Trend Micro Interscan
Trend Micro Interscan
Trend Micro Interscan
the products described herein without notice. Before installing and using the
software, please review the readme file, release notes and the latest version of the
Getting Started Guide, which are available from the Trend Micro Web site at:
http://www.trendmicro.com/download/documentation/
NOTE: A license to the Trend Micro Software usually includes the right to product
updates, pattern file updates, and basic technical support for one (1) year from the
date of purchase only. Maintenance must be renewed on an annual basis at Trend
Micro’s then-current Maintenance fees.
Trend Micro, the Trend Micro t-ball logo, InterScan Web Security Suite, TrendLabs,
and Trend Micro Control Manager are trademarks or registered trademarks of Trend
Micro, Incorporated. All other product or company names may be trademarks or
registered trademarks of their owners.
MSDE
Copyright (c) 2001, Microsoft Corporation. All rights reserved.
All rights reserved. This product includes cryptographic software written by Eric
Young (eay@cryptsoft.com). This product includes software written by Tim Hudson
(tjh@cryptsoft.com).
STLport software.
Copyright 1999-2000 Boris Fomitchev. This material is provided as is, with no
warranty expressed or implied. Any use is at your own risk. Permission to use or
copy this software for any purpose is hereby granted without fee provided the above
notices are retained on all copies. Permission to modify the code and to distribute
modified code is granted, provided the above notices are retained, and a notice that
the code was modified is included with the above copyright notice.
Copyright 1994 Hewlett-Packard Company. Permission to use, copy, modify,
distribute and sell this software and its documentation for any purpose is hereby
granted without fee, provided that the above copyright notice appears in all copies
and that both that copyright notice and this permission notice appear in supporting
documentation. Hewlett-Packard Company makes no representations about the
suitability of this software for any purpose. It is provided “as is” without express or
implied warranty.
Copyright 1996-1997 Silicon Graphics Computer Systems, Inc. Permission to use,
copy, modify, distribute and sell this software and its documentation for any purpose
is hereby granted without fee, provided that the above copyright notice appears in all
copies and that both that copyright notice and this permission notice appear in
supporting documentation. Silicon Graphics makes no representations about the
suitability of this software for any purpose. It is provided “as is” without express or
implied warranty.
Copyright 1997 Moscow Center for SPARC Technology. Permission to use, copy,
modify, distribute and sell this software and its documentation for any purpose is
hereby granted without fee, provided that the above copyright notice appears in all
copies and that both that copyright notice and this permission notice appear in
supporting documentation. Moscow Center for SPARC Technology makes no
representations about the suitability of this software for any purpose. It is provided
“as is” without express or implied warranty.
ICU License - ICU 1.8.1 and later
Copyright and Permission Notice
Copyright (c) 1995-2001 International Business Machines Corporation and others.
All rights reserved. Permission is hereby granted, free of charge, to any person
obtaining a copy of this software and associated documentation files (the
“Software”), to deal in the Software without restriction, including without limitation
the rights to use, copy, modify, merge, publish, distribute, and/or sell copies of the
Software, and to permit persons to whom the Software is furnished to do so,
provided that the above copyright notice(s) and this permission notice appear in all
copies of the Software and that both the above copyright notice(s) and this
permission notice appear in supporting documentation.
JFreeChart
Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place-Suite
330, Boston, MA 02111-1307, USA (http://www.object-refinery.com/lgpl.html).
PostgreSQL
Portions Copyright (c) 1996-2002, The PostgreSQL Global Development Group
Portions Copyright (c) 1994, The Regents of the University of California. IN NO
EVENT SHALL THE UNIVERSITY OF CALIFORNIA BE LIABLE TO ANY
PARTY FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR
CONSEQUENTIAL DAMAGES, INCLUDING LOST PROFITS, ARISING OUT
OF THE USE OF THIS SOFTWARE AND ITS DOCUMENTATION, EVEN IF
THE UNIVERSITY OF CALIFORNIA HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE. THE UNIVERSITY OF CALIFORNIA
SPECIFICALLY DISCLAIMS ANY WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. THE SOFTWARE PROVIDED
HEREUNDER IS ON AN “AS IS” BASIS, AND THE UNIVERSITY OF
CALIFORNIA HAS NO OBLIGATIONS TO PROVIDE MAINTENANCE,
SUPPORT, UPDATES, ENHANCEMENTS, OR MODIFICATIONS.
MIT Kerberos Library
Copyright © 1985-2002 by the Massachusetts Institute of Technology. Export of
software employing encryption from the United States of America may require a
specific license from the United States Government. It is the responsibility of any
person or organization contemplating export to obtain such a license before
exporting. WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
distribute this software and its documentation for any purpose and without fee is
hereby granted, provided that the above copyright notice appear in all copies and that
both that copyright notice and this permission notice appear in supporting
documentation, and that the name of M.I.T. not be used in advertising or publicity
pertaining to distribution of the software without specific, written prior permission.
Furthermore if you modify this software you must label your software as modified
software and not distribute it in such a fashion that it might be confused with the
original MIT software. M.I.T. makes no representations about the suitability of this
software for any purpose. It is provided “as is” without express or implied warranty.
Detailed information about how to use specific features within the software is
available in the online help file and the online Knowledge Base at Trend Micro’s
Web site.
Trend Micro is always seeking to improve its documentation. If you have questions,
comments, or suggestions about this or any Trend Micro documents, please contact
us at docs@trendmicro.com. Your feedback is always welcome. Please evaluate this
documentation on the following site:
http://www.trendmicro.com/download/documentation/rating.asp
Contents
Chapter 1: Introducing InterScan™ Web Security Suite
Overview ............................................................................................ 1-3
Why URL Filtering? ...................................................................... 1-3
How InterScan Web Security Suite Scans Files ............................ 1-4
InterScan Web Security Suite Illustration ..................................... 1-6
How InterScan Web Security Suite Detects Viruses ..................... 1-6
Benefits of InterScan Web Security Suite .......................................... 1-7
Main Features ..................................................................................... 1-9
About Viruses .................................................................................. 1-13
Virus Writers .............................................................................. 1-14
About Virus Scanning ................................................................. 1-14
About ActiveUpdate ................................................................... 1-15
About Heuristic Virus Protection ............................................... 1-16
About the Trend Micro Scan Engine ........................................... 1-17
About EPS ....................................................................................... 1-18
Using the Product Documentation .................................................. 1-20
i
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
ii
Contents
iii
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
iv
Contents
Index
v
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
vi
Chapter 1
1- 1
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
1- 2
Introducing InterScan™ Web Security Suite
Overview
IWSS can provide a high degree of user configurability. For example, you can
schedule routine tasks such as virus alert notifications and virus, spyware, and
PhishTrap pattern updates to occur automatically—just "set and forget." You can
also determine which file types are scanned for viruses, the action that IWSS takes
when a virus is detected (clean, delete, quarantine, or pass), and other program
details. As an added security check, and to leverage the routing of all Web traffic
through IWSS for virus scanning, URL filtering is available with IWSS. IWSS
provides URL access control management based on content category. You can also
integrate IWSS with existing user and group information to provide user-based
policy management. IWSS provides security for executable code that is accessed via
HTTP and prevents outbound access via HTTP to sites identified as malicious by
TrendLabs. IWSS provides reporting and auditing capabilities and supports multiple
server configurations.
1- 3
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
1- 4
Introducing InterScan™ Web Security Suite
FIGURE 1-1. You can configure the scan action settings for both HTTP and
FTP traffic.
FIGURE 1-2. IWSS is also designed to record virus events and associated
actions in the log.
1- 5
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
1- 6
Introducing InterScan™ Web Security Suite
Compressed Files
IWSS opens and examines the contents of compressed files based on the criteria
specified in the HTTP Virus Scan and FTP Virus Scan screens. IWSS performs
decompression according to the configurable limits (number of files, decompression
percent, decompressed file size, and decompression layers). See Configuring
Compressed File Scanning Limits starting on page 4-14 and 6-5 for more
information.
1- 7
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
1- 8
Introducing InterScan™ Web Security Suite
Main Features
InterScan Web Security Suite helps you manage your HTTP and FTP traffic in the
following ways:
URL Filtering
Enables enterprises to reduce corporate liability and bandwidth costs while
maintaining solid security policy practice.
Enhanced Reporting
Offers configurable, real time and scheduled reports for viewing activity within the
entire environment, for a group of users, or for a specific user's activity.
PhishTrap
Protects the enterprise and its employees from becoming victims of spoofs and scams
by preventing access to known phishing URLs.
Spyware
Leverages new scan engine functions and new spyware pattern file to detect spyware
programs at the gateway, before it is passed to the end user and installed on their
desktop.
1- 9
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
MIME Encoding
Bypasses certain MIME content-types (see Understanding Scan Configuration
Options starting on page 4-2 for information on the benefit of bypassing certain
MIME content-types). However, this is not a practice that Trend Micro recommends
when you enable the large file special handling option, because it is possible to
imitate a MIME content-type. However, if you are unable or choose not to enable
large file handling, IWSS must act upon the entire file. Some file types, such as
RealAudio or other streaming content, begin playing as soon as the first part of the
file reaches the client machine and will not work properly with the resulting delay.
You can have IWSS omit these file types from scanning by adding the appropriate
MIME content-types to the list of MIME content-types to skip.
Macro Scan
Helps prevent virus outbreaks by giving you the option to quarantine all attachments
containing macros, regardless of whether they have viruses, or to remove the macro
and deliver the attachment as usual.
During the early stage of a new macro virus outbreak, there may be times when you
want to stop all macro-containing documents from entering your network. Macro
scan can stop all attachments with macros from entering the LAN and crossing the
Internet gateway, until a new pattern file becomes available.
1-10
Introducing InterScan™ Web Security Suite
1-11
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
FTP-over-HTTP PUT. Request scanning does not support special handling of large
files (that is, scan-behind, deferred scan, or progress page).
Preview Scanning
Offers a reliable way to skip files that do not need scanning. For MIME content-types
that are not excluded on the configuration screen, IWSS inspects the first 4KB of a
file to determine if its content is a safe type. If the scan engine indicates that the file is
not of a type that can harbor viruses, the data is passed on to the client without further
inspection. In general, the performance benefit from skipping safe files more than
offsets any additional processing cost.
FTP Scanning
Supports FTP scanning to prevent viruses from entering the network through FTP
file transfers. You can either use FTP scanning to protect a local FTP site or for
screening files that users access via IWSS acting as their FTP proxy. See FTP
Installation Topology starting on page 2-14 for more information on the two settings
available for FTP.
1-12
Introducing InterScan™ Web Security Suite
FIGURE 1-3. IWSS can identify users via IP address, host name (modified
HTTP headers), or user/group name via proxy authentication.
About Viruses
A computer virus is a program that replicates. To do so, the virus needs to attach
itself to other program files (for example, .exe, .com, .dll) and execute whenever the
host program executes.
Beyond simple replication, a virus almost always seeks to fulfill another purpose: to
cause damage. Called the damage routine, or payload, the destructive portion of a
virus can range from overwriting the partition table on the main system disk to
scrambling the numbers in your corporate spreadsheets to just taunting you with
sounds, pictures, or effects.
It’s worth bearing in mind, however, that even without a “damage routine,” left
unabated, viruses continue to propagate—consuming system memory, disk space,
slowing network traffic, and generally degrading performance. Virus code can be the
source of mysterious system problems that take weeks to understand.
Some viruses, in conjunction with “logic bombs,” do not make their presence known
for months. Instead of causing damage right away, these viruses do nothing but
1-13
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
replicate—until the preordained trigger day or event when they unleash their damage
routines across the network.
Whether it was written to be harmful or just annoying, a virus on your system can
lead to instability and should not be allowed to remain.
Virus Writers
In the traditional scenario, a highly-technical individual, working alone, would write
a virus program and then introduce it onto a computer, network server, or the
Internet. Why? Ego, revenge, sabotage, and basic disgruntlement have all been cited
as motivations for virus writers.
Now, however, it takes no special skill to create a macro virus, a mass mailer, or
other virus with highly disruptive potential. In fact, “virus kits” proliferate on the
Internet and are available at no cost to anyone who wants to try disrupting the
Internet or corporate communications.
1-14
Introducing InterScan™ Web Security Suite
Not all viruses, or malware, can be cleaned. For example, some viruses corrupt the
host file, making in unusable. Trojans, worms, and mass mailers do not “infect” a
host file and therefore cannot be cleaned. Whatever the action, all detections are
written to the virus log; the administrator and/or designated others can also receive an
automatic notification of the incident.
About ActiveUpdate
ActiveUpdate is a function common to many Trend Micro products. Connected to the
Trend Micro update Web site, ActiveUpdate provides up-to-date downloads of virus
pattern files, scan engines, anti-spam rules, and program files via the Internet.
ActiveUpdate does not interrupt network services, or require you to reboot your
servers. Updates are available on a regularly scheduled interval, or on-demand.
Updated components are also available on the Trend Micro Total Solution CD, which
is issued quarterly to customers on Premium Support.
Note: New threats appear every day. Trend Micro recommends at least daily updates.
1-15
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
1-16
Introducing InterScan™ Web Security Suite
1-17
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
In both cases, updates can be scheduled from the antivirus product to occur
automatically, or they can be manually handled by the administrator in charge of
security.
The Trend Micro scan engine is certified annually by international computer security
organizations, including ICSA.
About EPS
Trend Micro Enterprise Protection Strategy, or EPS, protects against virus outbreaks
and mixed-threat Internet attacks, such as mass-mailing worms, Trojans, Denial of
Service (DoS) attacks, and unique network exploits such as the Slammer worm. The
Enterprise Protection Strategy is delivered in three phases; Outbreak Prevention,
Virus Response, and Assessment & Restoration:
1-18
Introducing InterScan™ Web Security Suite
Example Scenario
Assume that:
1. The first signs of a unique new mixed-threat exploit begin appearing at dawn in
the Netherlands.
2. TrendLabs immediately starts analyzing the threat to break down its behavior and
characteristics. They find that the threat is a mass-mailer worm that drops a
Trojan, which hijacks a port in the network. It then begins using the port to
contact a given IP address.
3. Within two hours, TrendLabs has released a multi-tiered solution:
• Blocking the email message containing the worm
• Scanning the network for the Trojan, and
• Closing the vulnerable port
4. The solution is certified and released to subscribers.
5. For any network that may already be exposed, a clean-up routine is launched.
If attacks are caught in the OPS phase, EPS subscribers are often able to avoid
damage, downtime, and cleanup efforts.
1-19
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
• Online help—The purpose of online help is to provide “how-tos” for the main
product tasks, usage advice, and field-specific information such as valid
parameter ranges and optimal values. Online help is accessible from the IWSS
user interface.
• Readme file—The Readme file contains late-breaking product information that is
not found in the online or printed documentation. Topics include a description of
new features, installation tips, known issues and release history.
• Knowledge Base— The Knowledge Base is an online database of
problem-solving and troubleshooting information. It provides the latest
information about known product issues. To access the Knowledge Base, open:
http://kb.trendmicro.com
1-20
Chapter 2
Installation Planning
This chapter presents an installation planning summary and different topologies for
each IWSS protocol handler.
Topics included in this chapter are:
• Installation Planning Summary
• Installation Flow Chart
• Recommended System Requirements
• HTTP Proxy Topology
• Deploying HTTP in a Multiple Server Configuration
• IWSS HTTP Stand-alone Installation Topology with Multiple Servers
• IWSS ICAP Installation Topology with Multiple Servers
• ICAP Request Mode Workflow
• ICAP Response Mode Workflow
• FTP Installation Topology
• Stand-alone Mode
• Upstream FTP Proxy
• Report and Database Setup
• User Identification Process
• Notes on User/Group Name via Proxy Authorization
2- 1
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
2- 2
Installation Planning
Note: If there is already a content-cache server on your network, then choose ICAP.
Configure HTTP Proxy as either Stand-alone mode (if you are not using an
upstream proxy) or Dependent mode (if you are using an upstream proxy) in the
configuration screen (HTTP > Configuration > Proxy Scan) of the IWSS console.
See HTTP Proxy Topology starting on page 2-8 for more information. For
Dependent mode, specify the proxy name and port number. Dependent mode
requires the use of additional hardware (proxy server); however, it supplements the
existing HTTP proxy for other features such as caching, logging, filtering, and
network configuration.
2- 3
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
2- 4
Installation Planning
2- 5
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
2- 6
Installation Planning
Note: (1) Insufficient disk space may cause performance issues and/or errors.
(2) For multiple IWSS ICAP servers to work properly, their corresponding pattern,
scan engine version, and intscan.ini files must be identical (see
Configuration Files starting on page C-1 for more information).
(3) Do not delete any table data directly in the database.
(4) For Windows 2000 with Hyperthreaded Intel processors (see details at:
http://www.intel.com/support/platform/ht/os.htm?iid=ipp_htm+os&), Trend Micro
recommends you disable Hyper-Threading Technology in the system BIOS Setup
program.
(5) MSDE 8.00.760 is installed with IWSS.
(6) To install MSDE other than the default C: drive, install first MSDE 2000 SP3a
from Microsoft (http://www.microsoft.com/sql/msde/ downloads/default.asp) on a
desired drive. IWSS can locate where MSDE is pre-installed.
2- 7
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
FIGURE 2-2. For dependent mode, type the proxy name and the port
number in the IWSS console under HTTP > Configuration >
Proxy Scan.
2- 8
Installation Planning
2- 9
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
FIGURE 2-3. Use a Layer 4 switch to load balance between IWSS servers
for multiple HTTP stand-alone servers.
2-10
Installation Planning
FIGURE 2-4. For multiple IWSS ICAP servers to work properly, their
corresponding pattern, scan engine version, and intscan.ini
files must be identical.
2-11
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
2-12
Installation Planning
2-13
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Stand-alone Mode
If you want to scan all FTP traffic in and out of the LAN, set up FTP so that it
“brokers” all such connections. In this case, clients FTP to IWSS FTP, supply the
logon credentials to the target site, and then let IWSS FTP make the connection. The
remote site transfers the files to IWSS FTP. Before delivering the files to the
requesting clients, IWSS FTP scans these files for viruses.
FIGURE 2-5. Configure the FTP proxy setting in the IWSS console
2-14
Installation Planning
Note: IWSS FTP works with most firewalls, usually requiring only a modification to the
firewall to open a port for the FTP proxy.
2-15
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Blocking-event Reports
• Riskiest URLs by viruses detected
• Riskiest users by infected URLs accessed
• Most violations by user
• Most violations by group
• Most blocked URL categories
• Most blocked URLs
• Most blocked URLs by day of the week
• Most blocked URLs by hour
Traffic Reports
• Most active users
• Most popular URLs
• Most popular downloads
• Most popular search engines
• Daily traffic report
• Activity level by day of the week
2-16
Installation Planning
2-17
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
2-18
Installation Planning
logged under the User ID column in various log files. It alters Windows
configuration values to include the MAC address of the client system and the
machine name where you made the HTTP requests. The use of the MAC address is
advisable because of its unique and traceable ID. The machine name is an additional
and helpful identifier.
The User/group name via proxy authorization (using LDAP for account
information) option verifies the user credentials as well as retrieves the group
information. IWSS uses LDAP to integrate with Active Directory, as a network
service that identifies all resources on a network and makes them accessible to users
and applications. This directory service makes the physical network topology and
protocols transparent so that a user on a network can access any resource without
knowing where or how it is physically connected. LDAP defines a standard method
for accessing and updating information in a directory. The information needed to
utilize a user validation/group retrieval during proxy authorization are as follows:
• LDAP server hostname
• Listening port number
• LDAP admin account
• Password
• Base distinguished name (served as a starting point for LDAP search operation)
• Authentication method (Simple to pass the admin password as plain-text or
Advanced to use the Kerberos authentication)
If you are using Microsoft Internet Explorer, IWSS uses the NTLM authentication
protocol to verify your credential with the Active Directory. NTLM employs a
challenge-response mechanism for authentication, in which clients are able to prove
their identities without sending a password to the server. Internet Explorer uses the
single sign-on mechanism while using NTLM at the first pass so that you will not be
prompted for your credential; however, if the verification fails, a dialog box will
prompt to check your credentials. For other browsers, a basic authentication is used.
In this case, you are prompted for your credential and the user name and password
are encoded using the Base64 encoding method, which is not a safe measure.
Note: You can only configure one LDAP (AD) server to authenticate user/groups
information for one particular domain.
2-19
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
2-20
Installation Planning
and NTLM authentication techniques when installed in HTTP proxy mode, but only
Basic when installed in ICAP mode. Consider the following:
NTLM application sup- IWSS will only issue NTLM challenges to Internet
port Explorer and versions of Mozilla 1.4.1 and above
2-21
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Note: (1) ICAP mode does not support NTLM and single sign-on, but supports BASIC
and IP based credential cache.
(2) HTTP mode or Dependent mode supports NTLM, BASIC, single sign-on, and
IP based credential cache.
2-22
Chapter 3
3- 1
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Note: An Activation Code is required to enable scanning and product updates (see
Activating IWSS and URL Filtering starting on page 3-35 for more
information).
3- 2
Installation and Setup
5. The IWSS Modules screen appears next. Select the features you want to install.
The following features to install are:
• Main Program — installs the administration user interface and the basic
library files necessary for IWSS
• HTTP Service — installs the service necessary for HTTP scanning (you can
select either ICAP or HTTP scanning) and URL blocking
• FTP Service — installs the service necessary for FTP scanning
• URL Filtering — installs the service necessary for URL filtering (not
enabled by default)
• Control Manager Agent for IWSS — installs the files necessary for the
Control Manager agent
• Register with TMCM Server — performs the registration process to link
the IWSS Control Manager agent to a Trend Micro Control Manager server
(see Trend Micro Control Manager starting on page 9-1 for more details)
Note: You will need a second Activation Code if you select the URL filtering
option.
3- 3
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
You need to install an agent if you are using Control Manager (Trend Micro’s
central management console). Select Control Manager agent for IWSS to
install the Control Manager agent (see Trend Micro Control Manager starting on
page 9-1 for more information).
6. Click Next to continue. If you selected the HTTP Service feature in the IWSS
Modules screen, the HTTP Handler Option screen appears. Choose the type of
HTTP handler to install (see Installation Planning Summary starting on page 2-2
for more details):
• HTTP Stand-alone proxy
• HTTP ICAP server
7. Next, if you selected Register with TMCM Server in step 5, the Control
Manager Server screen appears. Type the name (or the IP address) and the port
number of the TMCM server in the fields provided. Click Next to continue. In
the Control Manager Administrator Account screen, type the account name
for the TMCM server in the field provided.
8. In the Proxy Server screen, specify how you would access the Internet to
activate and update your software. If you are using a proxy server, enable Use a
proxy server to connect to Internet, and then type the address and port number
of the proxy server. If your proxy server requires authentication, enter the User
name and Password.
3- 4
Installation and Setup
• If you have your Activation Code, click Next. The Product Activation
screen appears. Type the Activation Code(s) in the fields provided. Click
Next. Leave the Activation Code field blank to continue installing without
activating the product.
Note: When activating IWSS, do not type the Registration Key value in the
Activation Code field.
• If you do not have your Activation Code, click Register Online. In the next
screen, click Register your product if you are a new customer. If you have
already registered, type your logon ID and password in the fields provided,
3- 5
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
and then click Login. Use your Registration Key in order to obtain your
Activation Code.
Note: You will need two separate Activation Codes for activating IWSS and URL
filtering. Also, if you do not activate IWSS and URL filtering, the security
updates, scanning and filtering capabilities will not be functional.
10. Next, type and confirm a password (between 4-32 characters) for the new
administrator account in the IWSS Administrator Account screen. Click Next.
11. In the Notification Handling screen, type the email address of the system
administrator and the name (or the IP address) of your SMTP server in the fields
provided. The SMTP server that you specify must permit relay from the IWSS
machine.
12. Next, choose the type of database that you want to use for report logs, policies,
rules, and quota consumption information. By default, MSDE (which is installed
with IWSS) is selected for the type of database to be used in the Database Type
screen.
Click Other and select SQL Server 2000 if you will not use MSDE. IWSS 2.0
3- 6
Installation and Setup
3- 7
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Note: Disable Bypass on Failure if the priority is more on virus propagation within
your network. Otherwise, enable Bypass on Failure to guarantee an
unblocked connection to the Internet.
6. Under the Consistency field, choose strong from the drop-down menu and leave
the lbw Threshold field empty.
7. Under the Services text box (for response mode), type:
icap://{ICAP-SERVER-IP}:1344/resp on,
where ICAP-SERVER-IP is the IP address of IWSS ICAP for response mode.
Under the Services text box (for request mode), type
icap://{ICAP-SERVER-IP}:1344/REQ-Service on,
where ICAP-SERVER-IP is the IP address of IWSS ICAP for request mode.
3- 8
Installation and Setup
For multiple IWSS ICAP server services, type the additional entries in step 7. For
example:
For response mode,
• icap://{ICAP-SERVER1-IP}:1344/resp on
• icap://{ICAP-SERVER2-IP}:1344/resp on
Click Commit Changes.
For request mode,
• icap://{ICAP-SERVER1-IP}:1344/REQ-Service on
• icap://{ICAP-SERVER2-IP}:1344/REQ-Service on
Click Commit Changes.
Note: For multiple ICAP servers within a service farm with strong consistency
selected, make sure that all ICAP servers have identical intscan.ini and
other configuration files (see Configuration Files starting on page C-1) and
the same virus pattern. The service farm will not work properly if the ICAP
servers have different configurations.
8. Click the Access Control Lists tab, and then select Enable Access Control
Lists. Type “icap (Service Farm name of the ICAP Server) any”
in HTTP ACL. Click Commit Changes.
To configure scanning FTP over HTTP traffic, go to Access Control List, and
then add “icap (service farm name)” any into the FTP ACL field.
To set up ICAP for the Blue Coat Port 80 Security Appliance:
Log on to the management console by typing http://{SERVER-IP}:8081 in the
address bar of your Web browser (specifying port 8081 as the default management
port). For example, if the IP address configured during the first-time installation is
123.123.123.12, enter the URL http://123.123.123.12:8081 in the Web browser.
1. Select Management. Type the logon user name and password if prompted.
2. Click ICAP in the left menu, and then click the ICAP Services tab.
3. Click New. The Add ICAP Service screen appears.
4. In the ICAP service name field, type an alphanumeric name. Click Ok.
5. Highlight the new ICAP service name and click Edit. The Edit ICAP Service
name screen appears.
3- 9
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Note: You can edit the configured ICAP services. To edit a server configuration
again, select the service and click Edit.
3-10
Installation and Setup
3-11
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
g. Choose the ICAP service name under the ICAP Service/Cluster Names
field. Enable Deny the request under the On communication error with
ICAP service section. Click OK, and then click OK again.
h. Click Install Policies.
FIGURE 3-4. Configure both the request and response mode ICAP
services. To check the current policy, go to the Policy
screen, click the Policy Files tab, and then click Current
Policy.
3-12
Installation and Setup
5. Type exit.
6. Create a request modification service, by typing
icap service REQUESTMOD SERVICE NAME
This command takes you into the ICAP service configuration menu. Type ? to
display a list of all available commands. Issue the following commands:
server icap://ICAP SERVER IP:1344/REQ-Service (to assign a server
type)
vector-point reqmod-precache (to assign the proper vector point type)
error-handling return-error (to assign the proper error-handling type)
enable (to enable the ICAP multiple server configuration)
7. Type exit.
8. For additional configuration steps, type the following:
icap append-x-headers x-client-ip (to enable X-client headers for
reports)
icap append-x-headers x-server-ip (to enable X-server headers for
reports)
icap rescan-cache ISTag-change (to turn on ISTAG rescan for updates)
icap bypass streaming-media (to exclude streaming media from ICAP
scanning)
icap apply all (to apply all settings and activate ICAP type)
show icap (to display current ICAP configuration at root CLI menu)
3-13
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
5. Highlight the new ICAP cluster name and click Edit. The Edit ICAP Cluster
name screen appears.
6. Click New to add an ICAP service to the cluster. The Add ICAP Cluster Entry
screen appears. The pick list contains a list of any services available to add to the
cluster. Choose a service and click Ok.
7. Highlight the ICAP cluster entry and click Edit. The Edit ICAP Cluster Entry
name screen appears. In the ICAP cluster entry weight field, assign a weight
from 0-255. Click Ok, click Ok again, and then click Apply.
Note: Do not delete a cluster used in a Blue Coat Port 80 Security Appliance policy if a
policy rule uses a cluster name.
3-14
Installation and Setup
3-15
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Password Management
Your password is the primary means of protecting your system from unauthorized
access. For a more secure environment, change the console password on a regular
basis and use a password that is difficult to guess.
The following tips will help you design a safe password:
• Include both letters and numbers in your password
• Avoid words found in any dictionary, of any language
• Intentionally mis-spell words
• Use phrases or combine words
• Use both uppercase and lowercase letters
To change the console password:
1. Open the IWSS console and click Administration > Password in the left menu.
2. Type your current password in the Old password field, and then type and
confirm the new password you want to use.
3. Click Save to save your new password.
3-16
Installation and Setup
3-17
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
clientAuth="false" protocol="TLS"
keystoreFile="mykeystore" keystorePass="iwss20"/>
</Connector>
Note: Include the keystoreFile and keystorePass parameters if you are not
using the default keystore name or the default Tomcat keystore password
changeit.
3-18
Installation and Setup
<Connector
className="org.apache.coyote.tomcat4.CoyoteConnecto"
port="1812" minProcessors="5"
maxProcessors="75"
enableLookups="true"
redirectPort="8443"
acceptCount="100" debug="0"
connectionTimeout="20000"
useURIValidationHack="false"
disableUploadTimeout="true" />
3. Go to Start > Settings > Control Panel > Administrative Tools > Component
Services and select Trend Micro InterScan Web Security Suite Console under
the Services (Local) branch. On the toolbar menu, click the Stop Service button,
and then click the Restart Service button.
After making these changes, the IWSS Web console is accessible via
https://<IWSS_server_IP>:8443/index.jsp
Testing IWSS
After installing IWSS, test the following to verify that IWSS is working properly.
There are five types of test to perform:
• Testing upload scanning
• Testing FTP scanning
• Testing URL blocking
• Testing download scanning
• Testing URL filtering
3-19
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Note: Flush the cache in the cache server and local browser before testing. If either cache
contains a copy of the test virus, it's possible an attempt to download the file would
get the file from the cache, rather than getting it from the Internet, thus IWSS
would not detect the file.
3-20
Installation and Setup
5. Send a mail with one of the test viruses as an attachment by using any Internet
mail service.
3-21
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
5. If you have configured the IWSS FTP proxy correctly, IWSS displays the
message shown in the figure below.
3-22
Installation and Setup
and click HTTP > Configuration > Proxy Scan in the left menu and enable
Dependent mode. Type the proxy address and the port number.
For more information about the HTTP topology, see HTTP proxy functionality
topology starting on page 2-5.
To test URL blocking:
1. Open the IWSS console and click HTTP > URL Blocking in the left menu and
select Enable URL blocking.
2. In the Match field, type the full Web address, URL keyword, or exact-match
string.
3. Click Block, and then click Save.
4. Open a Web browser and try to access the blocked Web site, a URL containing
the string, or the exact-match string.
3-23
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
If a user attempts to download an infected file, IWSS will block other user’s access to
that site for four hours by default. When subsequent users attempt to access the same
URL that contained the virus, the user will see a URL blocking message instead of
the virus-warning message.
Configure the default block time (in hours) by changing the parameter
infected_url_block_length under the
[Scan-configuration] section of the intscan.ini file (see Configuration
Files starting on page C-1 for more information).
3-24
Installation and Setup
3-25
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
where you can find the current version, release date, and a list of all the new virus
definitions included in the file.
How it Works
The scan engine works together with the virus pattern file to perform the first level of
detection, using a process called pattern matching. Since each virus contains a unique
"signature" or string of tell-tale characters that distinguish it from any other code, the
virus experts at TrendLabs capture inert snippets of this code to include in the pattern
file. The engine then compares certain parts of each scanned file to the data in the
virus pattern file looking for a match.
Note: ActiveUpdate also supports incremental updates. Rather than download the entire
five or six megabyte file each time, the ActiveUpdate feature can download only
the portion of the file that is new and append it to the existing pattern file.
Especially for networks running hundreds of individual desktop products,
ActiveUpdate can save considerable bandwidth (see About ActiveUpdate starting
on page 1-15 for more details).
where ### stands for the pattern version (for example, 400). To distinguish a given
pattern file with the same pattern version and a different build number, and to
accommodate pattern versions greater than 999, the IWSS console displays the
following format:
roll number.pattern version.build number (format: xxxxx.###.xx)
• roll number—this represents the number of rounds when the pattern version
exceeded 999 and could be up to five digits
• pattern version —this is the same as the pattern extension of lpt$vpn.###
and contains three digits
• build number—this represents the patch or special release number and
contains two digits
If multiple pattern files exist in the same directory, only the one with the highest
number is used. Trend Micro publishes new virus pattern files on a regular basis
3-26
Installation and Setup
(sometimes several times per week), and recommends you to set a daily automatic
update. Updates are available to registered IWSS users.
Note: There is no need to delete the old pattern file or take any special steps to “install”
the new one.
3-27
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Note: Use the Summary screen in the IWSS console to verify the current version of
the virus pattern file. Trend Micro recommends that you flush the cache
and reboot the NetCache appliance and Blue Coat Port 80 Security
Appliance after updating the virus pattern file to ensure that no viruses
are being cached.
3-28
Installation and Setup
where ### stands for the pattern version. This format distinguishes a given pattern
file with the same pattern version and a different build number. It also accommodates
pattern versions greater than 999. The IWSS console displays the following format:
roll number.pattern version.build number (format: xxxxx.###.xx)
• roll number—this represents the number of rounds when the pattern version
exceeded 999 and could be up to five digits
• pattern version —this is the same as the pattern extension of tmaptn.###
and contains three digits
• build number—this represents the patch or special release number and
contains two digits
To manually update the spyware pattern file:
1. Open the IWSS console and click Summary in the left menu.
2. Select Spyware pattern under the Component column and click Update. A
progress bar indicates the update progress, and a message screen then displays
the outcome of your update.
3-29
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
3-30
Installation and Setup
Rollback Option
IWSS looks in the program directory and uses the latest pattern file and engine
library file (vsapi32.dll) to scan inbound/outbound traffic. It can distinguish the
latest pattern file by its file extension; for example, lpt$vpn.401 is newer than
lpt$vpn.400.
Occasionally, a new pattern file may incorrectly detect a non-infected file as a virus
infection (known as a “false alarm”). You can revert to the previous pattern file or
engine library file by clicking the Rollback button.
3-31
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
FIGURE 3-12. You can only perform a virus pattern, PhishTrap pattern,
spyware pattern, and scan engine version rollback to
one version lower than your existing current version.
Note: The URL filtering database, spyware, and phish updates do not support
rollback.
3-32
Installation and Setup
3-33
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
5. Click Save.
3-34
Installation and Setup
• Domain name or the IP address of the mail server that will send the
notification messages in the Server name or IP address field (the default is
localhost). This email server must be configured to accept relayed messages
from the IWSS installation server
• Port used by the mail sever, typically 25, in SMTP server port
• Frequency that the mail queue must be checked in the Check mail queue in
minutes field.
FIGURE 3-14. You can also configure the notification settings in the
“Administration > Notifications” screen.
3-35
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Note: After registering IWSS, you will receive an Activation Code via email.
An Activation Code has 37 characters (including the hyphens) and is written in the
following format: xx-xxxx-xxxxx-xxxxx-xxxxx-xxxxx-xxxxx
A Registration Key has 22 characters (including the hyphens) and is written in the
following format: xx-xxxx-xxxx-xxxx-xxxx
When the full version expires, security updates will be disabled. When the evaluation
period expires, both the security updates and scanning capabilities will be disabled.
3-36
Installation and Setup
In the Product License screen, you can obtain an Activation Code online, view
renewal instructions, and verify the status of your product.
FIGURE 3-15. In the “Product License” screen, click "Enter a new code" to
upgrade from evaluation to full version.
3-37
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
d. The Activation Code screen appears. The system informs you that your
Activation Code will be sent to your registered email address.
e. Click OK.
For existing registered users, type your logon ID and password in the fields
provided, and then click Login.
Note: You are required to change your password the first time you log on.
a. The My Products screen appears. Click Add Products and type the
Registration Key. To edit your company profile, click View/Edit Company
Profile.
b. Your Activation Code appears on the next screen. To receive a copy of your
Activation Code through your registered email address, click Send Now.
3. Type the Activation Code in the Activation Code field and click Activate.
Note: For maintenance renewal, contact Trend Micro sales or your reseller. Click
Check Status Online to manually update the maintenance expiration date on
the Product License screen.
Maintenance Agreement
A Maintenance Agreement is a contract between your organization and Trend Micro,
regarding your right to receive technical support and product updates in
consideration for the payment of applicable fees. When you purchase a Trend Micro
product, the License Agreement you receive with the product describes the terms of
the Maintenance Agreement for that product.
A license to the Trend Micro software usually includes the right to product updates,
pattern file updates, and basic technical support (“Maintenance”) for one (1) year
from the date of purchase only. After the first year, Maintenance must be renewed on
an annual basis at Trend Micro’s then-current Maintenance fees.
Note: The Maintenance Agreement expires. Your License Agreement does not.
3-38
Installation and Setup
If the Maintenance Agreement expires, scanning can still occur, but the product
cannot be updated, even manually. Also, you will not be entitled to receive technical
support from Trend Micro.
Typically, ninety (90) days before the Maintenance Agreement expires, you will start
to receive email notifications, alerting you of the pending discontinuation. You can
update your Maintenance Agreement by purchasing renewal maintenance from your
reseller, Trend Micro sales, or on the Trend Micro Online Registration URL:
https://olr.trendmicro.com/registration/
3-39
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
To view your Registration Profile, type the logon ID and password created when you
first registered your product with Trend Micro (as a new customer), and click Log
on.
3-40
Installation and Setup
1. On the Windows taskbar, click Start > Settings > Control Panel >
Add/Remove Programs.
2. The Add/Remove Programs screen appears. Select Trend Micro InterScan
Web Security Suite Installation and click Change/Remove. The IWSS
Maintenance screen appears.
3. Click Modify to modify IWSS. The Select Features screen appears. Select the
features you want to install in IWSS. Click Next to continue.
4. Click Finish.
Note: If the local MSDE is installed, there are two options given in the IWSS
Maintenance screen:
(1) Remove the default DBMS or
(2) Remove the database schema
Otherwise, if the IWSS schema was created on a remote SQL Server, then you
are only allowed to remove the IWSS schema.
3-41
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
3-42
Chapter 4
4- 1
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
4- 2
HTTP Scanning and URL Blocking
add text/* to your MIME content-type skip list so IWSS does not need to scan Web
pages.
Malicious code within a small file can quickly spread throughout a network.
Malicious code that requires a large file for transport will propagate more slowly,
because the file containing malicious code will take longer to transmit. Therefore, it
is important to screen small files efficiently and completely.
FIGURE 4-1. For large file handling, there are three options to choose
from: (1) scan first, and then load page afterwards, (2)
Deferred scan, or (3) scan-behind.
When downloading a large file, the time to download the file and scan it for viruses
may be long enough to cause the browser to time out. The size of file that you should
consider “large” varies, depending on what hardware IWSS runs on, the mix of file
types in the particular environment, and so on. Trend Micro recommends that files
larger than 512KB (default value) be considered large; however, this value might
vary depending on your network speed, server capability, and other factors.
Once you encounter a large file, IWSS handles it in one of the following ways:
• allows the file through and scans it later
• loads a part of the page while scanning
4- 3
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
• generates a progress page to prevent the browser from timing out, thus, user does
not think the connection is hung
See Handling Large Files starting on page 4-5 for more details.
4- 4
HTTP Scanning and URL Blocking
3. Click Save.
Note: IWSS handles HTTPS connections differently than the HTTP connections. Because
the data is encrypted, IWSS is not capable of scanning the content. IWSS examines
the initial CONNECT request, and rejects it if is does not match the set parameters
(such as the target URL is on the Block List or contained in the PhishTrap pattern
file, or the port number used is not defined in the HttpsConnectACL.ini
file).
4- 5
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Behavior
for 2nd
Scanning INI setting URL in
Behavior time access
method in infectedB.ini if
for large for 1st time and
intscan.ini virus is found
file access
[http] after scanning thereafter
to the same
URL
Deferred special_handli The user gets IWSS saves the IWSS invokes
scan ng=yes the file if there infected URL to the scanning with
deferred_scan is no virus. If a [allow] section if the progress page
=late virus is found, file is cleaned after
IWSS drops
scanning. If it is
the connec-
deleted or quaran-
tion.
tined, the infected
URL is added to the
[block] section of the
infectedB.ini file.
4- 6
HTTP Scanning and URL Blocking
If the affected client has up-to-date antivirus software and security patches, no further
action may be needed. Otherwise, you will need to take actions to isolate and clean
up the affected system. Event tracing is also necessary when you detect malicious
code during an attempt to post data to the Web.
Use large file special handling if you have experienced an issue with timeouts.
To use the large file handling for IWSS HTTP data:
1. Open the IWSS console and click HTTP > Scanning > Action.
2. Under the Large File Handling section, select Enable special handling, and
then type the file size (in KB or MB) to be considered a large file. The default
value is 512KB.
3. Select the type of large file-handling to use:
• Scan first: show progress while scanning, and then load the page afterwards
(default setting)
• Deferred scan: load part of the page while scanning, stop the connection if a
virus is found
• Scan-behind: load the page first, and then scan afterwards (highest risk of
infection)
Note: These three options are not available for Blue Coat Port 80 Security
Appliance.
4. Click Save.
4- 7
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
4- 8
HTTP Scanning and URL Blocking
Note: Trend Micro recommends minimizing the list of MIME content-types to skip to
reduce the risk of virus infection.
4- 9
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
FIGURE 4-4. For HTTP proxy, use the email address as password
for anonymous FTP logon in FTP over HTTP.
Note: FTP servers require a user ID and password for access. However, users may
also anonymously log on to an FTP server. In FTP over HTTP, the proxy
server acts as an HTTP proxy on the client side, but acts as an FTP client on
the server side. If a client intends to log on anonymously, you need to have
this email address. The configuration decides what email address is used as
the password in anonymous logon.
4-10
HTTP Scanning and URL Blocking
Note: Do not precede an extension with a wildcard (*) character, and separate
multiple entries with a semicolon.
2. Click Save.
4-11
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
About IntelliScan
Most antivirus solutions today offer you two options in determining which files to
scan for potential threats. Either all files are scanned (the safest approach), or only
those files with certain file name extensions (considered the most vulnerable to
infection) are scanned. But recent developments involving files being “disguised”
through having their extensions changed has made this latter option less effective.
IntelliScan is a Trend Micro technology that identifies a file’s “true file type,”
regardless of the file name extension.
Note: IntelliScan examines the header of every file, but based on certain indicators,
selects only files that it determines are susceptible to virus infection.
4-12
HTTP Scanning and URL Blocking
Note: For the highest level of security, Trend Micro recommends scanning all files.
4-13
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
4-14
HTTP Scanning and URL Blocking
Note: “100” percent file compression ratio means that there is no limit on the
compressed files setting; whereas, “0” percent file compression ratio means
that all compressed files will be blocked.
4-15
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
4-16
HTTP Scanning and URL Blocking
Macro Scan
Macro Scan detects macro-containing files in file downloads and provides scanning
options: Quarantine, Clean, and Pass (the recommended action setting is Pass).
• Choose Quarantine to move a macro-containing file to the quarantine directory.
• Choose Clean to remove macros before delivering the file.
• Choose Pass to disable special handling on file containing macro(s).
To set the scan actions:
1. Open the IWSS console and click HTTP > Scanning > Action.
2. Select the appropriate action for the following files:
• Infected files (Delete, Quarantine, Clean)
• Uncleanable files (Delete, Quarantine, Pass)
• Password-protected files (Delete, Quarantine, Pass)
• Macros (Quarantine, Clean, Pass)
Select Enable spyware scanning if you want to scan spyware.
3. Click Save.
Note: If you enable Encrypt quarantined files under Quarantined files handling
(HTTP > Scanning > Action), the scan engine encrypts those infected files before
copying them. This is to protect against accidentally executing those files. If you
disable the setting, the scan engine copies the infected files to the quarantine
directory in their original form.
4-17
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
4-18
HTTP Scanning and URL Blocking
4-19
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
For example, you could create a generic notification as follows: “A virus was
detected in HTTP traffic.” This notification lets you know there is a problem, but
does not provide much information to help you follow up.
Instead, you could set up the notification using variables as follows: “%v was
detected in %f in the HTTP traffic on %d.” The notification might read as follows:
4-20
HTTP Scanning and URL Blocking
URL Blocking
IWSS can block Web sites and URL strings in both ICAP and HTTP proxy mode.
Note: Configure the ICAP client to scan files in pre-cache request mode to make this
feature work. The stand-alone proxy requires no additional configuration.
You can explicitly specify the Web sites and URL strings to block (or to exempt from
blocking).
Using this feature, you can block a given site yet allow access to some of its
sub-sites. You can also import a list of Web sites and URL strings from a given
database.
FIGURE 4-8. To import a file that contains a list of Web sites, URL
keywords, or strings, make sure that you write “URL
Blocking Import File” on the first line of that file. Use [block]
and [allow] headings for the block and exception list,
respectively.
4-21
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
4-22
HTTP Scanning and URL Blocking
[allow]
www.trendmicro.com*
www.antivirus.com*
7. Click Save.
Note: To include the "*" and "?" characters in a URL blocking string rather than
having IWSS consider them as wildcards, use variable %2a or %2A to
represent * and variable %3f or %3F to represent ?. For example, to block
www.example.com/*wildcard literally, specify the blocking rule as
www.example.com/%2awildcard instead of
www.example.com/*wildcard.
PhishTrap Overview
Phishing is a malicious hacker term that means hunting for a victim. “Phishers”
imitate an email message from a company with whom the user has an account. These
fraudulent email messages seem authentic, and many recipients are deceived into
supplying their personal information.
PhishTrap is a Trend Micro service that leverages:
• the ability of IWSS to block outbound access to a specific URL
4-23
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
• the capability of the Trend Micro antivirus team to collect and analyze customer
submissions and distribute a database of known harmful URLs.
PhishTrap can stop the harm coming from information that is sent out from the client,
such as private data/information. PhishTrap prevents access to known phishing
URLs. Thus, blocking the URL is appropriate in this case.
The URL that is determined to maliciously collect user information will be added to
the PhishTrap pattern file. The PhishTrap pattern file is a list of URLs that IWSS will
block. IWSS will periodically retrieve the updated PhishTrap pattern file via
ActiveUpdate.
IWSS allows users to submit suspected phishing URLs to TrendLabs for evaluation.
TrendLabs will evaluate the Web site to determine whether the submitted URL is
malicious. The URL is considered malicious if it meets the criteria for one of the
categories listed below.
• Phishing: a fraudulent collection of confidential information. This can be done
by offering an email message or Web site that poses as a communication from a
legitimate business, which requests information for purpose of identity theft
• Spyware: A hidden but legal program that secretly collects confidential
information. Spyware monitors a user’s computing habits and personal
information, and then sends this information to third parties without the user’s
approval.
• Virus accomplice: An outbound HTTP request due to known behavior of
malicious code — the malicious code could either send the information out or
download further components from a certain URL
• Disease vector: A Web site that exists only for a malicious purpose
To block different PhishTrap categories:
1. Open the IWSS console and click HTTP > URL Blocking > Via Pattern File
(PhishTrap).
2. Enable the following PhishTrap categories that you want to block:
• Phishing: fraudulent collection of confidential information
• Spyware: hidden but legal program that secretly collects confidential
information
• Virus accomplice: outbound HTTP accesses due to known behavior of
malicious code
4-24
HTTP Scanning and URL Blocking
Note: When spyware scanning is enabled, IWSS detects spyware and takes the same
action as specified for the uncleanable virus setting.
4-25
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
FIGURE 4-10. A sample URL blocking message for the disease vector
group.
4-26
HTTP Scanning and URL Blocking
8. Click Save.
4-27
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Note: TTL indicates the number of minutes to implement the changes of a new policy.
To deploy the changes on the account(s) immediately, click Deploy Policies.
4-28
HTTP Scanning and URL Blocking
3. Click Save.
4-29
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Note: To check if the LDAP connection is working, click Test LDAP Connection.
4-30
HTTP Scanning and URL Blocking
Note: For a multiple server configuration setup, Trend Micro recommends using a Layer
4 switch or other appliances that can perform the load-balancing function.
IWSS gives you the option to maintain/replicate the URL block list in memory across
IWSS servers in a farm. There are two kinds of IWSS data that require
synchronization between servers:
• URLs that are blocked because a virus is detected: this data is available to all
servers for the intended function to be at its most effective. Any real-time data
4-31
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
synchronization mechanism must be shared between data types. Thus, one server
must be designated as a master for such data (see To configure server
designation: starting on page 4-32 for details)
• Amount of data received by a given user, which is used to enforce access quota: a
central database must be set up for this purpose (see To configure the database
connection settings: starting on page 4-28 for details)
To configure server designation:
1. Open the IWSS console and click HTTP > Configuration > Server
Designation.
2. Select Enable for use in a multiple IWSS server configuration.
3. Type a value for the listening port number of the master server.
4. Under Server role, click one of the following two options:
• Master server
• Slave server
For a Slave server role, type the Master’s IP address in the field provided.
WARNING! A group of IWSS servers must have one, and only one, master server.
When updating the settings, remember to also update the settings of the
other IWSS servers in your network.
5. Click Save.
FIGURE 4-13. Entries in the URL block list in memory are dynamically
added to all IWSS servers in a farm.
4-32
HTTP Scanning and URL Blocking
Note: If you select the “User/group name via proxy authorization” option, make
sure that LDAP is successfully configured (see To configure the LDAP
settings: starting on page 4-29 for more details), or the IWSS server will not
start.
4-33
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
4-34
HTTP Scanning and URL Blocking
network traffic, but not so many threads that the system gets slowed down with
overhead.
4-35
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
4-36
Chapter 5
URL Filtering
This chapter presents an overview and workflow of the IWSS URL filtering module
with step-by-step instructions for creating and configuring policies.
Topics included in this chapter are:
• URL Filtering Overview
• URL Filtering Workflow
• Configuring URL Filtering Policies
• URL Filtering Policy Introduction
• Enabling URL Filtering
• Creating a New Policy
• Modifying an Existing Policy
• Configuring the URL Filtering Approved List
• Configuring Work Time Settings
• Requesting URL Classification Review
• Regrouping Categories
5- 1
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
5- 2
URL Filtering
the URL Filtering Approved List are matched against the URL, not to the contents of
the document that the URL refers to. You can use the URL Filtering Approved List to
bypass internal Web sites and other sites where the attempt to classify them
introduces unnecessary overhead. IWSS gives you the option to configure a URL
filtering approved-list by matching Web site, URL keyword, and exact-string
categories.
The two rules that you can apply for a given policy in a given time period are:
• Block during work time
• Block during leisure time
5- 3
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Note: The network configuration may determine whether some user identification
methods can be used. For example, the client IP address will not be available if
IWSS is used as an upstream proxy.
5- 4
URL Filtering
A queried URL is classified into one of over fifty sub-categories, and then mapped
into one of six Category Groups (Company Prohibited Sites; Not Work Related;
Possible Research Topics; Business Function Related; Customer Defined; and
Others). With the given Category Groups classification and the user ID as input, the
query is made to the policy management database. The result of the query is either
allowing or blocking access to the requested URL.
Note: Your corporate internal Web sites must not be classified; thus, such sites must be
added to the URL Filtering Approved List to prevent unnecessary overhead (see
To configure the URL filtering approved list: starting on page 5-12 for
details).
Manual updates to the URL filtering database can be done under the Summary >
Scanning screen of the IWSS console.
5- 5
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
tb_EntityType EntityTypeName
5- 6
URL Filtering
5- 7
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
3. The URL Filtering Policy: Add Policy screen appears. Specify the account type
(IP, IP range, user or group, or hostname), which was defined under HTTP >
Configuration > User ID. Click Add.
4. Click Next.
5. Under 2. Specify Rules, make sure that Enable policy is selected.
6. Type the policy name in the field provided and select the URL categories to be
blocked during work and leisure time:
• Company Prohibited Sites
• Not Work Related
• Possible Research Topics
• Business Function Related
• Customer Defined
5- 8
URL Filtering
• Others
Note: If no other policies are found for the user, IWSS applies the default policy
setting in the Global screen.
FIGURE 5-4. The default policy setting is defined under “HTTP > URL
Filtering Policies > Global.”
7. Click Save.
8. In the URL Filtering Policy List screen, set the priority of the new policy (under
the Priority column) by clicking on the up or down arrows.
Note: The Priority setting resolves the issue on what policy must be applied if there
are accounts belonging to two or more policies.
5- 9
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
9. Click Save.
5-10
URL Filtering
• Others
5. Click Save.
6. Go to HTTP > URL Filtering Policies > Policy List, and then set the priority of
the edited policy (under Priority). Click the up arrow to increase the priority
number, or click the down arrow to decrease priority.
Note: The Priority setting determines which policy is applied if there are accounts
belonging to two or more policies.
7. Click Save.
FIGURE 5-6. Use the “Notes” field to include valuable comments for a
given policy.
5-11
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
FIGURE 5-7. To import a file, write “URL Filtering Import File” on the
first line of a file that contains a list of Web sites, URL
keywords, or strings, and then write one rule per line.
5-12
URL Filtering
3. Click Add to include this entry in Do not filter the following sites.
Click Remove to remove highlighted entries from the list (or Remove All to
remove all entries).
To import a list of Web sites and URL strings from a given file to Do not filter
the following sites, specify the location of the file (C:\Program Files\Trend
Micro\IWSS\{file name}) in the Import approved list field by clicking
Browse, and then click Import.
To include the “*” and “?” wildcards literally, use variable %2a or %2A to
represent * and variable %3f or %3F to represent ?. For example, if you want
to filter the site www.example.com/*wildcard literally, specify the
filtering rule as www.example.com/%2awildcard instead of
www.example.com/*wildcard.
4. Click Save.
5-13
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Note: It is assumed that all IWSS servers in a cluster are within the same time
zone.
3. Click Save.
FIGURE 5-8. The time not designated as work time will be considered
as leisure time.
5-14
URL Filtering
FIGURE 5-9. Provide a short description in the “Note” field of the URL
being submitted for classification review.
Regrouping Categories
A default policy prevents access to a configurable set of category groups. You need
to create additional policies to allow access to restricted category groups, that is for
users that require broader access to the Internet because of their work functions. By
doing so, you may need to regroup sub-categories belonging to some URL
categories. For example, Travel, Restaurants/Dining/Food, Art/Entertainment are
sub-categories defined by default under Not Work Related. These sub-categories,
5-15
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
FIGURE 5-10. Select the new group from the “Move selected
sub-categories to” drop-down menu.
5-16
Chapter 6
FTP Scanning
After installing the FTP service, configure IWSS for FTP scanning. Trend Micro
recommends the following:
1. Update the virus pattern file and scan engine.
2. Enable FTP scanning.
3. Specify file types to scan.
4. Specify file types to block.
5. Configure compressed file scanning limits.
6. Configure active and passive FTP.
7. Configure large file handling during FTP transfers.
8. Configure notifications.
9. Configure scan actions on viruses.
6- 1
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
6- 2
FTP Scanning
• Use FTP Proxy — The FTP service works with an existing FTP proxy (you
need to specify the host name of the server and port number)
FIGURE 6-1. Port 21 is the port default value if you use an FTP proxy.
3. Click Save.
To configure the number of client requests:
1. Open the IWSS console and click FTP > Configuration.
2. Under Client Requests, type the maximum number of client requests in the field
provided.
3. Click Save.
6- 3
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
3. In the Other file types field, type other file types that you want to block (use a
space to delimit multiple entries). See Mapping File Types to Block with MIME
Content-types starting on page B-1 for the list of other file types to block.
4. Click Save.
6- 4
FTP Scanning
Note: There is no limit to the number or types of files you can specify. Do not
precede an extension with the (*) character. Delimit multiple entries with a
semicolon.
2. Click Save.
Default Extensions
These recommended extensions are activated by default and are updated with each
new pattern file. The following extensions (current as of March 2004) are known file
types that can potentially harbor viruses:
"";ARJ;BAT;BIN;BOO;CAB;CHM;CLA;CLASS;COM;CSC;DAT;DLL;DOC;DOT;DRV;EM
L;EXE;GZ;HLP;HTA;HTM;HTML;HTT;INI;JAR;JS;JSE;LNK;LZH;MDB;MPD;MPP;MP
T;MSG;MSO;NWS;OCX;OFT;OVL;PDF;PHP;PIF;PL;POT;PPS;PPT;PRC;RAR;REG;RT
F;SCR;SHS;SYS;TAR;VBE;VBS;VSD;VSS;VST;VXD;WML;WSF;XLA;XLS;XLT;XML;Z
;ZIP;{*;
6- 5
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
FIGURE 6-2. “100” percent file compression ratio means that there is
no limit on the compressed files setting; whereas, “0”
percent file compression ratio means that all
compressed files will be blocked.
6- 6
FTP Scanning
• Choose Delete to delete an infected file at the server. The requesting client will
not receive the file.
• Choose Clean to automatically clean and process an infected file. The requesting
client will receive the cleaned file if it is cleanable.
You can specify the action for FTP scanning to take upon finding an uncleanable file,
which includes worms and Trojans (the recommended action setting is Quarantine):
• Choose Pass to send an uncleanable file to the client without cleaning (Trend
Micro does not recommend this choice, because it may allow infected files into
your network).
• Choose Quarantine to move, without cleaning, an uncleanable file to the
quarantine directory. The requesting client will not receive the file.
• Choose Delete to delete an uncleanable file at the server. The requesting client
will not receive the file.
You can specify the action for FTP scanning to take in handling a
password-protected compressed file (the recommended action setting is Pass):
• Choose Pass to send a password-protected file to the client without cleaning.
• Choose Quarantine to move, without cleaning, a password-protected file to the
quarantine directory. The requesting client will not receive the file.
• Choose Delete to delete a password-protected file at the server. The requesting
client will not receive the file.
FIGURE 6-3. By default, the scan action settings for FTP scanning are:
Clean for infected files; Quarantine for uncleanable files; and
Pass for both password-protected compressed files and
macros.
6- 7
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Macro Scan
Macro Scan detects macros in files during FTP transfers and provides scanning
options (the recommended action setting is Pass).
• Choose Quarantine to move the files containing macro(s) to the quarantine
directory.
• Choose Clean to remove macros before delivering the file.
• Choose Pass to disable special handling of files containing macro(s).
To set the FTP scan actions:
1. Open the IWSS console and click FTP > Scanning > Action.
2. Select the action for the following files:
• Infected files (Delete, Quarantine, Clean)
• Uncleanable files (Delete, Quarantine, Pass)
• Password-protected files (Delete, Quarantine, Pass)
• Macros (Quarantine, Clean, Pass)
3. Click Save.
6- 8
FTP Scanning
• Domain name or the IP address of the mail server that will send the
notification messages in the Server name or IP address field (the default is
localhost)
• Port used by the mail sever, typically 25, in the SMTP server port field
• Frequency that the mail queue must be checked in the Check mail queue in
minutes field
4. Click Save.
To send an additional message to an FTP user:
1. Open the IWSS console and click FTP > Scanning > Notification.
2. Enable Add additional message to your FTP prompt. Type a message in the
field provided.
3. Click Save.
6- 9
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
WARNING! The partial delivery of a file may result in a virus leak; thus, this would be a
performance versus absolute security choice for you. Use this option only if
you are currently experiencing an issue with timeouts.
6-10
Chapter 7
Managing Logs
There are two types of logs available with IWSS: Reporting Logs and System Logs.
There are multiple logs for each: HTTP scan, FTP scan, Mail delivery service,
Administration, and Update logs are examples of system logs; and Virus, URL
blocking, Performance, and URL access logs are examples of reporting logs.
System logs contain unstructured messages due to errors or state changes in the
software, and are only visible by viewing the log file— they cannot be seen from the
Web console. Reporting logs provide program event information, and can be seen in
the IWSS console. The log data is stored in a database. It may optionally also be
stored in text log files for compatibility with scripts the customer may have written,
or as a redundant check to verify that the database is properly updated. Trend Micro
recommends that the database must eventually be the only archival storage location
for log data.
Topics included in this chapter are:
• Log Files Naming Conventions
• Virus Log
• URL Blocking Log
• Performance Log
• FTP Get Log
• FTP Put Log
7- 1
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
which can be read as [virus log name] for August 14, 2004
The naming conventions for each type of log are summarized in the following table:
URL Blocking
url_blocking.log.yyyy
.mm.dd
HTTP Log
http.log.yyyym-
mdd.0001
7- 2
Managing Logs
Note: Deleting a log will not necessarily remove the corresponding data from a display in
the IWSS console. You need to remove the corresponding data from the
appropriate database table.
Virus Log
The virus log contains information on virus name, date and time of detection, name
of the affected file, action taken, user ID, and scan type.
To view the virus log:
1. Open the IWSS console and click Logs > Virus Log in the left menu.
2. Under Time period, select a time (All Dates, Today, Last 7 days, Last 30 days).
Click Range to view the virus log in a given time range, and then indicate the
start and end dates.
3. Under Viruses, select virus(es) in the left list box to be added in the right list box.
Highlight virus(es) to add, and then click Add (or Add All for all viruses listed).
To remove virus(es) from the right list box, click Remove (or Remove All for all
viruses listed).
7- 3
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
4. Under the Sort by section, select the appropriate option to sort the display log
(Virus, Date, Action, Scan Type, File Name, User ID).
5. Click Show Log. The Virus Log viewing screen appears.
6. Click Refresh to update the virus log.
FIGURE 7-1. Sort the Virus log according to Virus, Date, Action, Scan
Type, File Name, or User ID
7- 4
Managing Logs
3. Under URLs blocked, you can add the URL(s) listed in the left list box to the
right list box. Highlight the URL(s) that you want to add, and then click Add (or
Add All for all URLs listed). To remove the list of URLs from the right list box,
click Remove (or Remove All for all URLs listed).
4. Under Sort by, select the appropriate option to sort the display log.
• URL—The URL address that is blocked
• Date—The date and time when the file or URL is blocked
• Category—The rule defined by the user in the URL filtering policies,
Access Quota, file blocking, and URL blocking
• Rule—This is composed of the following:
• IWSS-defined rule (block the URL containing a virus): displays the
URL that has been blocked, for example
• URL blocking rule: displays the URL in the block list, for example
• URL filtering rule: displays the policy name, for example
• OPP defined rule: displays the OPP rule, for example
• File type defined rule: displays file block type, for example
• PhishTrap defined rule: displays PhishTrap violation rule, for example
• Access Quota defined rule: displays access quota violation rule, for
example
• OPP ID—The ID number of the Outbreak Prevention Policy (OPP)
• Scan Type—Normal (for example, access quota, file type, URL memory
block list, content filter, or PhishTrap)
• User ID—The IP address of the browser, hostname, or user name
5. Click Show Log. The URL Blocking Log viewing screen appears.
7- 5
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
FIGURE 7-2. Sort the URL Blocking log according to URL, Date,
Category, Blocked By, OPP ID, Scan Type, or User ID.
Note: You can also find an entry in the URL Blocking Log when an FTP proxy
blocks a file by type.
7- 6
Managing Logs
Note: The network address translation may render this data meaningless, or at least
make it appear that all access occurs from a single client
• Domain accessed
• Path portion of the URL (the HTTP service can get the full URL path)
• IP address of the server from which the data was retrieved
To view the URL access log:
1. Open the IWSS console and click Logs > URL Access Log in the left menu.
2. Under Time period, select a time (All Dates, Today, Last 7 days, Last 30 days)
from the drop-down menu.
Click Range to view the URL access log in a given time range, and then indicate
the start and end dates.
7- 7
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
3. Under Sort by, select the appropriate option to sort the URL access log.
4. Click Show Log. The URL Access Log viewing screen appears.
5. Click Refresh to update the URL access log.
FIGURE 7-3. Sort the URL Access log according to Server, Date, User,
ClientIP, ServerIP, Domain, or Path.
Performance Log
The performance log contains information on server name, date, and the type and
value of the performance metric. Each performance metric record contains the
following information:
• Date and time the metric was recorded
• IWSS server that recorded the metric
• Matrix name (one of: HTTP Requests Processed, HTTP Responses
Processed, Number of HTTP threads, HTTP CPU % Utilization)
7- 8
Managing Logs
• Metric value
7- 9
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
FIGURE 7-5. Sort the FTP Get log according to User, Date, From, or File
Name.
7-10
Managing Logs
FIGURE 7-6. Sort the FTP Put log according to User, Date, From, or File
Name.
7-11
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
FIGURE 7-7. Summarize the log list according to date and size (in
bytes).
7-12
Managing Logs
Log Settings
On the Log Settings screen, you have the option to configure the following:
• Gather performance data
• Log HTTP/FTP access events
• Database log update interval
• Write logs to database and log files or database only
• Directories for reporting and system logs
• Number of days to keep the system logs
• Quarantine directory.
Directory Locations
You can configure the directories for the Reporting Log, System Log, and
Quarantine. The default location is C:\Program Files\Trend Micro\IWSS\Log
for both reporting and system log directories and C:\Program Files\Trend
Micro\IWSS\quarantine for the quarantine directory. IWSS checks if the
directory entered exists on the IWSS server. If the directory is not on the IWSS
7-13
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
server, an error message will appear to notify you that the directory you entered is not
accessible.
FIGURE 7-8. You have the option of writing logs to database and log files
or database only.
7-14
Managing Logs
FIGURE 7-9. The default number of days to keep the system logs is 5.
7-15
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
7-16
Chapter 8
Managing Reports
IWSS provides you with statistics that are useful in generating reports for a long-term
network traffic profile. These reports help you to optimize the network capability and
its security. IWSS gives you the option of generating reports based on a given
category of a specific user, all users, all groups or specific group(s). You can either
create the report manually (real-time) or on a scheduled basis. A report notification
can be sent to the email addresses defined in the configuration setting at given time
intervals.
Topics included in this chapter are:
• Generating reports
• Configuring real-time reports
• Configuring scheduled reports
8- 1
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Generating Reports
IWSS gives you the option of writing the reporting logs to database and text files or
to a database only. This option can be configured in the IWSS console under Logs >
Settings > Reporting Logs (see Log Settings starting on page 7-13 for more
information). The text logs are available for backward compatibility with IWSS 1.0
and to allow further analysis of log data through custom scripts or other third-party
applications. They can also be used in validating the completeness and accuracy of
logging to the database.
Trend Micro recommends that you migrate to “database only.” Data for reports is
recorded to the database at a configurable interval. Reports and database logs will not
reflect the activity, which has occurred after the last time data is written to the
database.
There is a performance penalty for enabling the access log (Log HTTP/FTP access
events is disabled by default). However, many reports on user activities will not be
available if the access log is not enabled. Conversely, if IWSS is configured as an
upstream proxy, valuable data on user activities may not be available to IWSS. Thus,
you need to decide whether or not you want IWSS to be the mechanism to summarize
all Web activities. If you do, then the access log must be enabled under Logs >
Settings > Reporting Logs > Options.
The IWSS console displays graphs and statistics for a generated report. Graphs can
be displayed in various formats:
• Bar
• Stacked bar
• Line
Note: The IWSS package is bundled with the Microsoft SQL Server Desktop Engine
(MSDE) for Windows platform. IWSS also supports Microsoft SQL Server 2000.
8- 2
Managing Reports
Blocking-event Reports
• Riskiest URLs by viruses detected
• Riskiest users by infected-URLs accessed
• Most violations by user
• Most violations by group
• Most blocked URL categories
• Most blocked URLs
• Most blocked URLs by day of the week
• Most blocked URLs by hour
Traffic Reports
• Most active users
• Most popular URLs
• Most popular downloads
• Most popular search engines
• Daily traffic report
• Activity level by day of the week
• Activity level by hour
• Per user report
8- 3
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
8- 4
Managing Reports
Report Type
Report by
Consolidated report Individual report
All groups or Included are only these These five reports are
Specific groups five reports: enabled:
o Most violations by o Most violations by
group· group
o Most blocked URL o Most blocked URL
categories categories
o Most blocked URLs o Most blocked URLs
o Most blocked URLs o Most blocked URLs
by day of the week by day of the week
o Most blocked URLs o Most blocked URLs
by hour by hour
8- 5
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Note: When you click Select on Specific group(s) (Reports > Real-time Reports >
Report by), the Select Groups pop-up screen displays according to the
setting made in the user identification method (HTTP > Configuration >
User ID).
3. Type the IP address range or type a group name in the fields provided.
4. Click Add.
5. Click Save
8- 6
Managing Reports
Note: When you click Select on Specific user(s) (Reports > Real-time Reports >
Report by), the Select Users pop-up screen displays according to the setting
made in the user identification method (HTTP > Configuration > User ID).
8- 7
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
8- 8
Managing Reports
8- 9
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
8-10
Managing Reports
FIGURE 8-6. By default, the data are stored in a database for 60 days.
8-11
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
8-12
Managing Reports
7. Click Save.
8-13
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
5. Under Report Type, select one of the two types of report to be generated
• Consolidated report
• Individual report
• Blocking-event reports
• Traffic reports
6. Under Options, select the chart type from the drop-down menu (Bar, Stacked
bar, or Line).
To view the activity for both blocked and unblocked traffic on a given chart,
select Distinguish blocked from unblocked traffic.
7. Click Save.
8-14
Managing Reports
• All groups
• Specific group(s)
5. Under Report Type, select one of the two types of report to be generated
• Consolidated report
• Individual report
• Blocking-event reports
• Traffic reports
6. Under Options, select the chart type from the drop-down menu (Bar, Stacked
bar, or Line).
To view the activity for both blocked and unblocked traffic on a given chart,
select Distinguish blocked from unblocked traffic.
7. Click Save.
FIGURE 8-9. For a monthly report, if you select a date that is beyond
the last day of the month (for example, 30 for February),
IWSS interprets it as the last day of the month.
8-15
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
FIGURE 8-11. A sample daily report for all users, which shows
“Riskiest Users by Infected URLs Accessed” and “Most
Violations by User”.
8-16
Managing Reports
Importing Data
You can import data from IWSS logs using the Microsoft Excel application.
To import data using the Microsoft Excel application:
1. Open an Excel application, and click Data > Get External Data > New
Database Query.
2. Under Choose Data Source > Databases, select IWSS*. Click OK.
8-17
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
5. Under Query Wizard - Filter Data, filter the data to specify which rows to
include in your query.
For example, select “username” in Column to filter, then choose “begins with”
in the drop-down list under Only include rows where > username, and then
select “username.” Click Next.
8-18
Managing Reports
6. Under Query Wizard - Sort Order, specify how the data must be sorted:
• Ascending or
• Descending
Click Next.
7. In the next screen, select Return Data to Microsoft Excel, and then click
Finish. Click OK.
TABLE 8-2. Major database tables for IWSS logging/reporting.
8-19
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
8-20
Chapter 9
9- 1
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
9- 2
Trend Micro Control Manager
Note: Additional information on the Enterprise Protection Strategy can be found on the
Trend Micro Web site at http://www.trendmicro.com.
9- 3
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
• Am I under attack?
• Can my system handle the attack?
• How should I respond to the attack?
Important Terms
The terms shown below are used throughout the chapter; thus, you need to become
familiar with these terms.
Agent
The agent is an application installed on a product-server that allows Control Manager
to manage the product. It receives commands from the Control Manager server, and
then applies them to the managed product. It also collects logs from the product, and
sends them to Control Manager. The Control Manager agent does not communicate
with the Control Manager server directly. Instead, it interfaces with a component
called the Communicator.
Communicator
The Communicator is the communications backbone of the Control Manager system;
it is part of the Trend Micro management infrastructure. Commands from the Control
Manager server to the managed products, and status reports from the products to the
Control Manager server, all pass through this component. Only one Communicator is
installed on each product server; the Communicator then handles the needs of all the
agents on the aforementioned server.
Entity
An entity is a representation of a managed product on the Product Directory link.
You see these icons in the directory tree of the Entity section. The directory tree is a
composition of all managed entities, residing on the Control Manager console.
9- 4
Trend Micro Control Manager
About Agents
Control Manager controls the first two tiers of its network using a system of
applications called agents. These agents receive command inputs from the
management console, and then apply them to the managed products. Agents also
obtain status information from the products and send them back to the Control
Manager server. The latter function allows you to view the status of your entire
network at a glance.
The Control Manager agent package is actually composed of two components: the
agent itself, and the Communicator. The Communicator handles
secure-communication between agents and the Control Manager server. Only one
Communicator is installed on a machine; thus if multiple products co-exist on a
server, the product agents share the Communicator.
9- 5
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
where host name is the name of the server on which Control Manager is installed.
The Logon screen opens.
2. Type your user name and password in the fields provided.
3. Click Sign in.
To log off from the management console:
Click Sign Out at the upper right corner of the management console.
Note: After installing a Control Manager server, Trend Micro strongly advises you to
perform an Update Now task to update your policies immediately. For subsequent
updates, use the Scheduled Update function.
9- 6
Trend Micro Control Manager
9- 7
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
blocking, File name blocking, File name/true file type blocking, URL pattern
blocking, and Web server blocking) and type the entries to be blocked in the text
box provided.
8. Click Next to go to the Notification tab. On this screen, specify the recipient of
the notification, method of notifying the recipients (email, pager), and the
corresponding message to be sent.
9. Click Next to go to the Scanning tab (no configurations needed for IWSS). Click
Next to go to the Update tab. Under the Update screen, specify how often you
want to check for updates (interval of time and source; Internet: Trend Micro
update server or Other source) and the method of deploying the updates
(Immediately to all destinations or According to a Deployment Plan).
10. Click Finish.
9- 8
Trend Micro Control Manager
9- 9
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
FIGURE 9-5. You can perform all the necessary configurations for
IWSS within Control Manager.
9-10
Trend Micro Control Manager
4. The Configuration tab is used to configure the master IWSS machine. Select the
product name in the drop-down menu under the Select a product field, and
select the appropriate entry under the Select a configuration field. Click Next.
5. The IWSS console appears. Perform the desired configuration, and then click
Tasks. Choose Configuration Replication in the drop-down menu of the Select
a task field.
6. Click Next. In the next screen select an entity or folder for replication, and then
click Replication.
9-11
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
9-12
Chapter 10
In the United States, Trend Micro representatives can be reached via phone, fax, or
email. Our Web site and email addresses follow:
http://www.trendmicro.com
support@trendmicro.com
10-1
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
For regional contact information and the specific technical support numbers for all
the regional and worldwide offices, open the IWSS console and choosing Support
from the drop-down in the banner.
General US phone and fax numbers follow:
Voice: +1 (408) 257-1500 (main)
Fax: +1 (408) 257-2003
Our US headquarters is located in the heart of Silicon Valley:
Trend Micro, Inc.
10101 N. De Anza Blvd.
Cupertino, CA 95014
10-2
Technical Support, Security Information, and Troubleshooting
Note: The information on this Web site is subject to change without notice.
10-3
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
• Asia/Pacific
• Australia and New Zealand
• Europe
• Latin America
• United States and Canada
Follow the instructions for contacting support in your region.
Version Information
In addition to virus pattern file updates, Trend Micro also provides occasional scan
engine and/or program upgrades. To find out exactly which virus pattern, PhishTrap,
spyware, URL filtering database pattern numbers, or scan engine build you are
running, click Summary in the left menu of the IWSS console.
10-4
Technical Support, Security Information, and Troubleshooting
FIGURE 10-2. Where to find the current version of the scan engine
Knowledge Base
Trend Micro Knowledge Base is a 24x7 online resource that contains thousands of
do-it-yourself technical support procedures for Trend Micro products. Use
Knowledge Base, for example, if you are getting an error message and want to find
out what to do to. New solutions are added daily.
Also available in Knowledge Base are product FAQs, hot tips, preventive antivirus
advice, and regional contact information for support and sales.
Knowledge Base can be accessed by all Trend Micro customers as well as anyone
using an evaluation version of a product. Visit:
http://kb.trendmicro.com
And, if you can't find an answer to a particular question, the Knowledge Base
includes an additional service that allows you to submit your question via an email
message. Response time is typically 24 hours or less.
For top solutions for IWSS, visit the following site:
http://kb.trendmicro.com/solutions/default.asp?show=pro
d&cmbProductTopSoln=62
10-5
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Known Issues
Known issues are features in your IWSS software that may temporarily require a
workaround. Known issues are typically documented in section 9 of the Readme
document you received with your product. Readme files for Trend Micro products
can also be found in the Trend Micro Update Center:
http://www.trendmicro.com/download/
Trend Micro recommends that you always check the Readme file for information on
known issues that could affect installation or performance, as well as a description of
what’s new in a particular release, system requirements, and other tips.
10-6
Technical Support, Security Information, and Troubleshooting
Note: Submissions made via the submission wizard/virus doctor are addressed promptly
and are not subject to the policies and restrictions set forth as part of the Trend
Micro Virus Response Service Level Agreement.
When you click Next, an acknowledgement screen displays. This screen also
displays a case number for the problem you submitted. Make note of the case number
for tracking purposes.
If you prefer to communicate by email message, send a query to the following
address:
virusresponse@trendmicro.com
In the United States, you can also call the following toll-free telephone number:
(877) TRENDAV, or 877-873-6328
10-7
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
10-8
Technical Support, Security Information, and Troubleshooting
TrendLabs
TrendLabs is Trend Micro’s global infrastructure of antivirus research and product
support centers that provide up-to-the minute security information to Trend Micro
customers.
The “virus doctors” at TrendLabs monitor potential security risks around the world,
to ensure that Trend Micro products remain secure against emerging threats. The
daily culmination of these efforts are shared with customers through frequent virus
pattern file updates and scan engine refinements.
TrendLabs is staffed by a team of several hundred engineers and certified support
personnel that provide a wide range of product and technical support services.
10-9
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Dedicated service centers and rapid-response teams are located in Tokyo, Manila,
Taipei, Munich, Paris, and Lake Forest, CA, to mitigate virus outbreaks and provide
urgent support.
10-10
Technical Support, Security Information, and Troubleshooting
Troubleshooting
How to turn on the verbose log
1. Set verbose=1 in the [http] section in the intscan.ini file
2. Restart the service.
IWSS cannot detect a virus
1. Open the IWSS console and click Administration > Product License.
2. Check if the product license status is activated.
URL filtering cannot block the URL specified in the policy
Option 1: Check the license status
1. Open the IWSS console and click Administration > Product License.
2. Check if the product license status is activated.
Note: The Activation Codes for IWSS virus detection and URL filtering module are
different.
Note: The Global Policy is automatically deployed. User-configured policies are not
automatically deployed
10-11
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
10-12
Technical Support, Security Information, and Troubleshooting
Some Internet applications do not function properly when scanned through ICAP
(for example, certain types of custom Internet programs, stock tickers, download
agents, real-time video, etc.).
To resolve this issue:
Add client_skip_content or server_skip_content in the [http] section of
the intscan.ini file (see Configuration files starting on page B-1). The
client_skip_content or server_skip_content looks for a particular pattern
in the HTTP header. If an entry in the HTTP header is an exact match with the
client_skip_content or server_skip_content, the specified content works
properly but will not be scanned (for example,
client_skip_content=User-Agent: Real-time Test Tool,
server_skip_content=Host: www.yahoo.com).
10-13
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
10-14
Appendix A
Glossary of Terms
This glossary describes special terms as used in this document or the online help.
Term Explanation
A-1
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Term Explanation
active FTP Configuration of FTP protocol that allows the client to initiate
“handshaking” signals for the command session, but the host
initiates the data session.
administrator account A user name and password that has administrator-level privi-
leges.
A-2
Glossary of Terms
Term Explanation
approved sender A sender whose messages are always allowed into your net-
work.
archive A single file containing one or (usually) more separate files plus
information to allow them to be extracted (separated) by a suit-
able program, such as a .zip file.
blocked sender A sender whose messages are never allowed to enter your
network.
A-3
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Term Explanation
boot sector virus A boot sector virus is a virus targeted at the boot sector (the
operating system) of a computer. Computer systems are most
likely to be attacked by boot sector viruses when you boot the
system with an infected disk from the floppy drive - the boot
attempt does not have to be successful for the virus to infect
the hard drive.
Also, there are a few viruses that can infect the boot sector
from executable programs. These are known as multi-partite
viruses and they are relatively rare. Once the system is
infected, the boot sector virus will attempt to infect every disk
that is accessed by that computer. In general, boot sector
viruses can be successfully removed.
case-matching Scanning for text that matches both words and case. For
example, if "dog" is added to the content-filter, with
case-matching enabled, messages containing "Dog" will pass
through the filter; messages containing "dog" will not.
A-4
Glossary of Terms
Term Explanation
compressed file A single file containing one or more separate files plus informa-
tion to allow them to be extracted by a suitable program, such
as WinZip.
configuration Selecting options for how InterScan VirusWall will function, for
example, selecting whether to quarantine or delete a
virus-infected email message.
content filtering Scanning email messages for content (words or phrases) pro-
hibited by your organization’s Human Resources or IT messag-
ing policies, such as hate mail, profanity, or pornography.
content violation An event that has triggered the content filtering policy.
daemon A program that is not invoked explicitly, but lies dormant wait-
ing for some condition(s) to occur. The perpetrator of the condi-
tion need not be aware that a daemon is lurking.
damage routine The destructive portion of virus code, also called the payload.
A-5
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Term Explanation
directory path The subsequent layers within a directory where a file can be
found, for example, the directory path for the IWSS quarantine
directory is:
C:\Programs\Trend Micro\IWSS\quarantine
DNS resolution When a DNS client requests host name and address data from
a DNS server, the process is called resolution. Basic DNS con-
figuration results in a server that performs default resolution.
For example, a remote server queries another server for data
on a machine in the current zone. Client software on the
remote server queries the resolver, which answers the request
from its database files.
domain name The full name of a system, consisting of its local host name and
its domain name, for example, tellsitall.com. A domain name
should be sufficient to determine a unique Internet address for
any host on the Internet. This process, called "name resolu-
tion", uses the Domain Name System (DNS).
DoS (Denial of Service) Group-addressed email messages with large attachments that
attack clog your network resources to the point where messaging ser-
vice is noticeably slow or even stopped.
download (noun) Data that has been downloaded, for example, from a Web site
via HTTP.
download (verb) To transfer data or code from one computer to another. Down-
loading often refers to transfer from a larger "host" system
(especially a server or mainframe) to a smaller "client" system.
A-6
Glossary of Terms
Term Explanation
file type The kind of data stored in a file. Most operating systems use
the file name extension to determine the file type. The file type
is used to choose an appropriate icon to represent the file in a
user interface, and the correct application with which to view,
edit, run, or print the file.
file name extension The portion of a file name (such as .dll or .xml) which indicates
the kind of data stored in the file. Apart from informing the user
what type of content the file holds, file name extensions are
typically used to decide which program to launch when a file is
run.
A-7
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Term Explanation
hard disk (or hard drive) One or more rigid magnetic disks rotating about a central axle
with associated read/write heads and electronics, used to read
and write hard disks or floppy disks, and to store data. Most
hard disks are permanently connected to the drive (fixed disks)
though there are also removable disks.
heuristic rule-based scan- Scanning network traffic, using a logical analysis of properties
ning that reduces or limits the search for solutions.
HouseCall A free virus scanning and cleaning product from Trend Micro.
HouseCall can detect and clean viruses found on your hard
drive, but HouseCall does not provide real-time protection. In
other words, HouseCall can help you to discover and clean up
an existing problem, but will not prevent future ones, nor will
HouseCall protect against worms, or mass-mailing programs.
A-8
Glossary of Terms
Term Explanation
“in the wild” Describes known viruses that are actively circulating. Also see
“in the zoo.”
“in the zoo” Describes known viruses that are currently controlled by antivi-
rus products. Also see “in the wild.”
A-9
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Term Explanation
LAN (Local Area Network) A data communications network which is geographically lim-
ited, allowing easy interconnection of computers within the
same building.
license certificate A document that proves you are an authorized user of IWSS.
link (also called hyperlink) A reference from some point in one hypertext document to
some point in another document or another place in the same
document. Links are usually distinguished by a different color
or style of text, such as underlined blue text. When you activate
the link, for example, by clicking on it with a mouse, the
browser displays the target of the link.
listening port A port utilized for client connection requests for data exchange.
A-10
Glossary of Terms
Term Explanation
macro virus Unlike other virus types, macro viruses aren't specific to an
operating system and can spread via email attachments, Web
downloads, file transfers, and cooperative applications.
mass mailer (also known as A malicious program that has high damage potential, because
a Worm) it causes large amounts of network traffic.
A-11
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Term Explanation
Microsoft Office file Files created with Microsoft Office tools such as Excel or
Microsoft Word.
mixed threat attack Complex attacks that take advantage of multiple entry points
and vulnerabilities in enterprise networks, such as the “Nimda”
or “Code Red” threats.
multi-partite virus A virus that has characteristics of both boot sector viruses and
file-infecting viruses.
operating system The software which handles tasks such as the interface to
peripheral hardware, scheduling tasks, and allocating storage.
In this documentation, the term also refers to the software that
presents a window system and graphical user interface.
passive FTP Configuration of FTP protocol that allows clients within your
local area network to initiate the file transfer, using random
upper port numbers (1024 and above).
A-12
Glossary of Terms
Term Explanation
pattern file (also known as The pattern file, as referred to as the Official Pattern Release
Official Pattern Release) (OPR), is the latest compilation of patterns for identified
viruses. It is guaranteed to have passed a series of critical tests
to ensure that you get optimum protection from the latest virus
threats. This pattern file is most effective when used with the
latest scan engine.
proxy server A World Wide Web server which accepts URLs with a special
prefix, used to fetch documents from either a local cache or a
remote server, then returns the URL to the requester.
A-13
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Term Explanation
scan engine The module that performs antivirus scanning and detection in
the host product to which it is integrated.
seat A license for one person to use InterScan VirusWall for SMB.
A-14
Glossary of Terms
Term Explanation
shared drive A computer peripheral device that is used by more than one
person, thus increasing the risk of exposure to viruses.
status bar A feature of the user interface, that displays the status or
progress of a particular activity, such as loading of files on your
machine.
Telnet The Internet standard protocol for remote login that runs on top
of TCP/IP (Transmission Control Protocol/Internet Protocol).
This term can also refer to networking software that acts as a
terminal emulator for a remote login session.
top-level domain The last and most significant component of an Internet fully
qualified domain name, the part after the last ".". For example,
host wombat.doc.ic.ac.uk is in top-level domain "uk" (for United
Kingdom).
Total Solution CD A CD containing the latest product versions and all the patches
that have been applied during the previous quarter. The Total
Solution CD is available to all Trend Micro Premium Support
customers.
traffic Data flowing between the Internet and your network, both
incoming and outgoing.
A-15
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Term Explanation
true file type Used by IntelliScan, a virus scanning technology, to identify the
type of information in a file by examining the file headers,
regardless of the file name extension (which could be mislead-
ing).
TTL Time to Live, a field in the Internet Protocol (IP) that specifies
how many more hops a packet can travel before being dis-
carded or returned.
virus kit A template of source code for building and executing a virus,
available from the Internet.
virus trap Software that helps you capture a sample of virus code for
analysis.
virus writer Another name for a computer hacker, someone who writes
virus code.
Web The World Wide Web, also called the Web or the Internet.
A-16
Glossary of Terms
Term Explanation
Web server A server process running at a Web site which sends out Web
pages in response to HTTP requests from remote browsers.
working directory The destination directory in which the main application files are
stored, such as C:\Program Files\Trend Micro\IWSS.
zip file A compressed archive (in other words, “zip file") from one or
more files using an archiving program such as WinZip.
"Zip of Death" A zip (or archive) file of a type that when decompressed,
expands enormously (for example 1000%) or a zip file with
thousands of attachments. Compressed files must be decom-
pressed during scanning. Huge files can slow or stop your net-
work.
A-17
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
A-18
Appendix B
B-1
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
B-2
Mapping file types to block with MIME content-types
B-3
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
B-4
Mapping file types to block with MIME content-types
zip application/
zip
B-5
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
B-6
Appendix C
Configuration Files
There are three types of configuration files (main, protocol module, scanning
module). All the configuration files are in the {IWSS root} directory; the default
location for {IWSS root} is C:\Program Files\Trend Micro\IWSS. The
main configuration file is in intscan.ini.
• Settings specific to virus scanning are in:
{IWSS root}\HTTP\IWSSPIScanVsapi.dsc
• Settings that are specific to the ICAP protocol are in:
{IWSS root}\HTTP\IWSSPIProtocolIcap.pni
• Settings that are specific to the stand-alone proxy are in:
{IWSS root}\HTTP\IWSSPIProtocolHttpProxy.pni
• Settings for URL filtering scanning module are in:
{IWSS root}\HTTP\IWSSPIUrlFilter.dsc
• Settings specific to reporting are in:
{IWSS root}\report.ini
• Settings for the URL Categorization database are in:
{IWSS root}\HTTP\urlfcIFX.ini
• Settings for default URL categories and their mapping information are in:
{IWSS root}\HTTP\urlfcMapping.ini
• Settings for the list of IP address and IP ranges of all machines allowed to access
the IWSS server for the purpose of proxying the HTTP requests are in:
{IWSS root}\HTTP\ClientACL.ini
C-1
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
• Settings for rules that define what ports IWSS will forward HTTP requests to are
in:
{IWSS root}\HTTP\HttpPortPermission.ini (
• Settings for rules that define what ports IWSS will allow HTTPS tunneling to are
in:
{IWSS root}\HTTP\HttpsConnectACL.ini
• Settings for list of IP address and IP ranges of trusted servers are in:
{IWSS root}\HTTP\ServerIPWhiteList.ini
The IWSS console varies depending on which modules are installed. If you have
been using a previous version of IWSS, there are also many new features available in
IWSS that require new .ini file entries.
Protocol Handlers
Functions responsible for interpreting and processing messages in some recognized
transmission protocols are encapsulated in a dynamic library referred to as a protocol
handler. IWSS provides a choice of either an ICAP protocol handler, which enables
IWSS to act as an ICAP server, or an HTTP proxy handler, wherein IWSS acts like a
direct HTTP proxy server. The application binary is independent of the protocol
handler, allowing the same application to support different protocols with a
configuration change.
Provide the complete path of the active configuration file of the protocol in the
main/protocol_config_path entry in the intscan.ini file application.
Protocol handlers require their own specific configuration files, which contain entries
that pertain only to that protocol. These protocol configuration files are denoted with
a “.pni” filename extension.
Scanning Modules
Traffic scanning functionality is provided through dynamic libraries known as
scanning modules. The first scanning module available to IWSS provides content
scanning using the scan engine.
Each scanning module has a configuration file with a “.dsc” extension. The IWSS
application locates the available scanning modules by searching for .dsc files in the
directory that is provided in the scan/plugin_dir entry in the intscan.ini file.
C-2
Appendix D
Platforms
• Windows, including Windows 2003, 2000, NT 4.x, NT 3.5x, XP, Me, 98, and 95
• Unix, including Solaris, all major flavors of Linux, IBM AS/400, OS/390
• DOS
D-1
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Encoding
• MIME
• UUencode
• Bin/Hex
File types
• Executables, including .exe, .com, .lnk, .bas, .reg
• Library files, including .dll
• Others, including .hlp and.chm
• Microsoft Office files (see Macro Scripts, below)
Compression
• Zip
• Arj
• Cab
Macro Scripts
• Word Basic
• VBA (Visual Basic for Applications)
• VBA3
Note: Examples of applications that host Macro scripts are Microsoft Word, Excel, and
PowerPoint.
Scripting Languages
• JavaScript
• VBScript
D-2
Displaying the script when running ./mkcert.sh
D-3
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
D-4
Appendix E
Clean <X Clean and pass Download the file Clean and Download the
without noticing pass cleaned file
that the file is
infected and had
been cleaned
Delete <X Delete Show a warning Block the Show a warn-
message that the URL ing message
infected file is that the URL
deleted is blocked
Quar- <X Move the infected file Show a warning Block the Show a warn-
antine to the quarantine direc- message that the URL ing message
tory infected file is that the URL
quarantined is blocked
E-1
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Cleanable Files
Clean >=X Pass the file but do Download the Clean and Download the
scan-behind infected file pass cleaned file
Delete >=X Pass the infected file, Download the Block the Show a warn-
but do scan-behind and infected file URL ing message
delete the infected file that the URL
from the IWSS server is blocked
Quar- >=X Move the infected file Download the Block the Show a warn-
antine to the quarantine direc- infected file URL ing message
tory that the URL
is blocked
E-2
Scan Action Behavior During Scan-behind
Non-cleanable Files
Pass <X Pass the file Download the file Pass the file Download the
without noticing file without
that the file is noticing that
infected the file is
infected
Delete <X Delete Show a warning Block the Show a warn-
message that the URL ing message
infected file is that the URL
deleted is blocked
Quar- <X Move the infected file Show a warning Block the Show a warn-
antine to the quarantine direc- message that the URL ing message
tory infected file is that the URL
quarantined is blocked
E-3
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Non-cleanable Files
Pass >=X Pass the file Download the file Pass the file Download the
without noticing file without
that the file is noticing that
infected the file is
infected
Delete >=X Pass the file Download the file Block the Show a warn-
without noticing URL ing message
that the file is that the URL
infected is blocked
Quar- >=X Pass the file Download the file Block the Show a warn-
antine without noticing URL ing message
that the file is that the URL
infected is blocked
E-4
Scan Action Behavior During Scan-behind
Pass <X Pass the file Download the file Pass the file Download the
file
Delete <X Delete Show a warning Delete Show a warn-
message that it is ing message
a password-pro- that it is a
tected file and is pass-
deleted word-pro-
tected file and
is deleted
Quar- <X Move the pass- Show a warning Move the Show a warn-
antine word-protected file to message that the pass- ing message
the quarantine direc- password-pro- word-pro- that the pass-
tory tected file is quar- tected file to word-pro-
antined the quaran- tected file is
tine directory quarantined
E-5
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Pass >=X Pass the file Download the file Pass the file Download the
file
Delete >=X Put the URL into the Download the file Check the Show a warn-
allow list, and then URL if it ing message
delete the pass- match. It will that it is a
word-protected file not down- pass-
load the word-pro-
URL if the tected file and
URL match. is deleted
Quar- >=X Move the pass- Download the file Move the Show a warn-
antine word-protected file to pass- ing message
the quarantine direc- word-pro- that the pass-
tory tected file to word-pro-
the quaran- tected file is
tine directory quarantined
E-6
Scan Action Behavior During Scan-behind
Macros
Pass <X Pass the file Download the file Pass the file Download the
file
Clean <X Clean the macro Download the file Clean the Download the
with the macro macro file with the
cleaned macro
stripped off
Quar- <X Move the macro file to Show a warning Block the Show a warn-
antine the quarantine direc- message that the URL ing message
tory macro file is quar- that the URL
antined is blocked
E-7
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
Macros
Pass >=X Pass the file Download the file Pass the file Download the
file
Clean >=X Pass the file, but per- Download the file Clean the Download the
form scan-behind macro file with the
macro
stripped off
Quar- >=X Move the macro file to Download the file Block the Show a warn-
antine the quarantine direc- URL ing message
tory that the URL
is blocked
E-8
Index compressed file scanning limits
FTP 6-5
compressed files 1-7
compression D-2
A configuration files C-1
access quota configuration replication 9-10
defined rule 7-5 configure Approved List 5-12
policies 4-26 contacting Technical Support 10-3
actions contacting Trend Micro 10-3
infected file (FTP) 6-6 Control Manager 1-18
infected file (HTTP) 4-16 accessing management console 9-6
Macro Scan (FTP) 6-8 agent 9-4
Macro Scan (HTTP) 4-17 architecture 9-5
non-cleanable files (HTTP) 4-16 overview 9-2
password-protected file (FTP) 6-7 server 9-4
password-protected file (HTTP) 4-16 tiers 9-5
uncleanable file (FTP) 6-7
Activation Code 3-2, 3-6 D
Active Directory 4-29 Damage Cleanup Services 10-10
ActiveUpdate 1-15, 5-4 data, import 8-17
incremental pattern file updates 1-16 database
with Control Manager 1-15 connection settings 4-28
without Control Manager 1-15 setup 4-28
adding policy decompression percent 4-15
request mode 3-11 default extensions 6-5
response mode 3-11 deferred scan 4-5, 4-7
Agent, definition 9-4 Denial of Service (DoS) 1-18
antivirus programs 1-14 directory locations, settings 7-13
disease vector 4-24
B documentation, availability of 1-20
Bin/Hex D-2
block list and exceptions, import 4-22 E
Blue Coat Port 80 Security Gateway, setting up 3-9 EICAR test file 10-8
BootTrap 1-16 Eicar, also test virus 3-19
Browser-console communication, encrypting 3-17 encoding D-2
bypass specific MIME content-types encrypted files D-1
HTTP Proxy 4-9 Enterprise Protection Strategy 9-3
ICAP 4-10 Entity, definition 9-4
EPS (Enterprise Protection Strategy) 1-18
C assessment and restoration phase 1-19
cache flushing example scenario 1-19
Cisco CE ICAP server 3-15 outbreak prevention phase 1-18
NetCache 3-15 virus response phase 1-18
Port 80 Security Appliance 3-15
centralized management 1-7 F
Cisco CE ICAP servers, setting up 3-12 file type
cluster configuration or entry, deleting 3-14 scanning for true file type 4-13
Communicator, definition 9-4 scanning with IntelliScan 4-13
comprehensive virus protection 1-8 true file type 4-13
I–1
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
I–2
Index
I–3
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
I–4
Index
I–5
Trend Micro™ InterScan™ Web Security Suite Getting Started Guide
signature 1-14
virus accomplice 4-24
Virus Alert service 10-8
virus doctors-see TrendLabs 10-9
Virus Encyclopedia 10-8
Virus Map 10-8
virus notifications
HTTP 4-17
Virus Primer 10-8
virus writers 1-14
motivation for writing viruses 1-14
virus writing kits 1-14
Visual Policy Manager 3-10
W
Web console
how to log on 3-15
Web site and URL strings blocking 1-11
Webmaster tools 10-8
weekly virus report 10-8
white papers 10-8
wildcards 4-23
work time 5-3
configuration 5-14
workflow
for request mode 2-12
for response mode 2-13
I–6
Trend Micro Incorporated
10101 N. De Anza Blvd.
Cupertino, CA., 95014 USA
www.trendmicro.com
For Sales:
Tel: +1-408-257-1500 (outside US and Canada)
Fax: +1-408-257-2003