Trend Micro™ Network VirusWall™ Enforcer 2500 Administrator’s Guide
1
-
16
•
Network Virus Policy
Configure Network Virus Policy to scan for network viruses and to help prevent
network outbreaks. If a network virus is detected, Network VirusWall Enforcer
2500 can monitor (allow the packet to reach it’s destination), drop the packet, or
quarantine the endpoint computer. Use damage cleanup to repair the damage that
viruses do to endpoint computers.
•
Network Application Policy
Configure Network Management Services to assess specific protocol, instant
messenger, and file transfer traffic. Monitor, reject, or drop packets that Network
VirusWall Enforcer 2500 detects. If you configure the action to reject the packet,
the action is different based on the protocol or layer 7 service. The device sends a
TCP RESET for TCP protocol related packets and ICMP Port Unreachable for
ICMP and UDP packets. The drop action filters out the selected network type
packets.
Viewing Logs to Assess Policy Enforcement
Logs provide information to help you monitor Policy Enforcement on your network.
Configure log settings from the Logs > Log Settings screen. You can also configure
the device to send the Endpoint History log to the Control Manager server from the
Log Settings screen. The device sends Endpoint History logs according to the time
you specify in Log Settings. However, Event and Network Virus logs are sent
immediately to Control Manager if the device is registered to a Control Manager
server.
Event Log—
Provides information on the Policy Enforcement configuration
modification.
Network Virus Log
—Provides information on viruses detected in your network.
Endpoint History
—Provides information on compliant endpoints, endpoints with
violations, and endpoints that are quarantined. (This information is sorted by IP
address and not by Date/Time.)
See the following pages to:
•
Configure Policy Enforcement,
•
Configure the Global Endpoint exception list,
•
Enable Windows Messenger Service popup message,