
New tasks let you set up routine maintenance and configuration procedures.
Creating a Task
Procedure
1. Select the Information Server, domain, or Normal Server on the domain
browser tree.
2. Do one of the following:
• Click Do > Create Task on the main menu.
• Click Task > New Task on the side bar.
3. Click Create.
3-50
Managing ServerProtect
4. Select the functions you want to include in this task in the Existing tasks
list.
5. Click Add #n Task Item to add the selected function to the Selected task
list. You can continue adding more functions. Alternatively, you can
remove a previously selected function.
Tip
You can click the up or down arrow icons next to Selected task(s) to
change the order in which the functions are performed. The Deploy
function should always be the last one on the list.
6. Select the Create as a scheduled task check box if you want this task to
be run according to a specified schedule. You can schedule tasks to run
on an hourly basis.
3-51
Trend Micro ServerProtect for Storage Getting Started Guide
7. Click Create to start the wizard and create a task with the selected
functions. Click Cancel to close the Create New window without saving
your changes.
Procedure
1. Follow steps 1 through 6 in Creating a Task on page 3-50. Make sure you
select the Create as a scheduled task check box under Scheduled task.
The Task Wizard window appears.
2. Click Next.
3-52
Managing ServerProtect
3-53
Trend Micro ServerProtect for Storage Getting Started Guide
3-54
Managing ServerProtect
and/or directories. The latter option also allows you to scan another drive on
the network.
3-55
Trend Micro ServerProtect for Storage Getting Started Guide
3-56
Managing ServerProtect
3-57
Trend Micro ServerProtect for Storage Getting Started Guide
Note
If the servers to which a task is applied are located in different time zones, the
time/date displayed in the Last Perform Time and Next Schedule fields will
reflect the local time for each server.
Procedure
1. Do one of the following:
• Click Task > Existing Task on the side bar.
• Click Do > Existing Task on the main menu.
The Existing Task list displays all of the tasks that are currently defined
within ServerProtect.
2. Select the task that you want to run, and click Perform Now.
Procedure
1. Do one of the following:
• Click Task > Existing Task on the side bar.
• Click Do > Existing Task on the main menu.
The Existing Task list appears.
3-58
Managing ServerProtect
2. Click the task in the Existing Task list that you want to modify.
3. Click Modify.
The Modify Task window appears.
Procedure
1. In the Select Servers to Apply Tasks window, select and add the server
on which you want to run the task.
2. Click Add.
3-59
Trend Micro ServerProtect for Storage Getting Started Guide
3. Click Apply. To close the window without saving your changes, click
Cancel.
Procedure
1. Select each function you want to include in this task in the Existing
Tasks list.
3-60
Managing ServerProtect
2. Click Add #n Task Item to add the function you selected to the Selected
task list.
If you want this task to be scheduled to run, make sure that you select
the Create as a scheduled task check box.
Tip
You can click the up or down arrow icons next to Selected task(s) to
change the order in which the functions are performed. The Deploy
function should always be the last one on the list.
3. Click Modify to start the wizard that will help you create a task with the
functions that you have chosen. Click Cancel to close the Create New
Task window without saving your changes.
3-61
Trend Micro ServerProtect for Storage Getting Started Guide
Procedure
1. Do one of the following:
• Click Do > Existing Task on the main menu.
• Click Task > Existing Task on the side bar.
2. Select the task in the Existing Task list that you want to view.
3. Click View at the bottom of the configuration area. Alternatively, you can
double-click the task’s record entry in the Existing Task table. The View
Task Information window appears.
3-62
Managing ServerProtect
3-63
Trend Micro ServerProtect for Storage Getting Started Guide
• Task Status: The Target Server displays all of the servers on your
network on which the task will run. The Current Status, Last
Perform Time, and Next Schedule fields display the status of the
task and the last time it was run.
4. Click OK to close the View Task Information window.
Procedure
1. Do one of the following:
• Click Do > Existing Task on the main menu.
• Click Task > Existing Task on the side bar.
2. In the Existing Task list, select the task you want to remove.
3. Click Remove.
Standard Alerts
A standard alert is generated whenever a selected event is detected on the
designated server. You can append additional text to a notification message.
3-64
Managing ServerProtect
Notification Events
You can configure ServerProtect to notify you when the following events
occur.
• Virus/Malware detected: an infected file on the server was detected
• Spyware/Grayware Detected: Detection of a Spyware-infected file on
the server
• Attempt to change write-protected file: Any attempt to change the
write-protected settings
• Real-time configuration change: Changes to the configuration settings
of Real-time Scan
• Service load/unload: To stop/start the ServerProtect
• Device RPC connection success/failure: Status of an RPC connection to
a NetApp Device
• Virus pattern out-of-date: Expiration of the virus pattern file
• Spyware pattern out-of-date: Expiration of the Spyware pattern file
Procedure
1. Select the Information Server domain, or a Normal Server on the
domain browser tree.
2. Do one of the following:
• Click Configure > Notifications > Standard Alert on the main
menu.
• Click Set Notification > Standard Alert on the side bar.
3-65
Trend Micro ServerProtect for Storage Getting Started Guide
Note
To find out more on configuring alert messages, refer to the related topic
in the online help.
Outbreak Alerts
Virus outbreaks have a high potential for damage on a corporate network.
Whenever the number of virus events exceeds the threshold, an outbreak
alert is triggered to notify the system administrator.
3-66
Managing ServerProtect
Procedure
1. Select the Information Server domain, or a Normal Server on the
domain browser tree.
2. Do one of the following:
• Click Set Notification > Outbreak Alert on the side bar.
• Click Configure > Notifications > Outbreak Alert on the main
menu.
3-67
Trend Micro ServerProtect for Storage Getting Started Guide
3-68
Managing ServerProtect
Procedure
1. Click either the Information Server domain, or a Normal Server on the
domain browser tree.
3-69
Trend Micro ServerProtect for Storage Getting Started Guide
4. Do the following:
a. Type the name of the mail server in the Mail Server text box.
b. Type the subject of the message in the Subject field text box.
c. Type the name of the sender in the From field text box.
3-70
Managing ServerProtect
5. Type each recipient of this email message in the To user(s) text box and
then click Add. You can remove a recipient by selecting the user, and
then clicking Remove.
6. Click Save & Test to ensure that the configuration settings are working.
If successful, the users that you specified receive a test email message.
7. Click OK to save your configuration changes and return to the Set Alert
Method window.
Note
To find out more about configuring alert messages, refer to the related
topic in the online help.
3-71
Trend Micro ServerProtect for Storage Getting Started Guide
Note
The results of each scan are available in the Scan Result logs. You can take
action on the infected files directly from the Scan Result window. This
provides a convenient way to take appropriate actions during a virus infection
event. For more information, refer to the Viewing Scan Result Information
topic in the online help.
3-72
Managing ServerProtect
Procedure
1. Click Set Action from the Scan Now or Real-time Scan configuration
area. The Set Virus Action window appears.
3-73
Trend Micro ServerProtect for Storage Getting Started Guide
Note
Spyware doesn't support clean action. If the action of virus is clean/
delete, for spyware virus it will only do delete operation.
2. Under Boot Viruses in the Action list, click the virus action you want
ServerProtect to take when it finds a boot virus. You can select Auto
Clean or Bypass.
3. Under File Viruses, do one of the following:
• Click Use ActiveAction to set Trend Micro recommended virus
actions. Beware that the action can be taken to handle spyware
infection is limited to Bypass, and that the action Clean is not
supported to handle spyware infection. Applying Clean action to a
spyware infected file results the deletion of the file.
Note
When using ActiveAction, spyware action will be bypass/bypass.
Note
If you selected a Clean action, we recommend that you select the Backup
infected file before cleaning check box. The virus cleaning process can,
on rare occasions, damage files and make them unusable.
You should exclude both the backup and quarantine directories from
scanning. Refer to the Directory Exclusion List topic in the online help
for more information. The selected scan type is displayed under Scan
type to be applied.
4. Click Apply to start using these settings.
3-74
Managing ServerProtect
Note
The EMC CAVA Scanner protects storage devices using Real-time Scan. If
the Normal Server is an EMC CAVA Scanner, the configuration of Real-
time Scan will also be applied to the EMC CAVA Scanner.
Scanning Profiles
Real-time Scan and Scan Now configurations can be saved as scanning
profiles that can then be used to create or modify tasks. Alternatively, you
can delete profiles if they are no longer needed. Scanning profiles can be
applied when configuring Scan Now and Real-time Scan tasks. For more
information, see Choosing a scan profile in the online help.
For scheduled scans, that is, scheduled scan tasks, you can either choose an
existing scanning profile or create your own. See Modifying an Existing Task
on page 3-58.
Procedure
1. Configure a Real-time Scan or Scan Now.
See Configuring Real-Time Scan on page 3-81 and Configuring Scan Now on
page 3-85.
2. Click Save As/ Delete Profile.
3-75
Trend Micro ServerProtect for Storage Getting Started Guide
Procedure
1. Do one of the following:
• Click Scan Now > Scan Now on the side bar.
• Click Do > Scan Now on the main menu.
• Click Set Scan option > Real-time Scan on the side bar.
2. Click Save As/ Delete Profile.
The Save/Delete Profile window appears.
3-76
Managing ServerProtect
3. Click the profile you want to delete in the Existing Profiles list.
4. Click Delete to delete the profile. Alternatively, click Close to close the
window without deleting it.
3-77
Trend Micro ServerProtect for Storage Getting Started Guide
Figure 3-38. Set Action dialog for RPC and EMC CAVA Scanner
Procedure
1. Click Set Action from the Storage Scanner configuration area. The Set
Action dialog appears.
2. Under File Viruses, do one of the following:
• Click Use ActiveAction to set Trend Micro recommended virus
actions. Beware that the action can be taken to handle spyware
infection is limited to Bypass, and that the action Clean is not
supported to handle spyware infection. Applying the Clean action to
a spyware infected file will delete the file.
• Click Customize scan actions, to select the appropriate action to
take against the file and macro viruses in the Action and Action if
3-78
Managing ServerProtect
Note
If you selected a Clean action, Trend Micro recommends selecting
the Backup infected file before cleaning check box. The virus
cleaning process can, on rare occasions, damage files and make
them unusable.
Note
The EMC CAVA Scanner protects storage devices using Real-time Scan. If
the Normal Server is an EMC CAVA Scanner, the configuration of EMC
CAVA Scanner will also be applied to Real-time Scan.
3-79
Trend Micro ServerProtect for Storage Getting Started Guide
Procedure
1. Click Set Action from the Storage Scanner configuration area. The Set
Action dialog appears.
2. Under File Viruses, select the appropriate action to take against the file
and macro viruses in the Action and Action if cleaning fails lists. See
When ServerProtect Finds a Virus (Virus Actions) on page 1-20 for more
information.
3. Click Apply to start using these settings.
3-80
Managing ServerProtect
• Scan mapped network drive: This option scans any mapped network
drive. You should have an existing network mapped drive for this option
to work.
Procedure
1. Select the Information Server, domain, or a Normal Server on the
domain browser tree.
2. Do one of the following:
• Click Set Scan Option > Real-time Scan on the side bar.
• Click Configure > Scan Options > Real time Scan on the main
menu.
3-81
Trend Micro ServerProtect for Storage Getting Started Guide
3-82
Figure 3-40. Real-time Scanning Configuration Window
Managing ServerProtect
3-83
Trend Micro ServerProtect for Storage Getting Started Guide
8. Select the Scan compressed files check box to scan compressed files and
then move the Scan level slider to set the number of compressed layers
that you want to scan. For information on advanced settings, refer to the
Compressed file scan topic in the online help.
Note
If you choose to scan selected file types in step 5, make sure you select
the extensions of compressed files in the extension list.
Note
The EMC CAVA Scanner protects storage devices using Real-time Scan. If
the Normal Server is an EMC CAVA Scanner, the configuration of Real-
time Scan will also be applied to EMC CAVA Scanner.
3-84
Managing ServerProtect
Procedure
1. Click the Information Server, domain, or a Normal Server on the domain
browser tree.
2. Do one of the following to bring about the configuration pane for Scan
Now operation:
• Click Scan Now > Scan Now on the side bar.
• Click Do > Scan Now from the main menu.
3-85
Trend Micro ServerProtect for Storage Getting Started Guide
3. Set Enable Damage Cleanup Service check box to enable the service.
Clear it to disable the service.
4. Under Scan target, choose one of the following:
• All local drives: Scans all drives in a server
• Selected drives/directories: Scans specific drives or directories on
a server
Click Browse. The Add Drives and/or Directories window appears.
Select the check box(es) for the drives or directories you want to
scan, then click OK to close the window.
3-87
Trend Micro ServerProtect for Storage Getting Started Guide
Note
If you choose to scan selected file types in step 4, make sure you include
the extensions of compressed files in the extension list.
8. Under Scan priority, click Low, Middle, or High. A high scan priority
consumes more CPU resources, but can complete scan jobs faster.
9. Click Set Action to configure how ServerProtect acts on infected files.
See Defining Actions Against Viruses on page 3-73.
10. Click Apply to save the changes or click Save As Profile to recall the
configuration settings at a later time.
3-88
Managing ServerProtect
according to the Scan Now configurations you have set in the Management
Console (for example, Scan target, Scan file type).
Procedure
1. Click Start > Programs > Accessories > Windows Explorer on the
Normal Server.
The Windows Explorer window appears.
2. Click the folder where you installed ServerProtect.
The default location for a 32-bit operating system is:
C:\Program Files\Trend\SProtect
3. Double-click ScanNow.EXE.
A Scan Now is performed.
Procedure
1. Click Start > Run on the Normal Server. The Run window appears.
2. Click Browse and locate the ScanNow.EXE file.
The default location for a 32-bit operating system is:
C:\Program Files\Trend\SProtect
3-89
Trend Micro ServerProtect for Storage Getting Started Guide
4. Click OK.
Scan Now stops.
Note
You must include a space between the file name and the Stop switch.
Scheduled Scanning
A scheduled scan scans files at the time and frequency configured. Use
scheduled scans to automate routine scans on your Normal Servers. You can
create a scheduled Scan Now or Real-time Scan by using a scheduled task.
Note
When a ServerProtect server is installed, ServerProtect automatically applies a
Scan task to the server. The default Scan task is set to scan all your local
directories every Friday.
If the existing task does not suit your needs, you can either edit the default
task, or create a new one. The ServerProtect Task Wizard guides you
through the process of creating new tasks.
3-90
Managing ServerProtect
Procedure
1. Click a Normal Server with RPC Scanner on the domain browser tree.
2. Do one of the following:
• Click Set Scan Option > Storage Scanner on the side bar.
• Click Do > Storage Scanner on the main menu.
3-91
Trend Micro ServerProtect for Storage Getting Started Guide
Procedure
1. Click a Normal Server with RPC Scanner on the domain browser tree.
2. Do one of the following:
• Click Set Scan Option > Storage Scanner on the side bar.
• Click Do > Storage Scanner on the main menu.
3. Click Duplicate.
3-92
Managing ServerProtect
Note
The scanner type of Normal Server(s) shows in Available Server List is
the same with the scanner type of the source Normal Server.
Note
This procedure does not duplicate the quarantine directory and backup
directory.
3-93
Trend Micro ServerProtect for Storage Getting Started Guide
Note
The EMC CAVA Scanner protects storage devices using Real-time Scan. If the
Normal Server is an EMC CAVA Scanner, the configuration of EMC CAVA
Scanner will also be applied to Real-time Scan.
3-94
Managing ServerProtect
Procedure
1. Click a Normal Server with EMC CAVA Scanner on the domain browser
tree.
2. Do one of the following:
• Click Set Scan Option > Storage Scanner on the side bar.
• Click Do > Storage Scanner on the main menu.
3-95
Trend Micro ServerProtect for Storage Getting Started Guide
Note
The Incoming option is not supported by EMC CAVA/Huawei Antivirus
Agent. Trend Micro recommends selecting Incoming and Outgoing,
which scans files in both directions.
3-96
Managing ServerProtect
Note
If you choose to scan selected file types in step 5, make sure you select
the extensions of compressed files in the extension list.
3-97
Trend Micro ServerProtect for Storage Getting Started Guide
Note
The scanner type of Normal Server(s) shows in Available Server List is
the same with the scanner type of the source Normal Server.
Note
This procedure does not duplicate the quarantine directory and backup
directory.
Procedure
1. Click a Normal Server with ICAP Scanner on the domain browser tree.
3-98
Managing ServerProtect
3-99
Trend Micro ServerProtect for Storage Getting Started Guide
Procedure
1. Click a Normal Server with CAP Scanner on the domain browser tree.
2. Do one of the following:
• Click Set Scan Option > Storage Scanner on the side bar.
• Click Do > Storage Scanner on the main menu.
3. Click Duplicate.
3-100
Managing ServerProtect
Note
The scanner type of Normal Server(s) shows in Available Server List is
the same with the scanner type of the source Normal Server.
Note
This procedure does not duplicate the port number.
3-101
Trend Micro ServerProtect for Storage Getting Started Guide
the file extensions. Since only certain kinds of files can contain viruses, you
can benefit from this function by only scanning those file types that are more
likely to be infected.
Procedure
1. In the Real-time Scan or Scan Now configuration area, under Scan file
type, click Selected files, and then click Extension List to define the file
types you want to scan.
The Select File for Scanning window then appears.
3-102
Managing ServerProtect
Type the file extension that you want to add in the text box, and
then click OK to add the extension to your list. Alternatively, click
Cancel to close the window without saving your changes. Finally,
click OK to close the Select files for Scanning window.
• Click Default to add all the default file extensions and then click OK
to close the Select files for Scanning window. Any customized
extensions will be lost.
The default setting provides sufficient protection for most
environments. For more information, see Supported File Extensions
for Scanning on page 3-103.
• Select the file extension you want to delete, and then click Delete.
3-103
Trend Micro ServerProtect for Storage Getting Started Guide
• .MPT
• .OVL
• .PPT
• .SHS
• .VSD
• .XLT
• .BIN
• .COM
• .DRV
• .HTA
• .LZH
• .MSG
• .PIF
• .RAR
• .SYS
• .VST
• .Z
• .CAB
• .DLL
• .EXE
• .HTM
• .MDB
• .OCX
• .POT
3-104
Managing ServerProtect
• .RTF
• .TAR
• .XLA
• .ZIP
• .CLA
• .DOC
• .GZ
• .HTML
• .MPP
• .OFT
• .PPS
• .SCR
• .VBS
• .XLS
Procedure
1. Select Set Scan OptionExclusion List from the left side bar.
2. Click Configure > Scan Options > Exclusion List on the main menu.
3. Under Excluded file extension list, click Add. The Add Program File
Extension dialog box appears.
3-105
Trend Micro ServerProtect for Storage Getting Started Guide
4. Type the file extensions that you want to exclude from being scanned.
You can add multiple file extension separated by a semicolon (;).
5. Click OK.
6. To delete a previously typed file extension, select the file name from the
Excluded file extension list, and then click Remove.
7. Click Apply.
3-106
Chapter 4
4-1
Trend Micro ServerProtect for Storage Getting Started Guide
Note
You cannot add an existing normal server by selecting "Add a Normal
Server" or "Move a Normal Server".
4-2
Upgrading Existing ServerProtect
4-3
Trend Micro ServerProtect for Storage Getting Started Guide
Note
Always keep in mind that all those components known to be existing in the
system must be selected to achieve a successful upgrade.
Set the check box corresponding to those options need to be upgraded and
click Browse... to bring up ServerProtect Installation Path Selection
window. See step 3 in Installing an Information Server on page 2-17. Navigate to
the target folder which needs to be upgraded on the local computer. The
installation program will complete the upgrade after copying the program
files and starting all related services.
Note
When make the selection to upgrade one ServerProtect component, keep in
mind to select all the existing components, including those of the latest
version already. Otherwise the installation program will pop up message box,
stating that other components must be choose to continue, and bring the user
back to the ServerProtect Selection Component window and request the user
to redo the selection
Note
If Trend Micro Control Manager Agent is installed, it should be upgraded after
the Information Server is installed.
4-4
Upgrading Existing ServerProtect
operation just as doing it locally. See Installing ServerProtect on page 2-12 for
detailed information.
Note
ServerProtect does not support installing or upgrading the Management
Console component remotely.
Note
The silent install should be used to upgrade the server only with normal
server exists. When silent installer detects the other components, it will quit
and do nothing.
Procedure
1. Install an Information Server.
2. Locate the SMS folder in the default installation path, and share it.
Note
Share the SMS folder with read and write permissions.
4-5
Trend Micro ServerProtect for Storage Getting Started Guide
Make sure the target servers you want to install as Normal Servers can
access the folder. If you want to perform more than one silent
installation, map the SMS folder on the target servers.
3. At the target server, navigate to the SMS folder or drive that is mapped to
the folder, open the file Setup.ini, and then add one of the following
lines at the end of the file to specify the scanner type:
• To install Normal Server as NetApp RPC Scanner:
[CommonSection]
NormalServerType=1
NormalServerType=2
NormalServerType=4
Note
If the NormalServerType in Setup.ini is not specified, the setup installs
the Normal Server as EMC CAVA Scanner by default.
Example:
a. At the target server, map the SMS folder to drive "M".
b. Open a command prompt.
c. Go to drive M: by typing "M:".
4-6
Upgrading Existing ServerProtect
e. Press Enter.
Silent install will proceed and the target server will be registered with
the Information Server.
For a silent installation, Normal Servers are installed in the "SMS"
domain. There is no way to change the domain name during the silent
installation. You can, however, rename the SMS domain after all the
Normal Servers have been installed.
You can also specify a path to which ServerProtect is installed. For
example, to install ServerProtect to the path D:\Utility\AntiVirus
\SProtect, do the following:
[CommonSection]
ServerTargetUNCPath=D$\Utility\AntiVirus\SProtect
Where:
ServerTargetUNCPath: Sets the location where the Normal Server
is installed.
To license the installed Normal Server, add the following lines to the
Setup.ini file in the source folder.
[CommonSection]
ServerTargetSN=XXXX-XXXX-XXXX-XXXX-XXXX
Where:
XXXX-XXXX-XXXX-XXXX-XXXX: Represents the legal serial number.
4-7
Trend Micro ServerProtect for Storage Getting Started Guide
You may not be able to register a Normal Server under the "SMS" domain
due to the use of a domain controller on the Information Server. To
resolve this issue, configure an IP address before using silent install.
To configure an IP address, do the following:
a. Go to the Setup.ini file in the SMS folder.
b. Replace the host name with its IP address next to AgentName then
save the file.
Note
During the course of perform upgrade in silent mode, caution should be
excised when sharing with others the SMS folder so that all those target
servers needs to be upgraded are included. See Installing ServerProtect in
Silent Mode on page 2-28 for detailed information to use this powerful
tool.
Note
After upgrading to this version from ServerProtect for NetApp or EMC Celerra,
all configuration options from your previous installation will remain
unchanged.
4-8
Upgrading Existing ServerProtect
The ServerProtect for Storage with RPC Scanner still manage to obtain
pattern updates from Trend update servers.
Solution:
Confirm the following conditions exist:
• Remote Procedure Call (RPC) is enabled on the servers
• Vscan is turned "On" on the NetApp Device
• The Common Internet File System (CIFS) default share (C$) still exists
After confirming these conditions, do the following:
1. Right-click a Scan Server, and then select Device List on the domain
browser tree. The Device List screen appears.
4-9
Trend Micro ServerProtect for Storage Getting Started Guide
2. Select one or more NetApp Devices from the list. To multi-select several
NetApp Devices, press the CTRL key as you select.
3. Click Logon Info. The Logon Information screen appears.
4. Verify the information is correct. Otherwise, reenter it.
5. Click OK.
After completing these steps, repeat the registration of the Scan Server in the
NetApp Device. If the password for the administrator account was recently
changed, the changes may not take effect until a start up/power-cycle of the
NetApp Device occurs.
The Scan Server completed scan on a file but original request was not found
when scanning large files on the NetApp Device
Description:
When scanning large files on the NetApp Device in ServerProtect for Storage
with RPC Scanner, the following message appears:
"[Server] completed scan on [FileName] but original request was
not found."
Solution:
This situation occurs because the scan period encountered a time out due to
the large size of the file. Resolve this issue by extending the Time Out period
between the NetApp Device and the Scan Server.
To extend the Time Out period between the NetApp Device and the Scan
Server, perform the following steps on the Scan Server:
1. Run Regedit.
2. Browse to the following key:
HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro\ServerProtect
\CurrentVersion\Engine\Devices
4-10
Upgrading Existing ServerProtect
Note
Default timeout period for ServerProtect is 24 seconds.
Configuring the ServerProtect for Storage with RPC Scanner to scan all file
types
Description:
How to configure ServerProtect for NetApp to scan all file types?
Solution:
To scan all files placed on the NetApp Device, change the extension table of
the NetApp Device so it supports all file extensions.
To make sure the extension table of the NetApp Device supports all file
extensions, type the following at the NetApp Device command prompt:
device> vscan extensions add ???
Note
The above command will make the NetApp Device scan all file types
regardless of their extension. The NetApp Device wild card is a question mark
(?) and not an asterisk (*).
4-11
Trend Micro ServerProtect for Storage Getting Started Guide
To add any file extension into the NetApp Device’s extension table, type the
following at the NetApp Device command prompt:
device> vscan extensions add vbs
The above command will make the NetApp Device scan file with a ".VBS"
extension. You can replace vbs with any three-letter file extension.
Scanning all files can degrade the NetApp Device’s performance and slow
down virus scanning. It is recommended to scan files that are prone to
viruses.
4-12
Chapter 5
5-1
Trend Micro ServerProtect for Storage Getting Started Guide
5-2
Managing ServerProtect with Trend Micro Control Manager
Procedure
1. Click Start > ServerProtect Management Console.
2. Do one of the following:
• Click CM Agent Setting on the side bar.
• Click Do > Control Manager (CM) Agent Setting on the main menu.
5-3
Trend Micro ServerProtect for Storage Getting Started Guide
Note
The Server name or IP address field automatically fills the host
name or the IP address of the computer on which you have installed
ServerProtect.
5-4
Managing ServerProtect with Trend Micro Control Manager
Note
If you use IIS server authentication, you cannot set ServerProtect to
update components from Control Manager. You must specify the URL of
an update server (either the Trend Micro ActiveUpdate server or the one
you set up) as the download source in the Scheduled Update or Manual
Update screen.
5. If you use a proxy server to access the Trend Micro Control Manager
server, select Use a proxy server for communication with Control
Manager server under Proxy Settings section, and then configure the
following:
• Proxy Protocol: Select a proxy protocol.
• Proxy server name or IP address: Type the proxy server name or its
IP address.
• Proxy server port: Type the proxy server’s port number.
5-5
Trend Micro ServerProtect for Storage Getting Started Guide
Procedure
1. Click Start > ServerProtect Management Console.
5-6
Managing ServerProtect with Trend Micro Control Manager
5-7
Chapter 6
Technical Support
Learn about the following topics:
• Troubleshooting Resources on page 6-2
• Contacting Trend Micro on page 6-3
• Sending Suspicious Content to Trend Micro on page 6-4
• Other Resources on page 6-5
6-1
Trend Micro ServerProtect for Storage Getting Started Guide
Troubleshooting Resources
Before contacting technical support, consider visiting the following Trend
Micro online resources.
Procedure
1. Go to https://success.trendmicro.com.
2. Select from the available products or click the appropriate button to
search for solutions.
3. Use the Search Support box to search for available solutions.
4. If no solution is found, click Contact Support and select the type of
support needed.
Tip
To submit a support case online, visit the following URL:
https://success.trendmicro.com/smb-new-request
Threat Encyclopedia
Most malware today consists of blended threats, which combine two or more
technologies, to bypass computer security protocols. Trend Micro combats
this complex malware with products that create a custom defense strategy.
The Threat Encyclopedia provides a comprehensive list of names and
symptoms for various blended threats, including known malware, spam,
malicious URLs, and known vulnerabilities.
6-2
Technical Support
Go to https://www.trendmicro.com/vinfo/us/threat-encyclopedia/#malware
to learn more about:
• Malware and malicious mobile code currently active or "in the wild"
• Correlated threat information pages to form a complete web attack story
• Internet threat advisories about targeted attacks and security threats
• Web attack and online trend information
• Weekly malware reports
Website https://www.trendmicro.com
6-3
Trend Micro ServerProtect for Storage Getting Started Guide
6-4
Technical Support
Other Resources
In addition to solutions and support, there are many other helpful resources
available online to stay up to date, learn about innovations, and be aware of
the latest security trends.
Download Center
From time to time, Trend Micro may release a patch for a reported known
issue or an upgrade that applies to a specific product or service. To find out
whether any patches are available, go to:
https://www.trendmicro.com/download/
If a patch has not been applied (patches are dated), open the Readme file to
determine whether it is relevant to your environment. The Readme file also
contains installation instructions.
Documentation Feedback
Trend Micro always seeks to improve its documentation. If you have
questions, comments, or suggestions about this or any Trend Micro
document, please go to the following site:
https://docs.trendmicro.com/en-us/survey.aspx
6-5
Appendix A
A-1
Trend Micro ServerProtect for Storage Getting Started Guide
Procedure
1. Click Help > About on the main menu.
A-2
Converting the ServerProtect Trial Version
3. Click Close to close the Serial Number List window, and then click OK
to close the About ServerProtect Management Console window.
A-3
Trend Micro ServerProtect for Storage Getting Started Guide
Procedure
1. Select the Normal Server you want to update the serial number for in the
domain browser tree.
2. Click Do > Update Serial Number on the main menu.
The Enter New Serial Number window appears.
3. Type the new serial number in the New serial number text boxes.
A-4
Converting the ServerProtect Trial Version
Upgrading ServerProtect
• Can I rollback ServerProtect to the previous version?
No. You cannot rollback ServerProtect to the previous version after the
upgrade.
A-5
Trend Micro ServerProtect for Storage Getting Started Guide
Note
To receive the latest virus protection, it is highly recommended to update your
virus pattern files and virus scan engine immediately after the installation.
Also, you should modify the default Deploy task, and add the Spyware pattern,
Virus Cleanup Template, Virus Cleanup Engine, and Anti-rootkit Driver as the
update components.
A-6
Converting the ServerProtect Trial Version
Miscellaneous
• Why there are old logs in Control Manager when installing CMAgent?
Where did they come from?
After Control Manager agent is installed, ServerProtect sends all pre-
existing logs to the Control Manager Server. However, this may generate
additional network traffic. To avoid redundancy, purge all logs from the
Management Console before installing the CMAgent.
• I have installed Information Server in the computer system, which is
having multiple network cards belonging to different network segments.
Why the Information Server could not be displayed in the Information
Server list when Management Console is open, and the link between
Information Servers and Normal Servers is broken?
The Information Server could not be displayed in the Information Server
list because when Information Server/Normal Server attempts to
connect to the correct network, it could not reach the network. To
resolve the problem, uninstall both the Information Server and the
Normal Server and reinstall them
• Why I can not see the Normal Server’s icons in the system tray?
If you use a remote desktop connection, the Normal Server's icons may
not be displayed in the system tray.
• Why I cannot see the Pattern and Engine of Normal Server?
Normal Server Pattern and Engine and other related information will
not displayed in the Management Console if the Normal Server is
disconnected from the Information Server. A cross sign will be displayed
in the Management Console status window if the link between Normal
Server and Information Server is broken.
• Why I cannot register words in the exception list even when I enable
"ExcludeUNCPath" in Admin.ini?
The configured setting may not be reflected to the Management Console
when User Access Control (UAC) is enabled even though
ExcludeUNCPath is enabled in Admin.ini.
A-7
Trend Micro ServerProtect for Storage Getting Started Guide
• Why ServerProtect displays the login failure error if the Windows log-in
password is blank?
Since Microsoft Windows has user account restriction, it requires a
password for remote log-in. Therefore, if the password is not set, it will
result in ServerProtect displaying login failure error.
A-8
Index
D
documentation feedback, 6-5
S
support
resolve issues faster, 6-3
IN-1