Cisco Content Security and Control SSM Administrator Guide, 6.1.1587.0
Index

Table Of Contents

A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - R - S - T - U - V - W -

Index

A

activation     6-9, A-6

status     A-7

Activation Code     6-7, 6-9, A-7

ActiveUpdate     2-6

proxy settings     5-3

server     8-8

administrator

email address     6-2

maximum notifications/hour     6-2

notifications     A-6

password     8-4, A-4

approved senders     3-7

B

Base License     1-1, 1-11, A-6

blocked senders     3-7

C

Cisco ASDM/Trend Micro GUI access     2-6

Cisco TAC

contacting     8-33

clock setup     2-1

collecting logs     A-15

command line interface

installing via     A-1

components

manual update     5-2

scheduled update     5-2

updating     5-1

view version and build     A-9

component status     2-4

compressed file handling     3-2, 4-2

configuration

backup     6-3

export     6-4

import     6-4

reset via CLI     A-17

confirming the installation     A-7

connection settings     6-1

content filtering     3-7

enabling     3-8, 3-9

D

date/time settings     A-6

view     A-9

default mail scanning settings     3-1

defaults

restore factory     A-12

default values     1-8

default Web and FTP scanning settings     4-1

device

reimaging     A-1

disclaimer     3-6

displaying system information     A-13

DNS lookup     2-6

documentation     1-3

E

EICAR test virus     2-3

email notifications     3-4

Exiting the Setup Wizard     A-17

F

failover     6-5

checklist     6-5

notification when peer is down     6-6

synchronize with peer     6-6

false positive

troubleshooting     8-9

features and benefits of Trend Micro for Cisco CSC SSM     1-2

file blocking     4-4

by file name extension     4-5

by group type     4-4

G

glossary     1-4

grayware

defined     4-3

definition     3-3

detecting     3-3

H

HyperTerminal     A-2

I

incoming/outgoing SMTP mail     3-2

incoming domain     A-6

incoming mail domain     3-6

inline notifications     3-4

installation

confirmation     A-7

handling failure at stages of     8-3

steps     8-1

IP address

pinging     A-17

J

Joke Programs     8-15

K

Knowledge Base     1-4, 8-15

L

large file handling     4-2

large files     4-2, 8-11

license

activating the product     6-9

informational links     6-9

renewing the license     6-9

license expiration date     6-7

license feature table     1-12

local list     4-6

logging in without going through ASDM     8-13

logs     5-4

collecting     A-15

M

management console

default view     8-14

timeout     8-13

management port     2-6

access control     A-16

manual update     5-2

message filter     3-1

message filtering     3-6

message size     3-8

N

navigation panel     1-7

network settings     A-5

view or modify     A-8

notifications

content-filtering violations     3-8

file blocking     4-5

for SMTP/POP3 events     3-3

modifying     3-4

types of     3-4

using tokens in     3-4

O

online help     1-9

contents     1-10

context-sensitive     1-3

general help     1-3

index     1-10

links in     1-11

popup blocking     1-11

search feature     1-10

P

packet capture     8-6

packet traces

collecting     A-15

password     A-4

change     A-10

recovery     8-4

reset     A-10

Password-reset policy

modify     A-11

pattern file

troubleshooting     8-8

phishing

example of     4-6

Phishing Encyclopedia     8-15

PhishTrap     4-7

ping IP     A-16

Plus License     1-2, 1-11, A-7

popup blocking     1-11

product upgrade     6-6

proxy settings for ActiveUpdate     5-3

R

reimaging

CSC SSM     A-1

reimaging or recovery of CSC module     8-7

risk ratings     8-16

root account     A-13

S

Safe Computing Guide     8-16

Save button     1-8

Scams and Hoaxes     8-15

Scan by specified file extensions     4-2

scanning

testing with EICAR     2-3

verify it is operating     2-2

scheduled update     5-2

seats     6-7

Security Information Center     8-15

service status

restart     A-9

view     A-9

view or modify     A-9

setup wizard     1-2

exiting     A-17

SOCKS4     5-3

spam

troubleshooting     8-9

spam filtering

enabling in SMTP and POP3     3-6

spyware

detecting     3-3

Spyware/Grayware advisories     8-15

spyware/grayware detection

enabling for SMTP and POP3     3-3

stamp

spam identifier     8-8

valid characters     8-8

Status LED     2-5

flashing     8-13

synchronization

auto-synchronization feature     6-6

with peer     6-6

Syslog     2-6

syslog     5-3

enabling     5-3

viewing from ASDM     5-3

syslog entries     8-16

system information

view     A-13

T

tab behavior     1-7

terminal session     A-2

test files     8-16

tld     3-6

TLS, using     3-6

tooltips     1-9

TrendLabs     8-16

troubleshooting

activation     8-4

cannot create spam identifier     8-8

cannot log on     8-4

cannot update pattern file     8-8

CSC SSM throughput is less than ASA     8-14

delay in HTTP connection     8-6

downloading large files     8-11

false positives must be zero     8-9

FTP download does not work     8-7

installation     8-1

logging in without going through ASDM     8-13

management console timed out     8-13

recovering a lost password     8-4

restarting scanning service     8-12

spam not being detected     8-8

SSM cannot communicate with ASDM     8-13

Status LED flashing     8-13

summary status & log entries out of synch     8-5

too many false positives     8-9

too much spam     8-9

virus detected but not cleaned     8-9

virus scanning not working     8-9

website access slow or inaccessible     8-6

troubleshooting tools     A-12

U

upload settings

modify     A-16

URL blocking     4-6

via local list     4-6

via pattern file (PhishTrap)     4-7

URL filtering     4-8

categories     4-8

reclassify URL     4-9

rules     4-9

schedule work/leisure time     4-9

settings     4-8

URL rating lookups     2-6

URLs

Knowledge Base site     1-4, 8-15

Trend Micro Virus Submission Wizard site     8-9

Virus Information Center site     8-15

V

Virus Encyclopedia     8-15

Virus Map     8-15

Virus Primer     8-16

W

Webmail scanning     4-4

Webmaster tools     8-16

Weekly Virus Report     8-16

white papers (Trend Micro)     8-16

work/leisure time     4-9