Table Of Contents
A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - R - S - T - U - V - W -
Index
A
activation 6-17, B-6
status B-7
Activation Code 6-15, B-7
ActiveUpdate 2-7
proxy settings 5-3
server 8-8
administrator
e-mail address 6-2
maximum notifications/hour 6-2
notifications B-6
password 8-5, B-4
approved senders 3-9
B
Base License 1-2, 1-12, B-7
blocked senders 3-10
C
Cisco ASDM/Trend Micro GUI access 2-7
Cisco TAC
contacting 8-30
clock setup 2-1
collecting logs B-16
command line interface
installing via B-1
components
manual update 5-2
scheduled update 5-2
updating 5-1
view version and build B-9
component status 2-4
compressed file handling 3-2, 4-2
configuration
backup 6-11
export 6-12
import 6-12
reset via CLI B-18
confirming the installation B-8
connection settings 6-1
content filtering 3-10
enabling 3-10, 3-12
D
Damage Cleanup Services D-1
date/time settings B-6
view B-9
DCS D-1
default mail scanning settings 3-1
defaults
restore factory B-12
default values 1-9
default Web and FTP scanning settings 4-2
device
reimaging B-1
disclaimer 3-8
displaying system information B-14
DNS lookup 2-7
documentation 1-4
E
EICAR test virus 2-3
e-mail notifications 3-5
Email Reputation 3-11
Exiting the Setup Wizard B-18
F
failover 6-13
checklist 6-13
notification when peer is down 6-14
synchronize with peer 6-13
false positive
troubleshooting 8-9
features and benefits of Trend Micro for Cisco CSC SSM 1-2
file blocking 4-5
by file name extension 4-6
by group type 4-6
G
glossary 1-4
grayware
defined 4-4
detecting 3-4
H
HyperTerminal B-2
I
incoming/outgoing SMTP mail 3-2
incoming domain B-6
incoming mail domain 3-8
inline notifications 3-5
installation
confirmation B-8
handling failure at stages of 8-4
steps 8-1
IntelliScan 3-3
IntelliTrap 3-3
IP address
pinging B-17
J
Joke Programs 8-29
K
Knowledge Base 1-4, 8-29
L
large file handling 4-2
large files 4-3, 8-12
license
informational links 6-17
renewing the license 6-17
license expiration date 6-15
license feature table 1-12
local list 4-7
logging in without going through ASDM 8-14
logs 5-6
collecting B-16
M
management console
default view 8-15
timeout 8-14
management port 2-7
access control B-17
console access settings B-17
manual update 5-2
MARS D-12
message filter 3-1
message filtering 3-8
message size 3-10
N
navigation panel 1-7
network settings B-5
view or modify B-9
notifications
content-filtering violations 3-11
file blocking 4-6
for SMTP/POP3 events 3-5
modifying 3-6
types of 3-5
URL blocking 4-8
using tokens in 3-6
O
online help 1-10
contents 1-11
context-sensitive 1-4
general help 1-4
index 1-11
links in 1-11
popup blocking 1-11
search feature 1-11
P
packet capture 8-7
packet traces
collecting B-16
password B-4
change B-11
recovery 8-5
reset B-10
Password-reset policy
modify B-11
pattern file
troubleshooting 8-8
phishing
example of 4-7
Phishing Encyclopedia 8-29
ping IP B-17
Plus License 1-2, 1-12, B-7
popup blocking 1-11
product activation 6-17
product upgrade 6-14
proxy settings for ActiveUpdate 5-3
R
reimaging
CSC SSM B-1
reimaging or recovery of CSC module 8-8
risk ratings 8-30
root account B-13
S
Safe Computing Guide 8-30
Save button 1-9
Scams and Hoaxes 8-29
Scan by specified file extensions 4-2
scanning
testing with EICAR 2-3
verify it is operating 2-2
scheduled update 5-2
seats 6-15
Security Information Center 8-29
service status
restart B-10
view B-10
view or modify B-10
setup wizard 1-2
exiting B-18
SOCKS4 5-3
spam
troubleshooting 8-9
spam filtering
enabling in SMTP and POP3 3-9
spyware
detecting 3-4
Spyware/Grayware advisories 8-29
spyware/grayware detection
enabling for SMTP and POP3 3-4
stamp
spam identifier 8-9
valid characters 8-9
Status LED 2-6
flashing 8-14
synchronization
auto-synchronization feature 6-14
with peer 6-13
Syslog 2-7
syslog 5-4
enabling 5-4
server configuration 5-4
settings 5-4
viewing from ASDM 5-4
syslog messages
list A-1
system information
view B-14
T
tab behavior 1-8
terminal session B-2
test files 8-30
tld 3-8
TLS, using 3-9
tooltips 1-10
TrendLabs 8-30
troubleshooting
activation 8-4
Active Directory 8-21
AD/LDAP searching 8-26
cannot create spam identifier 8-9
cannot log on 8-5
cannot update pattern file 8-8
connectivity issues 8-25
CSC SSM throughput is less than ASA 8-15
delay in HTTP connection 8-6
diagnostic tools 8-16
Domain Controller Agent 8-16
Domain Controller Agent connectivity 8-22
Domain Controller Agent debugging 8-18
Domain Controller Agent installation 8-21
Domain Controller Agent issue solutions 8-23
Domain Controller Agent service 8-21
domain controller auto-detection 8-25
Domain Controller server 8-16
domain controller server connectivity 8-25
downloading large files 8-12
false positives must be zero 8-9
FTP download does not work 8-7
installation 8-1
logging in without going through ASDM 8-14
management console timed out 8-14
recovering a lost password 8-5
restarting scanning service 8-13
spam not being detected 8-8
SSM cannot communicate with ASDM 8-14
Status LED flashing 8-14
summary status and log entries out of sync 8-6
too many false positives 8-9
too much spam 8-9
user/group policy 8-16
user identification 8-21, 8-27
virus detected but not cleaned 8-10
virus scanning not working 8-10
Web site access slow or inaccessible 8-6
troubleshooting tools B-13
U
upload settings
modify B-16
URL blocking 4-7
via local list 4-7
URL filtering 4-9
categories 4-9
rules, exceptions, and time 4-15
URLfiltering 4-8
URL rating lookups 2-7
URLs
Knowledge Base site 1-4, 8-29
Trend Micro Virus Submission Wizard site 8-10
V
Virus Encyclopedia 8-29
Virus Map 8-29
Virus Primer 8-30
W
Webmail scanning 4-5
Webmaster tools 8-30
Weekly Virus Report 8-30
white papers (Trend Micro) 8-30
Windows updates 8-12