SPLX 2.5 GSG
SPLX 2.5 GSG
TREND MICRO
ServerProtect 2TM
NOTE: A license to the Trend Micro Software usually includes the right to product
updates, pattern file updates, and basic technical support for one (1) year from the
date of purchase only. Maintenance must be reviewed on an annual basis at Trend
Micro’s then-current Maintenance fees.
Trend Micro, the Trend Micro t-ball logo, InterScan VirusWall, MacroTrap,
ServerProtect, ScriptTrap, and TrendLabs are trademarks or registered trademarks
of Trend Micro, Incorporated. All other product or company names may be
trademarks or registered trademarks of their owners.
All other brand and product names are trademarks or registered trademarks of their
respective companies or organizations.
Trend Micro is always seeking to improve its documentation. If you have questions,
comments, or suggestions about this or any Trend Micro documents, please contact
us at [email protected]. Your feedback is always welcome. Please evaluate this
documentation on the following site:
http://www.trendmicro.com/download/documentation/rating.asp
Contents
Contents
Chapter 1: Introducing ServerProtect™ for Linux™
Protecting Linux Servers .................................................................... 1-2
Quarantines .................................................................................... 1-2
Platforms, Compression, and Encoding ......................................... 1-2
Password Protected/Encrypted Files ........................................... 1-3
Understanding How ServerProtect for Linux Works ......................... 1-5
Exploring ServerProtect Scanning Technologies .......................... 1-6
Pattern Matching ......................................................................... 1-6
MacroTrap .................................................................................. 1-6
Compressed File Scanning .......................................................... 1-7
ServerProtect for Linux Features ....................................................... 1-8
ServerProtect for Linux Benefits ..................................................... 1-11
What’s New in ServerProtect for Linux .......................................... 1-16
Using the Product Documentation .................................................. 1-19
i
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
ii
Contents
iii
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Appendix A: Appendix
Accessing ServerProtect Man Pages ................................................. A-2
Understanding tmsplx.xml ................................................................ A-2
Scan Group Keys ........................................................................... A-4
ActiveUpdate Group Keys .......................................................... A-14
SOURCEINFO Group Keys ....................................................... A-16
DESTINFO Group Key ............................................................... A-19
Notification Group Keys ............................................................. A-19
Configuration Group Keys .......................................................... A-23
GUIPassword Group Key ........................................................... A-25
Logs Group Keys ........................................................................ A-25
Registration Group Keys ............................................................. A-26
Backing Up and Verifying the Configuration File ...................... A-27
Using RemoteInstall.conf ................................................................ A-28
Using splxmain ................................................................................ A-30
Using splx Script ............................................................................. A-34
Using splxcore Script ...................................................................... A-35
Using splxhttpd Script ..................................................................... A-36
Using splxcomp Script .................................................................... A-36
Using the CMconfig Tool ................................................................ A-37
Apache Configuration File .............................................................. A-38
Apache Log Files ............................................................................. A-38
SMTP Mail Notification Character Sets .......................................... A-38
Debian Commands .......................................................................... A-39
Index
iv
Chapter 1
Introducing ServerProtect™
for Linux™
Trend Micro ServerProtect for Linux provides comprehensive protection against
computer viruses, Trojans, and worms for file servers based on the Linux operating
system. Managed through an intuitive portable Web-based console, ServerProtect
provides centralized virus scanning, pattern updates, event reporting and antivirus
configuration.
1- 1
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
And, the increase in popularity of the Linux platform has resulted in the growth of
viruses and other malware specifically targeting Linux servers. Viruses that attack the
Linux platform are becoming more frequent and severe.
Quarantines
Quarantines are areas on your computer or network where files that cannot be
cleaned are stored. The messages or files may eventually be deleted, to limit the
storage space needed by the quarantine.
One important use of quarantines is to temporarily store files that contain malicious
code. With quarantined files, unlike deleted files, if the actual contents of the file are
needed later, they can be recovered. Administrators can use the quarantine
aggressively without concern that important information will be permanently lost.
1- 2
Introducing ServerProtect™ for Linux™
Encoding
• MIME
• UUencode
• Bin/Hex
File Types
• Executables, including .exe, .com, .lnk, .bas, and .reg
• Library files, including .dll
• Others, including .hlp and .chm
• Microsoft Office files (see Macro Scripts, below)
Compression
• Tar
• Gzip
• All windows compression formats
1- 3
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Macro Scripts
• WordBasic
• VBA (Visual Basic for Applications)
• VBA3
Note: Examples of applications that host Macro scripts are Microsoft Word and Excel,
OpenOffice, and Rexx.
Scripting Languages
• JavaScript
• VBScript
1- 4
Introducing ServerProtect™ for Linux™
1- 5
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
ServerProtect offers a Web-based console that allows for easy remote access from
any location with an Internet connection. Command-line alternatives are available for
many features of the application. You can configure notifications to alert you when
system events or an attempted attack has taken place.
Pattern Matching
ServerProtect draws upon an extensive database of virus patterns to identify viruses
and other malware through a process called “pattern matching.” ServerProtect
examines key areas of suspect files for telltale strings of malware code and then
compares them with thousands of virus signatures that Trend Micro has on record.
WARNING! Due to the large number of new viruses, always keep the virus pattern file
up-to-date.
MacroTrap
Macro viruses are application-specific; which means they can attack multiple
operating systems. Given this cross-platform compatibility, combined with the
popularity of the Internet and increasing power of macro languages, the magnitude of
the threat posed by these viruses is obvious. Trend Micro’s MacroTrap provides you
with a means of protecting your network from this type of malware.
1- 6
Introducing ServerProtect™ for Linux™
perform virus-like activity. Examples of this behavior include copying parts of the
template to other templates (replication), and execution of harmful commands
(destruction).
The ServerProtect scan engine scans inside archives and compressed files, and can
even detect viruses in compressed files and archives composed of other compressed
files - up to twenty (20) compression layers deep, if so configured. If ServerProtect
scans a file more than 20 layers deep, layers 21+ are “skipped” but are recorded in
the system logs.
The Trend Micro scan engine can detect malware in archives created by popular
compression and archival algorithms, such as *.zip, *.arj, *.lzh. A comprehensive list
is available in the How ServerProtect Finds Viruses topic in the online help.
Note: The Real-time Scan option still detects viruses included in skipped files
during a decompression attempt.
1- 7
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
The TMCM server consolidates these reports from log data, so these reports are
available only when managing ServerProtect from TMCM.
Multiple-Processor Support
ServerProtect can be installed on both single and multiple-processor servers.
1- 8
Introducing ServerProtect™ for Linux™
1- 9
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
can quickly contain virus outbreaks, minimize system damage, and prevent undue
downtime.
When registered to Trend Micro Control Manager, ServerProtect can take advantage
of OPS for file blocking.
OPS is a key component of the Trend Micro Enterprise Protection Strategy (EPS), the
culmination of a research initiative that identified best practices for preventing or
deflecting potentially damaging virus attacks. This study was brought on by the
apparent failure of conventional security measures to defend against new generation
threats, such as CodeRed and Nimda.
Trend Micro created Outbreak Prevention Services to address concerns at each stage
of the outbreak life cycle. OPS harnesses the three core strengths of Trend Micro:
...and brings them together in a single powerful interface: Trend Micro Control
Manager.
With OPS, Control Manager provides answers to the following key security
questions:
• Am I under attack?
• Can my system handle the attack?
• How should I respond to the attack?
Note: For additional information on the Enterprise Protection Strategy, visit the Trend
Micro Web site at http://www.trendmicro.com.
1-10
Introducing ServerProtect™ for Linux™
Award-Winning Software
ServerProtect is a proven award-winning product:
1-11
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
1-12
Introducing ServerProtect™ for Linux™
https://olr.trendmicro.com/registration/
1-13
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
1-14
Introducing ServerProtect™ for Linux™
1-15
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
• Reports are available from Trend Micro Control Manager. See Reports Available
from Control Manager on page 1-8.
• Outbreak Prevention Services (for file blocking). See Outbreak Prevention
Services on page 1-9.
Remote Installation
You can install one or multiple instances of ServerProtect to remote machines by
using the new RemoteInstall tool.
In addition to the above new features, the following features are available in version
2.5:
1-16
Introducing ServerProtect™ for Linux™
1-17
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Enhanced
links available
from drop-down
menu
Launch context-
sensitive help
from here
New banner
and color Tooltips provide
scheme help at the point
of need
1-18
Introducing ServerProtect™ for Linux™
• Getting Started Guide—This Guide helps you get “up and running” by
introducing ServerProtect, assisting with installation planning, implementation,
and configuration, and describing the main product functions. It also includes
instructions on testing your installation using a harmless test virus. The latest
version of the Guide is available in electronic form at:
http://www.trendmicro.com/download/
• Online help—The purpose of online help is to provide “how to’s” for the main
product tasks, usage advice, and field-specific information such as valid
parameter ranges and optimal values. Online help is accessible from the
ServerProtect management console.
• Man pages—ServerProtect for Linux provides manpages for the splxmain, splx,
tmsplx.xml, RemoteInstall, and CMconfig files. See Accessing ServerProtect
Man Pages starting on page A-2 for more information.
• Readme file—The Readme file contains late-breaking product information that
is not found in the online or printed documentation. Topics include a description
of new features, installation tips, known issues and release history.
• Knowledge Base— The Knowledge Base is an online database of
problem-solving and troubleshooting information. It provides the latest
information about known product issues. To access the Knowledge Base, open:
http://esupport.trendmicro.com/
1-19
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
1-20
Chapter 2
2- 1
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
System Requirements
Servers on which you install ServerProtect must meet the following requirements.
Hardware
CPU
• Intel™ Pentium™ II processor (or higher)
• AMD™ Athlon™ processor
Memory
• 256MB or more (512MB recommended for application/file servers)
Disk space
• 50MB for the /opt directory
• 50MB for the /tmp directory
Software
Supported Distributions and Kernels
• Red Hat™ Enterprise Linux (AS, ES, WS) 4.0
2.6.9-5.EL up
2.6.9-5.EL smp
2.6.9-22.EL up
2.6.9-22.EL smp
2.6.9-22.0.2.EL up
2.6.9-22.0.2.EL smp
• SUSE™ LINUX Enterprise Server 9
2.6.5-7.97 up
2.6.5-7.97 smp
2.6.5-7.244 up
2.6.5-7.244 smp
2- 2
Installing ServerProtect for Linux
For other kernels and distributions, refer to the following Web site for additional information:
http://www.trendmicro.com/en/products/file-server/
sp-linux/use/kernel.htm
Note: The Quick Access console is available only when you are logged on as root.
XWindows does not support root login on the Debian 3.1 default platform.
2- 3
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
If you have not installed the JRE, the logon screen appears as shown in the
following example.
FIGURE 2-1. Logon screen when users accessing the Web console
with Mozilla browsers have not installed the JRE
To enable the Java plug-in, go to the Mozilla plug-in directory and then create a
symbolic link to the Java plug-in. For example:
# cd /usr/lib/mozilla/plugins
# ln -s \
# /usr/java/j2re1.4.2/plugin/i386/ns610-gcc32\
# libjavaplugin_oji.so libjavaplugin.so
2- 4
Installing ServerProtect for Linux
For instructions on installing a KHM, see Installing a Kernel Hook Module on page
2-31.
Note: During installation, if you receive an error message that a dependent package must
be installed to continue the installation, install the required package before
proceeding.
2- 5
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
License Agreement
After beginning the installation of ServerProtect, the first task is to review and accept
the license agreement.
Note: The above command extracts the required files to their proper locations.
4. The Trend Micro End User License Agreement displays. Scroll to review the
license. When you have finished viewing, type “yes” to accept the licensing
terms. (If you do not click “yes,” installation cannot continue.)
than DOD, the Government's rights in Trend Micro Software shall be no greater
than those set forth in FAR 52.227-19(c)(1) or (c)(2), Commercial Computer
software - Restricted Rights; or FAR 52.227-14, Rights in General Data
Alternative III, as applicable. Contractor: Trend Micro Incorporated, 10101 N.
DeAnza Blvd., Cupertino, CA 95014.
If You do not accept Trend Micro's offer or You wish to license the Software
for production use, contact: Trend Micro Incorporated, 10101 N. De Anza Blvd.,
Cupertino, CA 95014. Telephone: (408) 257-1500. Fax: (408) 257- 2003. Address
all questions about this Agreement to: [email protected]. To view a
copy of Trend Micro's standard US License Agreement, visit
www.trendmicro.com/license/US.
THE SOFTWARE IS PROTECTED BY TRADE SECRET COPYRIGHT AND UNITED STATES PATENT
LAWS, AND INTERNATIONAL TREATY PROVISIONS. UNAUTHORIZED REPRODUCTION OR
DISTRIBUTION IS SUBJECT TO CIVIL AND CRIMINAL PENALTIES.
2- 6
Installing ServerProtect for Linux
2- 7
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
5. At the Control Manager server port: [80], enter the number of the
port that you would like to use to access Control Manager or just press ENTER to
accept the default value of 80. The installer stores your port number and asks if
you use a proxy to connect to Control Manager.
6. At the Do you access Control Manager through a proxy
server? (y/n) [n] prompt, enter y if you do or just press ENTER to
accept the default choice of n. If you choose n, the installer asks you to specify
the display name to identify ServerProtect on the Control Manager Web console.
If you do use a proxy server to connect to Control Manager, see Entering Proxy
Server Information on page 2-8 for further guidance on this process.
7. At the Please specify the name you would like to display
on the Control Manager console: [SPLX server IP
address] prompt, enter the desired name. Control Manager will use this name
to identify your ServerProtect server on the Control Manager Web console. The
installer stores this information and asks for the folder in which you would like to
present your ServerProtect server on the Control Manager Web console.
8. At the Please specify a folder name for this product (for
example: /SPLX) [New entity]: prompt, enter the folder path
described above. The installer displays a summary of the information you have
entered and asks you to confirm your choices.
9. At the Is the above information correct? (y/n) [n] prompt,
confirm or reject the displayed choices. If you enter n (or just press ENTER to
accept the default choice of n), the installer prompts you to re-enter all of the
above information, starting with the IP of your ServerProtect server. If you enter
y to confirm all of the displayed information, an “installation complete” message
displays and ServerProtect asks if you would like to enter your activation code.
See Activating ServerProtect During Installation on page 2-9 for further
guidance on this process.
2- 8
Installing ServerProtect for Linux
2- 9
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
2. The installer prompts you to activate ServerProtect. You can do so at this time or
skip this step and activate later. To skip this step, press Ctrl+D.
Step 2. Activate
Type the Activation Code/serial number received after registration
to activate ServerProtect.
(Press [Ctrl+D] to abort activation.)
3. The installation setup program is now complete. If you did not register or activate
during installation, you can do so later using methods described in this chapter.
See Registering ServerProtect on page 2-23 and Activating ServerProtect starting
on page 2-28 for instructions.
Installing Remotely
Trend Micro understands that many ServerProtect customers install and administer
ServerProtect in a centrally managed, distributed environment. For this reason we
have provided a remote installation tool (RemoteInstall).
RemoteInstall Features
The RemoteInstall tool has the following features:
• Can install ServerProtect on remote machines
• Configuration file keeps account information of client machines
• Can deploy ServerProtect configuration data to target machines after product
installation
• Can deploy Kernel Hook Module (KHM) to target machines after product
installation
• Can collect certain information about client environments, such as the running
Linux distribution and the Linux kernel number
• Can export configuration information to .CSV format so that in a subsequent
deployment RemoteInstall can re-use the list of machines to which the initial
deployment failed
2-10
Installing ServerProtect for Linux
2-11
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
“RemoteInstall tool directories and files upon extraction,” on page 2-12 for a list of
files and directories that this subdirectory contains.
2-12
Installing ServerProtect for Linux
Parameter Description
-c check client info
-f {alternative_config_file} specified config file of remote install. Use
this option to run RemoteInstall with a
config file other than RemoteIn-
stall.conf. (You can use an alterna-
tive config file as long as the alternative
file contains the same key-value pairs as
RemoteInstall.conf. See Using a
Configuration File in Your Remote Deploy-
ment on page 2-14)
-h show usage
-n do not show license agreement
-p {csv_file} convert specified csv file to config file for
use with RemoteInstall (see Converting
CSV-Formatted Files to RemoteInstall.conf
Format on page 2-15 for detailed guidance
on this option)
-v show version
To execute RemoteInstall:
1. Place the ServerProtect full binary file on the deploying server.
2. Extract RemoteInstall from the ServerProtect binary. (See Extracting
RemoteInstall From the ServerProtect Binary on page 2-11 for details.)
2-13
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
2-14
Installing ServerProtect for Linux
For brevity, only the most important configurable keys are listed in the table below.
For detailed explanations of every key, please see Using RemoteInstall.conf starting
on page A-28.
Key Description
DeployOption Indicates which kind of deployment you want
to do.
Value 1: ServerProtect 2.5 package deploy-
ment and installation
Value 2: ServerProtect 2.5 config file update
Value 3: KHM deployment
PackageName Indicates the ServerProtect installation path
for package deployment.
Activation Code/serial num- Used in package deployment. Value is the
ber ServerProtect 2.5 Activation Code/serial
number for installation.
ConfigFilePath Used in configuration file deployment. Indi-
cates configuration file path.
# ./RemoteInstall -p my_conf_file.csv
2-15
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
2-16
Installing ServerProtect for Linux
Single Deploy
In the #single deploy subsection of the Client assignment section of
RemoteInstall.conf are 13 configuration items that RemoteInstall must
be aware of in order to deploy successfully
Line Description
1. [x.x.x.x] IP address of client
2. RootPassword root password of client
3. ConnectCM Value 1 (the default): register to Trend Micro
Control Manager (TMCM) server.
Value 0: do not register to TMCM sever
4. CMServerIP IP address of TMCM server
5. CMServerPort connection port of TMCM server
(default = 80)
6. UseProxyAccessCM Value 1: use a proxy server to connect to
TMCM server.
Value 0 (the default): do not use proxy
7. ProxyServerIP IP address of proxy server
8. ProxyServerPort connection port of proxy server
(default = 80)
9. ProxyAuthentication Value 1: use proxy authentication
Value 0 (default): do not use
10. ProxyUserName Proxy authentication user name
11. ProxyPassword Proxy authentication password
12. CMClientName Client machine name that displays in
TMCM console.
Default = IP address of client
13. CMProductDirecto- Directory name that displays in TMCM con-
ryName sole. Directory is used to group clients.
Default = “New entity”
2-17
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Group deploy
For group deployment, all of the lines are identical to those in the #single
deploy section except for the following.
Line Description
1.[Group1] Instead of a key for the IP address
of a single machine, the first key
labels the group of clients to deploy
to.
14. Machine1=x.x.x.x In this line (and as many as needed
after it), list the IP address of each
machine to which RemoteInstall
will deploy ServerProtect.
15. Machine2=x.x.x.x (same as above)
(list as many as (same as above)
needed)
Tip: For ease of reference, Trend Micro suggests starting any group names with an
easily identifiable term, such as Group1, Group2, Group3, and likewise for
machine names, for example, Machine1, Machine2, and so on.
2-18
Installing ServerProtect for Linux
The Logon screen displays in your browser window. There are two versions of the
Logon screen, depending on whether you registered and activated ServerProtect
during installation.
If you registered and activated, a fully licensed (“standard”) version of the product
was installed. If you skipped registration and activation, an evaluation version of the
product was installed. The evaluation version is fully functional, but when the 60-day
evaluation period ends, you will stop receiving new pattern files or scan engine
updates from Trend Micro. Updates will not resume until you register and activate
ServerProtect.
2-19
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
If you have already registered and activated your copy of ServerProtect, the Logon
screen appears as follows:
2-20
Installing ServerProtect for Linux
If you have not registered and activated ServerProtect, the Logon screen includes
prompts to register ServerProtect using your Activation Code/serial number. The
screen appears as follows:
2-21
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
A password is not required to access the application the first time you log on after
installing. Click Log on. The following screen displays:
The Real-time Scan screen is the default view when the Web console opens.
2-22
Installing ServerProtect for Linux
Make selections from the left menu to navigate the user interface. For example, your
next action should be to set up your administrator account with a password, before
you log off from the ServerProtect Web console.
Note: When you first log on to the ServerProtect Web console after installation, the
password is blank. (There is no default password.)
For information on how to reset the password from the command line, see the
description of the -f command in Using splxmain starting on page A-30.
Registering ServerProtect
Trend Micro provides all registered users with technical support, virus pattern
downloads, and program updates for 1 year, after which you must purchase renewal
maintenance to continue receiving these services. Register ServerProtect to ensure
that you are eligible to receive the latest security updates and other product and
maintenance services. You can register ServerProtect during or after installation.
When you purchase ServerProtect, you will receive a Registration Key or serial
number (also referred to as an Activation Code) from Trend Micro or your reseller.
2-23
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Note: Some resellers may register ServerProtect for you and give you your serial number
directly.
2-24
Installing ServerProtect for Linux
4. In the Enterprise/SMB User section of the Online Registration page, click the
Click here (to register your product) link. The following screen displays.
5. If you are an existing customer and you already have a customer logon ID and
password, enter your logon ID and password on the left side of the screen and
click Login. If you are not a registered user, click Continue on the right side of
the screen.
6. On the Enter Registration Key page, type or copy the ServerProtect Registration
Key, and click Continue.
7. On the Confirm License Terms page, read the license agreement and then click I
accept to agree to the terms of the license agreement.
8. On the Confirm Product Information page, click Continue Registration.
2-25
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
9. Follow the prompts to complete the online registration form, and then click
Submit.
10. Click OK twice. After the registration is complete, Trend Micro sends you a
serial number (also referred to as an Activation Code) by email, typically within
20 minutes. You can activate ServerProtect using that number.
If you already have a ServerProtect 2.5 serial number (also referred to as an
Activation Code), follow the procedure below to register your ServerProtect
software.
2-26
Installing ServerProtect for Linux
Tip: Trend Micro recommends that you update the virus pattern file and scan engine
immediately after installation. If you use a proxy server to access the Internet,
configure your proxy server settings first, before updating the scan engine and
pattern file.
To update components:
1. Click Update > Manual Update. The Manual Update page displays.
2-27
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Activating ServerProtect
Use your Registration Key to register ServerProtect and obtain a serial number (also
known as an Activation Code) from the Trend Micro Online Registration Web site to
install a standard (not evaluation) version. The Web site is:
https://olr.trendmicro.com/registration/us/en-us/login.aspx
After completing the registration, Trend Micro issues a serial number (Activation
Code) that you use to activate Trend Micro software and other Trend Micro services.
Trend Micro recommends that you activate ServerProtect during installation.
However, if you have installed ServerProtect without activating it, you can still
activate it afterwards.
After installation, you can activate ServerProtect in three different ways.
2-28
Installing ServerProtect for Linux
To continue using ServerProtect after the evaluation period, register and activate the
product. Use the Registration Key included in the ServerProtect package or purchase
one from your Trend Micro reseller to obtain a serial number (also referred to as an
Activation Code) from Trend Micro Online Registration as described in Activating
ServerProtect starting on page 2-28.
2-29
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Removing ServerProtect
In order to remove ServerProtect, you must be logged on as root. The uninstallation
commands are different depending on which Linux distribution your system is using,
as shown in the table below. Both commands shown stop the ServerProtect service
and remove the application.
Red Hat
2-30
Installing ServerProtect for Linux
Tip: Trend Micro strongly recommends that you verify the MD5 checksum of
ServerProtect kernel hook modules to make sure the files have been
downloaded and extracted intact.
2-31
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
7. Make sure your Linux system port 14942 is already open for ServerProtect
access.
2-32
Chapter 3
3- 1
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
You may need to disable HTTP scanning, if any, before downloading the file. Include
the test file as an email attachment to test SMTP scanning, and to check FTP and
HTTP file transfers, for example, if you have Trend Micro InterScan VirusWallTM
installed on the network.
Alternatively, copy the following characters into a text file, and then save the file
with a com extension (for example, virus.com):
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
For either option, the mere downloading or creation of the file should be enough to
trigger real-time scanning.
Note: Accessing the Quick Access console requires logging on as a root user. The
default setting of XWindows on the Debian platform does not support root login.
3- 2
Getting Started with ServerProtect
For example:
3- 3
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
• Launch Web Console—This menu option allows you to launch the Web console
from your desktop, instead of typing the Web console URL in your browser
• Purge Logs—This option purges all scan, virus, and system logs
• Start Update Now—This option starts a download of the most recent virus
pattern file and scan engine from your update server
• Stop Scheduled Scan—This option stops an ongoing scheduled scan
3- 4
Getting Started with ServerProtect
Note: By default, ServerProtect starts whenever you turn on the server hosting it.
To change this setting, see Configuring Start-Up Settings on page 3-7.
Starting ServerProtect
There are two ways to start ServerProtect:
• From the command line
• From the XWindow Quick Access console
3- 5
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Note: On Red Hat platforms, the file path is Start Applications Menu > System Tools >
TrendMicro SPLX Administration > Services > Start SPLX Service. On all
other platforms, the word “Tools” is not displayed after the word “System.” The
notation used in this document is Start Applications Menu > System (Tools) >
and so on.
Stopping ServerProtect
There are two ways to stop ServerProtect:
• From the command line
• From the XWindow Quick Access console
3- 6
Getting Started with ServerProtect
3- 7
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
3- 8
Getting Started with ServerProtect
For help with these startup settings in the ServerProtect Web console, select
Administration > Startup Settings and click the system administration tool link.
The following screen appears:
3- 9
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Note: Trend Micro recommends using only one Web console at a time for configuring
ServerProtect. Otherwise, changes made by one user will be overwritten by another
user accessing the same Web console option.
Access the Web console through the XWindow Quick Access console, or directly
through a browser.
Note: To change the port numbers, use splxmain. See Using splxmain
starting on page A-30 for more information.
3. Type the Web console password, then press Enter. By default, the password field
is empty (that is, there is no default password).
3-10
Getting Started with ServerProtect
Tip: For protection, change the Web console password after logging in for the first
time. To learn how to change the Web console password, see To configure
ServerProtect Web console passwords: on page 3-11.
Note: Always protect your Web console password. Trend Micro recommends that you set
your password immediately after installation.
3-11
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Note: If your company uses a proxy to access the Internet, configure ServerProtect’s
proxy settings before attempting an update.
3-12
Getting Started with ServerProtect
Note: To set the proxy password from the command prompt, refer to Using
splxmain on page A-30.
3-13
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
3-14
Getting Started with ServerProtect
—or—
• Trend Micro Control Manager update server - the default update server
that displays when ServerProtect is being managed by Control Manager
3-15
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
4. Configure a download schedule. Select a start time in hours and minutes from the
Start time menu.
3-16
Getting Started with ServerProtect
5. Specify a repeat interval. The options are Hourly, Daily, and Weekly. For
weekly schedules, specify the day of the week (for example, Sunday, Monday,
and so on.)
Note: The Daily and Weekly fields offer you an interval called update for a period of x
hours. This means that your update will take place sometime within the x number
of hours specified, following the time selected in the Start time field. This feature
helps with load balancing on the ActiveUpdate server. Alternatively, you can
specify an exact time if you prefer. Hover your cursor over the tooltip icon ( )
for more explanation of this feature, and examples.
6. Click Save.
3-17
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
3-18
Chapter 4
4- 1
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
FIGURE 4-1. ServerProtect Web console left menu with Scan Options
expanded
Note: In kernel-dependent mode, the default initial view of the Web console is the
Real-time Scan page.
4- 2
Configuring and Performing Scans with ServerProtect
Note: In kernel-independent mode, the default initial view of the Web console is the
Manual Scan page.
Real-time This type of scan runs each time a file is accessed or executed.
Real-time Scan examines incoming, outgoing, and running
files.
Manual Also known as Scan Now, this scan type performs a thorough
scan of your server upon demand.
4- 3
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
of discovery and the release of the Trend Micro pattern file designed to detect the
new threat. Even though that period is typically a matter of hours, your servers may
be vulnerable during that time. After ServerProtect downloads the updated pattern
file, run a manual scan to see whether any malware arrived on your servers while you
were vulnerable. Another time to perform a manual scan is when the servers are back
online after maintenance downtime.
Configure each of the above scan types independently. Configuration options
common to all scanning types: virus actions, locations to scan, file types to scan, and
compressed file scanning, are discussed below as independent topics.
Note: To find out more about the scanning technologies ServerProtect employs, see to
Protecting Linux Servers on page 1-2.
Rename Modify the extension of the infected file to prevent any program
from opening or executing it. ServerProtect gives renamed files the
extension "VIR."
Pass Record virus infections or malicious files in the scan logs, but take
no action. This choice is not recommended.
TABLE 4-2. Actions that ServerProtect can take against detected viruses
4- 4
Configuring and Performing Scans with ServerProtect
Note: You can use an asterisk (*) or question mark (?) as a wildcard for entering the
directories to be scanned.
4- 5
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
4- 6
Configuring and Performing Scans with ServerProtect
4- 7
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
To remove extensions:
1. Select the extension to be excluded from scanning in the File types to scan list.
2. Click to remove the extension.
3. Click Save to apply your settings.
3. Specify the number of compression layers to scan. The permitted values are from
1 to 20 layers. The default settings are 5 layers for manual and scheduled
scanning, and 1 layer for real-time scanning. ServerProtect bypasses files in
compression layers that are higher than the number specified.
4. Specify the maximum extracted file size for scanning.
4- 8
Configuring and Performing Scans with ServerProtect
The minimum value you can set is 1MB, while the maximum value is 2,000MB.
The default values are 60MB for manual and scheduled scanning, and 30MB for
real-time scanning. ServerProtect does not scan files larger than the specified
size, but it records an entry about them in the scan log.
5. Click Save to apply your settings.
Note: Trend Micro strongly recommends that you keep real-time scanning enabled; it is
enabled by default.
4- 9
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
4-10
Configuring and Performing Scans with ServerProtect
second action. For example, for a virus, you might want to select Clean as a
first action, and Quarantine as a second action.
• Use the same action for all types—These fields allow you to select an
action for all files, regardless of file type. The second action applies only to
viruses and other security risks, and only when “clean” is selected as the first
action.
Note: On rare occasions, malware may damage a file in a way that does not allow
cleaning, and as a result, the affected file is not recoverable. To create a
backup copy before ServerProtect attempts to clean it, select the Back up file
containing security risk before action is taken check box.
FIGURE 4-7. Title bar showing Real-Time Scan with incoming, outgoing,
and running file scanning enabled
4-11
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Incoming
Outgoing
Running
4-12
Configuring and Performing Scans with ServerProtect
After ServerProtect completes the scan, the scan progress window appears showing
the status of the scan.
Note: A manual scan typically takes a few minutes. You can proceed to other tasks while
the scan is in progress.
4-13
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
4-14
Configuring and Performing Scans with ServerProtect
• Use the same action for all types—These fields allow you to select a single
first and second action for all files, regardless of file type. The second action
applies only to viruses and other security risks, and only when the selection
for first action is “clean.”
Note: On rare occasions, malware may damage a file in a way that does not allow
cleaning, and as a result, the affected file is not recoverable. To create a
backup copy before ServerProtect attempts to clean it, select the Back up file
containing security risk before action is taken check box.
4-15
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Note: Stopping a running scheduled scan will not disable successive scheduled scans.
You must log on as root to stop a scheduled scan.
4-16
Configuring and Performing Scans with ServerProtect
• Use customized scan action—Using the table (see Figure 4-6.), create a
customized first action for each type of security risk (joke, Trojan, virus, test
virus, spyware/grayware, and other). For virus and other threats, select a
second action. For example, for a virus, you might want to select Clean as a
first action, and Quarantine as a second action.
• Use the same action for all types—These fields allow you to select a single
First and second action for all files, regardless of file type. The second action
applies only to viruses and other security risks, and only when “clean” is
selected as the first action.
Note: On rare occasions, malware may damage a file in a way that does not allow
cleaning, and as a result, the affected file is not recoverable. To create a
backup copy before ServerProtect attempts to clean it, select the Back up file
containing security risk before action is taken check box.
4-17
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Exclusion List
ServerProtect provides the ability to exclude files, directories, and file types from
scanning. This feature can be used to avoid scanning quarantine directories and
certain virus-proof files. In the unlikely event that the scan engine causes false
alarms, you can temporarily include the misidentified file in this list.
There are currently two kinds of exclusion lists, which can be found on the same
page:
Directories and Files List - Use this list to exclude whole directories and/or
specified files from scanning.
File Types List - This list prevents ServerProtect from scanning specific file types.
In all types of scans except real-time scans, exclusion lists support use of wildcard
characters, either the asterisk (*) or question mark (?). An asterisk (*) wildcard
matches any number of characters, a question mark (?) wildcard matches only one
character.
Note: Each type of scan has its own exclusion list, allowing you better control over how
each scan performs.
4-18
Configuring and Performing Scans with ServerProtect
For detailed information, click the Scan Logs link for details about the scan. Click the
Virus Logs link for information about infected files or detected viruses.
Note: For more information about logs, and log maintenance, refer to the What are Logs?
and Why Maintain Logs? topics in the online help.
4-19
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Note: If you change the location of this directory, existing files still remain in the original
location.
To view logs:
1. Select Logs from the left menu, and select the kind of log you want to view.
2. The Stored Logs section of the screen displays the number of logs currently in the
log database, and the date range of the stored logs, if any.
3. Specify the viewing query criteria for the desired logs. The parameters are:
• Logs for—Select among the commonly specified date ranges: All dates,
Today, Yesterday, Past 7 days or Past 30 days. If the period you require is
not covered by the above options, choose Specified date range; this enables
the Start date and End date fields.
• Start date—Type the earliest log you want to view. Select the Specified
date range option in Logs for to use this criterion. The month-day-year
format is used. Alternatively, click the calendar icon ( ) and select a date
from the calendar.
• End date—Type the latest log you want to view. Select the Specified date
range option in Logs for to use this criteria. The month-day-year format is
used. Alternatively, click the calendar icon ( ) and select a date from the
calendar.
• Sort logs by—Specify the order and grouping of the logs. Options for
groups are: Start Date/Time, End Date/Time, Scan Type, Files Scanned,
and Infected Files; the order may either be ascending or descending.
4-20
Configuring and Performing Scans with ServerProtect
• Logs per page—From the drop-down menu, select the number of logs to
display at a time. Choose a setting that is appropriate for your monitor
resolution. The values range from 15 to 200, the default value is 25.
Note: You can increase the number of “logs per page” in the configuration file. See
MaxRetrieveCount starting on page A-26 for more information.
4-21
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
See Virus log on page 4-22 for an example of the virus log:
4-22
Configuring and Performing Scans with ServerProtect
See figure Figure 4-14. System log on page 4-23, for an example of the system log.
To exit the log and start a new log query, click . To export the results of
your log query to a .csv file, click . Navigate to the first, previous,
4-23
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
next, and last page of the log query results by clicking the navigation arrows
( ). To refresh the data, click at the top of the page (not shown in
the figures). Upon refresh, the log query screen may add new data to the query,
depending on the type of query you selected. For example, if you originally requested
today’s logs several hours ago, then return to this screen and refresh the screen, any
activity that occurred between the previous query and the refresh are added to the log
results.
WARNING! Files in the Quarantine directory are probably infected. Be careful when
accessing files in this directory.
Note: If you change the location of the Quarantine directory, existing files remain in the
original location.
4-24
Configuring and Performing Scans with ServerProtect
/opt/TrendMicro/SProtectLinux/SPLX.Backup
WARNING! ServerProtect will not scan files in the backup directory unless you remove it
from the Exclusion List of each scan type.
Note: If you change the location of this directory, existing files remain in the original
location. After specifying a backup directory, ServerProtect adds it to the
Exclusion List.
Configuring Notifications
ServerProtect can inform you of specific events that occur on your network, even
while you are away from it. It can alert you to virus outbreaks, infections, and system
configuration changes, using a variety of notification methods.
This section shows you how to specify the alert events that trigger notifications and
the notification methods.
4-25
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
4-26
Configuring and Performing Scans with ServerProtect
3. Each alert event provides a default notification message. See Figure 4-15.
Default messages on page 4-27 for an example.
4-27
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Note: Some SMTP servers will not deliver mail if a sender’s address is not available.
4-28
Configuring and Performing Scans with ServerProtect
3. Specify a character set in the Character set field; the default is the Western
European character set: iso-8859-1. There are two ways to do this:
• Type the character set code in the Character Set field. For information on
other common character sets, see SMTP Mail Notification Character Sets on
page A-38.
• Click Options to display the Preferred charset screen. Choose the
appropriate character set from the Preferred charset screen.
4. Click Save to apply the changes.
4-29
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
4-30
Chapter 5
5- 1
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Troubleshooting
The following section provides tips for dealing with issues you may encounter when
using ServerProtect for Linux.
Default Password
ServerProtect for Linux does not have a default password. Trend Micro strongly
advises you to set one immediately after installation.
5- 2
Troubleshooting and Contacting Technical Support
Debug Levels
Edit tmsplx.xml to define the debug level for each of the debug parameters:
Note: Detailed debugging produces a large debug file. Trend Micro recommends enabling
detailed debugging when replicating an issue, and immediately disabling it after
issue replication. Is is also recommended that your logs be on a non-root partition.
5- 3
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Note: Making incorrect changes to a configuration file can cause serious system
errors. Back up tmsplx.xml and syslog.conf to restore your original
settings.
a. Edit tmsplx.xml to define the debug level for each debug parameter
(UserDebugLevel and KernelDebugLevel).
b. Edit /etc/syslog.conf to assign the path and filename where
ServerProtect will write debug logs.
For example:
• To direct all ServerProtect user debug logs to /path/splx.log, include the
following line in syslog.conf:
local3.* /path/splxUserDebug.log
• To direct ServerProtect kernel debug logs to /path/splxKernDebug.log,
include the following line in syslog.conf:
kern.debug /path/splxKernDebug.log
2. Save and close the configuration file:
3. Query PID.
5- 4
Troubleshooting and Contacting Technical Support
4. Reload configuration.
Note: Detailed debugging produces a large debug file. Trend Micro recommends enabling
detailed debugging when replicating an issue, and immediately disabling it after
issue replication.
If detailed debugging has to run for a number of days or weeks, use logrotate
to rotate and compress log files automatically. Refer to the ServerProtect Web
console online help Using logrotate topic for details on how to compress
ServerProtect log files automatically.
5- 5
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Disable Debugging
Modify tmsplx.xml and syslog.conf to disable ServerProtect debugging.
To disable debugging:
1. Using a text editor such as vi, edit the following configuration files:
Note: Making incorrect changes to a configuration file can cause serious system
errors. Back up tmsplx.xml and syslog.conf to restore your original
settings.
5. Query PID.
For Debian:
ps -ef | grep sysklogd
ps -ef | grep klogd
6. Reload configuration.
For Debian:
kill -HUP <sysklogd PID>
kill -HUP <klogd PID>
5- 6
Troubleshooting and Contacting Technical Support
To locate the Trend Micro office nearest you, visit the following URL:
http://www.trendmicro.com/en/about/contact/overview.htm
5- 7
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
To speed up the problem resolution, when you contact our staff please provide as
much of the following information as you can:
• Product Activation Code
• ServerProtect Build version
• Exact text of the error message, if any
• Steps to reproduce the problem
Please include in the message text a brief description of the symptoms you are
experiencing. Our team of virus engineers will “dissect” the file to identify and
characterize any viruses it may contain and return the cleaned file to you, usually
within 48 hours.
TrendLabs™
Trend Micro TrendLabs is a global network of antivirus research centers that provide
continuous 24x7 coverage to Trend Micro customers around the world.
Staffed by a team of more than 250 engineers and skilled support personnel, the
TrendLabs dedicated service centers in Paris, Munich, Manila, Taipei, Tokyo, and
Irvine, CA. ensure a rapid response to any virus outbreak or urgent customer support
issue, anywhere in the world.
The TrendLabs modern headquarters, in a major Metro Manila IT park, has earned
ISO 9002 certification for its quality management procedures in 2000—one of the
first antivirus research and support facilities to be so accredited. Trend Micro
believes TrendLabs is the leading service and support team in the antivirus industry.
For more information about TrendLabs, please visit:
http://www.trendmicro.com/en/security/trendlabs/overview.htm
5- 8
Troubleshooting and Contacting Technical Support
Consult the Trend Micro Web site regularly to download patches and service packs:
http://www.trendmicro.com/download
All releases include a readme file with the information needed to install, deploy, and
configure your product. Read the readme file carefully before installing the hot fix,
patch, or service pack file(s).
5- 9
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Known Issues
Known issues are features in your ServerProtect software that may temporarily
require a workaround. Known issues are typically documented in section 9 of the
Readme document you received with your product. Readme’s for Trend Micro
products can also be found in the Trend Micro Update Center:
http://www.trendmicro.com/download/
Note: Trend Micro recommends that you always check the Readme text for information
on known issues that could affect installation or performance, as well as a
description of what’s new in a particular release, system requirements, and other
tips.
5-10
Appendix
Appendix
This appendix provides additional information about ServerProtect command line
configuration tools, and additional product information.
This appendix discusses the following topics:
• Accessing ServerProtect Man Pages on page A-2
• Understanding tmsplx.xml on page A-2
• Using RemoteInstall.conf on page A-28
• Using splxmain on page A-30
• Using splx Script on page A-34
• Using splxcore Script on page A-35
• Using splxhttpd Script on page A-36
• Using splxcomp Script on page A-36
• Apache Configuration File on page A-38
• Apache Log Files on page A-38
• SMTP Mail Notification Character Sets on page A-38
• Debian Commands on page A-39
A-1
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
To access ServerProtect man pages, type the following at the command line:
man {manpage}
For example:
man tmsplx.xml
Understanding tmsplx.xml
This section includes descriptions of the parameters for configuring ServerProtect.
Note: Making incorrect changes to the configuration file can cause serious system errors.
Back up tmsplx.xml to restore your original settings.
A-2
Appendix
A-3
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
The configuration file contains subsections that correspond to the different modules
in the ServerProtect software.
Note: If there is a conflict, exclusion settings take precedence over inclusion settings.
RealtimeScan
This key enables/disables Real-time Scan.
The valid values are:
0 disable
A-4
Appendix
RealtimeIncludeDirList, ScheduledIncludeDirList,
ManualIncludeDirList
Use these keys to include specific directories in a scan. Type the full path of the
desired directories, and then separate them with a colon (:). For example, to include
the tmp and etc directories in Real-time Scan type the following:
<P Name="RealtimeIncludeDirList" Value="/tmp:/etc"/>
RealtimeIntelliScan, ScheduledIntelliScan,
ManualIntelliScan
Use this key to turn IntelliScan on or off from within the configuration file. The
default value = 0 (off).
ScheduledMapDriveExclusion, ManualMapDriveExclusion
Use this key to turn Map Drive Exclusion feature on or off within the configuration
file. The values are 0 = disable Map Drive Exclusion, 1 = enable Map Drive
Exclusion.
RealtimeIncludeExtList, ScheduledIncludeExtList,
ManualIncludeExtList
Use these keys to add specific file types (identified by extension) in a scan. Use a
colon (:) to separate different file types. You can use small and capital letters
interchangeably when typing the file types. For example, to include the BIN and RPM
file types in Real-time Scan type the following:
<P Name="RealtimeIncludeExtList" Value="BIN:RPM"/>
Note: Use the null (default) value to scan all file types.
A-5
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
RealtimeIncludeTMExtList, ScheduledIncludeTMExtList,
ManualIncludeTMExtList
Use these keys to select scanning of all file types, or scanning of file types by
extension (for which Trend Micro recommends scanning). The valid values are:
0 (default value) Scan all file types
RealtimeExcludeDirList, ScheduledExcludeDirList,
ManualExcludeDirList
Use these keys to exclude certain directories from scanning. Type the full path of the
desired directories, and then separate them with a colon (:).
Note: If the value is null, all directories will be part of the scan.
RealtimeExcludeFileList, ScheduledExcludeFileList,
ManualExcludeFileList
Use these keys to exclude individual files from scanning. Type the full path of the
desired files, and then separate them with a colon (:). For example, to exclude a file
called fm.txt under the etc directory from Real-time Scan type the following:
<P Name="RealtimeExcludeFileList" Value="/etc/fm.txt"/>
Note: If the value is null (default), all files will be part of the scan.
A-6
Appendix
RealtimeExcludeExtList, ScheduledExcludeExtList,
ManualExcludeExtList
Use these keys to exclude file types (identified by extension) from a scan. Use a
colon (:) to separate the different file types For example, to exclude the BIN and TXT
file types in a Real-time Scan type the following:
<P Name="RealtimeExcludeExtList" Value="BIN:TXT"/>
Note: You can use small and capital letters interchangeably when typing the file types.
RealtimeCustomizedAction, ScheduledCustomizedAction,
ManualCustomizedAction
These keys specify the default values for customized actions for specific types of
security risks, as seen in the “Action When Security Risk Found” sections of the
Real-time Scan, Scheduled Scan, and Manual Scan screens.
FIGURE A-1. Default values for first/second action when selecting customized
scan action
A-7
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
RealtimeAllTypesAction, ScheduledAllTypesAction,
ManualAllTypesAction
These keys specify the default values for actions for all types of security risks, as
seen in the “Action When Security Risk Found” sections of the Real-time Scan,
Scheduled Scan, and Manual Scan screens.
FIGURE A-2. Default values for first/second action when selecting “all types”
scan action
For viruses and other threats only, a second action can be specified.
The following values apply:
0 = Pass (take no action)
1 = Rename infected files by appending the extension specified by the
FileExtentionToRename key.
2 = Quarantine
3 = Clean
4 = Delete
Therefore, the default custom settings are as follows:
All Types = 3-2
Disable all types actions = 0
A-8
Appendix
FIGURE A-3. ActiveAction is enabled when settings for Customized and All Types
are set to 0
RealTimeScanArchived, ScheduledScanArchived,
ManualScanArchived
This key is not used at this time.
RealtimeScanCompressed, ScheduledScanCompressed,
ManualScanCompressed
Use these keys to enable/disable compressed file scanning. The valid values are:
0 disable scan of compressed files
A-9
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
RealtimeCompressionLayer, ScheduledCompressionLayer,
ManualCompressionLayer
These keys determine the default number of compression layers ServerProtect scans.
The valid values are 1 through 20, the default value for Real-time Scan is 1, for
Scheduled Scan and Manual Scan the default is 5.
Note: Using low values reduces the performance impact of scanning, however at the
expense of less protection.
RealtimeCompressedFileSize,
ScheduledCompressedFileSize, ManualCompressedFileSize
These keys determine the maximum original size (without compression or archiving)
of compressed or archived files to scan. This value is in megabytes, the maximum
value is 2000, and the default value for Scheduled Scan and Manual Scan is 60. The
default value for Real-time Scan is 30. For example, if the
RealtimeCompressedFileSize value is 40, only compressed files that are
40MB or smaller before compression will be scanned in real time:
<P Name="RealtimeCompressedFileSize" Value="40"/>
Note: Using small values can improve scan performance, but at the expense of less
protection.
A-10
Appendix
ScheduledNice, ManualNice
This key is used to set process scheduling priority. The values are:
-20 = highest
19 = lowest
DirToMove
This key shows the directory to which files will be moved when a virus is found and
the AllTypesAction or CustomizedAction keys are set to Quarantine.
The default value is:
/opt/TrendMicro/SProtectLinux/SPLX.Quarantine
DirToSave
This key determines the directory where infected files are stored before a clean
operation. The default value is:
/opt/TrendMicro/SProtectLinux/SPLX.Backup
FileExtensionToRename
The file extension that is appended to an infected file when the AllTypesAction
or CustomizedAction fields are set to Rename. The default is vir.
ActionForTimeout
This key is not currently in use.
VirusOutbreak
This key enables/disables sending a notification when there is a virus outbreak. The
valid values are:
0 disable sending virus outbreak notifications
Note: ServerProtect will not send any alert notifications until the number of infected
files reaches the number specified in the VirusOutbreakCount key.
A-11
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
VirusOutbreakPeriod
This key sets the time interval, in minutes, between virus outbreak notifications. The
valid values are: 5, 10, 30, 60, 120, and 240; the default value is 60. This key has
no effect if the VirusOutbreak key is disabled.
VirusOutbreakCount
This key controls the number of infected files required for sending a virus outbreak
notification. The valid values are 1 through 1000, and the default value is 100. This
key has no effect if the VirusOutbreak key is disabled.
AlertVirusInfection
This key controls whether ServerProtect sends an alert notification when it finds
infected files on the system. The valid values are:
0 disable sending an alert notification when ServerProtect finds an infected file
AlertRealtimeConfigChange
This key controls whether ServerProtect sends an alert notification whenever you
modify a Real-time Scan configuration setting. The valid values are:
0 disable sending an alert notification whenever a Real-time Scan configuration
setting changes
A-12
Appendix
AlertPatternOutOfDate
This key controls whether ServerProtect send an alert notification whenever the
pattern file is out-of-date.
0 disable sending an alert notification whenever the pattern file is out-of-date
AlertPatternOutOfDatePeriod
This key sets the frequency, in days, for checking whether the pattern file is up to
date. The valid values are 1 though 1000, and the default value is 7. For example, to
have ServerProtect check whether the pattern file is up to date once every 7 days,
type the following:
<P Name="AlertPatternOutOfDatePeriod" Value="7"/>
Schedule
This key sets how often a scheduled scan runs. The valid values are:
0 no scheduled scan jobs (default)
ScheduledTime
This key shows when a scheduled scan runs based on the 24-hour clock. The default
value is 00:00:00 (midnight).
For example, to run a scheduled scan at 1:30 p.m. type the following:
<P Name="ScheduledTime" Value="13:30:00"/>
ScheduledWDay
This key sets the day of week a scheduled scan runs when the value of the
Schedule key is 3 (once every week). The valid values are Monday, Tuesday,
A-13
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Note: Before making any changes to any key in this group, contact Trend Micro technical
support for assistance.
EngineLastUpdateTime
This key should not be modified by users.
EngineType
This key should not be modified by users.
EngineVersion
This key should not be modified by users.
PatternLastUpdateTime
This key should not be modified by users.
PatternType
This key should not be modified by users.
PatternVersion
This key should not be modified by users.
PatternDate
This key should not be modified by users.
A-14
Appendix
ProductType
This key should not be modified by users.
ProductVersion
This key should not be modified by users.
Language
This key should not be modified by users.
Platform
This key should not be modified by users.
ScheduledNOption
This key controls the type of components updated when ServerProtect performs a
Scheduled Update. The valid values are:
1 update virus pattern
ManualNOption
This key controls the type of components updated when ServerProtect performs a
manual update. The valid values are:
1 update virus pattern
Option
Options for ActiveUpdate. This key is set to AU_OPTION and cannot be changed.
A-15
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Schedule
This key specifies the schedule for a scheduled update. The valid values are:
0 no schedule
1 hourly updates
3 weekly updates
The following three keys control the time and dates for the above schedule.
ScheduledTime
This key specifies the time of day for scheduled updates, using a 24-hour clock. Use
this key when the value of the Schedule key is 1, 2, or 3.
RandomizedUpdate
This key specifies use of the randomized ActiveUpdate feature to assist with load
balancing on the ActiveUpdate server. This feature is enabled by default, with a
default interval of 2 hours from the update time specified. A value of 0 disables the
randomized update feature. The range of values is 0 through 12.
UpdateRetryNum
This key specifies the number of times that the ActiveUpdate server will attempt to
update the pattern files and scan engine. A value of 0 disables the update retry. The
range of values is 0 through 3. The default value is 3.
UpdateRetryInterval
This key specifies the interval between retry attempts in minutes. The range is 10
through 60, the default = 10.
A-16
Appendix
DefaultSource
This key contains the URL from which updates are downloaded. The default value
for ServerProtect 2.5 differs based upon whether or not ServerProtect is registered to
Trend Micro Control Manager (TMCM).
When ServerProtect is registered to TMCM, the default value is:
http://xxx.xxx.xxx.xxx/TVCSDownload/ActiveUpdate
WARNING! Do not modify this value unless Trend Micro notifies you that the URL for
updates has changed.
DigSig
This key instructs ServerProtect whether to apply digital signature when
downloading components from download source. The valid values are:
0 disable digital signature download (default)
SrvAuth
This key instructs ServerProtect whether to apply HTTP authentication when
downloading components from an HTTP source. The valid values are:
0 disable digital signature download (default)
Merge
This key instructs ServerProtect whether to apply pattern file merging when
downloading virus pattern file from ActiveUpdate. The valid values are:
0 disable digital signature download
A-17
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Source
This key contains an alternate source for downloading updates. If the value of this
key is not null, ServerProtect uses this source in preference to DefaultSource.
The value of the Source key may be either a URL or a local path. The default value
for this key is null. For example:
http://????.com/download
ProxyUsername
If your proxy server requires authentication, this key contains the user name. The
default value is null.
ProxyPassword
If your proxy server requires authentication, this key contains the password. The
default value is null. You can modify this value using the Web console and splxmain.
See Using splxmain on page A-30.
Proxy
This key contains the IP address or domain name of your proxy server. The default
value is null. For example:
proxy.company.com
UseProxy
This key indicates a proxy server is required to access the ActiveUpdate URL
specified in Source or DefaultSource. The valid values are:
0 do not use a proxy server (default)
If you assign a value of 1 to the UseProxy key, set the proxy address using the
Proxy key, and if required, the username, password, and port number.
ProxyPort
This key contains the proxy port number. The default value is null.
A-18
Appendix
Type
This key indicates the delivery method for notifications. The valid values are:
"" (null) default value
SMTP use an SMTP server
SNMP use the SNMP protocol
SMTP:SNMP use both delivery methods
SmtpServer
This key indicates the domain name or IP address of the SMTP server. For example:
mail.company.com
If the value of the Type key is either SMTP or SMTP:SNMP, the value of this key
must not be null. The default value is null.
SmtpPort
This key contains the port number of the SMTP server. The valid values are 1
through 65535. The default value is 25.
A-19
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
SmtpFrom
This key contains the originating email address for sending notification emails. For
example:
[email protected]
Note: Some SMTP servers will not deliver email, unless there is a valid originating email
address.
SmtpTo
This key contains the notification recipients. You can specify multiple accounts by
separating them with colons. For example:
[email protected]:[email protected]
SmtpTimeout
The SMTP timeout value, in seconds. The default is 15.
SmtpCharset
This key specifies the character set ServerProtect uses to encode notification emails.
For information on other commonly used character sets. See SMTP Mail Notification
Character Sets on page A-38 for additional information. The default value is
iso-8859-1 (Latin 1 Western European).
SnmpHostname
This key contains the host name or IP address of the SNMP manager. For example:
snmp.company.com
If the value of the Type key is either SNMP or SMTP:SNMP, the value of this key
must not be null. The default value is null.
A-20
Appendix
SnmpCommunity
This key contains the SNMP community name. The default value is public. If the
value of the Type key is either SNMP or SMTP:SNMP, the value of this key must not
be null.
VirusOutbreakSubject
This key contains the subject line of the virus outbreak notification. The default value
is:
[SPLX] Security risk outbreak subject
VIRUSOUTBREAKMESSAGE
This key contains the message body text of the virus outbreak notification. The
default value is:
A security risk outbreak was detected
VirusInfectionSubject
This key contains the subject line of the virus infection notification. The default
value is:
[SPLX] Security risk infection subject
VIRUSINFECTIONMESSAGE
This key contains the message body text of the virus infection notification. The
default value is:
Security risk infection(s) detected
RealtimeConfigChangeSubject
This key contains the subject line of the Real-time Scan configuration change
notification. The default value is:
[SPLX] Real-time scan configuration modified
A-21
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
REALTIMECONFIGCHANGEMESSAGE
This key contains the message body text of the Real-time Scan configuration change
notification. The default value is:
The real-time scan configuration was modified
ServerProtectOnSubject
This key contains the subject line of the ServerProtect on notification. The default
value is:
[SPLX] ServerProtect was started
ServerProtectOffSubject
This key contains the subject line of the ServerProtect off notification. The default
value is:
[SPLX] ServerProtect was stopped
SERVERPROTECTONMESSAGE
This key contains the message body text of the ServerProtect on notification. The
default value is:
ServerProtect was started
SERVERPROTECTOFFMESSAGE
This key contains the message body text of the ServerProtect off notification. The
default value is:
ServerProtect was stopped
PatternOutOfDateSubject
This key contains the subject line of the pattern out-of-date notification. The default
value is:
[SPLX] Virus pattern file is outdated
A-22
Appendix
PATTERNOUTOFDATEMESSAGE
This key contains the message body text of the pattern out-of-date notification. The
default value is:
Virus pattern file is outdated
MaxItemNumber
The maximum number of notifications to be queued in the notification queue. The
default value is 1000.
ControlManagerDebug
The range is 0 to 3, with 0 meaning “disable.” The default value is 1. For more
information, see Table 5-1, “Debug levels editable with tmsplx.xml,” on page 5-3.
ThreadNumber
This key should not be modified by users.
UserDebugLevel
This key should not be modified by users.
KernelDebugLevel
This key should not be modified by users.
MaxCacheItem
This key should not be modified by users.
MaxListItem
This key should not be modified by users.
A-23
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
MaxDirItem
This key should not be modified by users.
MaxExtItem
This key should not be modified by users.
MaxExcDirItem
This key should not be modified by users.
MaxExcFilItem
This key should not be modified by users.
MaxExcExtItem
This key should not be modified by users.
WaitqTimeout
This key should not be modified by users.
VsapiTimeout
This key should not be modified by users.
MaxExcPid
This key should not be modified by users.
MaxVscPid
This key should not be modified by users.
MaxPathLen
This key should not be modified by users.
A-24
Appendix
MaxCmdLen
This key should not be modified by users.
Note: Log files can grow quite large, so it is important to delete them regularly.
Schedule
This key specifies the frequency for the scheduled log deletions. The valid values are:
0 disable automatic deletions of the log file
ScheduledTime
This key specifies the time of day for log deletions, using a 24-hour clock. The
default value is 02:00:00 (2 AM).
A-25
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
LogDirectory
This key stores the full path of the directory where all ServerProtect log files (Scan
log, Virus log, and System log) are stored. The default value is:
/var/log/TrendMicro/SProtectLinux
MaxLogDay
This key specifies the number of days that ServerProtect retains logs before purging
them. The valid values are 1 through 1000. The default value is 60.
Note: This value is large to protect new users from inadvertently losing history. Trend
Micro recommends that you back up your log files weekly and reduce the
MaxLogDay value.
MaxRetrieveCount
This key allows you to specify the maximum number of log entries to retrieve. In
ServerProtect releases prior to 2.5, only 1000 entries could be retrieved via the
screens in the Web Console. In response to customer requests, this limit is now
configurable by editing the tmsplx.xml file. This key has a value range from 200 to
65535. The default value is 1000, which matches the behavior of earlier releases.
Note: This limit applies only to referencing logs via the Web Console; all entries can be
viewed by viewing the files directly, unless the log has been purged.
The Web Console also allows you to choose how many log entries display per page.
The range is from 15 to 200, the default is 25.
A-26
Appendix
SerialNumber
This key contains the ServerProtect serial number in encrypted format. This key
should not be modified by users.
InstallationDate
This key contains the installation date.
To verify that the key values in the tmsplx.xml file are not corrupt:
At the command line, type the following:
/opt/TrendMicro/SProtectLinux/SPLX.util/xmlvalidator
A-27
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Using RemoteInstall.conf
Figure 4. RemoteInstall.conf keys, default values, and descriptions on page A-28 lists
all of the keys in the RemoteInstall.conf file, including whether they are
configurable and their default values.
A-28
Appendix
In /etc/syslog.conf:
loglocal7.* /var/log/boot.log
A-29
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Using splxmain
The splxmain command enables you to maintain and control ServerProtect from
the command line. Use splxmain for various ServerProtect maintenance tasks that
are run through cron(8) or crond(8) or that can be run from the command line. You
must have root (superuser) privileges to run splxmain.
Note: You should only use splxmain to run ServerProtect without Apache.
Syntax:
splxmain [-a |-b |-c | -De |-E |-f |-g <date> |-i |-j |-k
|-l <port> |-m [path1:path2] |-n |-o |-p |-q <Activation Code>
|-r |-s |-t |-u |-v |-w <port> |-x |-y ]
Parameters:
-a Terminate all vsapiapp processes, Manual Scan processes, and Scheduled
Scan processes gracefully. To terminate these processes immediately, use
the -k option.
-b Remove all scheduled jobs from the /etc/cron.d/splx file. file, letting
currently running jobs complete.
-c Refresh the Scheduled Scan, Scheduled Update, and Scheduled Log purging
settings based on the settings in the tmsplx.xml file to /etc/cron.d/splx
file.
A-30
Appendix
Updates, and Automatic Log Purges, then launch vsapiapp. If the -D option
is also specified, vsapiapp is run as a daemon; otherwise, it is run as a
regular process. -D can be used with this option.
-E Check the remaining days left before the evaluation version expires.
-f Reset the Web console password to the default value of null. If you forget
the Web console password, you can use this option to reset it to null and
then use the -j option to assign a new password.
Note: If you do not specify <date>, ServerProtect will use the value of the
MaxLogDay key in the tmsplx.xml file. See MaxLogDay on page
A-26.
-j Set the Web console password. Type the new password twice for
confirmation.
-l <port> Set the ServerProtect HTTP port for accessing the ServerProtect
Web console.
For example, splxmain -l xxxxx
A-31
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
splxmain -m /temp1:/temp2
Note: Executing a manual scan does not require running or triggering the
KHM.
Note: Executing a scheduled scan does not require running or triggering the
KHM.
-t Terminate the Scheduled Scan processes that are running through cron or
crond. /etc/cron.d/splx.
-u Update the scan engine and virus pattern according to tmsplx.xml and ask
vsapiapp to reload these components.
A-32
Appendix
-w <port> Set the HTTPS port for accessing the ServerProtect Web console.
For example:
splxmain -w 12345
-x Disable real-time scan by terminating the real-time scan child threads.
-y Set the user name and password for the proxy server used for component
download.
This information is also available in the splxmain man page, which you can access
from the command line by issuing this command:
# man splxmain
A-33
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Syntax:
splx {start|stop|restart|status}
Parameters:
start
Stops, and then restarts the ServerProtect service and the ServerProtect
Apache server
status
This parameter displays all active ServerProtect core services and the
TMCM-registration status.
A-34
Appendix
Note: Use the splxcore script to manage ServerProtect from the command line (no Web
console). Some features, such as product registration after ServerProtect is installed
or log query, are not available from the command line.
Location:
/etc/init.d/
Syntax:
splxcore {start|stop|restart|status}
Parameters:
start
A-35
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Syntax:
splxhttpd {start|stop|restart|status}
Parameters:
start
A-36
Appendix
Note: Use this tool only when installing InterScan VirusWall for Linux and ServerProtect
on the same server.
Syntax:
splxcomp {-h} {-v} {-i}
Parameters:
-h displays the tool’s parameters list
Syntax:
./CMconfig
Parameters:
(none)
A-37
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
WARNING! Editing the customized Apache server configuration file may result in
unexpected errors. Before making any changes to this file, back up
splxhttpd.conf to restore your original settings. Contact Trend Micro
Support for help when editing splxhttpd.conf.
English us-ascii
Japanese iso-2022-jp
Korean euc-kr
A-38
Appendix
Debian Commands
The following Debian-specific commands may be used in ServerProtect 2.5 for
Linux:
Command Description
A-39
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
A-40
Glossary
Glossary of Terms
This glossary describes special terms as used in this document or the online help.
Term Explanation
access (verb) To read data from or write data to a storage device, such as a
computer or server.
Glossary-1
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Term Explanation
administrator account A user name and password that has administrator-level privi-
leges.
CMconfig A ServerProtect 2.5 utility that you can run from the command
line to register SeverProtect to Trend Micro Control Manager,
to unregister it, or to re-register it.
daemon A program that is not invoked explicitly, but lies dormant wait-
ing for some condition(s) to occur. The perpetrator of the condi-
tion need not be aware that a daemon is lurking.
damage routine The destructive portion of virus code, also called the payload.
Glossary-2
Term Explanation
End User License Agree- An End User License Agreement or EULA is a legal contract
ment (EULA) between a software publisher and the software user. It typically
outlines restrictions on the side of the user, who can refuse to
enter into the agreement by not clicking "I accept" during instal-
lation. Clicking "I do not accept" will, of course, end the installa-
tion of the software product.
Many users inadvertently agree to the installation of spyware
and adware into their computers when they click "I accept" on
EULA prompts displayed during the installation of certain free
software.
EUC-KR A method of 8-bit character encoding used for the Korean lan-
guage. See the following Web site for more information:
http://en.wikipedia.org/wiki/EUC-KR
EXE file infector An executable program will a .exe file extension. Also see DOS
virus.
Glossary-3
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Term Explanation
header (networking defini- Part of a data packet that contains transparent information
tion) about the file or the transmission.
HTML virus A virus targeted at HTML (Hyper Text Markup Language), the
authoring language used to create information in a Web page.
The virus resides in a Web page and downloads via a user’s
browser.
“in the wild” Describes known viruses that are actively circulating. Also
see “in the zoo.”
Glossary-4
Term Explanation
Java Runtime Environment A Java Virtual Machine, set of class libraries, and other compo-
(JRE) nents needed to run applets and applications written in the
Java programming language. The JRE also includes a Java
plug-in and Java Web Start, which enables you to launch
Java-based applications without complicated installation proce-
dures. Refer to the following Web site for more information:
http://java.sun.com
Konquerer Desktop Envi- The KDE is a easy-to-use desktop environment for Unix plat-
ronment (KDE) 3.2 forms, that offers an integrated help system, a consistent look
and feel for applications, standardized menus and toolbars,
internationalization, and useful applications. KDE version 3.2 is
required for use of the Quick Access console menus in Server-
Protect. For more information about KDE, refer to the following
Web site: http://www.kde.org/
Kernel Hook Module (KHM) A linking mechanism between ServerProtect and your version
of the LInux operating system.
license certificate A document that proves you are an authorized user of a Trend
Micro product.
listening port A port utilized for client connection requests for data exchange.
Glossary-5
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Term Explanation
load balancing Load balancing is the mapping (or re-mapping) of work to pro-
cessors, with the intent of improving the efficiency of a concur-
rent computation.
log storage directory Directory on your server that stores log files.
macro virus Macro viruses are often encoded as an application macro and
included in a document. Unlike other virus types, macro viruses
are not specific to an operating system and can spread via
email attachments, Web downloads, file transfers, and cooper-
ative applications.
malware (malicious soft- Programming or files that are developed for the purpose of
ware) doing harm, such as viruses, worms, and Trojans.
management console The user interface for your Trend Micro product.
mass mailer (also known as A malicious program that has high damage potential, because
a Worm) it causes large amounts of network traffic.
mixed threat attack Complex attacks that take advantage of multiple entry points
and vulnerabilities in enterprise networks, such as the “Nimda”
or “Code Red” threats.
multi-partite virus A virus that has characteristics of both boot sector viruses and
file-infecting viruses.
network virus A type of virus that uses network protocols, such as TCP, FTP,
UDP, HTTP, and email protocols to replicate. Network viruses
often do not alter system files or modify the boot sectors of
hard disks. Instead, they infect the memory of client machines,
forcing them to flood the network with traffic, which can cause
slowdowns or even complete network failure.
Glossary-6
Term Explanation
Novell Linux Desktop A GNU/Linux distribution from Novell, Inc, based off of SUSE 9
Enterprise Server technology. For more infomation, see the fol-
lowing Web site:
http://www.novell.com/
outgoing files Files being copied or moved from your server to another loca-
tion.
pattern file (also known as The pattern file, as referred to as the Official Pattern Release
Official Pattern Release) (OPR), is the latest compilation of patterns for identified
viruses. It is guaranteed to have passed a series of critical tests
to ensure that you get optimum protection from the latest virus
threats. This pattern file is most effective when used with the
latest scan engine.
proxy server A World Wide Web server which accepts URLs with a special
prefix, used to fetch documents from either a local cache or a
remote server, then returns the URL to the requester.
Red Hat An open source operating system produced by Red Hat, Inc.
For more information, see the following Web site:
http://www.redhat.com/
Glossary-7
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Term Explanation
shared drive A computer peripheral device that is used by more than one
person, thus increasing the risk of exposure to viruses.
Glossary-8
Term Explanation
Telnet The Internet standard protocol for remote login that runs on top
of TCP/IP (Transmission Control Protocol/Internet Protocol).
This term can also refer to networking software that acts as a
terminal emulator for a remote login session.
Total Solution CD A CD containing the latest product versions and all the patches
that have been applied during the previous quarter. The Total
Solution CD is available to all Trend Micro Premium Support
customers.
true file type Used by IntelliScan, a virus scanning technology, to identify the
type of information in a file by examining the file headers,
regardless of the file name extension (which could be mislead-
ing).
Glossary-9
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Term Explanation
virus signature A virus signature is a unique string of bits that identifies a spe-
cific virus. Virus signatures are stored in the Trend Micro virus
pattern file. The Trend Micro scan engine compares code in
files, such as the body of an email message, or the content of
an HTTP download, to the signatures in the pattern file. If a
match is found, the virus is detected, and is acted upon (for
example, cleaned, deleted, or quarantined) according to your
security policy.
virus writer Another name for a computer hacker, someone who writes
virus code.
"Zip of Death" A zip (or archive) file of a type that when decompressed,
expands enormously (for example 1000%) or a zip file with
thousands of attachments. Compressed files must be decom-
pressed during scanning. Huge files can slow or stop your net-
work.
Glossary-10
Index
I–1
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
D Evaluation version
Debian 2-3 converting to standard version 2-29
commands A-39 Exclusion list 4-5–4-6
Debian commands A-39 Extensions 4-6
Default password 5-2 recommended 4-7
Delete virus 4-4
Deployment, remote 2-16
F
Failover 3-16
Desktop environment 2-3
Files
DESTINFO Group Key A-19
incoming 4-11
Directory
outgoing 4-11
add 4-4
running 4-11
quarantine 4-24
Firefox 2-3
remove 4-5
scan 4-4 G
Documentation Glossary of Terms 1-1
availability of 1-19 Gnome 2-3
set 1-19
Gnome desktop 2-3
Download Group deploy 2-18
components 3-13 GUIPassword Group Key A-25
from Internet 3-12
settings 3-12 H
source 3-14 Hardware requirements 2-2
Download source Hot fix 5-9
selecting 3-15 Hyper-Threading Technology 1-13
setting up multiple 3-16
I
E IBM AS/400 1-3
EICAR (European Institute of Computer Antivirus Incoming files 4-11
Research) 3-2 Installation
Email activating ServerProtect during 2-9
character sets 4-29, A-38 command 2-6
notification 4-28 log on as root 2-6
Enable proxy server information 2-9
alerts 4-26 testing 3-2
email notification 4-28 IntelliScan 4-6
notification 4-26 Internet Explorer 1-8, 2-3
Outbreak Alert 4-26 Internet source 3-14
real-time scan 4-9 InterScan VirusWall for Linux issues A-36
scheduled update 3-16 Invoke scheduled scan 4-15
SMTP notification 4-28
Encoding 1-2 J
Encrypted files 1-3 Java plug-in 2-4
Evaluation Java Runtime Environment 2-3
period 2-19 JavaScript 1-4
version 2-29 JRE. See Java Runtime Environment.
I–2
Index
K M
KDE 1-14, 2-3, 3-2–3-3, 3-6–3-7, 3-10 Macro virus 1-6
KDE. See Konqueror Desktop Environment. Macros 1-2
Kernel Hook Module 2-5, 2-16 MacroTrap 1-6, 1-6
defaults provided during installation 2-31 how MacroTrap works 1-6
deploy using RemoteInstall 2-16 man pages 1-19, A-2
Kernel-independent mode 4-3 Manual scan 4-3, 4-12
Kernels 2-3 execute A-31–A-32
Keys Manual update 2-27, 3-13
ActiveUpdate group A-14 Mozilla Firefox 1-8, 2-3
Configuration Group A-23 Mozilla plug-in 2-4
Configuration group A-23
DESTINFO group A-19 N
GUIPassword group A-25 Network-Mounted Drives 1-17
Logs Group A-25 Notification
logs group A-25 character sets 4-29, A-38
notification group A-19 configure 4-25
registration group A-26 email 4-28
scan group A-4 pattern file out-of-date 4-26
SOURCEINFO group A-16 recipients 4-28
KHM SMTP 4-28
installing 2-31 SMTP mail 4-28
triggering A-32 SNMP 4-29
KHM. See Kernel Hook Module. start ServerProtect 4-26
Knowledge Base 1-2, 1-19, 5-7, 5-9–5-10 stop ServerProtect 4-26
URL 1-19
Known issues 5-10
O
Online help 1-19
URL for Knowledge Base describing 5-10
Online registration 2-25, 2-29
URL for readme documents describing 5-10
OS/390 1-3
Konqueror 1-14
Outgoing files 4-11
Konqueror Desktop Environment 2-3
L P
Pass virus 4-4
License agreement 2-6
Password 2-23, 2-27, 3-11
Linux Setup utility 3-7
default 3-10, 5-2
Log off 3-11
incorrect 5-2
Logon 2-21
proxy 3-13
screen 2-4
rejected 5-2
logrotate 5-5
restriction 3-11
Logs 4-18
trial expired 5-2
date range 4-20
Web console 3-11
view specific logs 4-20
Patch 5-9
Logs Group Keys A-25
I–3
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
I–4
Index
I–5
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
I–6
Index
I–7
Trend Micro™ ServerProtect™ 2 for Linux™ Getting Started Guide
Tools 2-10 V
for InterScan issues A-36 VBScript 1-4
remote installation 2-10 View specific logs 4-20
RemoteInstall 2-11, 2-13 Virus
splxcomp A-36 action 4-4
TrendLabs 5-8 clean 4-4
Troubleshooting 5-2 compressed file 1-7
delete 4-4
U finding 1-6
Update
pass 4-4
manual 2-27, 3-13
pattern 1-6
pattern 3-12
quarantine 4-4
scan engine 3-12
rename 4-4
schedule 3-16
sending to Trend Micro 5-8
scheduled 3-16
server 3-14 W
source 3-14 Web browsers
Update Now scan option 3-13 supported 2-3
Upgrading from previous versions 2-5 Web console 1-1, 1-6, 1-12, 1-14, 3-10
URLs opening 2-19
EICAR Test Files site 3-2 password 3-11
Knowledge Base 1-19 password rejected 5-2
Knowledge Base containing known issues 5-10 ports 3-10
readme documents containing known issues 5-10 Wildcard 4-5
Trend Micro Linux Kernel Support 2-5, 2-16
Trend Micro Online Registration 2-28 X
Trend Micro Registration 1-13 XWindow 2-3, 3-2, 3-5–3-7, 3-10, 3-13
User Interface 1-18
I–8