IMSS70 UNIX Administrator Guide
IMSS70 UNIX Administrator Guide
Administrator’s Guide
ms
Messaging Security
Trend Micro Incorporated reserves the right to make changes to this document and to
the products described herein without notice. Before installing and using the
software, please review the readme files, release notes and the latest version of the
Getting Started Guide, which are available from Trend Micro’s Web site at:
www.trendmicro.com/download/documentation/
NOTE: A license to the Trend Micro Software usually includes the right to minor
product updates, pattern file updates, and basic technical support for one (1) year
from the date of purchase only. Maintenance must be renewed on an annual basis at
Trend Micro’s then-current Maintenance fees.
Trend Micro, the Trend Micro logo, InterScan Messaging Security Suite, and
Control Manager are trademarks or registered trademarks of Trend Micro,
Incorporated. All other product or company names may be trademarks or registered
trademarks of their owners.
Patents Pending
The Administrator’s Guide for Trend Micro InterScan Messaging Security Suite 7.0
(IMSS) is intended to provide you with instructions on how to configure and
administer IMSS to ensure that your network is well-protected against various
malware. You should read through this document after installing IMSS. For
instructions on deploying and installing IMSS, please refer to the IMSS Installation
Guide.
www.trendmicro.com/download/documentation/rating.asp
Contents
Preface
InterScan Messaging Security Suite 7.0 Documentation ..................... vi
Audience .............................................................................................. vi
Document Conventions ....................................................................... vii
i
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
ii
Rolling Back a Component Update ............................................. 2-57
Configuring Scheduled Update .................................................... 2-57
Configuring Log Settings ................................................................. 2-59
iii
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
Index
iv
Preface
Preface
Welcome to the Trend Micro™ InterScan™ Messaging Security Suite 7.0
Administrator’s Guide. This manual contains post-installation information to get
InterScan Messaging Security Suite (IMSS) up and running. Please refer to the
Online Help in the Web management console for detailed information on each field
on the user interface.
This preface discusses the following topics:
• InterScan Messaging Security Suite 7.0 Documentation on page vi
• Audience on page vi
• Document Conventions on page vii
v
Trend Micro™ InterScan Messaging Security Suite 7.0 Administrator’s Guide
Audience
The InterScan Messaging Security Suite documentation is written for IT managers
and email administrators in medium and large enterprises. The documentation
assumes that the reader has in-depth knowledge of email messaging networks,
including details related to the following:
• SMTP and POP3 protocols
• Message transfer agents (MTAs), such as Postfix
• LDAP
• Database management
The documentation does not assume the reader has any knowledge of antivirus or
anti-spam technology.
vi
Preface
Document Conventions
To help you locate and interpret information easily, the IMSS documentation uses the
following conventions.
CONVENTION DESCRIPTION
ALL CAPITALS Acronyms, abbreviations, and names of certain
commands and keys on the keyboard
Configuration notes
Note:
Recommendations
Tip:
vii
Trend Micro™ InterScan Messaging Security Suite 7.0 Administrator’s Guide
viii
Chapter 1
Getting Started
This chapter explains how to logon to the Web management console and provides
instructions on what to do immediately after installation to get IMSS 7.0 up and
running.
Topics include:
• Opening the IMSS Web Management Console on page 1-2
• Viewing the Web Management Console Using Secure Socket Layer on page 1-3
• Performing Basic Configuration with the Configuration Wizard on page 1-4
• IMSS Services on page 1-12
• Opening the End-User Quarantine Console on page 1-14
1-1
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
Note: If you are using Internet Explorer (IE) 7.0 to access the Web management console,
IE will block the access and display a popup dialog box indicating that the
certificate was issued from a different Web address. Simply ignore this message
and click Continue to this Web site to proceed.
1-2
Getting Started
1-3
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
1-4
Getting Started
2. Configure the following notification settings, which IMSS will use for all default
system and policy event notifications:
• Email Settings—Type the sender and receiver addresses, the name of the
server that IMSS delivers mail to, the SMTP server port, the language
character set, and any additional headers or footers to add to the message.
1-5
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
• SNMP Trap—If you have an SNMP server on your network, type the server
name and the community name.
2. Configure the following update settings, which will determine from where IMSS
will receive its component updates and through which proxy (if any) IMSS needs
to connect to access the Internet:
• Source—Click Trend Micro ActiveUpdate (AU) server to receive updates
directly from Trend Micro. Alternatively, click Other Internet source and
type the URL of the update source that will check the Trend Micro AU
server for updates. You can specify an update source of your choice or type
the URL of your Control Manager server, if applicable.
• Proxy Settings—Select the Use proxy server check box and configure the
proxy type, server name, port, user name, and passwords.
1-6
Getting Started
1-7
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
LDAP Admin
LDAP Account Base Distinguished Authentication
Server Name (examples) Method
(examples)
Note: Specify LDAP settings only if you will use LDAP for user-group definition,
administrator privileges, or Web quarantine authentication. You must enable
LDAP to use End-User Quarantine.
1-8
Getting Started
1-9
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
1-10
Getting Started
2. Type the Activation Codes for the products you want to activate. If you do not
have an Activation Code, click Register Online and follow the directions at the
Trend Micro Registration Web site.
1-11
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
IMSS Services
The scanner and policy services must be started in order to start protecting your
network using IMSS. You can however, choose whether to install or start the EUQ
service.
• Scanner Services—Performs scanning of SMTP/POP3 traffic.
• Policy Services—Acts as a remote store of rules for the scanner services to
enhance rule lookups.
• EUQ Services—Hosts a Web-based console to enable end-users to view, delete
and release spam messages addressed to them.
For more information on these services, refer to the IMSS Installation Guide.
1-12
Getting Started
2. Under the Managed Server Settings section, click the Start or Stop buttons for
the service(s) that you would like to start or stop.
1-13
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
WARNING! To successfully access all Web consoles on secondary EUQ services, you must
synchronize the system time of all EUQ services on your network.
An alternative to using the IP address is to use the target server’s fully qualified
domain name (FQDN).
1-14
Chapter 2
2-1
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
IP Filtering Service
The IP Filtering service has two individual components: Network Reputation Service
and IP Profiler.
• Network Reputation Service filters spam senders at the connection layer.
• IP Profiler helps protect the mail server from attacks with smart profiles (SMTP)
Intrusion Detection Service (IDS).
Tip: Trend Micro recommends deploying IP Filtering as the first line of defense in your
messaging infrastructure.
Although most email messaging systems have a multi-layer structure that often
includes some pre-existing IP blocking, spam filtering, and virus filtering, Trend
Micro recommends completely removing other IP blocking techniques from the
messaging environment. IP Filtering should act as the precursor to any application
filtering you might use.
2-2
Configuring IMSS Settings
2-3
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
2-4
Configuring IMSS Settings
Configuring IP Filtering
To completely configure IP Filtering, perform the following steps:
Step 1: Enable NRS and IP Profiler
Step 2: Enable IP Profiler Rules
Step 3: Configure NRS
Step 4: Add IP Addresses to the Approved List
Step 5: Add IP Addresses to the Blocked List
2-5
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
2. Select the Enable IP Filtering check box. This will select both the NRS and IP
Profiler check boxes.
3. Clear the NRS or IP Profiler check box, if you do not require them.
4. Click Save.
Note: If you decide to disable IP filtering subsequently, please uninstall NRS and IP
Profiler manually. Disabling IP filtering from the Web management console merely
unregisters IP Profiler from IMSS but does not stop NRS and IP Profiler from
running. For more information on uninstalling NRS and IP Profiler, see
Uninstalling Network Reputation Services and IP Profiler section of the IMSS
Installation Guide.
2-6
Configuring IMSS Settings
2. Select the desired tab to configure the rule settings for that threat.
3. Select the Enable check box.
4. Specify the required parameters (consult the online help for details).
5. Click Save.
2-7
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
Note: The above SMTP error code and error string will be sent to the upstream
MTA that will then take the necessary preconfigured actions, such as
record the error code and error string in a log file.
4. Click Save.
2-8
Configuring IMSS Settings
2-9
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
2-10
Configuring IMSS Settings
3. Specify the search data (leave blank to show all data). IMSS performs an exact
match by default. Separate multiple conditions with a semicolon “;”.
4. Click Display Log to see the results.
2-11
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
2-12
Configuring IMSS Settings
2-13
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
2-14
Configuring IMSS Settings
2-15
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
2-16
Configuring IMSS Settings
2-17
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
5. Click OK.
6. Click Save.
2-18
Configuring IMSS Settings
2-19
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
To scan POP3 traffic, configure your email clients to connect to the IMSS server
POP3 proxy, which connects to POP3 servers to retrieve and scan messages.
You can set up the following connection types:
• Generic—Allows you to access different POP3 servers using the same port,
typically 110, the default port for POP3 traffic.
• Dedicated—Accesses the POP3 server using a specified port. Use these
connections when the POP3 server requires authentication using a secure logon,
such as APOP or NTLM.
Requirements
For IMSS to scan POP3 traffic, a firewall must be installed on the network and
configured to block POP3 requests from all the computers except IMSS on your
network. This configuration ensures that all POP3 traffic passes through the firewall
only to IMSS and that IMSS scans the POP3 data flow.
2-20
Configuring IMSS Settings
2-21
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
4. Click Save.
2-22
Configuring IMSS Settings
Managing Policies
IMSS policies are rules that are applied to incoming/outgoing email messages. Create
rules to enforce your organization’s antivirus and other security goals. This section
gives you an overview of how the policy manager enables you to manage IMSS
policies.
2-23
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
2-24
Configuring IMSS Settings
2-25
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
2-26
Configuring IMSS Settings
6. Click the Add button. The Add Address Group screen appears.
2-27
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
• Type an email address and click Add to add email addresses individually.
You can also use wildcard characters to specify the email address. For
example, *@hr.com.
• Click the Import button to import a text file containing a list of predefined
email addresses.
Note: IMSS 7.0 can only import email addresses from a text file. Ensure that the text
file contains only one email address per line. You can also use wildcard
characters to specify the email address. For example, *@hr.com.
8. Click Save.
2-28
Configuring IMSS Settings
2-29
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
6. Select the desired address group and click the Edit or Delete button accordingly.
2-30
Configuring IMSS Settings
5. Choose Search for LDAP users or groups from the drop-down list.
6. Type the LDAP user or group that you are looking for.
Note: 1. You can use the asterisk wildcard when performing a search. See Using
the Asterisk Wildcard on page 2-53.
2. You can also search for LDAP groups when adding internal addresses. For
more information, see Configuring Internal Addresses on page 2-32.
2-31
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
2-32
Configuring IMSS Settings
• Type an internal domain name and click the >> button to add the domain to
the list of internal addresses.
Note: You can also search for LDAP groups when adding internal addresses. For
more information, see Searching for an LDAP user or group on page 2-30.
• Click the Import from File button to import a list of internal domains from
a text file.
3. Click Save.
2-33
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
Adding Policies
Before creating a policy, ensure that you have configured the internal addresses. For
more information, see Configuring Internal Addresses on page 2-32.
Creating a policy involves four (4) steps:
Step 1: Specifying a Route
Step 2: Specifying Scanning Conditions
Step 3: Specifying Actions
Step 4: Specifying Priority
Tip: To prevent a virus leak and ensure that all messages are scanned, Trend Micro
recommends that you maintain at least one antivirus rule that applies to "all
messages". Select "all messages" from the drop-down list when specifying the
route for an antivirus rule.
Specifying a Route
To add a new policy:
1. Choose Policy > Policy List from the menu. The Policy List screen appears.
2. Click Add.
3. Select Antivirus or Other from the drop-down list.
2-34
Configuring IMSS Settings
Note: The Antivirus rule scans messages for viruses and other malware such as
spyware and worms.
The Other rule scans spam or phishing messages, message content, and other
attachment criteria.
5. Select the policy route type from the drop-down list next to This rule will apply
to.
• incoming messages
• outgoing messages
2-35
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
Note: 1. You can use the asterisk wildcard when specifying an email address. For
more information, see Using the Asterisk Wildcard on page 2-53.
2. If you you selected POP3, you cannot configure the route. The rule applies
to all routes.
3. If you selected “all messages” for an antivirus rule, the rule also applies to
messages from any sender to any recipient.
2-36
Configuring IMSS Settings
• Antivirus rule
• Files to Scan—Sets the default method for scanning messages and
specific file types containing viruses and other malware. Also uses
IntelliScan to identify malicious code that can be disguised by a
harmless extension name.
2-37
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
2-38
Configuring IMSS Settings
• Other rule
• Spam/phishing emails—Scans messages identified as spam and
phishing messages. Spam messages are generally unsolicited messages
2-39
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
Specifying Actions
To set the actions:
1. Click Next. The Step 3: Select Actions screen appears.
Note: The user interface that appears in this step depends on the type of rule that you are
creating. The antivirus rule contains two tabs that allow you to configure the main
actions and the actions for special viruses.
2. The main actions for both the Antivirus and Other rule are similar, although there
are minor differences in the options listed. Select the desired action(s) from the
following categories:
• Intercept—Allows you to choose whether you would like IMSS to intercept
the messages and prevent them from reaching the recipients. Choosing the
intercept option allows you to specify an action for IMSS to take on
intercepted messages.
• Modify—Instructs IMSS to make some alterations to the messages or the
attachments, such as inserting a stamp or tagging the subject.
• Monitor—Instructs IMSS to send a notification, archive or blind copy the
messages if you would like to further analyze them.
To specify actions for an Antivirus rule:
Specify the main actions or actions for special viruses by clicking the respective tabs.
2-40
Configuring IMSS Settings
1. Main Actions—Allows you to specify the default actions that IMSS takes when
messages match the scanning conditions specified in Step 2: Scanning
Conditions.
2. Special Viruses—Allows you to specify the actions that IMSS takes if the
messages match any of the following criteria. The actions specified on this screen
will override the default actions specified on the Main Actions tab.
2-41
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
Note: IMSS takes the default action for messages matching the Additional
Threats Scanning conditions if you do not select alternative actions.
Note: IMSS takes the default action for messages matching the IntelliTrap
conditions if you do not select alternative actions.
2-42
Configuring IMSS Settings
Specifying Priority
Setting the priority of a rule allows you to control the order in which IMSS matches
the messages against a list of policies that you have created.
To specify a priority:
1. Click Next. The Step 4: Name and Order screen appears.
2-43
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
2-44
Configuring IMSS Settings
Example 1
How do I create a rule to delete attachments with specific file names or
extensions and then stamp the affected incoming message with an explanation to
the recipients?
2-45
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
2-46
Configuring IMSS Settings
2-47
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
6. Click Add to create a new stamp. The New Stamp screen appears.
2-48
Configuring IMSS Settings
Example 2
How do I create a rule that quarantines messages containing specific keywords
in the subject or body and then apply this rule to all recipients except
administrators?
2-49
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
2-50
Configuring IMSS Settings
5. If the desired keywords are not available from the existing list, click Add to
create a new keyword list. The New Keyword Expression screen appears.
2-51
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
8. Type the desired keyword expression and click Save. The New Keyword
Expression screen re-appears.
9. Repeat steps 7 and 8 for additional keyword expressions.
10. After you have added all the required keyword expressions, click Save. The
Keyword Expressions screen re-appears with the newly created keyword list.
11. Select the new list and click >> to insert the list into the Selected box.
12. Click Save. The Step 2: Select Scanning Conditions screen re-appears.
13. To enable the Body Keyword Expression condition, select the check box next to
it.
14. Click Body Keyword Expression. The Keyword Expressions screen appears.
15. Select the new keyword list and click >> to insert the list into the Selected box.
16. Click Save. The Step 2: Select Scanning Conditions screen re-appears. Ensure
that both the Subject keyword and Body keyword expressions are selected.
2-52
Configuring IMSS Settings
2-53
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
but not in conjunction with a partial name or extension. The following are valid
examples:
• *.*—Valid representation of all files.
• *.extension—Valid representation of all files of a certain extension.
• name.*—Valid representation of files with a specific name but with any
extension.
The following are invalid examples:
• *name.*—Invalid representation of a name.
• name.*extension—Invalid representation of an extension.
2-54
Configuring IMSS Settings
2-55
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
4. Click Save.
2. To update all components, select the first check box on the column header next to
the Name field. Otherwise, to update specific component(s), select the check box
next to the desired component.
2-56
Configuring IMSS Settings
2-57
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
2-58
Configuring IMSS Settings
2-59
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
2-60
Chapter 3
3-1
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
Backing Up IMSS
After you have installed IMSS and configured the required settings, it is always
prudent to create backups of the settings so that you can restore IMSS quickly in the
event of a system failure.
You can choose to perform a full or minimal backup of IMSS as follows:
• Full—Backs up all IMSS local configuration and binary files stored in
/opt/trend and database-related files in /var/imss.
• Minimal—Backs up only IMSS configuration settings stored in
/opt/trend/imss/config.
Note: 1. The backup and restore instructions in this manual are targeted at the all-in-one
deployment of IMSS. In the case of distributed deployment, you need to backup
the following:
a. The database files or tables on the computer(s) where you installed the
databases.
b. The local binary and configuration files on every computer where you installed
IMSS components.
2. If you perform a minimal backup, you may need to install previous hotfixes,
patches, or service packs after restoring IMSS.
3-2
Backing Up, Restoring, and Replicating Settings
5. Start Postfix.
6. Start all IMSS-related processes:
• /opt/trend/imss/script/S99ADMINUI start
• /opt/trend/imss/script/S99IMSS start
• /opt/trend/imss/script/S99POLICY start
• /opt/trend/imss/script/S99MANAGER start
• /opt/trend/imss/script/S99CMAGENT start
• /opt/trend/imss/script/S99EUQ start
• /opt/trend/imss/script/S99SCHEDULED start
• /opt/trend/imss/script/S99FOXDNS start
To perform a minimal backup:
1. Stop all IMSS-related processes. For details, see To perform a full backup: on
page 3-2.
2. Stop Postfix.
3. Back up /opt/trend/imss/config folder.
4. Back up all database tables.
5. Start Postfix.
6. Start all IMSS-related processes. For details, see To perform a full backup: on
page 3-2.
3-3
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
Restoring IMSS
In the event of a system failure, you can restore IMSS depending on whether you
have performed a full or minimal backup previously.
To perform full restoration:
1. Install a new IMSS on one computer, ensuring that the IP address, database user
name and password are the same as original.
2. Stop all IMSS-related processes. For details, see To perform a full backup: on
page 3-2.
3. Stop Postfix.
4. Restore the folders /var/imss/ and /opt/trend/ using the previous backup.
5. Restore Postfix configuration files.
6. Start Postfix.
7. Start all IMSS-related processes. For details, see To perform a full backup: on
page 3-2.
To perform minimal restoration:
1. Install a new IMSS on one computer, ensuring that the IP address, database user
name and password are the same as original.
2. Stop all IMSS-related processes. For details, see To perform a full backup: on
page 3-2.
3. Stop Postfix.
4. Restore the /opt/trend/imss/config/ folder using the previous backup.
5. Restore Postfix configuration files.
6. Import the previous database table backup into the new database.
7. Start all IMSS-related processes. For details, see To perform a full backup: on
page 3-2.
3-4
Backing Up, Restoring, and Replicating Settings
Replicating Settings
If you have installed multiple IMSS scanners that do not share the same admin
database, you can use the Trend Micro Control Manager to replicate settings across
these scanners without having to configure each scanner separately. If the scanners
share the same admin database, it is not necessary to replicate settings.
Do the following if you intend to replicate settings using Control Manager:
Step1: Back up IMSS settings. For details, see Backing Up IMSS on page 3-2.
Step2: Enable the Control Manager agent.
Step3: Replicate settings from the Control Manager Web console.
3-5
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
3-6
Backing Up, Restoring, and Replicating Settings
5. Click Next.
6. Select the check box next to the target server.
3-7
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
3-8
Chapter 4
Maintaining IMSS
This chapter provides you with general instructions on the tasks that you need to
perform for the day-to-day maintenance of IMSS. For more information on each field
on the Web management console, please refer to the Online Help.
Topics include:
• Monitoring Your Network on page 4-2
• Logs on page 4-14
• Quarantine and Archive on page 4-16
• Event Notifications on page 4-24
• Managing Administrator Accounts on page 4-29
• Configuring Scanner and Policy Connections on page 4-32
4-1
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
Viewing Statistics
You can obtain up to the last seven days’ of statistics on the performances of IMSS
scanners and IP profilers. These statistics provide useful information to help you
better manage your IMSS policies and enhance the security of your network.
To view the statistics:
1. Choose Summary from the menu. The System tab appears by default.
2. Click the Statistics tab.
3. Select the desired last # days from the Show drop-down list.
Note: IMSS automatically updates these statistics in its database at a quarter past every
hour. You can click Refresh to update the screen, but any newly updated statistics
in the database will not display on the screen until IMSS has completed the next
hourly database update.
For example, if you click Refresh at 4pm, IMSS will only update the database at
the next hourly update at 4:15pm. Assuming IMSS takes 2 minutes to process your
request, you will only see the results at 4:17pm.
4-2
Maintaining IMSS
Note: 1. The values (in percentages) for the same type of threat shown in the chart and
table are computed differently.
2. In the table, the total number of messages matching each scanning condition or
IP filtering type consists of overlaps. For example, if a message matches more than
one scanning condition, such as spam and attachment, this message will be counted
twice, once in the total number for spam and a second time in the total number for
attachment. Values in the chart, however, do not include such overlaps.
4-3
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
Performance Overview
This section shows the total number of incoming and outgoing messages in your
network and their corresponding values measured as percentages of the total. The
total number includes messages blocked by the following components in ascending
order:
• IP Profiler
• NRS
• Scan engine
4-4
Maintaining IMSS
Scan Performance
This section shows a breakdown of the number of messages matching various types
of scanning conditions specified in the policy rules, and their corresponding values in
percentages.
• Chart
Value = Number of messages matching the specific scanning condition divided
by the number of messages matching all scanning conditions.
Example:
Percentage of spam messages: 71% = 66 / 93
• Table
Value = Number of messages matching the specific scanning condition divided
by the total number of messages processed.
Example:
Percentage of spam messages: 22% = 66 / 300
4-5
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
IP Filtering Performance
This section shows the number of connections blocked by the following:
• The four types of IP Filtering rules, namely, spam, virus, DHA attack, and
bounced mail
• IP addresses that you have manually entered
• NRS
Values in the chart and table are computed as follows:
Value = Number of messages matching the specific IP filtering rule divided by the
total number of messages blocked by IP Profiler and NRS.
Example:
Total number of messages blocked by IP Profiler and NRS = 360
Percentage of spam messages: 22% = 80 / 360
4-6
Maintaining IMSS
Generating Reports
Depending on your needs, you can choose to generate a one-time report on demand
or schedule a report to be run at specific intervals. IMSS offers you the flexibility of
specifying the content for each report and the option of viewing or saving the result
in HTML or CSV format.
Policy and traffic summary Shows the total number and size of incoming
and outgoing messages. Also shows the
number of messages matching specific
scanning conditions.
Virus and malicious code summary Shows a summary of the virus message count
by actions.
Sender IP address blocking summary Includes "IP Profiler Blocking Summary" and
"NRS Blocking Summary". The former shows a
summary of the total number of sender
connections that reached IP Profiler and are
blocked by the different IP Filtering rules. The
latter shows the total sender connections that
reached NRS and are blocked by NRS.
Top 10 traffic email addresses Shows the top 10 email addresses ranked by
the total sent and received message count.
Top 10 virus names Shows the top 10 virus names ranked by their
detected count.
Top 10 IP addresses for DHA attack Shows the top 10 IP addresses ranked by the
addresses blocked count for DHA attack.
Top 10 IP addresses for bounced Shows the top 10 IP addresses ranked by the
mail attack addresses blocked count for bounced mail attack.
Top 10 virus recipients and senders Shows the top 10 virus recipients and senders
ranked by their total received and sent virus
message count respectively.
4-7
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
Top 10 most frequently triggered rule Shows the top 10 rule names ranked by the
names number of messages that triggered each rule.
2. Click Add.
4-8
Maintaining IMSS
After the report generates, the hyperlinks HTML and CSV display in the report
table.
4-9
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
Note: Report generation occurs once every five minutes. This means that report
generation could require as much as five minutes in addition to the time required to
aggregate reporting data and make the necessary calculations.
4-10
Maintaining IMSS
2. Click the Settings link for one of the following report types:
• Daily reports
• Weekly reports
• Monthly reports
The Report Settings screen appears.
4-11
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
Note: When configuring monthly report settings, if you choose to generate the report
on the 29th, 30th, or 31st day, IMSS will generate the report on the last day of
the month for months with fewer days. For example, if you select 31, IMSS
will generate the report on the 28th (or 29th) in February, and on the 30th in
April, June, September, and November.
5. Specify the number for each type of report that you would like to retain. Click
Save.
6. Choose Reports > Scheduled Reports from the menu. The Scheduled Reports
screen appears.
7. After the report generates, you can click HTML or CSV to view the report.
4-12
Maintaining IMSS
4-13
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
Logs
Logs are a useful means of enabling you to monitor various types of events and
information flow within IMSS. They also serve as an important resource for
troubleshooting purposes.
To enable logs and benefit from the information, do the following:
Step 1: Configure the log settings. For details, see Configuring Log Settings on
page 2-59.
Step 2: Perform log query.
Querying Logs
You can perform queries on five types of events or information:
• Message tracking—Records message details such as the sender, recipient(s),
message size, and the final action that IMSS has taken. In the case of quarantined
messages, the query result will also indicate the name and type of the policy rule
that was triggered.
• System events—Tracks the time of system events such as user access,
modification of rules, registration of Control Manager agent and so on.
• Policy events—Provides details on the policy rules that were triggered, the
actions taken, and the message details.
• MTA logs—Provides connection details of Postfix on the local computer where
the central controller is installed.
• IP Filtering—Provides the time when IMSS started and stopped blocking email
messages from the queried IP address.
For most log queries, IMSS supports wildcards (*) and exact matches (for example,
to view mail recipients whose name includes A or B, set the recipient(s) to
“*A*;*B*”). IMSS uses exact matching by default. Leaving the search condition
blank displays all logs. For multiple-conditions items, use semicolons (;) to separate
the entries for recipient(s) and attachment(s).
To query logs:
1. Choose Logs > Query from the menu. The Log Query screen displays.
2. Select the type of logs to query from the Type drop-down list.
4-14
Maintaining IMSS
4-15
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
Note: In order to use End-User Quarantine, you must first configure the LDAP settings.
For more information, see Step 3: Configuring the LDAP Settings on page 1-7.
4-16
Maintaining IMSS
4-17
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
4. Click on the timestamp hyperlink for a result item. The item details display in the
Quarantine Query screen.
4-18
Maintaining IMSS
5. Click Release or Delete to release or delete the email from the quarantine
respectively.
6. To query archived messages, click on the Archive tab on the Quarantine &
Archive screen, then specify the search criteria accordingly.
4-19
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
4-20
Maintaining IMSS
4-21
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
Note: If you do not run the euqtrans script after adding the new EUQ Database, some
previously quarantined mail messages may not be available to the end-users.
4-22
Maintaining IMSS
4-23
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
Event Notifications
You can configure IMSS to send an email or SNMP notification to you or specific
email users upon the occurrence of the following categories of event:
• System Status—Informs you when certain IMSS performances fall below the
desired level. For example, when a scanner service stops working, or when the
number of messages in the delivery queue exceeds the desired quantity.
• Scheduled Update Event—Alerts you when IMSS is able or unable to perform
a scheduled update of the scan engine or pattern files from the update source onto
the admin database.
• Scanner Update Result—Alerts you when IMSS is unable to update the engine
or pattern files on any scanner.
4-24
Maintaining IMSS
4-25
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
4-26
Maintaining IMSS
4-27
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
4-28
Maintaining IMSS
o
3. Provide the required information on the Authentication tab.
4. Click the Permissions tab. The Permissions screen appears.
4-29
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
5. Select the desired permissions to the various access areas of the Web
management console.
6. Click Save.
Note: 1. Only the default IMSS administrator account can add new administrator
accounts. Delegate administrator accounts cannot do so even if you assign full
permission to the Administration area.
2. Delegate administrator accounts with full administration rights can only change
their own IMSS passwords. If you forget the default administrator account
password, please contact Trend Micro’s technical support to reset the password.
4-30
Maintaining IMSS
Note: You can only delete the delegate administrator account but not the default
IMSS administrator account.
4-31
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
4-32
Chapter 5
5-1
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
Troubleshooting
Table 5-1 shows common troubleshooting issues you might encounter with the
configuration and administration of IMSS. Read through the solutions below. If you
have additional problems, check the Trend Micro Knowledge Base.
For troubleshooting and FAQ information pertaining to IMSS deployment, refer to
the IMSS Installation Guide.
General
Unable to access the The target port is not in the firewall approved list. Open the ports as
Web console or other shown in Table 5-2 on page 5-8 in the firewall.
components. If you are unable to access the Web console, do the following:
1. Start the database process, dbctl.sh, before starting the
Central Controller process, S99ADMINUI.
2. If you are still unable to access the Web console, restart the
Central Controller process, S99ADMINUI.
For more details, refer to Invoking IMSS Scripts on page A-2.
No access to the Web The Web console URL is not a trusted site in Internet Explorer. Add
console the URL to the trusted sites.
The imssps daemon If the imssps daemon is running, the policy service is working.
is running but Check the connection between the policy service and scanner
refusing connections. service and verify your LDAP settings.
Unable to activate If a proxy server is on your network, verify your proxy settings.
products
(Antivirus/eManager, To activate NRS, IMSS needs to connect to Trend Micro. This
SPS, NRS, IP process requires a DNS query. Therefore, if a DNS server is not
Filtering) or update available or has connection problems, activation will fail.
components Verify your DNS server settings.
5-2
Troubleshooting, FAQ, and Support
Email notifications do If your computer is running a non-English operating system and the
not display properly. notification message was not written in English, it may appear
distorted. Modify the character set through the Web console.
To modify the character set:
1. On the Web console menu, choose Administration >
Notifications > Delivery Settings.
2. Next to Preferred Charset, select the language in which the
messages will be encoded.
Cannot query IMSS scanner records the log with local time. To query message
message logs in logs, synchronize the date/time for all machines with IMSS.
IMSS.
Server displays as A managed server could become disconnected for any of the
disconnected in the following reasons:
Summary screen. • The scanner was removed from your network.
• The IMSS manager service has stopped.
• Network connection issue.
Check your firewall settings for the Manager Service listening port.
Click Administration > IMSS Configuration > Connections >
Components > IMSS Manager Port.
When viewing IMSS records attachment information only when the triggered rule is
detailed information for an attachment.
for quarantined or Please check the reason why IMSS quarantined the email.
archived email,
attachment
information is
sometimes not
available.
IMSS does not 1. Check if the IMSS scanner service is running.
receive email. 2. Check if a different application is using the required port. Free
up port 25.
Services are not The database has not been started or the database was started
running normally. after the IMSS services started. Restart all IMSS services.
5-3
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
5-4
Troubleshooting, FAQ, and Support
The EUQ Web digest Verify that the correct character set is selected:
does not display 1. Choose Administration > Notifications > Delivery Settings.
quarantined email
2. Next to Preferred charset, choose the character set that will
information correctly
properly display the digest information.
5-5
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
Some quarantined The EUQ Web console can only access email that IMSS identifies
email messages are as spam or phishing attempts.
not appearing on the From the EUQ Web console, you cannot view quarantined email
EUQ Web console that violated other rules, such as the antivirus rule.
Cannot enable LDAP Kerberos protocol requires time synchronization between the
with Kerberos Kerberos server and IMSS.
authentication.
Synchronize the date/time for all computers with IMSS.
IP Filtering Issues
FoxProxy cannot start There are several reasons why FoxProxy might not start. To find out
up the reason, view the IP Profiler logs.
To view IP Profiler logs:
1. Go to the directory where IP Profiler is installed (by default:
/opt/trend).
2. Open foxproxy.ini.
3. Change the value for log_level to 4.
4. Restart FoxProxy by typing the following:
/opt/trend/ipprofiler/script/foxproxyd restart
5. Open the log file by typing the following:
/opt/trend/ipprofiler/logs/foxproxy-general.****
Unable to connect to Verify that FoxProxy is running and that it is binding on port 25.
FoxProxy
5-6
Troubleshooting, FAQ, and Support
No IP Profiler log The following IP Profiler-related log files are in the IMSS admin
information exists database:
• foxmsg.****
• foxnullmsg.****
• foxreport.****
Verify that the log files exist:
1. Go to the log directory on the where IMSS is installed (by
default: /opt/trend/imss/log/).
2. If the files are not present, use the following command to check
if imssmgr is running:
ps –ef | grep imssmgr
3. Check if FoxProxy is running:
ps –ef |grep foxproxy
4. Verify that IP Profiler is enabled. In table
‘t_foxhuntersetting’, the following should exist:
record: ‘Type’ = 1 and ’enable’ = TRUE
NRS does not work NRS may not work due to the following reasons:
after being enabled • Spam Prevention Solution (SPS) was not activated. NRS
from the Web
shares the same AC code with SPS. If SPS has not been
console.
activated, please activate SPS and then activate NRS.
• The computer on which the scanning service is installed cannot
access the Internet. MTA cannot get a response for the DNS
query for AC validation. Please confirm that the computer where
the scanner service is installed has access to the Internet.
Please activate SPS and confirm that the computer with SPS
installed can access the Internet.
The MTA settings on By default, the settings on the SMTP routing screen cannot be
the SMTP Routing written to Postfix. Enable this function using the following steps:
Web console screen Go to the IMSS configuration directory (by default:
are not being written /opt/trend/imss/config).
into the Postfix Open the IMSS configuration file imss.ini
configuration files Change the value for enable_postset_thd to yes or leave the
value empty.
Restart IMSS manager using the following command:
/opt/trend/imss/script/S99MANAGER restart
5-7
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
IP profiler does not The changes required about one (1) minute to take effect.
block IP addresses in Please wait one (1) minute.
the Blocked List.
Blocked IP address The Overview page displays the top 10 blocked IP addresses by
does not display in type for the last 24 complete hours. For example, at 16:12 today the
the Overview page Overview page displays data from 16:00 yesterday to 16:00 today.
Please view the Overview page after an hour.
MTA 25 SMTP
Policy
Server 5060 SOAP listen port
5-8
Troubleshooting, FAQ, and Support
How can I change my MTA settings without using the Web console?
You can modify the IMSS configuration file and add the following key.
1. Open imss.ini.
2. Make the following modification:
detach_key_postfix=smtpd_use_tls:queue_directory:{Parameter1:{P
arameter2}:…::{Parameter n}
The parameters above will not be overwritten by any settings that you configure
through the Web console. You can modify main.cf manually.
IMSS Components
Can I move the Central Controller from one computer to another?
5-9
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
Yes. First, run the IMSS installation script to uninstall the Central Controller
from the computer. Next, run the IMSS installation script and install the Central
Controller on the other computer.
How can I set up and maintain the database?
The following commands can help you maintain the database:
• pg_dump imss > YYMMDD.HHMMSS.backup—Back up the database.
• psql imss < YYMMDD.HHMMSS.backup—Retrieve the latest data if errors
occur.
• vacuum—Clean up the database on tables that are frequently accessed or on
tables that have large amounts of data. Use when email traffic is low or when
the device is not connected to your network.
• vacuumfull—Clean up the entire database when the database is not being
heavily utilized or when the device is not connected to your network.
• redirect_stderr= and log_rotate_***= Turn on these options in
postgresql.conf to redirect old database log entries to the system log,
which is rotatable. You can name the log-file to start with a dash “-”.
You can also delete some IP-Filtering and log data using SQL and modify the
logs settings on the Logs > Settings screen.
Is IMSS policy service able to work if LDAP is down?
Yes, the policy service still works even if the LDAP server is down.
Following are three scenarios of such a situation.
• IMSS continues to work as usual.
• If the LDAP server is active but the port of the LDAP server is
inaccessible.
• If the policy server has the non-expired cache of the LDAP user or
group.
• The policy server will bypass the LDAP-related rules and continue to
process other rules.
• If the LDAP server is active, but the port of the LDAP server is
inaccessible.
• If the policy server has no valid cache for the rule.
5-10
Troubleshooting, FAQ, and Support
• IMSS will spend about one minute to perform each rule query. This may
slow down the message scanning and result in long mail queues.
• If the LDAP server is down.
• If the policy server has no valid cache for the rule.
Note: The imss_rbl_reply.user file may not exist. If it exists, please modify it.
Otherwise, you can omit it.
After installing NRS, you should see similar contents in the three configuration
files as follows:
• main.cf
smtpd_client_restrictions = reject_rbl_client
APRSJFK8BDTM2EEDBJY3LH5RJZ5CR9R.r.mail-abuse.com,reject_rbl_
client APRSJFK8BDTM2EEDBJY3LH5RJZ5CR9R.q.mail-abuse.com
• imss_rbl_reply
APRSJFK8BDTM2EEDBJY3LH5RJZ5CR9R.q.mail-abuse.com 450 Service
temporarily unavailable; $rbl_class [$rbl_what] blocked
using Trend Micro Network Reputation Service. Please see
http://www.mail-abuse.com/cgi-bin/lookup?ip_address=$rbl_wha
t${rbl_reason?; $rbl_reason}
5-11
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
Note: You do not need to type the dash ‘-’ for the AC.
After editing the configuration files, restart Postfix using the commands:
# postfix stop
# postfix start
IP Profiler
How can I purge the FoxProxy log?
A log purge program exists in the IP Profiler installation directory (by default:
/opt/trend/ipprofiler/bin/TmFoxPurgeLog).
The settings about log purge function are in the configuration file
foxproxy.ini. The keys are as follows:
• log_purge
• log_purge_unit
• log_purge_num
5-12
Troubleshooting, FAQ, and Support
Who will monitor FoxProxy’s status? Who will rescue it when it shuts down?
FoxProxy is a multiple-process program. The main process only monitors child
processes. If child processes are dead, the main process rescues them. But if the
main process is dead, the child processes cannot be rescued.
If you are experiencing any problems with FoxProxy, verify that the main
process is running.
How are DNS queries performed?
The DNS queries are performed directly by FoxProxy.
A DNS server is automatically installed on the Central Controller if the installer
does not detect any existing DNS server. When you install IP Profiler, the
installer will prompt you for the IP address of the Central Controller.
Why is the domain name of an IP address that was added to the
blocked/approved list always N/A?
IMSS does not determine the domain name of an IP address that was added to the
blocked/approved list (IMSS does resolve the IP address of an added domain
name).
Why does the IP Filtering Suspicious IP screen also display the connection
information of blocked IP addresses?
The IP Filtering > Suspicious IP screen shows all information for successful
connections. Therefore, although an IP address is now in the blocked list, the
previous connections for this IP address, which have not been blocked, are
shown.
How does IP Profiler process email?
The IP Filter decides if the source IP address is a safe IP address. IMSS scanner
service queries matched policies from the IMSS policy service. The policies are
applied to the email in the required order. If a policy specifies that an email
should be quarantined, deleted or delivered, then the action is taken and the
remaining policies are not applied.
Can the IP Profiler use an existing BIND server?
Yes. The IP profiler requires a BIND server. When a user installs IMSS, if a
BIND server is already present on the machine, the IP profiler will use this BIND
server. If a BIND server is not present, then IMSS installs a new BIND server.
5-13
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
How can I configure BIND version 9.x to make sure IP Profiler works well?
If you did not install BIND version 9.x during installation or migration, but you
want to use IP Profiler later, please do the following:
a. If an old BIND server exists, uninstall it on the target machine if the version
is lower than 9.x.
b. Run the command tar -xvf imss.tar to get the bind.tar file.
c. Copy bind.tar to a specified folder.
d. Run the command tar -xvf bind.tar to extract the file.
e. Type the cd command to change to the bind folder. Outside the folder, you
can view the following:
bash-2.03# pwd
/export/home/bob
bash-2.03# ls
bind bind.tar
f. Run the following commands:
chgrp -R imss bind
chown -R imss bind
chmod -R 555 bind
cp -f bind/named.conf /etc
cp -f bind/rndc.key /etc
mkdir -p /var/named
chmod 770 /var/named
g. If there is no named group or user, run the following command:
groupadd named
useradd -g named -s /bin/false -d /var/named named
h. Run the following commands to configure BIND server:
chown named:named /var/named
mkdir -p /var/run/named
chmod 770 /var/run/named
5-14
Troubleshooting, FAQ, and Support
5-15
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
WARNING! Trend Micro does not recommend that you disable the scanning for
notification mails as there is the risk of a security leak caused by
the policy settings.
End-User Quarantine
If I am using Kerberos, why are users unable to log on to the EUQ console with
a short name: “domain\user_name”?
Kerberos servers cannot accept user names in the format: Domain\user_name.
Kerberos requires the format user_name@domain.xxx
If I installed Exchange Server, and have set multiple mail addresses for each
user, how do I enable EUQ to check multiple mail addresses for one user?
If you installed one Exchange Server together with the Active Directory, you can
do the following:
a. Open the table tb_global_setting in IMSS administrator database and
replace the value of LDAP-->mail_attr from "mail" to "proxyAddresses".
5-16
Troubleshooting, FAQ, and Support
Tip: Trend Micro recommends using port 3268 for LDAP queries.
Active Directory uses port 389 for LDAP query. If one item cannot be queried in
one domain controller, it uses the LDAP referral mechanism to query another
domain controller. Use port 389 if your company has only one domain or if port
3268 is unavailable.
To use port 3268 for LDAP queries:
a. Click Administration >IMSS Configuration > Connections. The
Connections screen appears.
b. Click the LDAP tab.
c. Configure the LDAP listening port as 3268.
To use port 389 for LDAP queries:
5-17
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
Note: The logon name is not email address (though it appears as one).
5-18
Troubleshooting, FAQ, and Support
ActiveUpdate
How do I roll back a pattern file?
Click the Rollback button on the Summary page.
Others
What do I have to do to use SMTP over Transport Layer Security (TLS)?
Upload the certificate for TLS and enable it on the Administration > IMSS
Configuration > SMTP Routing screen.
IMSS 7.0 uses the Postfix TLS function. All settings are written to the
configuration file main.cf. For more information, see:
http://www.postfix.org/TLS_README.html
5-19
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
5-20
Troubleshooting, FAQ, and Support
5-21
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
Can IMSS 7.0 configure its own relay restrictions if a third-party upstream
server is not installed?
No. IMSS 7.0 cannot configure its own relay restrictions as it does not have its
own MTA on the Unix platform. You can only configure relay restrictions using a
third-party MTA.
How can I modify the Access Control List (ACL) for the IMSS scanner?
You can modify the following settings in imss.ini.
• Add the target IP address to the parameter smtp_allow_client_ip.
• Alternatively, disable ACL check by setting
open_to_all_connections=yes.
5-22
Troubleshooting, FAQ, and Support
• To ensure that other computers are able to connect to the scanner, insert the
target IP addresses in the parameter proxy_smtp_server_ip.
For more details, please refer to the comments in imss.ini.
Mails from some senders are always received as attachments. The mail body is
also replaced by the disclaimer or stamp. Why is that so?
When the charset of the stamp is different from the charset of the mail content,
IMSS will encounter issues inserting the stamp into the mail body after scanning
the mail. In this situation, IMSS will create a new mail, insert the stamp into the
mail body and attach the original message. The mail content, however, will not
be changed.
How can I specify a keyword expression to represent a blank header for
matching fields such as “from”, “to”, or “subject” when creating rules with
content filter?
If you are going to use a regular keyword expression to represent a blank header,
Trend Micro recommends that you use “^(\s)*$” (without the quotation marks).
The expression “^(\s)*$” (without the quotation marks) represents a blank
header or whitespace characters.
For example, if you want to check if a mail’s “from” header is blank, you can
edit a rule’s scanning condition as follows:
a. On the Web management console, click Policy>Policy List.
b. Click the link for an existing rule to edit the rule.
c. Click And scanning conditions match.
d. Click Header keyword expressions under the Content section.
e. Click Add to create a new keyword expression.
f. Add the content as “^(\s)*$” (without the quotation marks).
5-23
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
The contents of the Knowledge Base are updated continuously, and new solutions are
added daily. If you are unable to find an answer, however, you can describe the
problem in email and send it directly to a Trend Micro support engineer who will
investigate the issue and respond as soon as possible.
Contacting Support
Trend Micro provides technical support, virus pattern downloads, and program
updates for one year to all registered users, after which you must purchase renewal
maintenance. If you need help or just have a question, please feel free to contact us.
We also welcome your comments.
Trend Micro Incorporated provides worldwide support to all of our registered users.
Get a list of the worldwide support offices:
http://www.trendmicro.com/support
In the United States, you can reach the Trend Micro representatives via phone, fax, or
email:
Trend Micro, Inc.
10101 North De Anza Blvd.
Cupertino, CA 95014
Toll free: +1 (800) 228-5651 (sales)
Voice: +1 (408) 257-1500 (main)
Fax: +1 (408) 257-2003
Web address: www.trendmicro.com
Email address: support@trendmicro.com
5-24
Appendix A
IMSS Scripts
This appendix provides you with a list of IMSS scripts and their respective
parameters that you can invoke from the command line.
Topics include:
• Invoking IMSS Scripts on page A-2
A-1
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
A- 2
Scripts Parameters Descriptions
A-3
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
A- 4
Appendix B
B-1
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
B- 2
eManager, Virus and Program Logs
Many modules in IMSS write log information for troubleshooting purposes to the
following folder:
/opt/trend/imss/log
Temporary Folder
IMSS stores all application-generated temporary files in the temporary folder:
/opt/trend/imss/temp/
B-3
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
B- 4
Index
Index K
Knowledge Base 5-24
M
A
MTA
address groups
with NRS 2-3
examples of 2-25
AJP 5-8 N
APOP 2-21 NRS
audience vi Activation Code 2-2
Administration Console 2-4
B
basic configuration 1-4 MTA settings 2-3
using 2-2
C
commands A-2 O
Online Help vi
connections 2-14
contact support 5-24 P
D password
Documentation vi IMSS Web console default 1-2
permitted senders 2-17
domain-based delivery 2-17
POP3 listen port 5-8
E
EUQ R
Web console 1-14 Readme File vi
F S
FAQ scanning conditions 2-36
EUQ 5-16 setup wizard 1-4
SMTP routing 2-14
IMSS components 5-9
SOAP server 5-8
IP Profiler 5-12
Spam Prevention Solution (SPS)
postfix 5-9
Activation Code 2-2
TLS 5-19
SSL certificate 1-3
filters
support 5-24
examples of 2-25
T
I
transport layer 2-15
Install 1-1, 2-1, 3-1, 4-1
Trend Micro Knowledge Base 5-24
installing
troubleshooting 5-2
using SSL 1-3
activating products 5-2
I–1
Trend Micro™ InterScan™ Messaging Security Suite 7.0 Administrator’s Guide
I–2