IDF 1-5-1206 Deployment Guide

 Documents

 4 views
of 53
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Description
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, review the readme files, release notes, and the latest version of the applicable user documentation, which are available from the Trend Micro Web site at: http://www.trendmicro.com/download Trend Micro, the Trend Micro t-ball logo, Intrusion Defense Firewall, OfficeScan, and TrendLabs are trademarks or registered trademarks
Share
Tags
Transcript
   Trend Micro Incorporated reserves the right to make changes to this document and tothe products described herein without notice. Before installing and using the software,review the readme files, release notes, and the latest version of the applicable userdocumentation, which are available from the Trend Micro Web site at: http://www.trendmicro.com/download  Trend Micro, the Trend Micro t-ball logo, Intrusion Defense Firewall, OfficeScan, and TrendLabs are trademarks or registered trademarks of Trend Micro, Incorporated. Allother product or company names may be trademarks or registered trademarks of theirowners.Copyright© 2011 Trend Micro Incorporated. All rights reserved.Release Date: September 2011Document part number: OSEM15026/110817   The Installation Guide for Trend Micro™ Intrusion Defense Firewall™ is intended tointroduce the main features of the software and installation instructions for yourproduction environment. You should read through it prior to installing or using thesoftware.Detailed information about how to use specific features within the software are availablein the online help file and the online Knowledge Base at Trend Micro’s Web site. Trend Micro is always seeking to improve its documentation. Your feedback is always welcome. Evaluate this documentation on the following site: http://www.trendmicro.com/download/documentation/rating.asp    iii Contents Preface  Audience ............................................................................................................viiiIntrusion Defense Firewall Documentation ..................................................ixDocument Conventions ....................................................................................x About Trend Micro ............................................................................................x Chapter 1: About Intrusion Defense Firewall Server Plug-in ..................................................................................................1-1Dashboard ...................................................................................................1-2Monitoring Tools .......................................................................................1-2List of Computers ......................................................................................1-2Security Profiles ..........................................................................................1-2Firewall Rules ..............................................................................................1-2DPI (Deep Packet Inspection) Rules ......................................................1-3Stateful Configurations .............................................................................1-3Reusable Components ...............................................................................1-3Location Awareness ...................................................................................1-4Bridging Attack Protection .......................................................................1-4Client Plug-in ...................................................................................................1-4System Requirements .....................................................................................1-4Server Plug-in .............................................................................................1-4Client Plug-in ..............................................................................................1-5 What's New in Intrusion Defense Firewall 1.5 ..........................................1-5Performance and Scalability .....................................................................1-5 Automatic Computer Activation and Protection ..................................1-6Expanded OfficeScan Corporate Edition (OSCE) Support ...............1-6
Related Search
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks