Network Security for Enterprise and Medium Business
Administrator’s Guide
TM
Network Security
Page 2
Trend Micro Incorporated reserves the right to make changes to this document and to
the products described herein without notice. Before installing and using the product,
please review the readme files, release notes, and the latest version of the applicable user
documentation, which are available from the Trend Micro website at:
http://docs.trendmicro.com
Trend Micro, the Trend Micro t-ball logo, ActiveUpdate, Control Manager, OfficeScan,
and Network VirusWall are trademarks or registered trademarks of Trend Micro,
Incorporated. All other product or company names may be trademarks or registered
trademarks of their owners.
The user documentation for Network VirusWall Enforcer is intended to introduce the
main features of the product and installation instructions for your production
environment. You should read through it prior to installing or using the product.
Detailed information about how to use specific features within the product are available
in the online help file and the Knowledge Base at Trend Micro website.
Trend Micro is always seeking to improve its documentation. Your feedback is always
welcome at the following site:
http://docs.trendmicro.com
Page 4
Contents
Preface
About this Administrator’s Guide ..................................................................xii
Welcome to the Administrator’s Guide for Trend Micro™ Network VirusWall™
Enforcer 1500i. This book is intended for novice and experienced users of Network
VirusWall Enforcer who want to quickly configure, deploy, and monitor the device.
This document contains detailed information about how to configure and manage
Network VirusWall Enforcer. It assumes that you have read and performed the tasks
described in the Installation and Deployment Guide, particularly preconfiguring the device to
enable access to the web console.
Content Overview
This Administrator’s Guide provides the following information.
TABLE P-1.Document contents
CHAPTERCONTENT SUMMARY
Understanding Network VirusWall Enfo rcer
on page 1-1
Setting Up the Device on page
2-1
Preparing for Policy Enforcement
on page 3-1
Policy Creation and Deployment
on page 4-1
Maintaining the Device on page
5-1
Viewing Status, Logs, and Summaries
on page 6-1
Troubleshooting and FAQs on
page 7-1
Product overview and descriptions of features
and capabilities
Initial configuration procedures, including connecting to the network, securing the device, and
updating components
Configuration procedures in preparation for policy enforcement
Policy creation procedures and examples
Maintenance procedures, covering account
management and configuration backup
Procedures for viewing logs and managing
quarantined endpoints
Troubleshooting tips
xii
Page 16
TABLE P-1.Document contents
CHAPTERCONTENT SUMMARY
Preface
Getting Support on page 8-1
Introducing Trend Micro Control
Manager™
on page A-1
Glossary on page GL-1
How to contact technical support
Overview of Control Manager, including how to
use it to manage Network VirusWall Enforcer
Trend Micro™ Network VirusWall™ Enforcer 1500i is an outbreak prevention
appliance that allows organizations to enforce security policies at the network layer.
Network VirusWall Enforcer scans network traffic to help ensure that it is free of
fast-spreading network viruses. It helps reduce the chance of severe security
compromise by preventing ARP spoofing attacks.
Network VirusWall Enforcer can identify infected computers and deliver cleanup
services to these endpoints. Because it works at the network layer, it can effectively
quarantine and isolate actual and potential infection sources. It can address infected
endpoints, endpoints with software vulnerabilities or those without adequate malware
protection, and endpoints that violate network usage policies.
Network VirusWall Enforcer helps organizations take precise action on security policy
violations to proactively detect, contain, and even eliminate malware outbreaks. With
Network VirusWall Enforcer in the network, organizations can significantly reduce
network downtime due to rapidly spreading malware and reduce the cost of dealing with
the malware at individual endpoints.
Figure 1-1 depicts how Network VirusWall Enforcer can be deployed to protect a
network.
FIGURE 1-1. Basic deployment
1-2
Page 22
Understanding Network VirusWall Enforcer
What’s New
In This Release
Software 3.2 add the following new features and enhancements.
64-bit Platform Support for TMAgent
Version 3.2 expands Windows 64-bit platform support, enabling the following policy
enforcement capabilities:
•Antivirus software enforcement
•Pattern version enforcement
•System threat scans
•Vulnerability assessment
•Registry checks
Other Enhancements
This version also includes the following features and enhancements:
•Synchronization of global endpoint exception lists using Trend Micro Control
Manager (TMCM).
•Central management of administrative accounts using the Microsoft Active
Directory (AD) server.
•Adjusting the time interval for the Control Manager Log Schedule setting.
Software version 3.1 adds the following enhancements.
Expanded IPv6 Support
Version 3.1 expands IPv6 support, enabling the following policy enforcement
capabilities in IPv6 networks:
•Antivirus software enforcement
•Pattern version enforcement
•System threat scans
•Vulnerability assessment
•Registry checks
In addition to these policy enforcement capabilities, this version also supports the
following in IPv6 networks:
•Web-based endpoint notifications, in addition to existing support for
agent-based popup notifications
•Easy browser-based agent installation using ActiveX and remote login
Email Notifications for TDA-based Quarantine
To allow administrators to take immediate action after an endpoint is quarantined in
response to a Threat Discovery Appliance (TDA) detection, Network VirusWall
Enforcer can be configured to automatically send notification email. With the
notification, administrators can immediately confirm and resolve any potential threats
that have triggered the TDA detection. After resolving any threats, they can release the
endpoint through the web console.
1-4
Page 24
Understanding Network VirusWall Enforcer
Software Version 3.0 Patch 3
Patch 3 for software version 3.0 includes the following enhancements:
•Export filtered endpoint history data—filter endpoint history data before
exporting the data to a CSV file.
•Easy shutdown—power off the device through the web or the Preconfiguration
console.
•Easy patch installation—apply hot fixes, patches, and service packs through the
web console.
Software Version 3.0
The following features and enhancements were added with software version 3.0:
•IPv6 support—Network VirusWall Enforcer now supports pure IPv6 and
dual-stack environments, with the following functionality available on IPv6
networks:
•Management connections through the web console and SSH
•Scanning for network viruses
•Component updates and proxy settings
•Product license setting and registration
•SNMP trap notifications
•System log collection
•Agent-free policy enforcement—with the "no agent" option, Network VirusWall
Enforcer can now provide policy enforcement to endpoints running legacy and
non-Windows platforms.
•Hide agent icon—administrators can select to prevent the agent icon from
displaying on the system tray of endpoints.
•Product license activation—Network VirusWall Enforcer can now be activated
by entering an Activation Code on the web console and then connecting to the
online product registration system.
•ARP spoofing prevention—ARP spoofing attacks can leave networks and data
severely compromised by giving attackers access to network packets. Attackers can
manipulate redirected packets to extract data or compromise intended recipients.
Network VirusWall Enforcer provides protection against ARP spoofing through
preventive broadcast of legitimate Address Resolution Protocol (ARP) information
for critical nodes. It also provides configuration options for detecting possible ARP
spoofing activities and terminating applications responsible for these activities.
•OfficeScan™ 10 and smart scan support—Network VirusWall Enforcer can
now detect OfficeScan 10 on endpoints and determine the component status of
clients that are running smart scan cloud-based scanning.
•Control Manager™ 5.0 support—Network VirusWall Enforcer can now be
managed using Control Manager™ 5.0.
Protection Features and Capabilities
Network VirusWall Enforcer protects against a wide variety of threats focusing on
identifying and isolating actual and potential outbreak sources.
Endpoint Policy Enforcement
Network VirusWall Enforcer uses the agent to perform the following checks on
endpoints:
•Antivirus Product Scan—checks if the endpoint is running supported antivirus
software
•Antivirus Version Scan—checks if the installed antivirus software has the latest
pattern
•System Threat Scan—runs a memory scan to check if malware is running on the
endpoint and automatically performs cleanup upon detection
•Vulnerability Scan—checks if any installed Microsoft software is not patched for
known vulnerabilities
•Registry Scan—checks the registry to identify unwanted and missing registry entries
1-6
Page 26
Understanding Network VirusWall Enforcer
Network Virus Scan
To prevent worms from spreading, Network VirusWall Enforcer inspects packets that
pass through it for known malware code. Using packet scanning, Network VirusWall
Enforcer is able to stop network viruses and other types of worms as they attempt to
spread to other network segments. It can also clean up and quarantine the endpoints
from where the worms spread.
Network Policy Enforcement
Network VirusWall Enforcer can regulate port, instant messenger, and file transfer
activity with the following features:
•Application Protocol Detection—checks for activity on specified TCP or UDP
ports or ICMP to reject or drop packets or monitor endpoints that use the ports
•Instant Messaging Detection—checks for instant messenger activity, either file
transfer activity or all kinds of instant messenger activity
•File Transfer Detection—checks for file transfers using Windows shares, HTTP, or
FTP
Network VirusWall Enforcer can be configured to closely monitor endpoints when
found responsible for unwanted network activity. It can also drop and reject packets
associated with the detected activity.
Threat Mitigation with TDA
Network VirusWall Enforcer works with Trend Micro Threat Discovery Appliance
(TDA). TDA can identify endpoints with active threats by gathering and correlating
network activity. To mitigate threats identified by TDA and prevent them from
spreading, Network VirusWall Enforcer can actively monitor or quarantine endpoints.
ARP Spoofing Prevention
Network VirusWall Enforcer prevents ARP spoofing by broadcasting legitimate ARP
information associated with critical nodes. To detect and terminate ARP spoofing
malware on endpoints, it monitors applications for outgoing ARP traffic and terminates
applications that are sending more than 100 ARP packets per second.
Network VirusWall Enforcer is equipped with state-of-the-art antivirus technology.
Designed to act as shield for a segment of your network, it can scan and drop infected
network packets before they reach your endpoints. It can also prevent vulnerable or
infected endpoints from accessing the rest of the network.
Packet Scanning
Using the Network Virus Engine and the Network Virus Pattern, Network VirusWall
Enforcer scans every packet entering and leaving a network segment in real-time.
Network VirusWall Enforcer is able to recognize network viruses, drop infected packets
before they enter the network, and prevent further security compromise. See Security
Risks on page 1-10 for more information on network viruses and other malware.
Threat Management Agent
In addition to its packet scanning capabilities, Network VirusWall Enforcer uses Threat
Management Agent to perform endpoint assessments. The agent can scan for file-based
threats, software vulnerabilities, antivirus software, and registry keys to help ensure that
endpoints are secure.
Note:Network VirusWall Enforcer supports agent-free policy enforcement. During policy
creation, select the "no agent" deployment option to enforce the policy without
installing agents on endpoints. This option provides limited enforcement capabilities
on endpoints running unsupported platforms.
The agent performs the following policy enforcement tasks:
•Checking for installed antivirus software
•Checking the version of the antivirus pattern
•Scanning for threats, including malware responsible for ARP spoofing
•Checking for unpatched vulnerabilities
•Checking for missing or prohibited registry entries
•Displaying popup notifications
•Checking for prohibited protocols, instant messenger activity, and file transfers
1-8
Page 28
Understanding Network VirusWall Enforcer
•Cleaning up of infected systems
Platforms Supported by the Agent
The agent version released with Network VirusWall Enforcer has been tested on the
following platforms:
•Microsoft™ Windows™ 2000 (including Professional, Server, and Advanced Server
editions) with Service Pack 4
Note:Windows 2000 does not support IPv6 addressing.
•Windows Server™ 2003 (Standard and Enterprise editions) with Service Pack 1 or
later
•Windows XP (Home and Professional editions) with Service Pack 2 or later
Note:IPv6 support is not enabled on Windows XP by default.
•Windows Vista™ (Enterprise, Business, and Ultimate editions)
•Windows Server 2008 (all editions)
•Windows 7 (all editions)
Note:The agent may be updated to support additional platforms. Refer to the readme
provided with new agent releases for the latest information about each agent release.
Agent Deployment Options
When creating a policy, you can define how the agent is deployed. Your choice of
deployment method affects the enforcement criteria you can specify on that policy.
Network VirusWall Enforcer supports the following agent deployment options:
•No agent—this agent deployment method is recommended for organizations with
unsupported platforms. With this deployment, only protocol-based antivirus
detection, network virus scanning, network application policy assessment, and
certain threat mitigation functions are supported.
•Single-use agent—installs an agent for assessment and stops the agent service
after the assessment is completed. Unless the agent is outdated, Network VirusWall
Enforcer will reuse the same agent to perform an assessment on the same endpoint.
Note:On earlier releases of Network VirusWall Enforcer, this deployment option was
referred to as the "agentless" option.
•Persistent agent—installs an agent that periodically assesses the endpoint and
handles threat mitigation requests. This is the default deployment option.
Security Risks
Tens of thousands of malware exist, with more and more coming into existence each
day. These threats are known to infect endpoints by exploiting system vulnerabilities.
They perform all kinds of malicious behavior, including information theft.
Network Viruses
The strictest definition of a "network virus" describes a type of self-contained malware
that spreads from computer to computer without having to create file copies of itself.
These viruses exist only as network packets, moving from one computer to another, and
as code running in memory. Network VirusWall Enforcer provides protection against
these sophisticated threats by scanning network traffic and then identifying the packets
that contain code from known network viruses. It can also detect packets that contain
generic exploit code used commonly by network viruses to propagate.
While allowing Network VirusWall Enforcer to detect network viruses at the network
layer, its packet-scanning capability also allows it to block regular file-based malware as
they propagate through the network. It supplements file-based scanning technologies
and stops virulent threats before they can spread.
1-10
Page 30
Understanding Network VirusWall Enforcer
Vulnerabilities
Trend Micro assesses the risks posed by software vulnerabilities by considering the
number and the significance of the threats that use them, their potential and actual
impact, and the difficulty or ease by which they can be exploited. Vulnerabilities are
considered low, moderate, important, critical, or highly critical as described below.
•Highly Critical—vulnerabilities considered highly critical are vulnerabilities
associated with at least ten Internet threats, regardless of the impact of these
Internet threats. Systems and networks not patched against these vulnerabilities will
likely become infected due to the prevalence or sheer variety of associated Internet
threats.
•Critical—all vulnerabilities utilized by known Internet threats are critical.
Vulnerabilities that remain unused by Internet threats, but that can facilitate the
propagation of Internet threats across different systems, also fall under this
category.
•Important—vulnerabilities that compromise vital information and allow
unauthorized access to passwords and other valuable data are automatically
considered important. Vulnerabilities that compromise the integrity or availability of
system resources are also in the same category.
•Moderate—vulnerabilities that are hard to exploit because of default platform or
applications settings, auditing, or sheer technical complexity, are considered
moderate risk.
•Low-risk—these vulnerabilities either have minimal impact on affected systems or
are very difficult to exploit.
ARP Spoofing
Address Resolution Protocol (ARP) spoofing involves sending a fake or "spoofed" ARP
message to a network host to trick the host into associating an IP address to the sender's
MAC address. This technique can cause the recipient to send traffic intended for
another node or host to the sender, which is typically a host controlled by an attacker. As
a result, the attacker has access to the misdirected network traffic and can manipulate
this traffic for his or her own purposes. For example, attackers can extract confidential
data from the misdirected traffic or modify the traffic before forwarding them to their
intended recipients.
Most malware programs can be classified as file-based—they exist as files in physical
drives. Such malware programs include what are commonly known as viruses, Trojans,
and worms.
•Viruses—although the term "virus" has been commonly used to refer to malware
that can propagate, many security professionals prefer to use this term to refer only
to malware that can infect files and thus propagate from file to file. Viruses generally
affect executable files and macros in Microsoft™ Office documents.
•Worms—malware programs that can propagate from system to system are generally
referred to as "worms". Worms are known to propagate by taking advantage of
social engineering through attractively packaged email messages, instant messages,
or shared files. They are also known to copy themselves to accessible network shares
and spread to other computers by exploiting vulnerabilities. When worms are
memory-only or packet-only programs (that is, they are not file based), they are
generally referred to as "network viruses".
•Trojans—malware programs that do not have inherent abilities to spread are
generally referred to as "Trojan horse programs" or "Trojans". Although unable to
spread, Trojans are often found in infected computers after being installed by a
worm or by a human attacker. Trojans are known to perform all kinds of malicious
activities, including stealing information, opening ports for attackers, and damaging
system integrity.
Network VirusWall Enforcer leverages conventional antivirus scanning technology in
the TMAgent to check for active file-based malware.
Unprotected Endpoints
Endpoints without antivirus software or those with outdated patterns pose severe risks
to overall network security. When allowed to access the Internet or other external
resources, these endpoints can serve as infection vectors (the means by which malware
programs penetrate the network). Network VirusWall Enforcer can identify these
endpoints and isolate them from the network.
1-12
Page 32
Understanding Network VirusWall Enforcer
Prohibited Network Use
Unregulated user activities on the network can severely compromise security. Depending
on the needs of your network, Network VirusWall Enforcer allows you to regulate the
following network use:
•Port activity—by regulating port activity, you can control the use of certain
applications or protocols.
•Instant messaging—Network VirusWall Enforcer can regulate the use of certain
instant messaging applications. You can choose to regulate all activities associated
with these applications or only file transfers.
The following table lists supported instant messaging applications.
TABLE 1-1.Instant messenger support
APPLICATIONVERSION SUPPORT
Windows Live (MSN)
Messenger
Yahoo! MessengerSupports 8.1.0.421 or lower; 9.0.0.2018 or higher
AOL Instant Messenger (AIM)
ICQSupports version 6.5.1042 or lower
IRC (mIRC)Supports mIRC version 6.35 or lower
Pidgin (Gaim)Supports version 2.5.6 or lower
GaimSupports version 2.0.0 Beta 2 and or lower
Supports versions 8.1 and 9. Note that Windows
Live Messenger refuses logon attempts when the
client is older than version 8.1.
are not supported
Supports version 6.5.5.2 or lower; 6.8.8.2 or
higher not supported
•File transfers—in addition to regulating file transfers though instant messaging
applications, you can regulate file transfers made though the CIFS and Samba
protocols, HTTP file transfers, and FTP file transfers.
The following features let you control when a policy applies to an endpoint or a
connection:
•User authentication—during policy creation, you can define whether the policy
applies to all users, authenticated users only, or guest users only. Network VirusWall
Enforcer assesses an endpoint against the policy only when the specified type of
user is logged on to the endpoint.
•Network zones—you can define endpoint groupings or network zones using IP or
MAC addresses and VLAN IDs. During policy creation, you can indicate whether
the policy applies only to specific network zones. Network zones can also be used to
specify IP or MAC addresses that are exempted from policy enforcement.
•URL exception lists—when a policy is matched against an endpoint, Network
VirusWall Enforcer can be configured to block network traffic to and from the
endpoint. During policy creation, you can specify URL exception lists to ensure that
URLs on these lists remain accessible even to noncompliant endpoints. Typically,
you will want to exempt URLs to web pages containing antivirus software
downloads and vulnerability patches.
•Global endpoint exceptions—you can specify a list of IP or MAC addresses that are
exempted from all policy enforcement. All policies will not apply to the endpoints
with these IP or MAC addresses. For more information, see Specifying Globally
Exempted Endpoints on page 3-6.
Visibility
Network VirusWall Enforcer provides status screens, endpoint notifications, and logs to
allow end users and administrators to easily access enforcement results.
Endpoint Notifications
When Network VirusWall Enforcer finds that an endpoint is noncompliant, it can send
the following notifications to the endpoint:
•Web notifications—this message is displayed on the web browser and is visible only
when end users attempt to access a web page while being blocked due to
noncompliance.
1-14
Page 34
Understanding Network VirusWall Enforcer
•Popup notifications—these notifications use either the Windows Messenger service
to display messages on a standard Windows message box or the agent to display a
balloon message from the agent system tray icon.
Note:If you have selected to hide the agent system tray icon, any balloon messages
from the icon will not display.
•Email notifications—Network VirusWall Enforcer can be configured to send an
email to certain addresses whenever it quarantines an endpoint in response to a
Threat Discovery Appliance detection.
Status Screens
Use the Summary and Real-time status screens to get a quick overview of the status of
policy enforcement and the device.
The Summary screen displays the following information:
•Policy Enforcement Status—provides statistics on policy compliance and violations.
Click the number under Violations for more information.
•Threat Mitigation Events—provides statistics on the results of mitigation efforts.
Click the number to view additional information.
•Top 5 Policies with Violations—use this information to determine the most
common policy violations. Click the number under Violations to view additional
information.
•Endpoint Summary—provides statistics on the number of endpoints that are
compliant, noncompliant, or quarantined.
•AV Product Detection Status—provides statistics on the number of endpoints with
antivirus products. Click Export to save the information to a file.
•Component Status—lists the Network VirusWall Enforcer components, the last
time they were updated, and their current versions. Use this information to
determine whether you have the latest components and if updates are successful.
The Real-time Status screen displays the following information:
•Performance Status—displays CPU usage, memory usage, and concurrent
connections
•Interface Configuration Status—displays a graphical view of the current port
settings that correspond to the physical port layout
Tip: For detailed information on any web console screen, click the help button while on the
screen.
Logs
Logs provide information to help you monitor policy enforcement on your network.
During policy creation, you can specify whether log entries are generated for policy
violations. You can view these entries later through the web console screens and export
them to CSV files.
If Network VirusWall Enforcer is registered to Control Manager, the device
automatically sends log entries to Control Manager. The device can also be configured
to send logs to up to two syslog servers.
Network VirusWall Enforcer supports the following logs:
•Event Log—Network VirusWall Enforcer generates an entry on the event log every
time it detects an event, such as a virus outbreak, or performs an action, such as a
reset or a component update. If you register the device to Control Manager, it
automatically sends event log entries to the Control Manager server.
•Network Virus Log—whenever Network VirusWall Enforcer detects a network
virus, it creates a network virus log entry. If you register the device to Control
Manager, it automatically sends network virus log entries to the Control Manager
server.
•ARP Spoofing Log—whenever Network VirusWall Enforcer detects a malware
associated with ARP spoofing, it generates an entry on the ARP spoofing log.
Consult this log regularly to address any occurrences of this serious security breach.
•Threat Mitigation Log—whenever Network VirusWall Enforcer attempts to
respond to a detection by Threat Discovery Appliance (TDA), it generates an entry
in the threat mitigation log. If you register the device to Control Manager, it
automatically sends threat mitigation log entries to the Control Manager server.
1-16
Page 36
Understanding Network VirusWall Enforcer
•Endpoint History—whenever Network VirusWall Enforcer matches a policy to an
endpoint, it creates an endpoint history entry. If you register the device to Control
Manager, you can configure the time interval for sending endpoint history entries to
the Control Manager server.
Understanding Endpoints
Network VirusWall Enforcer considers each network host that functions as a packet
source and is identified by its own IP address to be an individual endpoint. A network
device with more than one network interface card (NIC) and subsequently multiple IP
and MAC addresses may be treated by Network VirusWall Enforcer as multiple
endpoints, resulting in separate policy matching events.
Based on assessment results, endpoints can be generally categorized as one of the three
following types:
•Compliant—endpoints that have not violated any policies.
•Noncompliant—endpoints that have violated at least one policy; the most common
tasks associated with noncompliant endpoints are blocking or monitoring them.
Monitored endpoints have unhampered access to the network, but may be
reassessed against policies sooner than compliant endpoints.
Note:When creating a policy, you can define different reassessment schedules for
compliant and noncompliant endpoints.
•Blocked—endpoints that have violated a policy and are restricted from accessing
network resources. If an endpoint is blocked, the device drops all packets directed
towards or coming from the endpoint. The only types of traffic a blocked endpoint
can receive are notifications and remedy-related traffic.
•Quarantined—blocked endpoints that can only be released and allowed access to
the network through the web console. Unless released, quarantined endpoints
remain blocked regardless of subsequent assessment results.
Endpoints may also be classified into the following categories depending on current
assessment status:
•Assessing—endpoints that are currently being checked for policy compliance
•Unsupported OS—endpoints that cannot be assessed because they are running on
unsupported platforms
Assessment Intervals
Noncompliant endpoints, by default, are assessed more frequently to help increase
compliance across the network. The following table shows the different reassessment
schedules and the factors that may trigger them.
TABLE 1-2.Endpoint assessment intervals
ASSESSMENT
TYPE
Default interval1 day15 minutes
Agent-based
assessments
Device-based
assessments
DEPLOYMENT
METHOD
Persistent agent1/2 of config-
Single-use agentAs configured,
No agentN/AN/A
All typesReal-time, trig-
COMPLIANTNONCOMPLIANT
1/2 of configured
ured interval
triggered by
traffic
gered by traffic
interval
As configured,
triggered by traffic
Real-time, triggered by traffic
SNMP Support
Simple Network Management Protocol (SNMP) is set of communication specifications
for managing network devices, such as bridges, routers, and hubs over a TCP/IP
network.
In the SNMP management architecture, one or more computers on the network act as a
network management station (NMS) and poll the managed devices to gather
information about their performance and status. Each managed device has a software
module, known as an agent, which communicates with the NMS.
1-18
Page 38
Understanding Network VirusWall Enforcer
For instructions on how to configure SNMP settings, see Configuring SNMP Settings on
page 5-8.
MIB Security
Managed devices can protect their MIBs by granting only specific network management
stations access. One way of doing this is through authentication. Managed devices can
require that all NMSs belong to a community, the name of which acts as a password that
the managed devices use to authenticate management stations attempting to gain access.
Additionally, the settings for a community can include access privileges, such as
READ-ONLY and READ-WRITE, that are granted to network management stations.
Table 1-3 enumerates the SNMP specifications supported by Network VirusWall
Enforcer.
TABLE 1-3.Supported SNMP agent specifications
VERSION
ACCESSPRIVILEGES
MANAGEMENT INFORMATION
BASE (MIB)
ACCEPTEDCOMMUNITYNAMES
v2c
READ ONLY (the GET command)
MIB II, with the following standard objects:
System group
Interfaces group
Enterprise group, including system status and
memory utilization
Community names with the following characteristics:
Default name– public
Access privileges- READ ONLY (the get command)
Maximum number of community names- 5
Maximum length of community name- 33 alphanumeric characters
Allows up to 255 specific network management
station IP addresses to access the agent
Table 1-4 enumerates the supported SNMP trap specifications.
TABLE 1-4.Supported SNMP trap specifications
COMMUNITYNAMES
DESTINATION NETWORK MANAGEMENT
STATION
(NMS) IP ADDRESSES
One community name allowed
One NMS IP address allowed per community name
SNMP Trap Limitations
The following SNMP traps limitations exist:
•Version supported: 2c
•Community names—one community name allowed; 1-33 alphanumeric characters
(including underscore: "_")
•Destination Network Management Station (NMS) IP addresses—one NMS IP
address allowed per community name
•System location and system contact—0–254 characters (ASCII 32–126, excluding
"&")
SNMP Traps
In addition to the standard SNMP trap messages, Network VirusWall Enforcer sends
the following traps:
•Cold start—SNMP agent enabled
•Link down—port connection down
•Link up—connection to port established
1-20
Page 40
Understanding Network VirusWall Enforcer
•Authentication failure—three consecutive attempts to log on to the
Preconfiguration console during the same local or remote SSH session were
unsuccessful
•Shutdown—SNMP agent disabled
Note:This trap is also sent if Network VirusWall Enforcer shuts down while the
SNMP agent is enabled. No trap is sent if the device shuts down while the agent
is disabled.
•Boot to factory default—boot to default rescue partition. This sends an SNMP trap
every minute.
•Boot to previous partition—started device using previous partition in response to
keyboard commands. This SNMP trap message is sent after the device has started.
•Turn on/off OPP—whenever Control Manager sends an OPP command to
Network VirusWall Enforcer, an SNMP trap indicates whether or not OPP support
is enabled.
SNMP Agent Messages
In addition to the standard SNMP agent messages, Network VirusWall Enforcer sends
the following additional agent messages:
•nvwScanCurrConn—concurrent scan connections.
•nvwScanCurrMem—current memory use for scans.
•nvwPolicyCurrConn—concurrent number of endpoints with the Threat
Management Agent (TMAgent).
VLAN Support
A virtual local area network (VLAN) is a network consisting of endpoints that are not
on the same physical segment of a local area network (LAN) but behave as if they are on
the same segment. These endpoints comprise a network in a virtual sense, through
software residing on a networking device, such as a switch. VLANs reduce network
congestion by managing the flow of traffic between endpoints that communicate often,
even if they are not on the same network segment.
When a local switch on the network receives a packet, it can use the destination port,
destination MAC address, or protocol to determine which VLAN the packet belongs.
When other switches receive the packet, they determine VLAN membership implicitly
using MAC address information or explicitly using a tag that the first switch adds to the
MAC address header.
Network VirusWall Enforcer recognizes both tagged and non-tagged of IEEE 802.1Q
VLAN frames, thereby preserving the VLAN structure on your network.
Tip: If you use Control Manager and the Control Manager server on your network belongs to
a VLAN, bind Network VirusWall Enforcer to the same VLAN (tagged or non-tagged).
This will help ensure effective communication between the Control Manager server and
Network VirusWall Enforcer.
1-22
Page 42
Chapter 2
Setting Up the Device
After installing Network VirusWall Enforcer and performing all preconfiguration tasks
described in the Installation and Deployment Guide, there are a number of tasks you need to
perform to ensure that everything is properly set up.
This chapter describes how to ensure that Network VirusWall Enforcer is connected to
the network and that it is activated and fully updated. It discusses the following topics:
Network VirusWall Enforcer provides a Preconfiguration console and a web console for
configuring or managing the device.
Preconfiguration Console
The Preconfiguration console lets you configure the device before deploying it to your
network. Access the console to set the most basic device settings, including port
functions and IP address configuration.
You can view the Preconfiguration console directly by connecting a keyboard and a
VGA monitor to the device or remotely using an SSH client.
FIGURE 2-1. The Preconfiguration console logon screen
Accessing the Preconfiguration Console Remotely
To access the preconfiguration console remotely, you need an SSH client like PuTTY,
which you can download here:
http://www.putty.org/
2-2
Page 44
Setting Up the Device
Consider the following when accessing the console remotely:
•SSH console access must be enabled from the web console. See Configuring Access
Control on page 2-12.
•Connect to the device management IP address using SSH.
•When prompted to log on to the Linux root console, use the user name "root" and a
blank password.
•Certain options are not available when accessing the Preconfiguration console
remotely. For example, you cannot disable SSH connections. Also, you will not be
able to import or export configuration information or export an HTTPS certificate
when.
Web Console
The Network VirusWall Enforcer web console provides a browser-based interface for
managing policies and other aspects of the device. The console lets you react quickly to
network virus emergencies from nearly anywhere.
TABLE 2-1.Comparison of the Network VirusWall Enforcer consoles (Continued)
TASK
Restart and shut down device
View device information (CPU
and memory usage)
View interface configuration
PRECONFIGURATION
CONSOLE
WEB CONSOLE
Logging on to the Web Console
If you have preconfigured the device as described in the Installation and Deployment Guide,
you can log on to the web console using the management IP address or host name you
have specified for the device.
To access the Network VirusWall Enforcer web console, use Microsoft™ Internet
Explorer™ 6.0 or later. The console address is:
•IPv4:
http://<device IP address or host name>
•IPv6:http://<[device IP address] or host name>
Connecting to the Network
When the management IP address, bridge IP address, and static route settings are
correct, Network VirusWall Enforcer is able to connect to the network and packets to
and from the device are efficiently routed.
Note:You can configure these settings on both the web console and the Preconfiguration
console.
2-6
Page 48
Setting Up the Device
Management IP Address
The management IP address lets you access the web console and manage the device. For
instructions, see Configuring IP Address Settings on page 2-10.
Note:If you have a dual-stack environment, ensure that you specify both IPv4 and IPv6
address settings.
Bridge IP Addresses
To effectively deploy the agent, provide remediation measures, and perform other policy
enforcement tasks, Network VirusWall Enforcer requires direct and unrouted
communication between itself and protected network segments. Network VirusWall
Enforcer may use the management IP address to communicate with all endpoints.
However, direct and unrouted communication is possible only if:
•The management IP address is not bound to a management port (ports 1-2 ); and
•All the protected endpoints are in the same segment as the management IP address.
Specify a bridge IP address for each protected segment with which device cannot
directly communicate. The bridge IP addresses must be in the same segment to avoid
routing and ensure effective policy enforcement.
FIGURE 2-3. Bridge IP addresses and protected segments
2-8
Page 50
Setting Up the Device
Static Routes
A static route defines a specific router IP address that Network VirusWall Enforcer
should use to reach endpoints in a particular segment. A static route is required for each
router between Network VirusWall Enforcer and a protected segment or segments. You
can define up to 50 static routes.
Note:To add a static route, add a bridge IP address for each segment first. Ensure that you
do not delete bridge IP addresses that are being used by your static routes.
To allow Network VirusWall Enforcer to protect endpoints in segment 1 in the
following diagram, the following settings must be defined:
•A bridge IP address (bridge IP 1) for segment 1. This IP address should be in the
same segment as the upper interface of router 2.
•A static route pointing to segment 1 and router 2, specifically the IP address of the
upper interface of router 2 facing switch 1.
Note:You can bind a bridge IP address to a bridge with a specific VLAN ID. You can add
Configure the management IP address, bridge IP address, and static routes to ensure
that Network VirusWall Enforcer and efficient routing is established.
Note:Specify IPv4 settings if you have deployed Network VirusWall Enforcer to an IPv4
2-10
or a dual-stack environment. Specify IPv6 settings if you have deployed Network
VirusWall Enforcer to an IPv6 or a dual-stack environment.
Page 52
Setting Up the Device
To configure IP address settings:
1.Click IP Address Settings in the Administration menu.
2.Select to allow Network VirusWall Enforcer to obtain IP address settings from a
DHCP server or configure the settings manually.
3.Click the Bridge IP Address tab to add or delete bridge IP addresses. Bridge IP
addresses allow the device to access endpoints in another segment.
4.Select the Static Routes tab to add or delete static routes. You can add up to 50
static routes.
Note:For more information on bridge IP addresses and static routes, see Bridge IP
Addresses on page 2-7 and Static Routes on page 2-9.
Securing the Device
To secure the device, perform the following tasks:
•Change the password of default accounts to secure the console. See Changing Account
Passw ords on page 2-11.
•Control access to the device. See Configuring Access Control on page 2-12.
Changing Account Passwords
Secure the console by immediately changing the passwords to the default accounts,
"admin" and "poweruser".
To change the password for an account:
1.Click Administration > Account Management. The Account Management
screen appears.
2.Click the name of the account to edit the account.
3.Type the new password and retype it for confirmation.
Note:Trend Micro strongly recommends changing all default passwords as soon as you
are able to access the web console. A strong password is at least 8 characters
long and a combination of upper and lower case letters, numbers, punctuation
marks, and other special characters. Avoid dictionary words, names, and dates.
4.Click Save.
Configuring Access Control
Reduce the risk of unauthorized web console access by granting access only to certain IP
addresses. You can also enable or disabled remote SSH access to the Preconfiguration
console. You can have up to 10 concurrent HTTP web console sessions and up to 10
concurrent HTTPS sessions.
To configure Access Control:
1.Click Access Control in the Administration menu.
Tip:With SSH access enabled, you can access the Preconfiguration console using any
SSH client.
3.To restrict IP addresses, select Enable IP address restriction. You can add up to
20 IP addresses to this list.
a.Type an IP address in the IP address text box.
b.Type a comment (optional). Use this field to provide more information about
the IP address.
c.Click Add to add the IP address.
d.Add more IP addresses as needed.
2-12
Page 54
Setting Up the Device
e.Click Save.
Note:When you enable IP address access restriction, you will be logged off from the web
console and will need to log on again. If you did not add your current IP address to
the access control list, you will be prevented from accessing the web console and from
logging on.
Activating and Updating the Device
Ensure that the device can connect to the Internet and then activate your license. After
activation, you will be able to perform updates. Perform the following procedures to
activate and update your device:
•If necessary, configure proxy server settings so the device can connect to the
Internet. See Configuring Proxy Settings on page 2-14.
•Activate the device license. See Activating the Device License on page 2-15.
•If you are using a Control Manager server as a local update server, specify the URL
of the server so the device can download updates from this server. See Specifying the
Update Source on page 2-14.
•Perform an update of Network VirusWall Enforcer pattern and program files. You
may need to reset the device after the update. See Updating Components on page 2-17.
•Schedule automatic pattern and engine updates. See Scheduling Component Updates on
page 2-18.
Update Options
Network VirusWall Enforcer components are software modules that comprise the
Network VirusWall Enforcer operating system. To help ensure up-to-date protection,
update all the components regularly.
Network VirusWall Enforcer provides the following methods to update and deploy the
latest components to its managed products and devices:
•Manually—instruct Network VirusWall Enforcer to connect directly to the update
source, download, and then apply the latest components. Use the Manual Update
option on the web console to perform this type of update.
•Automatically—configure Network VirusWall Enforcer to automatically connect to
the update source, download, and then apply the latest components. Use the
Scheduled Update option on the web console to set this type of update.
Configuring Proxy Settings
Specify the necessary proxy server settings to ensure that Network VirusWall Enforcer
can connect to the Internet. Network VirusWall Enforcer connects to the Internet
during license registration and when downloading updates.
To configure proxy settings:
1.Click Proxy Settings from the Administration menu.
2.Select Use a proxy server to connect to the Internet.
3.Select HTTP, SOCKS 4, or SOCKS 5 for the protocol.
4.Type t he Server name or IP address and the Por t.
5.Type t he User name and Password under Proxy server authentication if the
proxy server requires authentication.
6.Click Save.
Note:To ensure that Network VirusWall Enforcer connects to the designated update source
directly, without going through the proxy server, select Do not use the proxy server
to download updates. This option does not affect Pattern Release History
downloads.
Specifying the Update Source
By default, Network VirusWall Enforcer obtains updates from Trend Micro
ActiveUpdate servers, but you can configure the device to connect to a local update
source.
Use the Update Settings screen to set the update source from which Network VirusWall
Enforcer obtains the latest components.
2-14
Page 56
Setting Up the Device
To set the update source:
1.Click Update Source from the Updates menu.
2.Select Trend Micro ActiveUpdate Server or select Other update source and
type the URL of the update source.
Note:The update source must be a valid URL that begins with http or https. When
using a URL with a literal IPv6 address, enclose the IPv6 address in square
brackets.
Activating the Device License
For continuous protection, ensure that your Network VirusWall Enforcer license has
been activated and that it remains valid.
To activate your device license:
1.Click Product License in the Administration menu.
2.Click Update Information to get the latest license information for your device.
3.If your license has not been activated or it has expired, supply a new Activation Code by clicking New Activation Code.
Network VirusWall Enforcer uses the following components to detect, prevent or
contain, and eliminate malware outbreaks.
TABLE 2-2.Updatable components
COMPONENTDESCRIPTION
Network Virus
Engine
Network Virus
Pattern
Damage
Cleanup Engine
Damage
Cleanup Pattern
Vulnerability
Pattern
Forensic Clean
Template
Forensic Clean
Engine
Scans all packets passing through Network VirusWall
Enforcer. The Network Virus Engine specifically searches
for network viruses.
Contains a regularly updated database of network virus
packet information. Trend Micro often updates the network
virus pattern file to help ensure Network VirusWall Enforcer
can identify new network viruses.
Scans endpoints for and repairs damage caused by malware. The Damage Cleanup Engine can also check for vulnerabilities.
Contains cleanup information that is used by the Damage
Cleanup Engine to identify malware and remove them from
endpoints.
Contains information about vulnerabilities in popular software products and is used to identify vulnerabilities in endpoints.
Contains information used by the Forensic Clean Engine to
locate and remove threats detected by Threat Discovery
Appliance.
Locate and removes threats detected by Threat Discovery
Appliance.
2-16
Anti-rootkit
Driver
Detects rootkits, sophisticated malware programs that are
able to hide from Windows APIs and the detection tools
that leverage them.
Page 58
TABLE 2-2.Updatable components (Continued)
COMPONENTDESCRIPTION
Setting Up the Device
Pattern Release
History
Antivirus Product
Detection Engine
Threat Management Agent
Program file
Contains information about the latest patterns for supported antivirus products. Network VirusWall Enforcer uses
this information to check whether endpoints are running the latest
patterns.
Note: You can specify a different update schedule for
updating the Pattern Release History.
Scans endpoints to determine whether they are running
supported antivirus software.
The main component of the agent, which is used by Network
VirusWall Enforcer to perform certain tasks on the endpoint.
Note: The Network VirusWall Enforcer program, also
referred to as the image, which includes the
operating system, system programs, and all
components necessary to get Network VirusWall
Enforcer functioning properly. When you manually
update the program file, Network VirusWall Enforcer
prompts you to reboot the device if necessary.
Otherwise, for scheduled program file updates, the
device automatically reboots after the update when
necessary.
Tip: Use the Summary screen on the Network VirusWall Enforcer web console to check
whether selected components have been updated.
Updating Components
For optimum security and product performance, ensure that all components are current
by performing a manual update.
LDAP settings define how Network VirusWall Enforcer authenticates endpoint users
for policy enforcement.
Before configuring LDAP settings, note the following:
•If you select Kerberos as the authentication method, ensure you fill out the KDC
settings and that the device and LDAP server times match.
•If you select Simple as the authentication method, the password for Network
VirusWall Enforcer and the LDAP server is not encrypted.
•Kerberos authentication is not supported in IPv6 networks. When using Kerberos
authentication, both the LDAP and the KDC server addresses must be IPv4
addresses.
3-2
Page 64
Preparing for Policy Enforcement
To configure LDAP server settings:
1.Click LDAP Settings in the Administration menu. The LDAP Settings screen
displays.
2.Select Use Microsoft Active Directory or Use OpenLDAP.
Note:Network VirusWall Enforcer supports single sign-on (SSO) to the Internet if you
select Use Microsoft Active Directory.
3.Select the authentication method. OpenLDAP supports Simple, Kerberos, and
Digest MD5 authentication, while Active Directory only supports Simple and
Kerberos authentication.
4.Specify the following:
•LDAP server location—type an FQDN, such as www.trendmicro.com, or an
IP address
•LDAP server port—for example, 389
•Base distinguished name—type the DN setting, for example, dc=trend and
dc=com
•KDC server location—type an FQDN, such as www.trendmicro.com, or an
IP address
•Default realm—for example, TREND.COM
•Default domain—for example, TREND.COM
•KDC principal name—KDC principal name. This setting is only used for
Microsoft Active Directory 2008.
•KDC server port— provide if applicable; for example, 88
5.Depending on your security policies, select Enable single sign-on (SSO) to the
Internet. This option is available only if you are using Active Directory.
Depending on your security policy settings, you can configure Network VirusWall
Enforcer to allow single sign-on to the Internet for users using their Active Directory
account. This means that once a user signs on to their computer with their Active
Directory credentials, they no longer need to sign on through Network VirusWall
Enforcer to connect to the Internet.
Keep the following in mind when enabling single sign-on (SSO):
•SSO only works with a persistent agent deployment.
•SSO does not work when an endpoint is new to Network VirusWall Enforcer and it
has no records on the device. This occurs when the agent has not been installed on
the endpoint. Users of these endpoints will continue to see the authentication page
when attempting to access the Internet.
•SSO does not support LDAP referrals.
Defining URL Lists
During policy creation, you can specify URL lists as exceptions to enforcement. URLs in
these lists remain accessible even to endpoints found in violation of the policy.
Before creating policies, define the URL lists that you will need. URL lists typically
include URLs of update sites for security software and Microsoft products. It can also
include the download or installation page for the security software required on your
network. Each list can include up to 64 URLs.
To add a URL List:
1.Click Policy Enforcement > URL Lists.
2.Click Add. The Add URL List screen displays.
3.Type up to 30 characters for the name of the URL list.
4.Type an optional comment. Comments can be up to 50 characters long.
5.Type a valid IPv4 or IPv6 URL. Use wildcards (*) to specify multiple URLs.
Note:When specifying an IPv6 URL with a literal IP address, enclose the IP address in
square brackets.
3-4
Page 66
Preparing for Policy Enforcement
6.Click Add to to add the specified URL to the list.
7.Add more URLs to the list as necessary.
8.Click Save.
Defining Network Zones
Network zones are predefined IP and MAC address groupings that allow you to manage
policy coverage. If you want to apply different security policies to different sets of
endpoints, organize these endpoints into different network zones. During policy
creation, you can specify whether to apply a policy to all endpoints or specific network
zones.
To create a network zone:
1.Click Network Zones in the Policy Enforcement menu.
2.Click Add. The Add Network Zone screen displays.
3.In the General tab, type up to 30 characters for the name of the network zone.
4.Type an optional comment. Comments can be up to 50 characters long.
5.Specify the IP or MAC addresses for the network zone.
Note:Use a comma to separate each address or range. You can specify up to 64 IP or
MAC addresses or address ranges.
6.Click Add to. The IP or MAC address is added to the list.
7.Add more IP or MAC addresses as necessary.
8.Click the Interfaces/VLANs tab to bind zones to VLANs and device specific
interface ports.
a.Select interface ports to bind the zone to.
Note:Selecting no ports is the same as selecting all ports. If no port is selected or
all ports are selected, the zone is not bound to particular ports.
b.Specify the VLAN Settings. Select from all tagged and untagged VLAN IDs,
Note:When specifying multiple VLAN IDs, separate each ID with a comma. You
can specify up to 32 VLAN IDs.
9.Click the Exception tab to specify exceptions to this network zone. Exceptions are
MAC or IP addresses that are not covered by the network zone, even when you
have added them implicitly as part of an address range in the General tab.
Note:You can add up to 64 IP or MAC addresses or address ranges to the exception
list.
10. Click Save.
Specifying Globally Exempted Endpoints
The global endpoint exception list identifies the endpoints that are not assessed against
any policy. Use the list to ensure that certain endpoints are not blocked by the device.
You can add up to 64 global endpoint exceptions.
To add to the global endpoint exception list:
1.Click Policy Enforcement > Global Endpoint Exceptions in the Policy
Enforcement menu. The Global Endpoint Exceptions screen displays.
2.Select IP address/range or MAC address.
3.Type the IP or MAC addresses or the range in the text box.
Note:Use a comma (,) to separate each address or address range. To specify a range,
use a hyphen (-).
4.Click Add to. The specified address or range is added to the list.
5.Add more addresses or ranges as needed.
6.Click Save.
3-6
Page 68
Preparing for Policy Enforcement
Specifying OfficeScan Detection Ports
If your organization has Trend Micro™ OfficeScan™ deployed, specify the port or
ports used by OfficeScan clients to listen for server commands. These ports can be used
by Network VirusWall Enforcer to detect the OfficeScan client on endpoints.
To specify the OfficeScan detection ports:
1.Click OfficeScan Settings in the Policy Enforcement menu.
2.Specify the port numbers for detecting OfficeScan. You can specify up to 10 ports,
separating each port with a comma (,).
3.Click Save.
Specifying Remote Login Accounts
To allow Network VirusWall Enforcer to remotely log on to endpoints and install the
agent silently, you must configure remote login accounts. You can add up to five remote
login accounts, which will be authenticated using the configured LDAP settings.
Note:To ensure that Network VirusWall Enforcer successfully installs the agent, use an
account that has administrator rights on protected endpoints, such as a domain
administrator account.
Network VirusWall Enforcer can send notifications using the following media to inform
either endpoint users or administrators about policy violations or related events.
TABLE 3-1.Notification media
MEDIATARGETDESCRIPTION
WebEndpoint userWeb notifications are displayed when a blocked or
quarantined endpoint attempts to access a web page
or other remote resources using their web browser.
PopupEndpoint userPopup notifications are displayed at the endpoint
immediately after a policy is violated, regardless of
the action that Network VirusWall Enforcer is set to
take. Popup notifications can be set to display as a
standard Windows message box or a balloon notification from the agent icon on the taskbar.
Whether or not popup notifications display can be
configured individually for each section of a policy.
EmailAdministratorsEmail notifications are sent to inform administrators
about quarantined endpoints. Email notifications are
centrally enabled or disabled and apply to all policies.
3-8
Page 70
Preparing for Policy Enforcement
Web Notifications
When a quarantined or blocked endpoint attempts to access a web page or other remote
resources using a web browser, Network VirusWall Enforcer can display one of the
following notifications on the web browser.
TABLE 3-2.Types of web notifications
NOTIFICATIONPURPOSE
User LoginPrompts the endpoint user to specify domain creden-
tials.
Performing Endpoint
Assessment
Network WormIndicates that the endpoint has been quarantined due
Outbreak Prevention
Policy Started
No Antivirus Product
Detected
Registry Key ScanIndicates that the endpoint is being blocked because it
Antivirus Product Has
Outdated Pattern
Vulnerability
Detected
Threat DetectedIndicates that the endpoint is being blocked because it
Indicates that the endpoint is being assessed against
applicable policies.
to malicious code detected in its outgoing traffic.
Indicates that the endpoint is being blocked due to a
violation of the Outbreak Prevention Policy that has
been deployed by Control Manager.
Indicates that the endpoint is being blocked because it
does not have supported antivirus software.
does not have required registry entries or contains
unwanted entries.
Indicates that the endpoint is being blocked because it
has an outdated antivirus pattern
Indicates that the endpoint is being blocked because it
has unpatched software vulnerabilities.
TABLE 3-7.Supported variable tags for email notifications
VARIABLE TAGDESCRIPTION
<%=TRAFFIC_DIRECTION%>Whether traffic is incoming or outgoing
relative to the endpoint
<%=RISK_TYPE%>Threat type
<%=RISK_PROTOCOL%>Port where the malicious packet was
found
<%=RULE_ID%>Rule used to detect the threat
<%=SUSP_BEHAVIOR%>Suspicious network activity
<%=SOURCE_IP%>IP address of the traffic source
<%=SOURCE_HOSTNAME%>Host name of the traffic source
<%=SOURCE_PORT%>Port of source traffic
<%=SOURCE_MAC%>MAC address of the traffic source
<%=SOURCE_GROUP%>Workgroup of the traffic source
<%=DEST_IP%>IP address of the traffic destination
<%=DEST_HOSTNAME%>Host name of the traffic destination
<%=DEST_PORT%>Port of traffic destination
<%=DEST_MAC%>MAC address of the traffic destination
<%=DEST_GROUP%>Workgroup of the traffic destination
<%=NVWE_IP%>IP address of the Network VirusWall
Enforcer device
3-16
Page 78
Preparing for Policy Enforcement
Customizing Notification Content
Customizing Web and Popup Notification Content
Both web and popup notifications are targeted at endpoint users. Customize these
notifications if you want to provide information that is important to endpoint users in
your organization.
Tip: For the list of formatting and variable tags that you can use with notifications, see
Notification Tags on page 3-12.
To customize web and Popup notification content:
1.Click Policy Enforcement > Notifications. The Endpoint tab is selected by
default.
2.Click the type of web or popup notification you want to customize. For
descriptions of each notification type, see Table 3-2. Types of web notifications and
Table 3-3. Types of popup notifications.
3.Modify the message. For web notifications, you can use up to 4096 characters. For
popup notifications, you can use up to 130 bytes. Alphanumeric characters
consume one byte, while special and East Asian characters can require up to four
bytes.
Note:If you use double-byte characters, particularly characters from East Asian
languages, in your notification messages, ensure that you select the appropriate
encoding method.
Email notifications are targeted at administrators. Customize these notifications if you
want to provide information that can be important particularly to administrators in your
organization.
Tip: For the list of variable tags that you can use with notifications, see Notification Tags on
page 3-12.
To customize email notification content:
1.Click Policy Enforcement > Notifications.
2.Click the Administrator tab.
3.Click the type of email notification you want to customize. For descriptions of each
notification type, see Email Notifications on page 3-11.
4.Modify the message.
5.Click Save.
Configuring Notification Settings
To help ensure that your notifications are delivered as expected, configure the following
notification settings before using the device for policy enforcement:
•Web notification settings on page 3-18
•Popup notification settings on page 3-19
•Email notification settings on page 3-19
Note:Notification settings are global. These settings apply to all notification types and all
policies.
Web notification settings
You can configure the following web notification settings:
•Trend default look and feel—select this option to use the default message
appearance.
3-18
Page 80
Preparing for Policy Enforcement
•Custom—select this option to specify the Page title, Title text color, and Banner
color.
•Display the assessment screen—select this option to display the assessment page
whenever the endpoint attempts to opens a web page while it is being assessed.
To configure web notification settings:
1.Click Policy Enforcement > Notifications. The Endpoint tab is selected by
default.
2.In the Web Notificati ons section, click Settings.
3.Specify your preferred settings and click Save.
Popup notification settings
You can configure the following web notification settings:
•Encoding method—select the encoding method that closely matches the language
of your popup notifications. English, German, French (ISO-8859-1) is selected
by default.
•Popup method—select whether to display a standard Windows message box or a
notification from the agent icon on the taskbar. The Windows message box
option is selected by default.
Note:If you have selected to hide the agent icon, any popup messages from the agent will
not be displayed.
To configure popup notification settings:
1.Click Policy Enforcement > Notifications. The Endpoint tab is selected by
default.
2.In the Popup Notifications section, click Settings.
3.Specify your preferred settings and click Save.
Email notification settings
Note:Email notification settings must be configured before any email notifications can be
Configuring email notification settings lets you define:
•Recipient addresses—the notification recipients
•Sender address—the email address to use for sending notifications
•Character encoding—the encoding method that best matches the language of your
email notifications. UTF-8 can cover most languages and character sets; however,
select another encoding method if notification recipients are using email clients that
do not support UTF-8.
•SMTP server address and port—the address or name of the server and the port
used by the server for SMTP communication
•User name and password—credentials for sending mail through the specified SMTP
server
To configure email notification settings:
1.Click Policy Enforcement > Notifications.
2.Click the Administrator tab.
3.In the Email Notifications section, click Settings.
Tip:You can access the same screen through Administration > Email Settings.
4.Specify all the settings.
Note:Email notifications are sent only if all the settings are specified.
5.Click Test Co nnect ion to verify whether Network VirusWall Enforcer can access
the specified SMTP server. If the test fails, check network connectivity and the
specified settings. Make necessary changes and rerun the test until it succeeds.
6.Click Save.
Configuring ARP Spoofing Protection
Network VirusWall Enforcer prevents Address Resolution Protocol (ARP) spoofing by
broadcasting legitimate ARP information associated with your critical nodes. Network
VirusWall Enforcer also monitors endpoints for ARP spoofing malware.
3-20
Page 82
Preparing for Policy Enforcement
To understand the threat posed by ARP spoofing, see ARP Spoofing Prevention on page
1-7.
Monitoring for ARP Spoofing Malware
To detect and terminate ARP spoofing malware on endpoints, Network VirusWall
Enforcer monitors applications for outgoing ARP traffic. If an application is found to
be sending more than 100 ARP packets per second, Network VirusWall Enforcer
considers the application ARP spoofing malware and can terminate the application.
By broadcasting legitimate ARP information, Network VirusWall Enforcer allows
endpoints to correct spoofed ARP information from malware or other sources.
Note:When configuring ARP spoofing prevention, specify MAC and IP address
information of your critical nodes, including gateways and servers. This information
helps prevent misdirection of network traffic to critical nodes.
3.Specify the IP and MAC addresses of your critical nodes to help ensure that traffic
to these nodes are not affected by ARP spoofing. To do this:
a.Type a valid IP address.
Note:ARP spoofing prevention only supports IPv4 addresses.
b.Type a valid MAC address.
c.Use the comment field to provide additional information about the node you
are adding.
d.Click Add to.
4.Click Save.
Configuring Agent Settings
Network VirusWall Enforcer uses the Threat Management Agent (TMAgent) to
perform certain policy enforcement tasks. You can configure the following agent
settings:
•Threat Management Agent port—specify the port that the agent uses to
communicate with Network VirusWall Enforcer. By default, the agent uses port
5091.
•Hide the agent system tray icon—selecting this option prevents the agent icon
from displaying on the system tray of endpoints. This option also prevents
agent-based popup notifications from displaying.
•Poll Network VirusWall Enforcer periodically—select this option to
automatically send updates to Network VirusWall Enforcer if requests from the
device are not received.
To configure agent settings:
1.Click Policy Enforcement > TMAgent Settings.
2.Specify your preferred settings.
3.Click Save.
3-22
Page 84
Chapter 4
Policy Creation and Deployment
This chapter describes how to define policies for enforcement by Trend Micro™
Network VirusWall™ Enforcer 1500i. It also discusses different deployment scenarios
and how you can create policies to match these scenarios.
The following table describes the actions and remediation methods that Network
VirusWall Enforcer can perform in response to policy violations.
TABLE 4-2.Supported actions and remediation methods
METHODTARGETDESCRIPTION
MonitorEndpointTags the endpoint as noncompliant and
applies a more aggressive assessment
schedule
BlockEndpointBlocks endpoint traffic until the next
assessment
Redirect to URLWeb trafficOpens a specified URL when a blocked
or quarantined endpoint attempts to
open a website; with this method
selected, you can also specify:
• Allow off-page navigation—select
this option to allow endpoint users to
follow links from the specified URL.
• Link depth—this value serves as a
limit to the number of links endpoint
users can navigate away from
relative to the specified URL. You
can use this option to prevent
unprotected endpoints from reaching
harmful or compromised pages.
QuarantineEndpointBlocks endpoint traffic until the endpoint
is released through the console
4-4
Page 88
Policy Creation and Deployment
TABLE 4-2.Supported actions and remediation methods
METHODTARGETD ESCRIPTION
RejectApplication- or
protocol-specific
packets
DropApplication- or
protocol-specific
packets
Clean upEndpointAttempt to stop malware and remove its
Prevents packets from passing and
sends a reset packet (RST) to the
source
Prevents packets from passing
components from the endpoint
Policy Matching Overview
Network VirusWall Enforcer allows you to create multiple policies for different network
segments and different types of endpoints and traffic. Network VirusWall Enforcer
follows a first-match rule—once the device matches a policy to a communication
session, it stops checking for additional policy matches.
First-Match Rule
Keep broad policies at the bottom of the policy list and specific policies higher in the
list. Consider the three policies in the following table:
TABLE 4-3.Example of correctly prioritized policies
In Table 4-3, placing broader policies lower in the list prevents situations where specific
and more stringent policies are never matched.
In Table 4-4, placing broader polices higher in the priority list prevents other policies
from being enforced. The broadest policy, which matches communication sessions from
any source or to any destination, prevents enforcement of the second and third policies.
Also, even if the first policy is removed, the third policy is still never enforced, since the
destination of the third policy is more specific than that of the second policy.
TABLE 4-4.Example of incorrectly prioritized policies
Before creating policies for enforcement, review the following best practices:
•Carefully set policy priority based on the first-match rule.
•Traffic from a targeted endpoint must pass through Network VirusWall Enforcer or
the device will not recognize the endpoint.
•To minimize endpoint disruption and to monitor activity, select Remote login for
the Endpoint installation method, Monitor for the Endpoint Action, and
disable the detecting page. However, if Remote login is unsuccessful ActiveX is
used.
•If you have a DNS server on your network, ensure the following:
•Add the Gateway and DNS IP addresses to Global Endpoint Exceptions.
•Specify the DNS server IP addresses in the Preconfiguration console to allow
the device to relay DNS queries for blocked endpoints.
•If you use a proxy server, include the Proxy port in HTTP detection settings.
4-6
Page 90
Policy Creation and Deployment
•If you select ActiveX as the endpoint installation method, ActiveX needs to be
enabled on the endpoint.
•If you select Remote Login, ActiveX for the endpoint installation method,
configure remote login accounts. Ensure that endpoint firewalls do not block the
agent installation.
•If you disable endpoint detection for endpoints with unidentifiable operating
systems, the device will not assess endpoints with firewall software or devices, such
as routers.
•If you select user authentication, you must configure LDAP settings.
•If you select the ActiveX deployment option and select to assess only Trend Micro
products using networking protocols, the Threat Management Agent (TMAgent)
will not install on endpoints.
•If you want endpoints to access the URL exception page, do not specify TCP port
80 under Application Protocol Detection.
•If you select the Reject packet action in Application Protocol Detection the
following occurs:
•TCP: TCP reset
•UDP: ICMP destination port unreachable
•ICMP: ICMP destination port unreachable
•If you select the Drop packet action in Application Protocol Detection,
applications waiting for responses to dropped packets may appear unresponsive.
•If you select the File Transfer Detection service:
•HTTPS traffic is not scanned.
•ASP uploads are not scanned.
•If the action is Reject Packet, FTP downloads a file name with zero bytes.
•If CIFS connections exist at the time of policy creation, the action may not
function correctly.
•Inform endpoints of policy requirements prior to blocking them from accessing the
network. If you deploy a policy that requires endpoints to have the latest
vulnerability patch installed moments after the patch is released, the majority of the
endpoints on your network will violate this policy.
•Selecting to monitor action for all new policies helps locate problem areas without
disrupting endpoints. This is a good way to begin deploying new policies on your
network.
•If you select Display the assessment screen under Endpoint Notifications and
select a short reassessment interval during policy creation, endpoint users will
frequently see the assessment screen while waiting to access the network. Consider
disabling the assessment screen to make assessments transparent to end users.
Overview of Policy Sections
Each Network VirusWall Enforcer policy comprises of the following sections.
TABLE 4-5.Policy sections
SECTIONDESCRIPTION
Endpoint SettingsAgent deployment options and endpoint reassess-
ment intervals
Authentication and
Network Zones
• User authentication requirements for accessing
the network
• Policy coverage, specifically endpoint IP/MAC
addresses (network zones), ports, and
enforcement schedule
Enforcement PolicyAntivirus product and pattern checking, malware
scans, vulnerability checks, and registry checks
Network Virus PolicyPacket-level scanning for network viruses and other
malware
4-8
Page 92
TABLE 4-5.Policy sections
SECTIONDESCRIPTION
Policy Creation and Deployment
Network Application
Policy
Threat Mitigation
Rules
URL ExceptionsURLs that are always accessible to all endpoints,
Regulation of port activity, instant messaging, and file
transfers
Enforcement of detections from Threat Discovery
Appliance, which monitors for suspicious network
activity
including noncompliant endpoints
Creating a Policy
Network VirusWall Enforcer secures your network by checking network traffic and
endpoints based on predefined policies. This approach provides the flexibility of
implementing different assessment criteria for different devices as well as implementing
different actions when these criteria are violated. For more information about Network
VirusWall Enforcer policies, see Policy Enforcement Features on page 4-2.
Policy creation is done through a wizard in the web console. It involves the following
steps:
•Step 1: Specify Endpoint Settings on page 4-10
•Step 2: Specify Authentication and Network Zones on page 4-11
•Step 3: Specify Enforcement Policy on page 4-12
•Step 4: Specify Network Virus Policy on page 4-15
•Step 5: Specify Network Application Policy on page 4-15
•Step 6: Specify Threat Mitigation Rules on page 4-17
•Step 7: URL Exceptions on page 4-18
•Step 8: Review, Enable, and Save the Policy on page 4-18
Tip: For detailed information about a wizard screen, click the Help button while on that
screen. For important information about policy rules and priorities before you create a
policy, see Policy Enforcement Best Practices on page 4-6.
Step 1: Specify Endpoint Settings
1.Click Policy Enforcement > Policies. The Policies screen displays.
2.Click Add to to start the wizard.
3.Type a policy name. Comments are optional.
4.Select one of the options for agent deployment. See Agent Deployment Options on
page 1-9.
5.Specify the agent installation method by selecting one of the following:
•ActiveX—endpoint users must click a confirmation message to run ActiveX to
install TMAgent.
•Remote login, ActiveX—endpoint users do not need to click a confirmation
message when installing TMAgent using remote login. To use this feature, you
need to configure remote login accounts for accessing endpoint computers on
your network. If remote login does not complete successfully, the assessment
continues using ActiveX.
Note:Windows XP Home does not support remote login. For operating systems
that do not support remote login, use the ActiveX only deployment
method.
6.Specify preferences for non-Windows or unidentifiable operating systems. The
options are:
•Disable endpoint detection for non-Windows operating systems
•Disable endpoint detection for unidentifiable operating systems
7.Specify reassessment time intervals for compliant and noncompliant endpoints. Set
a shorter reassessment interval for noncompliant endpoints.
8.Click Next.
4-10
Page 94
Policy Creation and Deployment
Step 2: Specify Authentication and Network Zones
1.Specify optional authentication settings by selecting the Enable user
authentication. This option lets you select whether to apply the policy to
authenticated users or to guest users.
Note:Configure LDAP settings if you select Enable user authentication. See
Configuring LDAP Authentication Settings on page 3-2 for more information. If
you create one policy for authenticated users, create another policy that applies
to users that are not authenticated.
2.Specify Endpoint Network Zone settings. This option lets you select the endpoints
groups or network zones that need to be assessed against the policy. Click Add if
you need additional network zones. For information about adding network zones,
see Defining Network Zones on page 3-5.
3.Click Show Details to modify more specific settings.
a.Specify packet destination network zones. This option lets you apply the policy
to traffic headed for certain endpoints only.
b.Specify TCP/UDP protocol ports. This option lets you apply the policy to
traffic at certain ports only. You can specify up to 64 TCP or UDP ports.
c.Specify a schedule for the policy. The policy will only apply during the specified
Specify the services by selecting the checkbox next to the scan type:
1.Antivirus Product Scan—use this feature to scan for antivirus software on
endpoints.
a.Select Antivirus Product Scan.
b.Select the products to detect.
Note:To detect antivirus products using only protocol activity, select Only use
networking protocols to assess Trend Micro products. Selecting this option
will allow you to detect certain Trend Micro products without an agent.
c.Specify the Endpoint Action by selecting one of the following:
•Monitor endpoints—flag the endpoint as "noncompliant", but allow
endpoint traffic to pass.
•Block endpoints—you can select a remedy from None or Redirect to URL, which redirects endpoint users to a page where they may rectify
policy violations.
If you select Redirect to URL, you have the option of limiting the
number of pages endpoint users can navigate to by selecting Allow
off-page navigation and Link depth.
2.Antivirus Version Scan—use this feature to require endpoints to keep their
antivirus patterns updated.
a.Select Antivirus Version Scan.
4-12
b.Specify the acceptable pattern version by selecting one of the following:
•Require the latest virus pattern file—require the endpoint to keep the
virus pattern updated.
•Allow virus pattern files that are—you can specify whether to allow
patterns that are up to four versions old.
c.Specify the Endpoint Action by selecting one of the following:
•Monitor endpoints—flag the endpoint as "noncompliant", but allow
endpoint traffic to pass.
Page 96
Policy Creation and Deployment
•Block endpoints—you can select a remedy from None or Redirect to
URL, which redirects endpoint users to a page where they may rectify
policy violations.
If you select Redirect to URL, you have the option of limiting the
number of pages endpoint users can navigate to by selecting Allow
off-page navigation and Link depth.
3.System Threat Scan—use this feature to scan for system threats. This feature
does not scan files. Instead, it scans memory for threats.
Note:If you select persistent agent deployment and the system threat scan service, the
device may not check the endpoint more than once. However, if you select the
single-use agent deployment option, the device checks the endpoint during each
reassessment.
a.Select System Threat Scan.
b.Specify the Endpoint Action by selecting one of the following:
•Monitor endpoints—flag the endpoint as "noncompliant", but allow
endpoint traffic to pass.
•Block endpoints—you can select a remedy from None or Redirect to URL, which redirects endpoint users to a page where they may rectify
policy violations.
If you select Redirect to URL, you have the option of limiting the
number of pages endpoint users can navigate to by selecting Allow
off-page navigation and Link depth.
4.Vulnerability Scan—use this feature to scan for known vulnerabilities. You need
to manually select new vulnerabilities in the vulnerability list when the vulnerability
list updates.
a.Select Vulnerability Scan.
b.Select the type of vulnerabilities to scan. Click on the vulnerability risk rating to
select individual vulnerabilities. For more information about vulnerability risk
ratings, see Vulnerabilities on page 1-11.
c.Specify the Endpoint Action by selecting one of the following:
•Monitor endpoints—flag the endpoint as "noncompliant", but allow
endpoint traffic to pass.
•Block endpoints—you can select a remedy from None or Redirect to URL, which redirects endpoint users to a page where they may rectify
policy violations.
If you select Redirect to URL, you have the option of limiting the
number of pages endpoint users can navigate to by selecting Allow
off-page navigation and Link depth.
5.Registry Scan—use this feature to scan for required and prohibited software by
using registry key information.
a.Select Registry Scan.
b.Click Add. The Check Registry For screen displays.
c.Type the Display Name.
d.Specify if this is a Required registry key or a Prohibited registry key.
e.Type t he Registry Key.
f.Under Registry key value, specify the following optional criteria:
•Name—specify the value name.
•Type/Data—specify the data type (String or DWord) and the actual
value of the data. If you do not specify a value name, you will be limited to
string data types.
g.Click OK. The window closes and the registry key displays in the list.
h.Specify the Endpoint Action by selecting one of the following:
•Monitor endpoints—flag the endpoint as "noncompliant", but allow
endpoint traffic to pass.
•Block endpoints—you can select a Remedy from None or Redirect to URL to a URL where the endpoint may rectify the violation.
If you select Redirect to URL, you have the option of limiting the
number of pages the endpoint can navigate by selecting Allow off-page
navigation and Link depth.
6.Select Send policy violation data to syslog to record related events to logs.
4-14
Page 98
Policy Creation and Deployment
7.Select Notify endpoints about policy violations to display popup messages on
endpoints that violate this section of the policy.
8.Click Next.
Step 4: Specify Network Virus Policy
1.Select the Enable Network Virus Scan to detect network viruses in packets that
pass through the device.
2.Specify the action to perform when a network virus is detected by selecting one of
the following:
•Monitor endpoints—flag the endpoint as "noncompliant", but allow endpoint
traffic to pass.
•Drop packets—drop the packet.
•Quarantine endpoints—blocks the endpoint from accessing the network
until it is released through the console.
3.Specify the Remedy by selecting one of the following:
•None
•Clean up—remove components of the detected malware from the endpoint.
4.Select Send policy violation data to syslog to record related events to logs.
5.Select Notify endpoints about policy violations to display popup messages on
endpoints that violate this section of the policy.
6.Click Next.
Step 5: Specify Network Application Policy
Specify the service by selecting the check box next to the scan to perform:
1.Application protocol detection—select this option to regulate activity on certain
TCP and UDP ports. Select ICMP to regulate ICMP activity.
a.Select the Application Protocol Detection.
b.Under TCP port, type the TCP ports or port ranges to scan.
c.Under UDP port, type the UDP ports or port ranges to scan.
Note:To use ICMP, ensure you select All ports in the TCP/UDP Protocol
Ports settings in
4-11.
Step 2: Specify Authentication and Network Zones on page
e.Specify an Endpoint Action by selecting one of the following:
•Monitor endpoints—flag the endpoint as "noncompliant", but allow
endpoint traffic to pass.
•Reject packets—return a reset packet (RST) to inform the source
endpoint that the connection has been broken.
•Drop packets—close the connection to prevent the packets from passing.
2.Instant messaging detection—use this feature to regulate instant messenger
activity.
a.Select Instant messaging detection.
b.Select the instant messaging software to regulate:
•MSN—select to check MSN or Windows Live Messenger traffic. You can
regulate only file transfer activity or all activities.
•Yaho o—select to check Yahoo! Messenger traffic. You can regulate only
file transfer activity or all activities.
•ICQ/AIM—select to check ICQ or AOL Instant Messenger (AIM)
traffic. You can regulate only file transfer activity or all activities.
•IRC—select to regulate all Internet Relay Chat (IRC) activity
c.Specify an Endpoint Action by selecting one of the following:
4-16
•Monitor endpoints—flag the endpoint as "noncompliant", but allow
endpoint traffic to pass.
•Reject packets—return a reset packet (RST) to inform the source
endpoint that the connection has been broken.
•Drop packets—close the connection to prevent the packets from passing.
Page 100
Policy Creation and Deployment
3.File transfer detection—use this feature to regulate file transfer activity.
WARNING! Avoid overly broad wildcard entries such as *.* or *.htm for the files
to assess. These entries can completely block access to the Internet.
a.Select File transfer detection.
b.Select the types of file transfer activities to assess:
•Windows file transfer—select this option to assess CIFS and Samba
protocol file transfers. Most of these file transfers occur when files are
copied to and from shared folders.
•HTTP file transfer—select this option to assess HTTP file transfers.
•FTP file transfer—select this option to assess FTP file transfers.
c.Type the files to check under Files to assess and the files to allow under
Exception.
d.Specify an Endpoint Action by selecting one of the following:
•Monitor endpoints—flag the endpoint as "noncompliant", but allow
endpoint traffic to pass.
•Reject packets—return a reset packet (RST) to inform the source
endpoint that the connection has been broken.
4.Select Allow Control Manager to modify Network Application Policy settings
when an outbreak occurs if you use a Control Manager server to manage Trend
Micro products. The device temporarily enforces the Outbreak Prevention Policy
during an outbreak and reverts to this policy afterwards.
5.Select Send policy violation data to syslog to record events to logs.
6.Click Next.
Step 6: Specify Threat Mitigation Rules
1.Select Enable Threat Mitigation to enforce Threat Discovery Appliance (TDA)
detections. TDA analyzes network activity to identify endpoints that may be
infected with malware.
2.Select the action to apply on endpoints exhibiting suspicious network activity:
4-17
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.