IWSVA 5.0 Guide
IWSVA 5.0 Guide
Virtual Appliance 5
Antivirus and Content Security at the Web Gateway
Administrator’s Guide
ws
Web Security
Trend Micro Incorporated reserves the right to make changes to this
document and to the products described herein without notice. Before
installing and using the software, please review the readme files, release
notes and the latest version of the Getting Started Guide, which are available
from Trend Micro’s Web site at:
http://www.trendmicro.com/download/documentation/
Trend Micro, the Trend Micro t-ball logo, InterScan, TrendLabs, Trend
Micro Control Manager, and Trend Micro Damage Cleanup Services are
trademarks or registered trademarks of Trend Micro, Incorporated. All other
product or company names may be trademarks or registered trademarks of
their owners.
Copyright© 1998-2009 Trend Micro Incorporated. All rights reserved. No
part of this publication may be reproduced, photocopied, stored in a retrieval
system, or transmitted without the express prior written consent of Trend
Micro Incorporated.
Release Date: April 2009
Protected by U.S. Patent No. 5,951,698
The Administrator’s Guide for Trend Micro is intended to provide in-depth
information about the main features of the software. You should read
through it prior to installing or using the software.
For technical support, please refer to the Technical Support and
Troubleshooting chapter for information and contact details. Detailed
information about how to use specific features within the software are
available in the online help file and online Knowledge Base at Trend
Micro’s Web site.
Trend Micro is always seeking to improve its documentation. If you have
questions, comments, or suggestions about this or any Trend Micro
documents, please contact us at [email protected]. Your feedback is
always welcome. Please evaluate this documentation on the following site:
http://www.trendmicro.com/download/documentation/rating.
asp
Contents
Contents
Preface
IWSVA Documentation ..................................................................... xvi
Audience ............................................................................................ xvi
Document Conventions ..................................................................... xvii
iii
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Chapter 2: Updates
Product Maintenance ..........................................................................2-2
Renewing Your Maintenance Agreement .....................................2-2
iv
Contents
v
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
vi
Contents
vii
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
viii
Contents
ix
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
x
Contents
xi
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
xii
Contents
xiii
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Glossary of Terms
Index
xiv
Preface
Preface
Welcome to the Trend Micro™ InterScan™ Web Security Virtual Appliance 5.0
Administrator’s Guide. This guide provides detailed information about the InterScan
Web Security Virtual Appliance (IWSVA) configuration options. Topics include how
to update your software to keep protection current against the latest risks, how to
configure and use policies to support your security objectives, configuring scanning,
configuring URL blocking and filtering, and using logs and reports.
This preface describes the following topics:
• IWSVA Documentation
• Audience
• Document Conventions
xv
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
IWSVA Documentation
In addition to the Trend Micro™ InterScan Web Security Virtual Appliance
Administrator’s Guide, the documentation set for IWSVA includes the following:
• Installation Guide—This guide helps you get “up and running” by introducing
IWSVA, assisting with installation planning, implementation, and configuration,
and describing the main post-upgrade configuration tasks. It also includes
instructions on testing your installation using a harmless test virus,
troubleshooting, and accessing Support.
• Online Help—The purpose of online help is to provide “how to’s” for the main
product tasks, usage advice, and field-specific information such as valid
parameter ranges and optimal values. Online Help is accessible from the IWSVA
Web console.
• Readme file—this file contains late-breaking product information that is not
found in the online or printed documentation. Topics include a description of new
features, installation tips, known issues and, release history.
The latest versions of the Installation Guide, Administrator’s Guide and readme
file are available in electronic form at:
http://www.trendmicro.com/download/
Audience
The IWSVA documentation is written for IT managers and system administrators
working in enterprise environments. The documentation assumes that the reader has
in-depth knowledge of networks schemas, including details related to the following:
xvi
Preface
Document Conventions
To help you locate and interpret information easily, the IWSVA documentation uses
the following conventions.
CONVENTION DESCRIPTION
Configuration notes
Note:
Recommendations
Tip:
xvii
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
xviii
Chapter 1
1-1
Trend Micro™ IWSVA Administrator’s Guide
protects HTTPS, HTTP, and FTP traffic in enterprise networks from viruses and
other risks.
In addition to antivirus scanning, IWSVA also helps with other network security
issues.
• Web Reputation scrutinizes URLs before you access potentially dangerous Web
sites, especially sites known to be phishing or pharming sites.
• URL filtering feature can allow, block, or monitor access to Web sites with
content prohibited by your organization.
• HTTPS decryption feature allows encrypted traffic to pass through IWSVA
scanning and filtering policies as “normal” HTTP traffic and verifies certificates
from HTTPS servers.
• Applets and ActiveX security helps to reduce the risk of malicious mobile code
by checking digital signatures at the HTTP(S) gateway, and monitoring applets
running on clients for prohibited operations. With Applets and ActiveX security
modules and URL Filtering now included in the IWSVA, these come at not extra
cost to you.
Hardware Specifications
For a complete description of IWSVA server requirements, see the Installation Guide.
Minimum Requirements:
• Single 2.0 GHz Intel ™ Core2Duo™ 64-bit processor supporting Intel™ VT™
or equivalent
• 2GB RAM
• 12GB of disk space. IWSVA automatically partitions the detected disk space as
required
• Monitor that supports 1024 x 768 resolution with 256 colors or higher
Recommended Requirements:
• Dual 2.8 GHz Intel ™ Core2Duo™ 64-bit processor or equivalent for up to 4000
users
• Dual 3.16 GHz Intel ™ QuadCore™ 64-bit processor or equivalent for up to
9500 users
• 4GB RAM is recommended to support up to 4000 users
1-2
Introducing InterScan Web Security Virtual Appliance
1-3
Trend Micro™ IWSVA Administrator’s Guide
What’s New
This section describes the new features in IWSVA.
HTTPs Decryption
IWSVA closes the HTTPs security loophole by decrypting and inspecting encrypted
content. You can define policies to decrypt HTTPs traffic from selected Web
categories. While decrypted, data is treated the same way as HTTP traffic to which
URL filtering and scanning rules can be applied.
Per-policy Exception
For granular control of policies, IWSVA allows approved URL and file name lists to
be defined on a per policy basis. In addition, IWSVA provides the option to bypass
virus scans and compressed file handling actions for the approved lists.
Custom Category
For flexible URL filtering, IWSVA allows the creation of new categories to satisfy
the need for more Web site categories than is provided by the URL Filtering module.
1-4
Introducing InterScan Web Security Virtual Appliance
1-5
Trend Micro™ IWSVA Administrator’s Guide
1-6
Introducing InterScan Web Security Virtual Appliance
Syslog Support
To provide enterprise-class logging capabilities, IWSVA allows sending logs using
the syslog protocol (default UDP port 514) to multiple external syslog servers in a
structured format.
1-7
Trend Micro™ IWSVA Administrator’s Guide
1-8
Introducing InterScan Web Security Virtual Appliance
Main Features
The following IWSVA features help you maintain HTTP and FTP gateway security.
FTP Scanning
In addition to scanning FTP uploads and downloads, IWSVA can block file types at
the FTP gateway. To prevent performance issues, the FTP scanning module supports
special configurations for compressed files and large files. Spyware and grayware
scanning is also supported.
IWSVA FTP scanning can be deployed onto your environment in conjunction with
another FTP proxy server, or IWSVA can act as its own FTP proxy. To help ensure
the security of InterScan Web Security Virtual Appliance, several security-related
configurations are available to control access to IWSVA and its ports.
1-9
Trend Micro™ IWSVA Administrator’s Guide
URL Filtering
With the URL Filtering option in IWSVA, you can set policies based on categories of
URLs, such as “Adult”, “Gambling,” and “Financial Services.” When a user requests
a URL, IWSVA first looks up the category for that URL and then allows, denies, or
monitors access to the URL based on the policies you have set up. You can also
define a list of approved URLs that will not be filtered.
1-10
Introducing InterScan Web Security Virtual Appliance
• Custom categories
• Computers/Bandwidth
• Computers/Harmful
• Computers/Communication
• Adult
• Business
• Social
• General
You can select all the categories of a specific group, or you can browse through the
categories that comprise a group and select only certain categories (see URL
Filtering Settings on page 7-8).
1-11
Trend Micro™ IWSVA Administrator’s Guide
Notifications
IWSVA can issue several types of notifications in response to program or security
events. Administrator notifications are sent through email to the designated
administrator contacts. User notifications are presented in the requesting client’s
browser. Both administrator and user notifications can be customized.
To work with network management tools, IWSVA can also issue several types of
notifications as SNMP traps. IWSVA sends traps for security risk detections, security
violations, program and pattern file updates, and service disruptions.
Because IntelliTrap is considered a type of security risk, it uses the same notifications
as HTTP Scanning.
PhishTrap
Trend Micro helps protect LAN users from inadvertently giving away sensitive
information as part of the of Internet fraud known as phishing. IWSVA protects you
from phishing threats with a two-prong solution: PhishTrap and Web Reputation
anti-phishing. From a remote database, Web Reputation retrieves the appropriate
URL rating for a requested URL and then determines if it is a phishing threat.
While Web Reputation determines phishing threats based on the reputation of the
requested URL, PhishTrap accomplishes this by using engine and pattern file
technology. PhishTrap looks for phishing threats based on the signature file.
Note: You can use PhishTrap with or without Web Reputation. If PhishTrap is used
without Web Reputation, you receive a basic level of protection. If PhishTrap is
used with Web Reputation enabled, you receive a "layered" protection. When both
features are enabled, the PhishTrap pattern match occurs before the Web
Reputation query on a remote database.
1-12
Introducing InterScan Web Security Virtual Appliance
Web Reputation
Web Reputation guards end-users against emerging Web threats. It can improve the
Web surfing experience by enhancing Web filtering performance. Because a Web
Reputation query returns URL category information (used by the optional URL Filter
module), IWSVA no longer uses a locally stored URL database.
Web Reputation also assigns reputation scores to URLs. For each accessed URL,
IWSVA queries Web Reputation for a reputation score and then takes the necessary
action, based on whether this score is below or above the user-specified sensitivity
level.
IWSVA enables you to provide feedback on infected URLs, which helps to improve
the Web Reputation database. This feedback includes product name and version,
URL, and virus name. (It does not include IP information, so all feedback is
anonymous and protects company information.) IWSVA also enables you to monitor
the effectiveness of Web Reputation without affecting existing Web-access policies.
Results are located in the URL Blocking Log and the Summary page (Security Risk
Report tab).
For more Web Reputation information, see Specifying Web Reputation Rules on
page 5-14 and Web Reputation Settings on page 5-15.
IntelliTrap
IntelliTrap™ detects potentially malicious code in real-time, compressed executable
files that arrive with HTTP data. Virus writers often attempt to circumvent virus
filtering by using different file compression schemes. IntelliTrap provides a heuristic
evaluation of compressed files that helps reduce the risk that a virus compressed
using these methods will enter a network through the Web.
1-13
Trend Micro™ IWSVA Administrator’s Guide
For more IntelliTrap information, see IntelliTrap Pattern and IntelliTrap Exception
Pattern Files on page 2-7 and About IntelliTrap on page 5-21.
IntelliTunnel
IWSVA uses IntelliTunnel™ technology to block undesirable instant messaging (IM)
and authentication connection protocols tunneled across port 80. It uses a dynamic,
updatable pattern file to distinguish normal browser traffic from other protocols
communicating over port 80.
For more information, see IntelliTunnel Security on page 5-34.
1-14
Introducing InterScan Web Security Virtual Appliance
Hard drive statistics are static and are only updated when you open the Summary
page.
• Bandwidth
• Concurrent Connections
• CPU Usage
• Physical Memory Usage
For more information, see Real-time Statistics on page 10-2.
Optionally, IWSVA can be configured to send information to Trend Micro’s
Advanced Reporting and Management (ARM) for InterScan Web Security products
for central logging, reporting, and policy management. ARM provides
high-performance reporting with many additional report types and advanced features
such as report drilldown, activity monitoring, dynamic dashboarding, and much
more.
1-15
Trend Micro™ IWSVA Administrator’s Guide
1-16
Introducing InterScan Web Security Virtual Appliance
• Reports (Real-time and Scheduled): Blocked pharming sites are reported in the
following reports because pharming activity is logged in the URL Blocking Log:
• Most blocked URLs
• Most blocked URLs by day of the week
• Most blocked URLs by hour
IWSVA reports IntelliTrap activity in the following areas:
• Summary Page: Scanning tab: Files detected by IntelliTrap are listed in the
“Scanning results for” with its frequency.
For more information, see Reports, Logs, and Notifications on page 10-1.
1-17
Trend Micro™ IWSVA Administrator’s Guide
Non-Cisco devices that support WCCP version 2 have not been explicitly tested by
Trend Micro. Therefore, interoperability cannot be guaranteed.
1-18
Chapter 2
Updates
Because new malicious programs and offensive Web sites are developed and
launched daily, it is imperative to keep your software updated with the latest pattern
files and engines, as listed on the Updates Schedule page on the InterScan Web
Security Virtual Appliance (IWSVA) Web console.
Topics in this chapter include the following:
• An explanation of Trend Micro’s ActiveUpdate feature
• How to update program components through the native IWSVA Web console or
through Trend Micro Control Manager
• Configuring proxy settings to enable Internet connectivity for updates
• An explanation of the program components that need to be updated
• Getting version information about components being used by IWSVA
• Invoking manual (on-demand) and scheduled updates
• Forcing a manual update
• Verifying a successful update
• Rolling back to previous versions of pattern files or the scan engine
• Applying controlled pattern releases
2-1
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Product Maintenance
From time to time, Trend Micro might release a patch for a reported known issue or
an upgrade that applies to your product. To find out whether there are any patches
available, visit the following URL:
http://www.trendmicro.com/download/
Clicking the link for IWSVA takes you to the Update Center page for IWSVA. Scroll
down to view the patches that are available.
Patches are dated. If you find a patch that you have not applied, open the readme
document to determine whether the patch applies to you. If so, follow the upgrade
instructions in the readme.
To view your Registration Profile, type the login ID and password created when you
first registered your product with Trend Micro (as a new customer), and click Login.
2-2
Updates
About ActiveUpdate
ActiveUpdate is a service common to many Trend Micro products. ActiveUpdate
connects to the Trend Micro Internet update server to enable downloads of the latest
pattern files and engines.
ActiveUpdate does not interrupt network services, or require you to reboot your
computers. Updates are available on a regularly scheduled interval that you
configure, or on demand.
Note: Trend Micro recommends hourly updates of the pattern files and daily and weekly
updates of engines.
2-3
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
2-4
Updates
Note: The IntelliTunnel feature is unrelated to the virus scanning facility and uses its
own scanning engine, which is not dynamically updatable.
• Anti-virus scan engine: This is the module that analyzes each file’s binary
patterns and compares them against the binary information in the pattern files. If
there is a match, the file is determined to be malicious.
• URL Filtering Engine: IWSVA utilizes the Trend Micro URL Filtering Engine
to perform URL categorization and reputation rating based on the data supplied
by the Trend Micro Web Reputation feature. Trend Micro recommends using the
default setting of a weekly update check to ensure that your installation has the
most current URL Filtering Engine.
There, you can find the current version, release date, and a list of the new virus
definitions included in the file.
How it Works
The scan engine works together with the virus pattern file to perform the first level of
detection, using a process called pattern matching. Because each virus contains a
unique binary “signature” or string of tell-tale characters that distinguishes it from
any other code, the virus experts at TrendLabs capture inert snippets of this code to
include in the pattern file. The engine then compares certain parts of each scanned
file to the data in the virus pattern file looking for a match.
2-5
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
where ### represents the pattern version (for example, 400). To distinguish a given
pattern file with the same pattern version and a different build number, and to
accommodate pattern versions greater than 999, the IWSVA Web console displays
the following format:
roll number.pattern version.build number (format: xxxxx.###.xx)
• roll number—This represents the number of rounds when the pattern version
exceeds 999 and could be up to five digits.
• pattern version—This is the same as the pattern extension of lpt$vpn.###
and contains three digits.
• build number—This represents the patch or special release number and
contains two digits.
If multiple pattern files exist in the same directory, only the one with the highest
number is used. Trend Micro publishes new virus pattern files on a regular basis
(typically several times per week), and recommends configuring a hourly automatic
update on the Updates > Schedule screen. Updates are available to all Trend Micro
customers with valid maintenance contracts.
Note: There is no need to delete the old pattern file or take any special steps to “install”
the new one.
2-6
Updates
result of the analysis indicates that the Web page contains malicious content, IWSVA
automatically decreases its reputation score and returns the revised score to the
reputation server.
The URL filtering page analysis pattern file is stored in the following directory:
/etc/iscan/Ctx#####.###
2-7
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
reduce the risk that a bot or any other malicious compressed file might cause to a
network.
IntelliTrap pattern tmblack.### and IntelliTrap exception pattern
tmwhite.### are saved in the /etc/iscan/ directory.
Scan Engine
At the heart of all Trend Micro antivirus products lies a proprietary scan engine.
Originally developed in response to the first computer viruses the world had seen, the
scan engine today is exceptionally sophisticated. It is capable of detecting Internet
worms, mass-mailers, Trojan horse risks, network exploits and other risks, as well as
viruses. The scan engine detects the following types of risks:
• “in the wild,” or actively circulating
• “in the zoo,” or controlled viruses that are not in circulation, but are developed
and used for research and “proof of concept”
In addition to having perhaps the longest history in the industry, the Trend Micro
scan engine has also proven in tests to be one of the fastest—whether checking a
single file, scanning 100,000 files on a desktop machine, or scanning email traffic at
the Internet gateway. Rather than scan every byte of every file, the engine and pattern
files work together to identify not only tell-tale characteristics of the virus code, but
the precise location within a file where the virus would hide. If a virus is detected, it
can be removed and the integrity of the file restored.
To help manage disk space, the scan engine includes an automatic clean-up routine
for old viruses, spyware, and IntelliTrap pattern files as well as incremental pattern
file updates to help minimize bandwidth usage.
In addition, the scan engine is able to decode all major internet encoding formats
(including MIME and BinHex). It also recognizes and scans common compression
formats, including Zip, Arj, and Cab. Most Trend Micro products also allow
administrators to determine how many layers of compression to scan (up to a
maximum of 20), for compressed files contained within a compressed file.
It is important that the scan engine remains current with the latest risks. Trend Micro
ensures this in two ways:
2-8
Updates
• Frequent updates to the scan engine’s data file, called the virus pattern file, which
can be downloaded and read by the engine without the need for any changes to
the engine code itself.
• Technological upgrades in the engine software prompted by a change in the
nature of virus risks, such as the rise in mixed risks like Italian Job.
In both cases, updates can be automatically scheduled, or an update can be initiated
on demand.
The Trend Micro scan engine is certified annually by international computer security
organizations, including the International Computer Security Association (ICSA).
2-9
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
The following are the information types the Web Reputation database can retrieve for
a requested URL:
• Web category
• Pharming and phishing flags used by anti-pharming and anti-phishing detection
• Web Reputation scores used to block URL access, based on a specified
sensitivity level (see Specifying Web Reputation Rules on page 5-14)
The Web Reputation database is updated with the latest categorization of Web pages.
If you believe the reputation of a URL is misclassified or you want to know the
reputation of a URL, please use the link below to notify Trend Micro:
http://reclassify.wrs.trendmicro.com/submit-files/wrsonlinequer
y.asp
Manual Updates
The effectiveness of IWSVA depends upon using the latest pattern and engine files.
Signature-based virus and spyware/grayware scanning works by comparing the
binary patterns of scanned files against binary patterns of known risks in the pattern
files. Trend Micro frequently releases new versions of the virus pattern and spyware
2-10
Updates
pattern in response to newly identified risks. Similarly, new versions of the Phish
pattern are released as new phishing URLs are identified.
New versions of the Trend Micro scan engine are updated as performance is
improved and features added to address new risks.
Note: If Internet connections on your network pass through a proxy server, you need to
configure your proxy information. Click Updates > Connection Settings from the
main menu and enter your proxy server information.
2-11
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
A message box appears if the version of the pattern file or scan engine on IWSVA
is greater than or equal to the counterpart on the remote download server. If the
pattern file on IWSVA is older than the one on the remote download server, the
newer pattern file is downloaded.
3. Click OK in the message box to start the forced update.
Scheduled Updates
IWSVA can perform scheduled updates for the following pattern files:
• Virus
• Spyware
• URL page analysis
• Phish Pattern
• IntelliTrap
• IntelliTunnel
Likewise, IWSVA can perform scheduled updates for the Scan and URL Filtering
engines.
To schedule automatic pattern file and engine updates:
1. Click Updates > Schedule on the main menu.
2. For each type of updatable component, select the update interval.
The following are your options:
• Every x minutes (pattern files only; select the number of minutes between
update interval)
• Hourly (pattern files only)
• Daily
• Weekly (select a day from the drop-down menu; this is the recommended
setting for the latest engine updates)
3. For each component, select a Start time for the update schedule to take effect.
2-12
Updates
4. Click Save.
Note: Use the Summary screen in the IWSVA Web console to verify the current
version of a pattern file. If your network configuration includes a cache server,
Trend Micro recommends that you clear the cache and reboot the cache server
after updating the pattern file. This forces all URL requests to be scanned,
ensuring better network protection. Consult your cache server documentation
for information on how to clear the cache and reboot the server.
Maintaining Updates
Update Notifications
IWSVA can issue notifications to proactively inform an administrator about the status
of a pattern or engine update. For more information about configuring update-related
notifications, see Enabling Pattern File Update Notifications starting on page 10-43
and Enabling URL Filtering and Scan Engines Update Notifications starting on page
10-43.
2-13
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Note: IWSVA does not support rollback for the URL filtering engine.
2-14
Updates
Note: After you apply a CPR, incremental updates are not possible. This means that
subsequent updates require downloading the entire pattern file rather than just the
new patterns, resulting in a slightly longer pattern download time.
In order for IWSVA to access the new pattern file, ensure that it has the same
permission and ownership as the previous pattern file.
2-15
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
2-16
Chapter 3
HTTP Configuration
Before you start using InterScan Web Security Virtual Appliance (IWSVA) to scan
for malicious HTTP(S) downloads, filter or block URLs, and apply access quotas for
your clients, you need to configure some HTTP settings that control the HTTP traffic
flow. IWSVA can be used in conjunction with another proxy server on your network;
alternatively, you can configure IWSVA to use its native proxy.
Topics in this chapter include the following:
• Enabling the HTTP(s) Traffic Flow
• Specifying a Proxy Configuration and Related Settings
• Network Configuration and Load Handling
• Configuring an IWSVA Server Farm
• Configuring Access Control Settings
• Setting Up IWSVA ICAP
To enable and configure Squid, see Appendix E, Squid Configurations. To enable and
configure WCCP, see Network Configuration and Load Handling on page 3-11 and
your Cisco product documentation. To enable and configure Full Transparency
(Transparent Bridge mode), see Network Configuration and Load Handling on page
3-11
3-1
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
3-2
HTTP Configuration
If the network device and IWSVA device are on different network segments, use
the IWSVA routing table to point IWSVA to the device.
• Forward Proxy — This configuration is used to protect clients from receiving
malicious HTTP-borne risks from a server. This is the most common
configuration, and the typical use case is to protect Web users on your network
from receiving malicious Internet downloads. IWSVA and the clients that it
protects are typically in the same LAN.
• Reverse proxy — This configuration is used to protect Web and FTP servers
from attacks or malware introduced by public or private users.
• ICAP— Choose this topology if you have an ICAP client on the network and
you want it to pass traffic to IWSVA for scanning. IWSVA acts as an ICAP
server.
• WCCP — The WCCP configuration allows customers that have WCCP enabled
routers and switches to redirect Web and FTP traffic to IWSVA to create a
high-performance scalable and redundant architecture.
3-3
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Proxy Configurations
There are several types of proxy configurations:
• No upstream proxy (stand-alone mode)
• Upstream proxy (dependent mode)
• Simple transparency
• Reverse proxy
• WCCP
Note: If you configure IWSVA to work in stand-alone mode, each client on your network
needs to configure Internet connection settings to use the IWSVA device and port
(default 8080) as their proxy server.
3-4
HTTP Configuration
3-5
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
server to retrieve the content. When using an upstream proxy, pages cached on the
proxy server are served more quickly.
3-6
HTTP Configuration
Note: When IWSVA is configured in HTTP Forward Proxy mode with Upstream Proxy
enabled, pharming sites cannot be effectively blocked.
When you configure IWSVA to work in Forward Proxy mode and enable Upstream
Proxy, the Server IP White List will not take effect. Content from servers that you
configure on the Server IP White List still will be scanned or filtered.
Transparent Proxy
Transparency is the functionality whereby client users do not need to change their
Internet connection’s proxy settings to work in conjunction with IWSVA.
Transparency is accomplished with a Layer 4 switch that redirects HTTP packets to a
proxy server, which then forwards the packets to the requested server.
IWSVA supports a “simple” type transparency. Simple transparency is supported by
most Layer 4 switches. While it is compatible with a wide variety of network
hardware from different manufacturers, configuring simple transparency does
impose several limitations:
• When using simple transparency, the User Identification method to define
policies is limited to IP address and/or host name; configuring policies based on
LDAP is not possible.
• FTP over HTTP is not available; thus, links to ftp:// URLs might not work if your
firewall settings do not allow FTP connections. Alternatively, links to ftp:// URLs
might work, but the files are not scanned.
• Simple transparency is not compatible with some older Web browsers when their
HTTP requests don't include information about the host.
3-7
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
• Do not use any source NAT (IP masquerade) downstream of IWSVA, because
IWSVA needs to know the IP address of the client to scan and clean the
malicious traffic.
• A DNS server is needed for DCS to resolve the client machine name from its IP
address in order to perform a cleanup.
The benefit of enabling transparency is that the clients’ HTTP(S) requests can be
processed and scanned by IWSVA without any client configuration changes. This is
more convenient for your end users, and prevents clients from exempting themselves
from security policies by simply changing their Internet connection settings.
Note: In simple transparency mode, IWSVA does not accept SSL (HTTPS) traffic.
Configure the router not to redirect port 443 traffic to IWSVA.
If you configure IWSVA in simple transparency mode and the IWSVA server is
connected to a layer-4 switch, you should set the HTTP listening port to 80 and
enable PING on the data interface to allow users to access the Internet through
IWSVA.
3-8
HTTP Configuration
Reverse Proxy
IWSVA can be used to scan content that clients upload to a Web server. When
IWSVA is installed using either the forward or reverse proxy scan configuration,
traffic in both directions is scanned (uploading and downloading).
3-9
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
5. Click Save.
Note: If communication with your internal Web servers is through SSL, do not forget to
configure the HTTPS port(s). For more information, see HTTPS Ports starting on
page 3-17.
In reverse proxy mode, IWSVA tunnels HTTPs traffic. HTTPs decryption is not
supported in Reverse Proxy Mode.
To complete your reverse proxy configuration, the IWSVA device’s IP address must
be registered in the DNS as the host name of the Web server that the reverse proxy is
protecting. In this way, the IWSVA device appears to be the Web server, as far as the
clients are concerned.
Proxy-related Settings
In addition to specifying the type of proxy configuration you want, you can set
additional parameters for the configuration:
• HTTP listening port
• Anonymous FTP logon over HTTP email address
Note: IWSVA handles HTTPS connections differently from HTTP connections. Because
the data is encrypted, you can configure HTTPS decryption policies to decrypt the
content which can then traverse filtering and scanning policies as “normal” HTTP
traffic. IWSVA examines the initial CONNECT request, and rejects it if it does
3-10
HTTP Configuration
not match the set parameters (such as the target URL is on the Block List or
contained in the Phish pattern file, or the port number used is not defined in the
HttpsConnectACL.ini file).
3-11
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Note: For more information on capacity sizing, refer to the IWSVA 5.0 Sizing Guide.
3-12
HTTP Configuration
you can only replicate other configuration settings among IWSVA servers via ARM
or TMCM.
For more detailed information, please refer to the Advanced Reporting and
Management for InterScan Web Security Administrator's Guide.
Note: An IWSVA server farm must have only one parent server.
The “parent”/“child” designation from the Server Farm page in the Web console
only specifies how dynamic data (list of temporarily blocked URLs and list of
client IP addresses suspected of spyware infection) is shared between multiple
IWSVA devices.
3-13
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
• HTTP and HTTPS requests to ports or port ranges can be selectively allowed or
denied for all users whose Internet access passes through IWSVA. This feature is
convenient if you want to prevent certain types of Internet transfers. In addition,
you can configure HTTPS decryption policies to decrypt HTTPS traffic for
scanning.
Client IP
In addition to the default setting that allows all clients on your network to access the
IWSVA proxy, IWSVA can be configured to allow HTTP access only to those clients
that you explicitly specify. If your organization does not allow everyone on your
network to access the Internet, this is a convenient way to block HTTP access by
default.
To allow HTTP access based on client IP:
1. Select HTTP > Configuration > Access Control Settings from the main menu.
In transparent bridge mode, the destination and HTTPS ports are not available;
therefore, when in this mode the Destination Ports and HTTPS Ports tabs are
not present in the Access Control Settings screen.
2. Ensure that the Client IP tab is active.
3. Check Enable HTTP Access Based On Client IP.
4. Select the radio button that describes how clients are allowed HTTP
access—either IP address, IP range, or IP mask.
3-14
HTTP Configuration
Note: If you specify a single IP address and then an IP address range containing the
single IP address, the IP address range is negated if a user attempts to access
a URL at the single IP address.
For more information about identifying the clients, see Identifying Clients and
Servers starting on page 3-14.
To delete a client IP or IP range, click the corresponding Delete icon next to it.
5. Click Add.
The client IP that you have configured is added to the list at the bottom of the
Client IP tab. Access control settings are evaluated according to the order they
appear in the list at the bottom of the Client IP tab.
6. Click Save.
WARNING! Content from servers that you configure on the Server IP white list is not
scanned or filtered. Trend Micro recommends adding only those servers
over which you have close control of the contents.
In ICAP mode, the server IP white list is only applied to RESPMOD requests.
REQMOD activities (such as URL filtering, Webmail upload scanning, and URL
blocking) cannot be bypassed by the server IP white list for ICAP installations.
To add servers to the Server IP White List:
1. Select HTTP >Configuration > Access Control Settings from the main menu.
3-15
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Note: To enable FTP over HTTP connections for clients to open FTP links in Web pages,
IWSVA must be able to open a command connection to the FTP server on port 21.
This requires allowing access to port 21 on the HTTP access control settings.
3-16
HTTP Configuration
HTTPS Ports
IWSVA can restrict which ports can be used for encrypted HTTP transactions. The
default configuration is to allow only HTTPS connections on port 443 (the default
HTTPS port) and 563 (the default port for encrypted news groups).
Note: If you need to access the Web console through HTTPS while connecting through
IWSVA itself, allow access to the IWSVA secure console port number (8443 by
default).
To restrict the ports that can be used to tunnel encrypted HTTP transactions:
1. Select HTTP > Configuration > Access Control Settings from the main menu.
2. Make the HTTPS Ports tab active.
3. Choose the Action to perform—either Deny or Allow.
4. Check either Port or Port Range and then enter the corresponding port(s).
5. Click Add. The destination port restrictions appear at the bottom of the HTTPS
Ports tab.
To delete any HTTPS port access restrictions that you might have configured,
click the Delete icon next to the port or port range to remove.
3-17
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
6. Access control settings are evaluated according to the order they appear in the list
at the bottom of the HTTPS Ports tab. To change the order that ports are
displayed in the list, click the up or down arrows in the Priority column.
7. Click Save.
Note: The ICAP setup procedures below apply to the ICAP versions listed under
X-Authenticated ICAP Headers Support on page 1-3. They are provided for
your convenience; consult the native documentation for complete information.
3-18
HTTP Configuration
a. Click the Setup tab, and then click System > Licenses in the left menu. The
System Licenses screen opens.
b. Type your license under the ICAP license section.
c. Click Commit Changes.
6. Select the Service Farms tab on the ICAP 1.0 screen, then click New Service
Farm to add ICAP servers. Assign the service farm name in the Service Farm
Name field.
• For response mode, select RESPMOD_PRECACHE in the Vectoring
Point field.
• For request mode, select REQMOD_PRECACHE in the Vectoring Point
field.
7. Select Service Farm Enable.
8. In the Load Balancing field, choose the proper algorithm to use for load
balancing (if you have more than one ICAP server in the service farm). Clear
Bypass on Failure.
Note: Disable Bypass on Failure if your priority is to limit virus propagation within
your network. Otherwise, enable Bypass on Failure to guarantee an
unblocked connection to the Internet.
9. Under the Consistency field, choose strong from the drop-down menu and leave
the lbw Threshold field empty.
Note: For multiple ICAP servers within a service farm with strong consistency
selected, make sure that all ICAP servers have identical intscan.ini and
other configuration files and the same virus pattern. The service farm will not
work properly if the ICAP servers have different configurations.
10. Under the Services text box (for response mode), type:
icap://{ICAP-SERVER-IP}:1344/RESP-Service on
where ICAP-SERVER-IP is the IP address of IWSVA ICAP for response mode.
11. Under the Services text box (for request mode), type
icap://{ICAP-SERVER-IP}:1344/REQ-Service on
3-19
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Note: The procedure for setting up ICAP on a Blue Coat appliance might vary depending
on the product version.
1. Select Management.
Type the logon user name and password if prompted.
2. Click ICAP in the left menu, then click the ICAP Services tab.
3. Click New. The Add ICAP Service screen opens.
4. In the ICAP service name field, type an alphanumeric name. Click Ok.
5. Highlight the new ICAP service name and click Edit. The Edit ICAP Service
name screen opens.
6. Type or select the following information:
3-20
HTTP Configuration
Note: You can edit the configured ICAP services. To edit a server configuration
again, select the service and click Edit.
3-21
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
If you do not have JRE on your workstation, a security warning window opens.
Click Yes to continue. Follow the instructions.
To add the response mode policy:
1. Select Management.
Type the logon user name and password if prompted.
2. Click Policy on the left menu, then click the Visual Policy Manager tab.
3. Click Start. If the Java Plug-in Security Warning screen appears, click Grant
this session.
4. On the menu bar, click Edit > Add Web Content Policy. The Add New Policy
Table screen opens.
5. Type the policy name under the Select policy table name field. Click OK.
6. Under the Action column, right-click Bypass ICAP Response Service and click
Set. The Add Object screen opens. Click New and select Use ICAP Response
Service. The Add ICAP Service Action screen opens.
7. Choose the ICAP service name under the ICAP Service/Cluster Names field.
Enable Deny the request under the On communication error with ICAP
service section. Click OK, then click OK again.
8. Click Install Policies.
To add the request mode policy:
1. Follow Step 1 through Step 5 in the previous procedure.
2. Under the Action column, right-click Deny and click Set. The Add Object
screen opens. Click New and select Use ICAP Request Service. The Add ICAP
Service Action screen opens.
3. Choose the ICAP service name under the ICAP Service/Cluster Names field.
4. Enable Deny the request under the On communication error with ICAP
service section.
5. Click OK and then OK again.
6. Click Install Policies.
7. Configure both the request and response mode ICAP services.
To check the current policy, go to the Policy screen, click the Policy Files tab,
and then click Current Policy.
3-22
HTTP Configuration
This takes you into the ICAP service configuration menu. Type ? to display a list
of all available commands. Type the following commands:
server icap://ICAP SERVER IP:1344/resp (to assign a server type)
vector-point respmod-precache (to assign the proper vector point
type)
error-handling return-error (to assign the proper error-handling
type)
enable (to enable the ICAP multiple server configuration)
5. Type exit.
6. Create a request modification service, by typing
icap service REQUESTMOD SERVICE NAME
3-23
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
This command takes you into the ICAP service configuration menu. Type ? to
display a list of all available commands. Issue the following commands:
server icap://ICAP SERVER IP:1344/REQ-Service (to assign a
server type)
vector-point reqmod-precache (to assign the proper vector point
type)
error-handling return-error (to assign the proper error-handling
type)
enable (to enable the ICAP multiple server configuration)
7. Type exit.
8. For additional configuration steps, type the following:
icap append-x-headers x-client-ip (to enable X-client headers for
reports)
icap append-x-headers x-server-ip (to enable X-server headers for
reports)
icap rescan-cache ISTag-change (to turn on ISTAG rescan for
updates)
icap bypass streaming-media (to exclude streaming media from ICAP
scanning)
icap apply all (to apply all settings and activate ICAP type)
show icap (to display current ICAP configuration at root CLI menu)
3-24
HTTP Configuration
4. In the ICAP cluster name field, type an alphanumeric name and click Ok.
5. Highlight the new ICAP cluster name and click Edit.
The Edit ICAP Cluster name screen opens.
6. Click New to add an ICAP service to the cluster.
The Add ICAP Cluster Entry screen opens. The pick list contains a list of any
services available to add to the cluster. Choose a service and click Ok.
7. Highlight the ICAP cluster entry and click Edit.
The Edit ICAP Cluster Entry name screen opens. In the ICAP cluster entry
weight field, assign a weight from 0-255. Click Ok, click Ok again, and then
click Apply.
Note: Do not delete a cluster used in a Blue Coat Port 80 Security Appliance policy if a
policy rule uses a cluster name.
3-25
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
NetCache appliance, the Blue Coat Port 80 Security Appliance, or the Cisco ICAP
servers serve future requests for the same Web content by your network users.
Because the request is not sent to the Internet, download time is accelerated.
To flush the cache in NetCache:
1. Click the Utilities tab, then click Cache Objects on the left menu.
2. Click Flush under the Flush the Cache section.
To flush the cache in the Blue Coat Port 80 Security Appliance:
1. Select Management.
Type the logon user name and password if prompted.
2. Click Maintenance.
3. Click the Tasks tab and click Clear. Click OK to confirm.
To flush the cache in the Cisco ICAP server:
1. Telnet to Cisco CE.
2. At the root CLI menu, type cache clear.
3. Press Enter.
3-26
HTTP Configuration
Note: The HTTP Listening port automatically changes to 1344 when ICAP mode is
selected.
3-27
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
3-28
HTTP Configuration
The outbound URL is valid, thus the request mode allowed the URL to pass. The
response of the traffic — the actual download triggers InterScan Web Security to
block the download from occurring.
3-29
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
3-30
Chapter 4
4-1
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
4-2
Policies and User Identification Method
Note: By default, there is no access quota control for clients who access IWSVA through
the default listening port; thus there is no pre-configured Global Access Quota
Policy.
IWSVA does not provide HTTPs decryption from guest ports. Instead,
IWSVA tunnels HTTPs traffic through guest ports.
4-3
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Deploying Policies
After configuring a policy, the settings are written to the database after you click
Save. Clicking Deploy Policies applies the new policy configuration immediately.
Otherwise, the policy changes go into effect when IWSVA reads the information
4-4
Policies and User Identification Method
from the database after the time intervals specified under Policy Deployment
Settings (in minutes) on the Administration > IWSVA Configuration > Database
screen.
Note: When policies are being applied, either after the cache expiration interval or from
clicking Deploy Policies, HTTP(S) and FTP connections are interrupted for a short
time (about ten seconds).
U SER / GROUP
IP A DDRESS H OSTNAME N AME
A UTHENTICATION
4-5
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
U SER / GROUP
IP A DDRESS H OSTNAME N AME
A UTHENTICATION
Note: For users connecting to an HTTP server with integrated Windows authentication
through the IWSVA using Internet Explorer 6.0, make sure the Use HTTP1.1
through proxy connections option is selected in the Tools > Internet
Options >Advanced screen for NTLM (NT LAN Manager) authentication to
work properly.
IP Address
The IP address is the default identification option and requires the following:
• Client IP addresses are not dynamically assigned through DHCP as DHCP will
make the IP address identification less accurate as DHCP leases expire.
• Network address translation (NAT) is not performed on the network path
between the affected system and IWSVA
If the local network meets these conditions, you can configure IWSVA to use the IP
address user identification method.
When using the IP address identification method, the scope of scanning policies is
defined by defining a range of IP addresses, or a specific IP address, when adding or
editing a policy.
To enable the IP address user identification method:
1. Select Administration > Network Configuration > Deployment Mode | User
Identification from the main menu.
4-6
Policies and User Identification Method
Host Name
The host name identification method requires that clients use Internet Explorer on the
Windows platform. In addition to defining a policy’s scope by specifying the user’s
host name(s) when defining accounts to which a policy applies, the Host name
(modified HTTP headers) user identification option logs the MAC address and
Windows machine name to the security event logs.
By default, only the host name portion of the host name/MAC address combination is
stored in IWSVA for certain types of logs, such as the URL Access Log and reports,
and is used to match policies. If you want to use both the host name and MAC
address for user identification, edit intscan.ini and change use_mac_address=no to
use_mac_address=yes in the [user-identification] section.
Note: Applet-filtering messages show the client IP address (and not the host name)
because even when using Internet Explorer, the HTTP request is submitted by the
Java plug-in, not the browser; therefore, Internet Explorer cannot add the special
header to the request.
Since IWSVA is unable to obtain host name information before decrypting HTTPs
contents, IWSVA does not support host name identification for HTTPs decryption
policies in bridge or WCCP mode.
4-7
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
http://www.trendmicro.com/download/product.asp?productid=86
Note: Before your users are able to access the Internet, and for IWSVA to apply the
correct policy, clients will have to run the client registration utility on each
system.
4-8
Policies and User Identification Method
that Internet Explorer includes in the User-Agent HTTP header. You can find the
identifying information logged under the User ID column in various log files. It
alters Windows configuration values to include the MAC address of the client system
and the machine name that made the HTTP requests. The MAC address is a unique
and traceable identification method and the machine name is an additional and
helpful identifier. For more information, refer to Enabling MAC Address Client
Identification on page 10-46.
After running the register_user_agent_header.exe utility, a new registry value is
created under the
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Intern
et Settings\User Agent\Post Platform
S IMPLE
K ERBEROS NTLM
AUTHENTICATION
4-9
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
S IMPLE
K ERBEROS NTLM
AUTHENTICATION
Note: To use the Digest-MD5 authentication method with the Sun Java System Directory
Server 5.2, all passwords must be stored as clear text in the LDAP directory.
Choose Simple from the LDAP Authentication Method area of the User
Identification page (Administration > Network Configuration > Deployment
Mode | User Identification) to have IWSVA send the user's credential (used in the
Admin account) as plain text for the initial LDAP connection only.
For increased security protection, IWSVA uses the advanced authentication method
(Kerberos or Digest-MD5) for all subsequent user logon authentications from
IWSVA to the LDAP server. In addition, IWSVA still validates user credential
using Kerberos authentication method even when you select simple authentication
on the LDAP server.
4-10
Policies and User Identification Method
Note: You must configure IE settings to enable automatic authentication on each client
computer.
By default, automatic authentication is enabled in IE 7.0.
4-11
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Note: Trend Micro recommends that you use global catalog instead of referral chasing. If
you enable referral chasing, automatic authentication may not work for users
whose information is not found in the main LDAP server. In this case, a Web
browser window displays for these users to type their logon information.
4-12
Policies and User Identification Method
4-13
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Note: If you want to apply the Guest Policy for those network users who are not in your
LDAP directory, enable the guest account and configure the guest port (default =
8081) that receives those requests on the IWSVA device. For more information
about enabling the guest account and configuring the guest port, see Enabling the
Guest Port starting on page 4-4. If the guest port is not enabled, only users in the
LDAP directory can browse the Internet.
Note: In case future versions of Microsoft Active Directory modify the schema,
IWSVA supports changing the attribute names that make up a user’s
distinguished name. If you’re using either Microsoft Active Directory 2000 or
2003, you should select the Default settings option.
4-14
Policies and User Identification Method
7. Enter the Listening port number used by the LDAP server that you have chosen
(default = 389). If your network has multiple Active Directory servers and you
have enabled the Global Catalog (GC) port, change the listening port to 3268.
Note: If you enable the Global Catalog in Active Directory, you might need to
configure your firewall to allow communication through port 3268.
8. Enter the “Admin account” and Password for a credential with at least read
authority to the LDAP server. If the domain is us.example.com:
• For Microsoft Active Directory, use the UserPrincipalName for the admin
account, for example, [email protected].
• For OpenLDAP and the Sun Java System Directory Server 5.2, enter the
Distinguished Name (DN) for the admin account (for example,
uid=LOGON_ID,ou=People,dc=us,dc=example,dc=com).
9. Enter the Base distinguished name to specify from which level of the directory
tree you want IWSVA to begin LDAP searches.
The base DN is derived from the company's DNS domain components; for
example, LDAP server us.example.com would be entered as
DC=example, DC=com.
If you are using Active Directory servers with the Global Catalog (GC) port
enabled, use the root domain of the Global Catalog-enabled Active Directory;
for example, use dc=example,dc=com.
10. Select the LDAP authentication method to use—either Simple or Advanced.
If you opt for Advanced authentication, the following authentication methods
are used:
• Microsoft Active Directory and OpenLDAP: Kerberos
• Sun Java System Directory Server 5.2 (formerly Sun™ ONE Directory
Server): Digest-MD5
Additionally, configure the following parameters to use Advanced
authentication:
• Default Realm
• Default Domain
4-15
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
• KDC and Admin Server: The hostname of the Kerberos key distribution
server. If you are using Active Directory, this is typically the same host name
as your Active Directory server.
• KDC port number: Default port = 88
When using NTLM to authenticate with KDC(s) on a different forest
through Internet Explorer or using IWSVA to do referral chasing with Active
Directory, Trend Micro recommends enabling “Use HTTP 1.1 through proxy
connections.” This setting can be found on the Internet Explorer Tools menu
> Internet Options > Advanced tab. Enabling this setting prevents Internet
Explorer from cutting off the “Keep-Alive connection” setting. Note that
using NTLM is only supported with Microsoft Active Directory.
11. In the event a client cannot authenticate using the LDAP and/or Kerberos server
that you specify, you can configure IWSVA to check other LDAP and/or
Kerberos servers on your network. Check Enable Referral Chasing and then
click the Primary referral server and Secondary referral server links.
12. Enter the information for the other LDAP servers.
Note: If you are using Active Directory servers and have enabled the Global Catalog
port (default = 3268), then IWSVA referral chasing configurations are not
supported. IWSVA uses a different mechanism to query Active Directory
4-16
Policies and User Identification Method
servers when the Global Catalog port is enabled, thus configuring referral
servers is redundant.
13. Configure the LDAP Authentication White List to exempt hosts from the
LDAP authentication process.
For example, if you have an application server that access the Internet and you
want to permit its access without requiring the server to authenticate, you can
include the server’s IP address in the LDAP authentication white list.
IWSVA will only apply IP address-based policy settings and bypass user/group
name checking.
14. To verify the information has been entered correctly and IWSVA can
communicate with the LDAP servers that you configured, click Test LDAP
Connection on the User Identification page.
A message box appears, indicating that you have successfully contacted the
LDAP server.
15. Click Save.
4-17
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Note: Since the ‘member’ attribute is incomplete in some built-in groups that exist in
Active Directory (such as ‘Domain Users’), IWSVA will not be able to obtain
membership information for these groups through LDAP search. Trend Micro
recommends you create policies based on user-defined groups instead of built-in
groups.
4-18
Policies and User Identification Method
Note: In order to configure IWSVA to listen on port 3268, the Microsoft Active Directory
server that IWSVA uses should have the Global Catalog enabled.
Since the member attribute is not replicated to the Global Catalog for all group
types, and because the memberOf attribute derives its value by referencing the
member attribute (called back links and forward links, respectively), search results
for members of groups, and groups in which a member belongs, can vary. Search
results depend on whether you search the Global Catalog (port 3268) or the domain
(port 389), the kind of groups that the user belongs to (global groups or domain
local groups), and whether the user belongs to universal groups outside the local
domain.
For more information, search for the article “How the Global Catalog Works” at
http://www.microsoft.com.
Note: Even if you configure IWSVA to use the Host name (modified HTTP headers) or
User/group name authentication user identification method, you can always specify
clients by entering an IP address or IP address range.
Before adding a policy and configuring its scope, set the user identification method.
See Configuring the User Identification Method starting on page 4-5 for more
information.
4-19
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
4-20
Policies and User Identification Method
5. When you have named your new policy and defined the account(s) to which it
applies, click Next to proceed with configuring the rest of the policy.
Login Accounts
Up to 128 users can access IWSVA using assigned access rights. When in the
application, users can make configuration changes that are recorded in the audit log
(see Audit Log on page 10-21).
4-21
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
If you have a team of security administrators who are responsible for different
functions and who might also have help desk privileges, then assigning them access
rights can be beneficial to your organization. To manage IWSVA, these users can
have different logins with different privileges.
Access rights can also give you the ability to audit what is being changed in IWSVA.
If you have the need to comply with certain government agency standards, then this
function can be critical.
Note: Accounts that have administrator privileges can log in to the terminal console
through SSH.
4-22
Policies and User Identification Method
Note: If an administrator account logs into the terminal console through ssh, and does not
close the session, the administrator cannot modify the account directly to "Auditor"
or "Reports only." A warning message will appear.
4-23
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
4-24
Chapter 5
5-1
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Note: In addition to enabling HTTP scanning and Applet/ActiveX security, ensure that
HTTP traffic is turned on (see Enabling the HTTP(s) Traffic Flow starting on page
3-2). Otherwise, clients cannot access the Internet.
5-2
Configuring HTTP Scanning
5-3
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
because the file containing malicious code takes longer to transmit. Therefore, it is
important to screen small files efficiently and completely.
Note: Performance might be adversely affected if the main policy for ActiveX scanning
directs that all PE (windows executable) files must be scanned (not just COM
objects, of which ActiveX controls are a subtype), or if all unsigned PE files are to
be blocked. The performance impact occurs because the Javascan daemon (which
enforces policy for these files, as well as Java Applets) is invoked more often.
5-4
Configuring HTTP Scanning
HTTPs Security
HTTPs (Hypertext Transfer Protocol with Security) is a combination of HTTP with a
network security protocol (such as SSL, Secured Sockets Layer). HTTPs connection
is used for Web applications (such as online banking) that require secured
connections to protect sensitive content. Since traditional security devices are unable
to decrypt and inspect this content, virus/malware and other threats embedded in
HTTPs traffic can pass unobstructed through your security defenses and on to your
enterprise network.
IWSVA supports HTTPs decryption and scanning in the following modes:
• Transparent bridge
• WCCP
• Forward proxy
5-5
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
credit card numbers) is encrypted, and data transmitted cannot be tampered with and
forged.
When a client initiates an SSL session by typing a URL that starts with https://
instead of http://, an SSL handshake is performed to verify identification (such as
certificate exchange and validation) and process encryption methods required for the
session. The IWSVA server acts as an intermediary between a client and a secure
Web server to validate server certificates. The following describes a simplified SSL
handshake process:
1. The client Web browser sends a connection request and its encryption data to the
Web server. IWSVA forwards the request to the Web server.
2. The Web server returns its SSL information (including the server certificate).
IWSVA checks the server certificate.
3. If server certificate passes validation tests, the HTTPs connection is allowed
between the Web server and the client. IWSVA applies HTTPs decryption
policies to scan encrypted content.
If the Web server requests a client certificate, IWSVA either blocks or tunnels the
encrypted traffic.
For more information on server certificate management, refer to Managing Digital
Certificates on page 5-53.
5-6
Configuring HTTP Scanning
5-7
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Note: IWSVA only matches the first custom category regardless of whether zero or more
than one custom category is selected.
In bridge mode, if a proxy server is located between IWSVA and the Web server
and client browsers are configured to access the Internet through the proxy server,
IWSVA tunnels HTTPs connections but does not decrypt or scan HTTPs traffic.
5-8
Configuring HTTP Scanning
The options on this page depend upon the user identification method that you are
using—either IP address, Host name (modified HTTP headers), or User/group
name authentication (LDAP). For more information about configuring the user
identification method and defining the scope of a policy, see Configuring the
User Identification Method starting on page 4-5.
4. Click Next.
5. On the Specify Categories screen, ensure that Enable policy is selected.
6. Select the URL categories to decrypt.
To select all the categories of a group, click Select All for the group. The group
does not need to be expanded for you to select all categories in a group.
7. Type an optional Note to include useful information about this policy for future
reference.
8. Click Next.
9. If you want to apply an exception list, in the Specify Exception Lists screen,
select an approved URL list name from the drop down list box. IWSVA tunnels
HTTPS traffic from a URL in the exception list; that is, the encrypted content
will not be decrypted for inspection.
10. Click Save.
11. In the HTTPS Decryption Policies screen, set the priority of the new policy
(under the Priority column) by clicking on the up or down arrows.
The Priority setting determines which policy is applied if there are accounts
belonging to two or more policies.
12. Click Save.
13. To immediately apply the policy, click Deploy Policies; otherwise, the policy is
applied after the database cache expires.
WARNING! In proxy mode, IWSVA applies HTTPS decryption policies based on the
client's browser domain. However in transparency mode, since IWSVA is
unable to obtain client domain information, IWSVA applies HTTPS
decryption policies to the CommonName in the server certificate.
5-9
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Note: If you disable certificate validation, clients can access any HTTPs Web sites
without checking server certificates.
If a certificate does not pass a certificate validation test, clients can still choose to
access a Web site through HTTPs connection. A warning screen displays on the
client's browser.
5-10
Configuring HTTP Scanning
Certificate Authority
By default, IWSVA acts as a private Certificate Authority (CA) and dynamically
generates digital certificates that are sent to client browsers to complete a secure
session for HTTPS connections. However, the default CA is not signed by a trusted
CA on the Internet and the client browsers will display a certificate warning each
time users access an HTTPS Web site. Although users can safely ignore the
certificate warning, Trend Micro recommends using a signed certificate for IWSVA.
To import a CA certificate:
1. From the main menu, click HTTP > HTTPS Decryption > Settings |
Certificate Authority.
2. Click Browse next to Certificate to select a certificate file. IWSVA supports
certificates using base64-encoded format.
5-11
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
3. Click Browse next to Private Key to select the private key associated with the
CA certificate. The private key is provided together with your certificate from the
well-known CA.
4. Type the Passphrase if you provided this information when you first applied for
the certificate.
5. Type the passphrase again the Confirm Passphrase field.
6. Click Import.
To export a CA certificate (public key):
1. From the main menu, click HTTP > HTTPS Decryption > Settings |
Certificate Authority.
2. Click Get Public CA Key.
3. Follow the on-screen prompt to save the certificate file on your computer.
To export CA private key:
1. From the main menu, click HTTP > HTTPS Decryption > Settings |
Certificate Authority.
2. Click Get Private CA Key.
3. Follow the on-screen prompt to save the key file on your computer.
Note: Web Reputation must be enabled at the global level in order for it to be used
at the policy level.
5-12
Configuring HTTP Scanning
4. Click Add.
5. Type a descriptive Policy name.
Policy names that include references to the users or groups to which they apply
(for example, “Virus Policy for Engineers” or “URL Filtering Policy for
Researchers”) are easy to remember.
6. Select the users to which this policy applies.
The options on this page depend upon the user identification method that you are
using—either IP address, Host name (modified HTTP headers), or
User/group name authentication. For more information about configuring the
user identification method and defining the scope of a policy, see Configuring the
User Identification Method starting on page 4-5 and LDAP Query Matching
Across Main and Referral Servers starting on page 4-18.
Note: Regardless of the user identification method you have configured, you can
always enter IP addresses of the clients to which the policy applies.
7. When you have named your new policy and defined the account(s) to which it
applies, click Next to proceed with defining HTTP virus scanning rules.
To modify an existing HTTP scanning policy:
1. Click HTTP > HTTP Scan > Policies from the main menu.
2. Click the name of the policy to modify.
3. Modify the Web Reputation rule, virus scanning rule, the spyware scanning rule,
policy exceptions, and the scanning action.
The specified scanning action applies to all specified rules.
To add or remove users from an existing HTTP scanning policy:
1. Click HTTP > HTTP Scan > Policies from the main menu.
2. Click the desired scan policy account.
3. From the Scan Policy: Edit Policy (Account tab) screen, either add or remove a
user.
• To add a user, specify a user IP address in the IP address field or specify a
range of users in the From and To fields under IP range. Click Add after
specifying a user or range of users.
• To remove a user, click the trash can icon next to the user.
5-13
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
5-14
Configuring HTTP Scanning
Pharming attacks are attempts to redirect you to imposter Web sites with the intention
of stealing private information (usually financial related). Pharming compromises a
DNS server by planting false information into the server, which causes a user’s
request to be redirected to an unintended location. Unfortunately, the Web browser
displays what appears to be the correct Web site.
5-15
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
2. Select Use Web Reputation rule in this policy to enable Web Reputation or
clear the check box to disable it for this policy.
Feedback Option
In addition to the current dynamic URL Blocking List, virus scan results can be fed
back to the URL Local Cache and an external backend Rating Server. The Trend
Micro Feedback Engine (TMFBE) provides a feedback mechanism for IWSVA to
send back virus scan results to the backend Rating Server. The Feedback option is
enabled by default.
Note: When using Upstream Proxy mode, you might need to configure the proxy server
to explicitly allow the IWSVA IP address to access www.trendmicro.com.
Negative Results
If the scan result from Trend Micro's virus scanning engine is negative, the infected
URL is sent back to the following locations:
• Dynamic URL Blocking List
• URL Local Cache with an adjusted Web Reputation score.
• TMFBE feedback buffer with VirusName and IntelliTrap Flag. When this buffer
reaches ten entries or five minutes have passed from the last feedback, these
URLs are sent to the backend Rating Server in a batch (each URL is sent
sequentially).
Positive Results
If the scan result from Trend Micro's virus scanning engine is positive, the URL in
question is saved in the URL local cache. This prevents the same URL from getting
scanned by Trend Micro's virus scanning engine twice.
5-16
Configuring HTTP Scanning
Note: Note: Clearing the cache stops and restarts the http scanning daemon. This might
interrupt IWSVA service.
5-17
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Note: For the highest level of security, Trend Micro recommends scanning all files.
About IntelliScan
Most antivirus solutions today offer you two options in determining which files to
scan for potential risks. Either all files are scanned (the safest approach), or only
those files with certain file name extensions (considered the most vulnerable to
infection) are scanned. But recent developments involving files being “disguised” by
5-18
Configuring HTTP Scanning
having their extensions changed has made this latter option less effective. IntelliScan
is a Trend Micro technology that identifies a file’s “true-file type,” regardless of the
file name extension.
Note: IntelliScan examines the header of every file, but based on certain indicators,
selects only files that it determines are susceptible to virus infection.
5-19
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Note: Trend Micro recommends minimizing the list of MIME content-types to skip
to reduce the risk of virus infection. Also, Trend Micro does not recommend
5-20
Configuring HTTP Scanning
About IntelliTrap
IntelliTrap detects potentially malicious code in real-time, compressed executable
files that arrive with HTTP data. Virus writers often attempt to circumvent virus
filtering by using different file compression schemes. IntelliTrap provides heuristic
evaluation of compressed files that helps reduce the risk that a virus compressed
using these methods enters a network through the Web. IntelliTrap has the following
options:
• Can be enabled or disabled in the Virus Scan Rule tab for each scan policy.
(IntelliTrap is enabled by default.)
5-21
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
5-22
Configuring HTTP Scanning
A compressed file that has more than 10 layers of compression or contains more than
10000 files that will not pass through the gateway.
5-23
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
is generated to prevent the browser from timing out and to inform the user that
scanning is in progress to prevent them from thinking that the connection is hung.
Note: For large file handling, IWSVA uses the progress page. The progress page uses
JavaScript and a pop-up window to display the download progress. If your desktop
security policy has pop-up blocking enabled or JavaScript disabled, then the
progress page does not function and scanning is prevented.
In order for the progress page to work, IWSVA needs to know to which externally
visible IP address the clients connect. Using 127.0.0.1 causes a problem. If a
message about the progress page appears, add the machine IP address to
iscan_web_server so that the host name does not resolve to 127.0.0.1 (for
example, iscan_web_server=1.2.3.4:1812) or modify the /etc/hosts file.
Note: Some Internet applications (YouTube, Windows Update, streaming, etc.) will
assume a certain amount of data should arrive on the client side within a certain
time frame (for example, 20 percent of data or 1MB of data in 90 seconds). When
IWSVA is configured to use the Scan feature before delivering the scanning option,
some requested files will not be passed to the client until the scanning is
completed. In this case, it is likely that the Internet application could detect a
transmission failure because the client side does not receive enough data in time.
Then, the client side will not be able to complete the video file or streaming file.
5-24
Configuring HTTP Scanning
Deferred Scanning
When IWSVA is configured to use the Deferred scanning option, part of the file is
passed to the requesting client while IWSVA scans the remainder of the file. The
partial file remains in the client’s temporary directory until scanning concludes and
the last byte of the file is delivered.
Instead of using a specified data size, IWSVA uses a percentage to define how much
data is downloaded at a time. At most every two seconds, IWSVA sends a specified
percentage of received data to the browser. The last chunk of data is not larger than
4KB and is sent to the browser before the scan is finished.
For the data download percentage, you can specify either 20, 40, 60, 80, or 100. The
default percentage is 60. The actual percentage of data sent to the browser can be
much smaller than the percentage specified.
Note: Large file handling does not work when using the Blue Coat Port 80 Security
Appliance in ICAP mode. In addition, when using the Blue Coat security appliance
in ICAP mode, when the client downloads a large virus-infected file, the client
browser might not show the virus blocking notification page. Instead, the client
browser will show “Page cannot be displayed.” If IWSVA is configured as an
HTTP proxy in-line with the Blue Coat appliance, however, large file handling
functions.
External data received by IWSVA is sent to the browser in smaller chunks without
scanning. The last chunk is sent to the browser to complete the download only after
the entire set of data is received and scanned. Sending smaller chunks not only
maintains the IWSVA-Web browser connection, but also keeps end-users posted of
the download progress.
Large file handling can be set for each policy (click HTTP > HTTP Scan > Policies
> policy and click the Virus Scan Rule tab).
5-25
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
FIGURE 5-6 For special handling of large files, there are two options to
choose from: (1) scan before delivering and (2) deferred
scanning
Scanning of large files can be turned off by choosing Do not scan files larger than
to reduce performance issues when downloading very large files and you have
control over their integrity.
To disable scanning large files:
• Under Large File Handling, check Do not scan files larger than and then
configure the file size over which files are not scanned. The default is 2048MB.
Disabling scanning of any files, even large ones, is not recommended, because it
introduces a security vulnerability into your network.
To use large file handling for HTTP scanning:
1. In the Large File Handling section, select Enable special handling, and then
type the file size (in KB or MB) to be considered a large file.
The default value is 512KB.
2. Select the type of large file-handling to use:
• Scan before delivering: Shows progress while scanning, and then loads the
page afterwards (default setting)
• Deferred scanning: Loads part of the page while scanning; stops the
connection if a virus is found
3. Click Save.
5-26
Configuring HTTP Scanning
5-27
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
5-28
Configuring HTTP Scanning
5-29
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
• Approved URL list—Select the name of the approved URL list to be exempted
from a URL filtering policy, HTTPs decryption policy, Applet/ActiveX security
policy, or the WRS rule and file type blocking in an HTTP scanning policy.
• Approved file name list—Select a file name list to be exempted from file type
blocking. You can apply a file name exception list to an HTTP scanning policy or
an FTP scanning policy. This option is not available for Applets and ActiveX
policies and URL filtering policies.
• Do not scan the contents of selected approved lists—Select this option if you
do not want to scan the contents of the URLs or files in the approved lists for
viruses. In addition, compressed file handling action will not be applied.
5-30
Configuring HTTP Scanning
5-31
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
using a text editor, you can import the list rather than enter them one-by-one.
Import lists must conform to a defined standard.
3. Click Save.
Scan Actions
There are four actions that IWSVA can take in response to the outcome of virus
scanning:
• Choose Delete to delete an infected file at the server. The requesting client will
not receive the file. This action can be applied to the Infected files, Uncleanable
files, and Password-protected files scan events.
• Choose Quarantine to move a file (without cleaning) to the quarantine directory.
/etc/iscan/quarantine
The requesting client will not receive the file. This scan action can be applied to
all four of the scan events. You can optionally choose to encrypt files before
sending them to the quarantine directory. For more information, see Quarantined
File Handling starting on page 5-27.
• Choose Clean to have IWSVA automatically clean and process infected files.
The requesting client receives the cleaned file if it is cleanable, otherwise the
uncleanable action is taken. This action can be applied to the Infected files and
Macros scan events. For macro-containing files, the Clean action strips the macro
from the file, whether the macro is a virus or benign, to protect your network
before an updated virus pattern is released and deployed.
• Choose Pass to send the file to the requesting user. This action can be applied to
the Uncleanable files, Password-protected files, and Macros events. The Pass
action should always be used for Macros events, unless you want to strip or
quarantine all macro-containing files during a virus outbreak.
5-32
Configuring HTTP Scanning
Note: Trend Micro does not recommend choosing the Pass scan action for
uncleanable files.
Scan Events
After scanning, you can configure actions for the four possible scanning outcomes:
• Infected files: Files determined to be infected with a virus or other malicious
code. Available actions are Delete, Quarantine or Clean (recommended and
default action).
• Uncleanable files: Depending on the type of virus or malicious code infecting a
file, the scan engine might not be able to clean some files. Available actions are
Delete (recommended and default action), Quarantine, and Pass.
• Password-protected files: Files that cannot be scanned because they are either
password-protected or encrypted. The infection status of these types of files
cannot be determined. Available actions are Delete, Quarantine, and Pass
(recommended and default action).
• Macros: Microsoft Office files that contain macro program code. Because many
of the fastest spreading viruses are macro viruses, you can quarantine all
macro-containing files during the early stages of a virus outbreak in order to
block all files before the new virus pattern is added to the pattern file and
deployed to your environment. Available actions are Quarantine, Clean, and
Pass. Unless there is a need to quarantine or strip macros during a virus outbreak
before an updated pattern file is released, the action for Macro should always be
set to Pass.
5-33
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
IntelliTunnel Security
IWSVA uses IntelliTunnel technology to block undesirable instant messaging (IM)
and authentication connection protocols tunneled through port 80. It uses a dynamic,
updatable pattern file to distinguish normal browser traffic from other protocols
communicating over port 80. Currently, the pattern file can identify three popular
types of IM traffic when this traffic is tunneled through port 80.
5-34
Configuring HTTP Scanning
Because IWSVA is an HTTP/FTP proxy, it can only scan traffic that is submitted to it
directly (through a browser's proxy setting), or through a network device (in bridge
and ICAP modes). This means that IWSVA is only able to intercept HTTP (port 80),
HTTPS (port 443), and FTP (port 21) traffic. Traffic to other ports are not routed
through IWSVA and, thus, cannot be blocked by it. In order to ensure that IM traffic
is routed through IWSVA, the clients must be configured to use HTTP tunneling with
IWSVA because the proxy and outbound access through all other ports must be
disabled at the firewall.
This section describes the protocols used for IM and authentication connections. It
also describes how to edit and create an IntelliTunnel policy.
5-35
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Note: Because of the way that Google authenticates users, the Gmail application uses the
same authentication as the Google Talk product. This means that blocking Google
Talk also blocks Gmail.
5-36
Configuring HTTP Scanning
5-37
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
The figure below illustrates how IWSVA scans and blocks malicious applets and
ActiveX objects.
5-38
Configuring HTTP Scanning
HTML page containing a warning message. This new page is then delivered to client
workstations.
Bad signature
5-39
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Note: The process of instrumenting a signed applet renders the signature invalid.
Therefore, the signature is stripped, leaving it unsigned. IWSVA can optionally
re-sign the applet if required by the client browser.
Note: Re-signing applies only to validly signed applets. If the system is configured to
accept unsigned applets, these applets bypass this process and are delivered to
client workstations immediately after instrumentation.
5-40
Configuring HTTP Scanning
take place; otherwise, IWSVA notifies the users and gives them the option to allow
the behavior, terminate the behavior, or stop the applet.
5-41
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Signature Status
A digital signature is a way to verify the genuine publisher of an applet. It also allows
you to verify that the applet has not been tampered with or otherwise changed
because it was published. After analyzing the applet’s signature, IWSVA makes one
of the following determinations:
• Valid signature
• No signature: The applet is unsigned.
• Invalid signature: The applet’s signature is corrupt or cannot be verified for
some reason; for example, no trusted root certificate is found
Checking the signature of an applet is done in two steps. The first is a verification of
the integrity of the applet code against data in the signature. The second is a
verification of the integrity of the certificates, the “certificate chain,” used to create
the signature. For the signature to be considered valid, the certificate chain must end
with a certificate known to IWSVA that is trusted. The set of these certificates can be
viewed and managed by opening the Web console to HTTP > Configuration >
Digital Certificates > Active Certificates.
Certificate Status
Java applet security rules can apply different actions to applets that have valid
signatures, based on their certificate status.
By default, IWSVA trusts its active certificates. However, an active certificate can be
“flagged” if you no longer want to trust applets that have a flagged certificate in their
certificate chain. Flagged certificates continue to be listed as active certificates,
though the flagged status is noted.
5-42
Configuring HTTP Scanning
Configuring Exceptions
For each of the types of operations that can be selectively allowed or prohibited, you
can configure file or folder exceptions where the security policies do not apply.
• To allow a given type of file operation, except when performed by a subset of
files, check the Enable button next to the file operation. Click the Exceptions
link. The Exceptions to File Operations screen opens. Configure the files and
folders where the operation is not allowed.
• To disallow a given type of file operation, except for a subset of files, check the
Disable button next to the file operation. Click the Exceptions link and then
configure the files and folders where the operation is allowed.
To configure Java applet processing settings:
1. After setting the scope of your policy, do one of the following:
• Select Process Java applets using the following settings for IWSVA to
pass, block or instrument the applet based on its signature and certificate
status.
5-43
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
• Select Block all Java applets for IWSVA to not allow any applets to pass to
the clients. If you choose this setting, proceed to step Step 3.
2. For each of the following signature and certificate status, choose the processing
action to use (* denotes the default Trend Micro-recommended settings):
• Valid signature, trusted certificate: Pass*, Instrument applet (re-sign),
Instrument applet (strip signature), Block
• Valid signature, flagged certificate: Pass, Instrument applet (re-sign),
Instrument applet (strip signature), Block*
• No signature: Pass, Instrument Applet*, Block
• Invalid signature: Pass, Instrument Applet (strip signature), Block*
3. For each of the four (destructive, non-destructive, write or read) operations that
can be selectively enabled or disabled, click the Enable or Disable button to
configure your security policy.
4. Click the Exceptions button, and then configure the files or folders that are
exceptions to the security policy:
a. Enter the Directory/File Path of the files that do not apply to the configured
security policy.
• To configure a specific file path, check Exact file path.
• To exclude the entire folder’s contents from the security rule, check
Include all files in this directory.
• To exclude all of the folder’s files, plus those in subdirectories, from the
security rule, check Include files in this and all subdirectories.
Note: All file paths are those on the client machine, where the applet runs. The
file path format should be in the form required by the operating system
running on the client.
b. Click the Add button to add the exceptions to the given security policy.
c. Configure other files or directories to exempt from the applet’s security
settings.
5-44
Configuring HTTP Scanning
d. When you’ve completed configuring your file and folder exceptions, click
Save.
5. On the Java Applet Security Rules tab, select Bind local ports to allow applets
to bind to ports on the client workstation.
6. To allow applets to connect to their originating servers, select Connect to their
originating servers.
7. To allow applets to connect to hosts other than the ones they originated from,
check Enable or Disable next to Host connections, then configure exceptions to
the security policy.
a. Enter the Host that do not apply to the configured security policy.
b. Click the Add button to add the exceptions to the given security policy.
c. Add others host that do not apply to the security policy.
5-45
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
d. When you’ve completed configuring the hosts that are exceptions to the
policy’s security rules, click Save.
8. Choose Create new thread groups to allow applets to create new thread groups.
To disallow this operation, clear it.
9. Choose Create unlimited active threads to have IWSVA ignore thread activity
from applets downloaded to clients on the LAN. Clear the box and specify a limit
to restrict the number of threads applets can create at one time.
10. Choose Create unlimited active windows to limit the number of active top-level
windows applets can open. Enter the number of allowable windows in the
provided text box. Clearing this option gives applets the freedom to open as
many windows as they want — just like some malicious Java applets do to annoy
users.
11. Enter any optional Note for future reference about this policy.
12. Click Next to continue with configure ActiveX security rules if you are
configuring a new Applets and ActiveX policy. If you are modifying an existing
policy, click Save.
13. Click Deploy Policies to immediately apply the policy; otherwise, the policy is
applied after the database cache expires.
14. Enter any notes to save pertinent information about this policy, and then click
Save.
5-46
Configuring HTTP Scanning
5-47
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Certificate Expiration
IWSVA can be configured to:
5-48
Configuring HTTP Scanning
• Check that the certificate used to sign the applet has not expired
• Check that the certificates in the certification path are all valid
Revocation Status
Digital certificates can be revoked by their issuer. IWSVA can check whether a
certificate has been revoked when a status source is available.
If IWSVA cannot access the defined status source, you can configure IWSVA to set
the status of the certificate to Valid, Unsigned (Strip signature), or Invalid.
Applet Re-signing
IWSVA can re-sign instrumented applets with your company’s own “private key”
before they are sent to client workstations. Because applets lose their original
certificates during instrumentation, you might want to re-sign them to ensure that
clients’ Web browsers always accept the applets without any restrictions.
To use the re-signing feature, you need two keys: 1) a “private key” that must be
imported into IWSVA, and 2) a certificate containing the “public key” equivalent to
your “private key” that must be imported into your clients’ Web browsers. The
certificate enables the browsers to recognize the signature you affix to instrumented
applets. Without this certificate, these applets are treated as another unsigned
applet—either blocked by the browser or given limited access to system resources.
IWSVA supports the PKCS12 key format. If you do not have a key yet, you can
purchase one from any of the well-known Certificate Authorities (CAs).
To re-sign applets after instrumentation:
1. On the Java Applets tab of the Applet and ActiveX Settings page (HTTP >
Applets and ActiveX Settings), check Re-sign the applets with the following
certificate.
5-49
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
2. Type the path or click Browse to navigate to the certificate to use for re-signing.
3. Enter the certificate’s Password.
4. Click Add.
5. Click Save.
5-50
Configuring HTTP Scanning
If an applet is blocked due to its signature or certificate status, the requesting client is
presented with a message showing the policy that blocked the applet, along with the
reason:
5-51
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
5-52
Configuring HTTP Scanning
5-53
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
• Flag the certificate: Flag all signatures that use the certificate in its certification
path.
• Clear flagged certificate: Re-instate the trusted status of a certificate that was
previously flagged, so that certificates that use the certificate in their certification
path is trusted.
To view existing certificates:
1. Select HTTP > Configuration > Digital Certificates from the main menu.
2. Switch between the Active Certificates and Inactive Certificates tabs to see
which certificates are already known to IWSVA.
To add a trusted certificate:
1. Select HTTP > Configuration > Digital Certificates from the main menu.
2. Ensure the Active Certificates tab is active.
3. Click Add.
The Add Certificates screen opens.
4. Type the path or click Browse to navigate to the certificate to add and click Add.
Note: Certificates are commonly contained in files with the extensions .cer, .der, .crt.
Also note that, as stated above, only active CA certificates are considered
trusted, but any active certificate might be flagged.
The screen returns to the Active Certificates tab. The certificate that you added
should be visible, along with the type of certificate and its expiration date.
To delete a certificate:
1. Select HTTP > Configuration > Digital Certificates from the main menu.
2. Select the certificate(s) to delete.
3. Click Delete.
To de-activate a trusted certificate:
1. Select HTTP > Configuration > Digital Certificates from the main menu.
2. Make sure the Active Certificates tab is active.
3. Check the certificate(s) to de-activate.
4. Click De-activate.
5-54
Configuring HTTP Scanning
5. The certificate(s) that you selected moves to the Inactive Certificates tab.
To activate a certificate:
1. Select HTTP > Configuration > Digital Certificates from the main menu.
2. Make sure the Inactive Certificates tab is active.
3. Select the certificate(s) to activate.
4. Click Activate.
5. The certificate(s) that you selected moves to the Active Certificates tab.
To flag a certificate:
1. Select HTTP > Configuration > Digital Certificates from the main menu.
2. Make sure the Active Certificates tab is active.
3. Select the certificate(s) to flag.
4. Click Flag Certificate.
5. The flagged certificate(s) remains visible on the Active Certificates tab, with a
red flag in the status column.
To remove a certificate from being flagged:
1. Select HTTP > Configuration > Digital Certificates from the main menu.
2. Make sure the Active Certificates tab is active.
3. Select the flagged certificate(s) to be cleared (certificates with flagged status
have a red flag in the Status column).
4. Click Clear Flagged Certificate.
5. The flagged certificate(s) remains visible on the Active Certificates tab, without
a red flag in the Status column.
5-55
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
5-56
Chapter 6
6-1
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Note: For a group quota policy, the quota is for each client within the policy’s scope, and
all clients in the same policy have the same quota.
6-2
Access Quotas and URL Access Control
The options on this page depend upon the user identification method that you are
using—either IP address, Host name (modified HTTP headers), or User/group
name authentication. These settings are configured in the Administration >
Network Configuration > Deployment Mode | User Identification screen. For
more information about configuring the user identification method and defining
the scope of a policy, see Configuring the User Identification Method starting on
page 4-5.
Regardless of the user identification method you have configured, you can
always enter IP addresses of the clients to which the policy applies.
8. Type some optional notes to record any special information about the policy.
9. Click Save.
10. When returned to the Access Quota Policies page, click Deploy Policies to
immediately apply the policy; otherwise, the policy is applied after the database
cache expires.
There might be occasions when you want to temporarily deactivate a policy, without
deleting the settings from the database.
To deactivate a policy:
1. Click HTTP > Access Quota Policies from the main menu.
2. From the Access Quota Policies screen, click the linked item in either the
Account or Access quota column to take you to the Edit Policy screen.
3. Clear Enable policy at the top of the screen and then click Save.
Disabling the policy does not take effect until the policy cache refreshes, or you
click Deploy Policies.
If you no longer have any need for a policy (for example, if the employee using the
client leaves your organization), you can either delete the whole policy or users
within the policy’s scope from the IWSVA database.
To delete a policy:
1. Click HTTP > Access Quota Policies from the main menu.
2. From the Access Quota Policies screen, select the policy and then click Delete.
Deleting the policy does not take effect until the policy cache refreshes, or you
click Deploy Policies.
6-3
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
6-4
Access Quotas and URL Access Control
• Web Reputation returns the URL rating to IWSVA, any phishing or pharming
flags, and the URL category.
• If a URL is flagged for phishing or pharming, IWSVA blocks access to the Web
site.
• Next, if you are using the optional URL Filtering module, this module uses the
Web category information for the requested URL to determine if access is
permissible.
If the URL is found on the approved URL list, the URL bypasses the category
filtering and proceeds to the final step in URL access control (see URL Filtering
Exceptions on page 7-11).
If the category of the requested URL is permitted in the URL Filtering policy,
then the URL is passed on to the final step; otherwise, the URL is blocked.
• Finally, based on the Web Reputation URL rating, IWSVA determines whether
the requested URL is below or above the sensitivity level specified in the scan
policy.
If the URL is found on an approved list, IWSVA skips the sensitivity level
checking for this URL (see Specifying the Exception Lists on page 5-29).
If the rating falls below the sensitivity level, the requested URL is blocked.
However, if the rating is above the sensitivity level, IWSVA grants access.
6-5
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
for trusting are Web sites that are frequently accessed and contain content you can
control (for example, your company’s intranet sites).
Trusted URL information is kept in the [URL-trusting], normalLists
section of the intscan.ini configuration file.
When configuring trusted URLs, you can specify the sites using the following:
• The Web site, which includes any sub-sites
• Exact-match strings within a requested URL
You can apply exceptions to sites that would otherwise match the criteria for the
trusted URL list, so IWSVA scans or filters them as usual.
A list of trusted URLs and their exceptions can also be imported from a file, in
addition to configuring them through the user interface. Write a comment or title
(which IWSVA ignores) at the top of a file that contains a list of Web sites, URL
keywords, or strings, and then write one rule per line. Group sites to be blocked
under [block] as shown in the following example, and group exceptions under
[allow]:
URL Blocking Import File {this title is ignored}
[block]
www.blockedsite.com*
unwanted.com*
urlkeyword
banned.com/file
banned.com/downloads/
[allow]
www.blockedsite.com/file
www.unwanted.com/subsite/
www.trendmicro.com*
Note: For HTTPS decryption policies, the strings to match vary depending on whether
you set IWSVA in proxy or transparency mode.
- In proxy mode, IWSVA matches the domain names, not the full URL. Thus, you
only need to specify the domain names.
- In transparency mode (WCCP or bridge mode), IWSVA matches the
CommonNames in the server certificates received.
6-6
Access Quotas and URL Access Control
WARNING! When you select the “Enable Trusted URLs” option, the content of
trusted URLs will not be filtered and scanned for viruses.
6-7
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Blocking URLs
IWSVA can block Web sites and URL strings in the global blocked URL list.
Note: If you have installed the ICAP proxy handler, configure the ICAP client to scan
files in pre-cache request mode to make this feature work.
Depending on the deployment mode, you can block an HTTPs Web site by entering
the FQDN (in standalone/dependent mode) or certificate cn information (in bridge
or WCCP mode).
When configuring URLs to block, you can specify the sites using the following:
• The Web site, which includes any sub-sites
• Keyword matching within a URL
• Exact-match strings within a requested URL
You can apply exceptions to the blocked URL list so IWSVA allows requests as
usual. Using this feature, you can block a given site to allow access to some of its
sub-sites or files. The URL Blocking list (including exceptions) is maintained in the
/etc/iscan/URLB.ini file. The path for the URLB.ini file is set using the
“normalLists” parameter under the [URL-blocking] section in the intscan.ini file.
You can also block URLs based on pattern matching with the Phish pattern file
(/etc/iscan/URLB.ini), a database of patterns of Web sites associated with
phishing or related schemes.
In addition to adding the URLs through the Web console, URL block lists can be
imported from a text file.
6-8
Access Quotas and URL Access Control
the Block List and it already exists in the other list, IWSVA prevents the addition
and display a warning message stating that the entry already exists in the other list.
Configuring URLs to block:
1. Click HTTP > URL Access Control > Global URL Blocking.
2. Select “Enable URL blocking.”
3. On the Via Local List tab, type the full Web address or URL keyword, or
exact-match string in the Match field.
To identify a folder or directory in a given Web site, use a forward slash (/) after
the last character. For example, if you want to block www.blockedsite.com
but allow access to its charity directory:
a. Type www.blockedsite.com in the Match field, then click Block.
b. Type www.blockedsite.com/charity/ in the Match field, and click Do
Not Block. (If you write charity without the forward slash, IWSVA
considers www.blockedsite.com/charity as a file.)
Note: For HTTPS decryption policies, the strings to match vary depending on
whether you set IWSVA in proxy or transparency mode.
- In proxy mode, IWSVA matches the domain names, not the full URL. Thus,
you only need to specify the domain names.
- In transparency mode (WCCP or bridge mode), IWSVA matches both the
CommonNames and URLs. You must include these in the blocking list if you
want to block an HTTPS site.
4. Click Remove to remove the highlighted entries from the list (or Remove All to
remove all entries).
5. Click Save.
6-9
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
[block]
www.blockedsite.com*
unwanted.com*
urlkeyword
banned.com/file
banned.com/downloads/
[allow]
www.blockedsite.com/file
www.unwanted.com/subsite/
www.trendmicro.com*
To include the “*” and “?” characters in a URL blocking string rather than having
IWSVA consider them as wildcards, use variable %2a or %2A to represent * and
variable %3f or %3F to represent ?. For example, to block
www.example.com/*wildcard literally, specify the blocking rule as
www.example.com/%2awildcard instead of
www.example.com/*wildcard.
If importing the list is not successful, verify that you have followed the specified
format for the URL Blocking import file before contacting customer support. Be sure
you have:
• Listed blocked entries under [block] and exceptions under [allow]
• Formatted entries containing wildcards as described in this document or the
online help
To import a list of URLs to block:
1. Format a text file as described above with the URLs to block, along with any
exceptions.
2. Click HTTP > URL Access Control > Global URL Blocking from the main
menu.
3. Specify the location of the file to import in the “Import block list and
exceptions” field by clicking Browse, and click Import.
4. Click Save.
6-10
Access Quotas and URL Access Control
6-11
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
6-12
Chapter 7
URL Filtering
This chapter presents an overview and workflow of the InterScan Web Security
Virtual Appliance (IWSVA) URL filtering module with procedures for creating and
configuring URL filtering policies.
URL filtering, along with Web Reputation, is part of the multi-layered, multi-threat
protection solution provided by IWSVA (see Overview of URL Access Control on
page 6-4).
Topics in this chapter include the following:
• Introducing URL filtering and how URL filtering policies work
• Understanding the URL filtering workflow
• Creating, modifying and deleting URL filtering policies
• Configuring URL filtering settings, including managing URL categories,
selecting a Safe Search mode, setting URL filtering exceptions to blocked or
monitored sites (the default filtering action for exceptions is allowed), and setting
the work and leisure time schedules
• Creating new custom categories
• Requesting reviews of URLs misclassified into the wrong category
7-1
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
7-2
URL Filtering
• General
• Access to Web sites in each category can be allowed, blocked, or monitored
during time periods designated as work or leisure time.
• Different policies can be configured for different users in your environment.
Access to all identified URLs within a targeted category might be managed according
to policy. The database associates each URL with one or more categories. To
accurately define a Web site, the URL may belong to multiple URL categories. For
example, a shopping site that contains malware may belong to the Shopping category
as well as the Virus Accomplice category. Depending on how many URL categories
the URL falls into, the URL filtering policy may manage the access differently. In the
event a URL that your organization needs to access is associated with a prohibited
category, you can create exceptions to URL filtering rules to override the database’s
classification. The patterns specified in the Approved URL List are matched against
the URL, not to the content of the document to which the URL refers. IWSVA gives
you the option of configuring a URL filtering approved-list by matching Web site,
URL keyword, and exact-string categories.
Another way to bypass IWSVA’s default URL categorization is to create Custom
Categories and assign the necessary access privileges to allow user access.
The following are the filtering actions that you can apply for a given policy during
work or leisure time period:
• Allow—Connection to the target server is allowed and users can access the Web
site
• Block—Connection to the target server is not established and users are not
allowed to access the Web site. A log entry is also created for this event
• Monitor—Connection to the target server is allowed and users can access the
Web site. A log entry is also created for this event
7-3
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
A URL requested by a user can be classified into one or more of 82-plus categories,
which are organized into 7 pre-defined groups. IWSVA passes the requested URL
through IWSVA's URL filtering engine to be filtered according to their policies for
the user making the request. Based on the category to which the requested URL
belongs and the policy's action, the URL can be allowed, blocked, or monitored.
Note: Manual updates to the URL filtering engine can be done from the Manual Update
screen.
7-4
URL Filtering
Note: The Guest Policy is only supported if you have configured IWSVA in
stand-alone/dependent mode.
7-5
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
2. Click Add.
The URL Filtering Policy: Add Policy screen appears.
3. Type a descriptive Policy name.
Policy names that include references to the users or groups to which they apply,
for example, “URL Filtering Policy for Researchers,” are easy to remember.
4. Select the users to which the policy applies.
The options on this page depend upon the user identification method that you are
using—either IP address, Host name (modified HTTP headers), or User/group
name authentication. For more information about configuring the user
identification method and defining the scope of a policy, see Configuring the
User Identification Method starting on page 4-5.
5. Click Next.
6. On the Specify Rules screen, ensure that Enable policy is selected.
7. Select one of the following filtering actions for each URL category or sub
category:
• Allow—Connection to the target server is allowed and users can access the
Web site
• Block—Connection to the target server is not established and users are not
allowed to access the Web site. A log entry is also created for this event
• Monitor—Connection to the target server is allowed and users can access
the Web site.
8. Select to apply the filtering action during leisure or work time.
• Action During/Work Time—Select the check box of the category that you
want to apply the filtering action during work time. To select all the
categories of a group, click the check box for the group. The group does not
need to be expanded for you to select all categories in a group. Restricted
days and hours are defined in the URL Filtering Settings (Schedule tab)
page.
• Action During/Leisure Time—Select the check box of the category that
you want to apply the filtering action during leisure time. To select all the
categories of a group, click the check box for the group. The group does not
need to be expanded for you to select all categories in a group.
9. Click Apply to apply the filtering action to the selected categories.
7-6
URL Filtering
Note: Repeat steps 8 and 9 if you want to apply a different filtering action to
sub-categories in the same group.
10. Type an optional Note to include useful information about this policy for future
reference.
11. Click Next.
12. Select a Safe Search setting for each search engine and click Next.
• Strict—Filters out adult contents from all search results (including image,
video, and Web search)
• Moderate—Filters out adult contents from Web search results only
(excluding image search)
• Off—Does not filter search results. This is the default setting
13. In the Specify Exception Lists screen, select an approved URL list name from
the drop down list box if you want to apply an exception list. URLs in the
exception list will bypass URL filtering.
14. Click Save.
15. In the URL Filtering Policies screen, set the priority of the new policy (under
the Priority column) by clicking on the up or down arrows.
The Priority setting determines which policy is applied if there are accounts
belonging to two or more policies. For accounts that belong to more than one
policy, IWSVA will execute the policy on a first match bases. Policies that
contain the account after the first match policy is executed are skipped.
16. Click Save.
17. To immediately apply the policy, click Deploy Policies Now; otherwise, the
policy is applied after the database cache expires.
7-7
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
2. Click the Account Name or Policy Name links of the policy to be modified.
3. The URL Filtering Policy: Edit Policy screen opens.
• Change the scope of your policy by adding or deleting clients on the
Account tab.
• From the Rule tab, modify filtering action for the URL categories.
• From the Safe Search Engine tab, change the Safe Search mode for each
search engine.
• From the Exception tab, select an exception list that you want to apply to
this policy.
4. Click Save.
5. Go to HTTP > URL Filtering > Policies and set the priority of your policies
using the arrows. The Priority setting determines which policy is applied if there
are accounts belonging to two or more policies.
6. Click Save.
7. Click Deploy Policies to immediately apply the policy; otherwise, the policy is
applied after the database cache expires.
7-8
URL Filtering
The HTTP > Configuration > Custom Categories screen displays a list of
user-defined categories. Click Add to create a new one or click a category name to
edit an existing one.
• Category Name—Type a brief but descriptive name for the custom category.
Names must be unique.
• Match—Enter a Web site, a keyword or phrase, or a string of characters in the
field, and then tell IWSVA how to apply the match. This field supports both the ?
and * wildcards. Entries in this field are added one-by-one to the custom
category.
Note: For HTTPS decryption policies, the strings to match vary depending on
whether you set IWSVA in proxy or transparency mode.
- In proxy mode, IWSVA matches the domain names, not the full URL. Thus,
you only need to specify the domain names.
- In transparency mode (WCCP and Bridge mode), IWSVA matches the
CommonNames in the server certificates received.
• Web site—Limits the search to the string as a whole; used with one or more
wildcards, this type of setting can be especially useful for applying the
configured URL filtering action o an entire Web site. There is no need to
include http:// or https:// in the URL (it is automatically stripped).
• URL keyword—Looks for any occurrence of the letters and/or numbers
within a URL, and will match regardless of where the string is found (the
string "sex" would be considered a match for
"http://www.encyclopedia/content/sexton.htm" and the page blocked). Using
wildcards in this field greatly increases the chance of false positives and
unexpected results.
• String—Limits the search to the string as a whole, for example to target a
specific site, page, file, or other particular item.
• Import URL List—You can import an existing list of URLs that you want to add
to a category. For example if you have a list of your competitors’ URLs you have
compiled using a text editor, you can import the list rather than enter them
one-by-one. Import lists must conform to a defined standard (refer to the online
help for more information).
7-9
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Requesting a Reclassification
To request a URL reclassification:
1. Click HTTP > URL Filtering > Settings from the main menu.
2. Click the URL Re-classification & Lookup tab.
7-10
URL Filtering
FIGURE 7-1 Trend Micro Online URL Query - Feedback System screen
Note: IWSVA still applies Safe Search filtering to Web sites in the approved URL list.
7-11
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
3. Click Save.
Note: It is assumed that all IWSVA devices in a cluster are within the same time zone.
7-12
URL Filtering
• For Work time 1, choose “0:00” in the From drop-down list and “11:59” in
the To drop-down list.
• For Work time 2, choose “12:00” in the From drop-down list and “23:59” in
the To drop-down list.
7-13
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
7-14
Chapter 8
FTP Scanning
This chapter describes FTP virus scanning and the different ways FTP scanning can
be deployed and configured for your environment.
Topics in this chapter include:
• Understanding similarities and differences between FTP and HTTP virus
scanning
• Configuring FTP scanning proxy options (stand-alone vs. FTP proxy)
• Understanding data connection options (passive FTP vs. active FTP)
• Configuring FTP scanning options
• Setting FTP access control settings
8-1
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Introduction
InterScan Web Security Virtual Appliance (IWSVA) can scan FTP uploads and
downloads for viruses and other malicious code in a manner similar to how it
processes HTTP traffic. Unlike HTTP scanning, however, a single configuration is
applied to all clients on your network—user or group-based policies are not
supported for FTP scanning.
IWSVA FTP scanning uses either a stand-alone proxy or works in conjunction with
another FTP proxy on the network. To deploy FTP scanning into your environment,
first configure the FTP settings that control the type of proxy and the type of data
connection (either passive or active FTP; see Passive and Active FTP starting on
page 8-3). The next step is to configure the scanning rules that control the traffic
direction that is scanned, the type of files to block or scan, how compressed and large
files are handled, and the actions taken when malicious code is detected.
After setting the FTP scanning settings, there are optional security and performance
settings to consider modifying. Access control lists can be configured to selectively
allow client FTP access based on the client’s IP address. To improve performance
when frequently accessing FTP sites over which you have direct control of the
content, specific FTP servers can be added to an approved list so that downloads
from them are not scanned. Moreover, to further lock down the IWSVA device, FTP
access to specific ports can either be allowed or denied.
Note: IWSVA does not support active FTP scanning in WCCP mode.
FTP Settings
IWSVA FTP scanning settings include options for using either the IWSVA native
(stand-alone) proxy or a separate FTP proxy, two options for how data connections
are made (active FTP vs. passive FTP).
Proxy Settings
IWSVA FTP scanning provides two proxy options—a “stand-alone” mode whereby
clients connect to the native IWSVA proxy that later connects with the FTP server,
8-2
FTP Scanning
and an “FTP proxy” mode whereby IWSVA passes requests through a separate FTP
proxy that in turn connects to the FTP server.
• In stand-alone mode, the client needs to use <username>@<FTP server
name> as the FTP username to indicate which FTP server IWSVA should
connect to.
• In FTP proxy mode, no username is required because IWSVA always connects to
the FTP proxy and server designated in the configuration settings.
FTP proxy mode can also be used to protect a single FTP server by specifying the
FTP server’s hostname/IP address and port number in the FTP proxy configuration.
In this case, the IWSVA FTP scanning module is dedicated to the specified FTP
server, in a manner similar to a reverse proxy for HTTP scanning.
Client Requests
To configure the FTP settings, you need to specify the proxy settings and the data
connection.
To configure the FTP settings:
1. Click FTP > Configuration > General from the main menu.
2. Under the Proxy Settings section, select the appropriate FTP setting based on
your topology—either Use stand-alone mode if you want the native IWSVA
proxy to connect to FTP sites, or Use FTP proxy for the FTP service to work
8-3
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
with an existing FTP proxy (specify the host name of the Proxy server and the
Port).
3. Choose the type of data connection to use—either Passive FTP or Active FTP.
4. Click Save.
8-4
FTP Scanning
Scan Direction
Depending on how you want to use IWSVA FTP scanning, you can selectively
configure the FTP scanning module to scan uploads, downloads or both. For
example, if you have deployed antivirus software to all of the workstations in your
organization, disabling uploads might be justified to achieve a performance benefit,
because the files should already be scanned on the client.
File Blocking
You can identify the types of files to block for security, monitoring or performance
purposes. You can block file types such as Java applets, Microsoft Office documents,
audio/video files, executables, images, or other types that you can manually
configure. If your organization has policies that prohibit certain types of files in your
network, IWSVA FTP file blocking can stop them at the FTP gateway.
File Scanning
When configuring the types of files to be scanned, there are three options:
• All scannable files: All files are scanned (the safest option).
• IntelliScan: Only file types known to harbor viruses are scanned (file type is
determined by checking the file header). See About IntelliScan starting on page
5-18 for more information.
• Specified file extensions: Only files with specified file extensions are scanned.
Trend Micro recommends scanning all files, unless performance considerations
require choosing one of the other options. See Configuring FTP Scanning Settings on
page 8-7 for more information.
8-5
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Note: IWSVA can also block specified file types within a compressed file during FTP
scanning.
Note: The FTP scanning module does not support the “scan before delivering” large file
handling methods used by the HTTP scanning module.
8-6
FTP Scanning
8-7
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
only those file types that are explicitly specified in the Default Extensions
list and in the Additional Extensions text box. The default list of extensions
is periodically updated from the virus pattern file.
Use this option, for example, to decrease the aggregate number of files
IWSVA checks, therefore, decreasing the overall scan times.
Note: There is no limit to the number or types of files you can specify. Do not
precede an extension with the (*) character. Delimit multiple entries with a
semicolon.
WARNING! The partial delivery of a file might result in a virus leak; therefore,
this would be a performance versus an absolute security choice for
you. Use this option only when you are currently experiencing an
issue with timeouts.
9. To encrypt files sent to the quarantine directory to prevent them from being
inadvertently opened or executed, select Encrypt quarantined files.
10. Click Save and switch to the Spyware/Grayware Scan Rule tab.
8-8
FTP Scanning
11. Select the types of additional risks to scan for, and click Save.
12. In the Exceptions tab, select an approved file name list from the drop-down list.
Select Do not scan the contents of selected approved lists if you do not want to
scan the contents of the files in the approved lists for viruses. In addition,
compressed file handling action will not be applied.
13. Switch to the Action tab, and select the actions for IWSVA to take in response to
scanning.
14. Click Save.
8-9
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
By Client IP
By default, all clients on the network are allowed to access FTP sites through the
IWSVA device (provided FTP traffic is enabled, see Enabling FTP Traffic and FTP
Scanning starting on page 8-4).
To limit FTP access based on client IP address:
1. Click FTP > Configuration > Access Control Settings from the main menu.
2. Switch to the Client IP tab.
3. Select Enable FTP Access Based on Client IP.
4. Enter the IP addresses of clients allowed FTP access through IWSVA. The
following are acceptable entries:
• IP: a single IP address, for example, 123.123.123.12.
8-10
FTP Scanning
Note: Skipping scanning through the IP approved list only applies to file downloads.
Uploaded files are still scanned.
8-11
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Note: The destination port list at the bottom of the Destination Port tab reflects the
processing order (or reverse priority order). Destination port access control is only
applied during an FTP command connection, and FTP data connections are not
affected. A typical configuration is 1. “Deny ALL” and 2. “Allow 21” which
results in only allowing access to port 21.
8-12
Chapter 9
SSH Access
Access to the IWSVA CLI interface can be obtained through the IWSVA terminal
(keyboard and monitor connected directly to the IWSVA server) or remotely using a
SSH v2 connection to the management IP address. Before you access the CLI using
SSH, you must first enable SSH access control in the Web console (Administration
> Network Configuration > Interface Configuration > Remote CLI).
9-1
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Command Modes
To access the CLI interface, you will need to have the administrator account and
password. IWSVA's CLI commands are separated into two
categories—non-privileged and privileged commands.
Non-privileged commands are basic commands that allow the administrator to obtain
specific low security risk information and to perform simple tasks. The
non-privileged command prompt ends with an angle bracket (>).
Privileged commands provide full configuration control and advanced monitoring
and debugging features. To use privileged commands, type enable and the
password for the Enable account. The screen displays enable# as the privileged
command prompt. To return to non-privileged commands, type exit.
Command List
The following table lists the available commands:
9-2
Command Line Interface Commands
admin squid vacuum admin squid vacuum Vacuum the squid cache
9-3
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
9-4
Command Line Interface Commands
9-5
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
9-6
Command Line Interface Commands
configure ssh port configure ssh port <port> Configure SSH port num-
ber
port PORT SSH port num-
ber [1 ~ 65535]
9-7
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
9-8
Command Line Interface Commands
9-9
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
9-10
Command Line Interface Commands
9-11
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
9-12
Command Line Interface Commands
disable https acclog- disable https acclogfullurl Disable full HTTPS URL
fullurl record for access log
disable verbose ftp disable verbose ftp Disable verbose FTP logs
9-13
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
enable https acclog- enable https acclogfullurl Enable full HTTPS URL
fullurl record for access log
enable squid proxy enable squid proxy down- Enable squid proxy server
downstream stream before IWSVA
enable squid proxy enable squid proxy Enable squid proxy server
upstream upstream after IWSVA
enable verbose ftp enable verbose ftp Enable verbose FTP logs
9-14
Command Line Interface Commands
9-15
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
service ftpd restart service ftpd restart Restart the FTP traffic
scanning daemon
9-16
Command Line Interface Commands
service ftpd start service ftpd start Start the FTP traffic scan-
ning daemon
service ftpd stop service ftpd stop Stop the FTP traffic dae-
mon
service httpd restart service httpd restart Restart the HTTP traffic
scanning daemon
service httpd start service httpd start Start the HTTP traffic
scanning daemon
service httpd stop service httpd stop Stop the HTTP traffic dae-
mon
service logtodb start service logtodb start Start the daemon that
saves logs to database
service logtodb stop service logtodb stop Stop the daemon that
saves logs to database
service maild restart service maild restart Restart the email notifica-
tion daemon
service maild start service maild start Start the email notification
daemon
service maild stop service maild stop Stop the email notifica-
tion daemon
9-17
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
service wccpd restart service wccpd restart Restart the WCCP dae-
mon
service wccpd start service wccpd start Start the WCCP daemon
service wccpd stop service wccpd stop Stop the WCCP daemon
service webui restart service webui restart Restart the tomcat dae-
mon
9-18
Command Line Interface Commands
service webui start service webui start Start the tomcat daemon
service webui stop service webui stop Stop the tomcat daemon
show config all show config all View the all the config
files.
9-19
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
show disk partition show disk partition [parti- Report filesystem usage
tion] partition STRING
[optional partition] []
show disk partition show disk partition read- Report readable filesys-
readable able [partition] tem usage
partition STRING
[optional partition] []
show disk space show disk space [target] Report file space usage
target STRING [optional
directory or filename] [/]
show disk space show disk space readable Report readable file space
readable [target] usage
target STRING [optional
directory or filename] [/]
9-20
Command Line Interface Commands
show file intscan show file intscan View the intscan config
file
9-21
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
show ldap group- show ldap groupcache Display IWSVA LDAP user
cache interval interval group membership cache
interval
9-22
Command Line Interface Commands
show log admin show log admin View the admin log file
[log_suffix] log_suffix LOGSUFFIX
[log_suffix] []
9-23
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
show log ftp show log ftp [log_suffix] View the ftp log file
log_suffix LOGSUFFIX
[log_suffix] []
show log http show log http [log_suffix] View the http log file
log_suffix LOGSUFFIX
[log_suffix] []
show log mail show log mail [log_suffix] View the mail log file
log_suffix LOGSUFFIX
[log_suffix] []
show log postgres show log postgres View the postgres log
show log squid show log squid View the squid proxy log
show log tmudump show log tmudump View the tmudump log file
show log update show log update View the update log file
[log_suffix] log_suffix LOGSUFFIX
[log_suffix] []
show metrics ftp show metrics ftp Display IWSVA ftp perfor-
mance metrics
show metrics http show metrics http Display IWSVA http per-
formance metrics
show mgmt status show mgmt status Display the status of the
separate management
interface
9-24
Command Line Interface Commands
show open files show open files [target] Display open files
target STRING [optional
directory or filename] []
show process stack show process stack <pid> Print a stack trace of a
running process
pid UINT <pid>
show process trace show process trace <pid> Trace system calls and
signals
pid UINT <pid>
show redirect ftp- show redirect ftpports Display the FTP redirec-
ports tion port numbers.
9-25
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
show redirect http- show redirect httpports Display the HTTP redirec-
ports tion port numbers.
show statistic ether- show statistic ethernet a Display both listening and
net a non-listening sockets.
show statistic ether- show statistic ethernet all Display all network inter-
net all faces.
show webserver port show webserver port Display Web server port
settings
9-26
Command Line Interface Commands
stop process core stop process core <pid> Stop a running process
and generate a core file
pid UINT <pid>
9-27
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
9-28
Chapter 10
10-1
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Summary Reports
The IWSVA console opens to the Summary screen that displays the System
Dashboard with real-time, dynamic system information. Other available reports
display static information. Tabs on the Summary screen gives access to the following
information:
• Real-time Statistics
• Scanning Activity
• URL Activity
• Spyware Activity
• Security Risk Reporting
Real-time Statistics
IWSVA provides dynamic statistics where the administrator can view the “real-time”
information about the IWSVA system. These statistics are displayed as graphs in the
System Dashboard tab of the Summary page and include the following:
• Virus and Spyware Trend Display
• Component Update Status Display
• Hard Drive Display
• Bandwidth Display
• Concurrent Connections Display
• CPU Usage Display
• Physical Memory Usage Display
The “Virus and Spyware Trend” tab displays the latest information as to when the
report was generated. The information displayed is not updated in real time as in the
other dynamic real-time reports of the Summary (System Dashboard tab) screen.
10-2
Reports, Logs, and Notifications
Note: If the system time is adjusted backward (either manually or through automatic
network time server synchronization), IWSVA will stop gathering real-time
statistics information. To have IWSVA collect real-time statistics information, you
must restart the metric management daemon. Type the following commands in the
CLI:
/etc/iscan/S99ISMetricMgmtd stop
/etc/iscan/S99ISMetricMgmtd start
Note: Because each day’s virus and spyware data is represented by a single point on the
display, IWSVA cannot start graphing data until there are two points, or two days
worth of data available.
The information in the Virus and Spyware display is for the entire IWSVA
installation (single server and up to a server farm).
10-3
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
If the database resides on the same drive as any of these directories, then the database
disk usage is also included in the display. The scale along the Y-axis ranges from 10
to 100 percent.
You can specify threshold alert values and the frequency of alerts so that you are
notified when any of the hard disk statuses reach a critical level. IWSVA can send
these alerts either through email, SNMP trap/notification (if enabled), or both. SNMP
traps are sent when a configured threshold value is met.
Bandwidth Display
This is a dynamic display that shows the bandwidth usage of both inbound and
outbound traffic for HTTP and FTP. IWSVA sees traffic in terms of requests and
responses. Therefore, the display interprets all requests as outbound traffic and all
responses as inbound traffic. From this display, you can view any potential
bandwidth problems.
The display shows ten data points, which gives the graph a history of five to ten
minutes of activity. This activity is only monitored for the local IWSVA device. With
the ideal refresh rate being between 30 and 60 seconds, the display has a default
refresh rate of 30 seconds.
Clicking the 1-day or 30-day button opens a window that shows a static chart with
one or 30 days of usage, respectively. IWSVA retrieves this information from the
database. If the database does not contain enough data, the display shows the data
that is available.
Note: The 30-day display option shows each day’s bandwidth usage data by a single
point. For the 1-day display option, the screen shows the bandwidth usage for each
hour of the day by a single point. IWSVA cannot start graphing data until there are
two points worth of data available.
You can specify threshold alert values and the frequency of alerts so that you are
notified when a bandwidth usage reaches a critical level. IWSVA can send alerts
either through email, SNMP trap/notification (if enabled), or both. See Email
Notification Settings on page 10-34.
10-4
Reports, Logs, and Notifications
Note: The bandwidth setting should be very high—above “out of normal range” values to
avoid frequent alerts.
Note: The 30-day display option shows each day’s CPU usage data by a single point. For
the 1-day display option, the screen shows the CPU usage for each hour of the day
by a single point. IWSVA cannot start graphing data until there are two points
worth of data available.
10-5
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Clicking the 1-day or 30-day button opens a window that shows a static chart with
one or 30 days of physical memory usage, respectively. IWSVA retrieves this
information from the database. If the database does not contain all the data, the
display shows the data that is available.
Note: The 30-day display option shows each day’s physical memory usage data by a
single point. For the 1-day display option, the screen shows the physical memory
usage for each hour of the day by a single point. IWSVA cannot start graphing data
until there are two points worth of data available.
10-6
Reports, Logs, and Notifications
Scanning Activity
Activities pertaining to scanning are available from the Scanning tab. They include
the following:
• Enabling and disabling HTTP and FTP traffic (available from all Summary page
tabs)
• Access links to Trend Micro’s Web threat protection sites (available from all
Summary page tabs)
• Displaying malware names and frequency of occurrence in scanning results by
selected time period
• Top 5 Virus/Malware Risk (last 7 days) based on IP Address /Host name/User
name
• Refreshing scanning results
The Scanning tab displays the names of top 5 most detected virus/malware and
devices at risk. In addition, you can also view scanning results by selected time
period.
URL Activity
Activities pertaining to URL activity are available from the URL tab. This screen
includes the top URLs/categories/phishing sites blocked for the past seven days and
URL activity by selected time period displays of the following items:
• Most blocked URL
• Most blocked URL category
• Most blocked phishing site
• URL activity summary
Spyware Activity
Activities pertaining to spyware activity are available from the Spyware tab. This tab
displays scanning information about the following:
• Top 5 Detected Spyware (last 7 days) — This section gives the spyware name
and the option to add it to the exceptions list.
10-7
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
• Top 5 Spyware Risks (last 7 days) — This sections lists the User ID where the
risk initiates.
• Scanning results for (Today, Past week, or Past month)—This sections lists
the spyware name and frequency of occurrence.
• Cleanup results for (Today, Past week, or Past month) — This section lists the
malware type and the number of each type cleaned.
10-8
Reports, Logs, and Notifications
email malware statistics. See Enabling HTTP Scanning and Applets and ActiveX
Security on page 5-2 to view the Threat Resources drop-down list.
Introduction to Reports
IWSVA can generate reports about virus and malicious code detections, files
blocked, URLs accessed and DCS cleanups. You can use this information about
IWSVA program events to help optimize program settings and fine tune your
organization’s security policies.
You can configure and customize reports. For example, IWSVA allows you to
generate reports for all or specific user(s), all or specific group(s), either on demand
(in real time) or on a scheduled basis.
In addition, for scheduled report, you can create report templates based on
user(s)/group(s) or report type. To allow you to share the selected report information
with those who need it, IWSVA can send the generated report through email as file
attachments.
10-9
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Types of Reports
IWSVA can generate the following categories of reports:
• Violation-event reports: Reports about virus detections, policy violations,
blocked URLs, and monitored URLs
• Spyware/Grayware reports: Reports about spyware detections
• Cleanup reports: Reports about DCS cleanup attempts requested by IWSVA
• Traffic reports: Reports about Web browsing activity, the most popular Web
sites and downloads, and other details about Web browsing activity
• URL filtering category reports: Reports about a main category or selected
sub-categories
• Individual/per user reports
The following sections describe all available reports.
Violation-event Reports
IntelliTrap is used to detect potentially malicious code in real-time, compressed
executable files that arrive with HTTP(s) data. When IntelliTrap detects a malicious
executable file, the detection appears in Violation-event reports.
• Riskiest URLs by viruses detected
• Users with most requests for malicious URLs
• Most violations by user
• Most violations by group
• Most blocked URL categories**
• Most monitored URL categories**
• Most blocked Applets and ActiveX objects**
• Most blocked URLs
• Most monitored URLs**
• Most blocked URLs by day of the week
• Most blocked URLs by hour
• IntelliTunnel report
** Additional license is required to access report(s)
10-10
Reports, Logs, and Notifications
Spyware/Grayware Reports
• Spyware/grayware detection by category
• Top spyware/grayware detections
• User with most Spyware/Grayware infections
Cleanup Reports**
• Cleanup events by category
• Top cleanup events by name
• Most infected IP addresses
**Additional license is required to view report(s)
Traffic Reports
For traffic reports, you need to enable “Log HTTP/HTTPS/FTP access events” in
Logs > Log Settings.
Traffic reports might take a long time to generate; that is, up to a few hours for large
sites with extensive access logs.
• Most active users
• Most popular URLs
• Most popular downloads
• Most popular search engines
• Daily traffic report
• Activity level by day of the week
• Activity level by hour
• Top categories (weighted)*
* To access the top categories report, you must have a URL Filtering activation code.
10-11
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Report Settings
When generating a real-time report or setting up scheduled reports, you need to
specify the information in this section.
10-12
Reports, Logs, and Notifications
When generating reports for specific users or groups, the user selection method is
determined by the method configured under Administration > Network
Configuration > Deployment Mode | User Identification. For more information
about user identification, see Configuring the User Identification Method starting on
page 4-5.
Options
IWSVA can present program information in either bar, stacked bar or line charts.
Different chart shading for URLs or downloads blocked by IWSVA versus successful
requests can also be used.
10-13
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Generating Reports
Real-time Reports
IWSVA enables you to generate reports in real time for either all or a subset of the
clients accessing the Internet. You can save the generated real-time report in PDF or
CVS format (click the corresponding link on the upper left corner in the report
screen).
To configure real-time reports:
1. Click Reports > Real-Time Reports in the main menu.
2. Under “Time period,” select a time period for the report (either All Dates,
Today, Last 7 days, Last 30 days). Or click Range to generate a report in a
given time range, and then select the From and To dates.
3. Under Report by, select the users for which the report is generated—either All
users, Specific user(s), All groups, or Specific group(s). For more information
about running reports for specific users or groups, see To select specific group(s):
and To select specific user(s): starting on page 10-15.
4. Under Generate Report by Protocol, select the Web protocol for which you
want to generate a report.
5. Under Report Type, select the report type(s) and enter the desired report record
number(s).
Note: IWSVA groups multiple report parameters into a single report, with each
report parameter having its own section.
6. Under Options, select the chart type from the menu. To denote blocked traffic
from unblocked traffic using different shading, select “Distinguish blocked
from unblocked traffic.”
7. Click Generate Report.
Click Reset to reset the form to the default values.
10-14
Reports, Logs, and Notifications
The following table provides information about the parameters that can comprise a
report:
* For Web Reputation (including anti-pharming and anti-phishing), blocked sites appear in these
reports. But to find a blocked site, the information is only in “Most blocked URLs.”
10-15
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
2. Under Report by, select Specific user(s), and then click Select.
When you click Select on Specific user(s) (Reports > Real-time Reports >
Report by), the Select Users pop-up screen opens according to the setting made
in the user identification method (Administration > Network Configuration >
Deployment Mode | User Identification).
3. Type the IP address, Host name or search for a user name in your LDAP
directory if using the “User/group name authentication” identification method.
4. Click Add.
5. After adding the users to include in the report, click Save.
Scheduled Reports
You can configure IWSVA to generate scheduled reports on a daily, weekly, or
monthly basis.
To configure scheduled reports:
1. Create a new report template in the Reports > Report Template (see Scheduled
Report Templates on page 10-17).
1. Click Reports > Scheduled Reports > Daily Reports|Weekly
Reports|Monthly Reports from the main menu.
2. Click Add or a report name to edit it.
3. Enter a name for the new report. Set the time and/or date to generate the
scheduled report.
4. Under Report template, select a template from the drop down list.
5. Select Email this report and the attachment format, and type the email
address(es) to which IWSVA should send the generated report as a file
attachment. You must also enter the From and Subject fields. Separate multiple
email addresses with a comma.
6. Click Save.
To delete a scheduled report:
1. Click Reports > Scheduled Reports > Daily Reports|Weekly
Reports|Monthly Reports in the main menu.
2. Select the report setting to remove and then click Delete.
10-16
Reports, Logs, and Notifications
Note: Deleting a scheduled report will not remove the associated report template.
10-17
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
2. Select the name of the template you want to make a copy of. Click Copy. The
Add Template screen displays with the settings of the template you have
selected.
3. Enter a different name in the Template Name field and make changes to the
template if required.
4. Click Save.
Customizing Reports
You can configure IWSVA to archive scheduled reports. The default path for
archiving reports is /var/iwss/report but can be modified. The default
configuration is to archive 60 daily reports, 20 weekly reports, and four monthly
reports before deleting them from the server, but you can configure the number of
scheduled reports to save.
10-18
Reports, Logs, and Notifications
Note: When changing the Archive Directory, the folder must exist on the
IWSVA device before it is entered into the Report Customization page.
In order to view reports already generated, copy them over to the new
folder.
Introduction to Logs
There are two types of logs available with IWSVA: reporting logs and system logs.
Reporting logs provide program event information, and the IWSVA Web console can
be used to query and view them. These logs include:
• Virus
• URL blocking
• URL filtering
• Performance
• System events
• URL access
System logs contain unstructured messages about state changes or errors in the
software, and are only visible by viewing the log file—they cannot be seen from the
Web console. System logs include:
• HTTP scan
10-19
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
• FTP scan
• Mail delivery daemon
• Administration, Update, and Audit trails
The IWSVA database stores all log data, but log data can also be stored in text log
files for backward compatibility with previous IWSVA versions or used with an
external reporting tool. Storing the log data in text log files provides redundancy to
verify that the database is properly updated. Trend Micro recommends using the
database as the only storage location for log data.
In addition, IWSVA provides syslog capabilities. This allows you to configure
IWSVA to send specified logs to one or more external syslog servers.
10-20
Reports, Logs, and Notifications
Note: When the access log is enabled, the IWSVA service is restarted. During the restart,
a router might take up to 30 seconds to recognize IWSVA again, during which the
router does not redirect packets.
Audit Log
The audit log contains information that describes any configuration changes that
users make to the application. For instance, after a migration or rollback procedure is
activated by a user, an entry recording the migration activity is created in the audit
log.
To view the audit log:
1. Click Logs > Log Query > Audit Log in the main menu.
2. Under Time period, select the time for which you want a report generated.
Click Range to view the virus log in a given time range, then select the start and
end dates.
3. Under User(s), select the user(s) for which you want to view log entries. Click
Add (or Add All for all users listed). To remove user(s) from the right list box,
click Remove (or Remove All for all users listed).
4. Under the Sort by section, select an option by which to sort the display log. The
options are “User” and “Date.”
5. Click Show Log. The Audit Log screen opens.
6. Click Refresh to update the screen.
Cleanup Log
The cleanup log contains information returned by DCS after it performs a cleanup of
the client machine. If no response is returned from a DCS server, there is no entry for
that clean up request.
To view the virus log:
1. Click Logs > Log Query > Cleanup Log in the main menu.
10-21
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
2. Select a Time period (All Dates, Today, Last 7 days, Last 30 days).
Click Range to select a time range, then select the start and end dates.
3. Under Malware cleaned, select the malware name(s).
Highlight the names to add, and then click Add (or Add All for all viruses
listed). To remove malware name(s) from the right list box, click Remove (or
Remove All for all viruses listed).
Under some circumstances, DCS is unable to connect to a client machine when
IWSVA sends the cleanup request. Because no malware is cleaned during these
attempts, querying the cleanup log by malware name does not display any
information. To view logs about cleanup attempts when DCS could not
successfully connect to the client machine, select Show connection failure
events.
4. Under the Sort by section, select a sort option (Malware, Date, IP address,
Action, Type, and Subtype).
5. Click Show Log. The Cleanup Log viewing screen opens.
6. Click Refresh to update the screen.
10-22
Reports, Logs, and Notifications
Performance Log
The performance log contains information about server performance. Each
performance metric record contains:
• Date and time the metric was recorded
• IWSVA device that recorded the metric
• Metric name (one of: HTTP Requests Processed, HTTP Responses
Processed, Number of HTTP threads, HTTP CPU % Utilization)
• Metric value
To view the performance log:
1. Open the IWSVA Web console and click Logs > Log Query > Performance
Log in the main menu.
2. Select a Time period (All Dates, Today, Last 7 days, Last 30 days) from the
drop-down menu.
Click Range to select a time range, then select the start and end dates.
3. Under Sort by, select a sort order.
4. Click Show Log. The Performance Log viewing screen opens.
5. Click Refresh to update the screen.
Spyware/Grayware Log
The spyware/grayware log contains information about spyware/grayware detected by
IWSVA, including the name of the spyware/grayware, date, action, category, scan
type, file name affected, user ID of the client involved, and Web protocol.
10-23
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
10-24
Reports, Logs, and Notifications
10-25
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Note: You can also find an entry in the URL Blocking Log when an FTP proxy
blocks a file by type.
10-26
Reports, Logs, and Notifications
Note: Network address translation might render this data meaningless, or at least
make it appear that all access occurs from a single client. Also, when the
access log is enabled, the IWSVA service is restarted. During the restart, a
router might take up to 30 seconds to recognize IWSVA again, during which
the router does not redirect packets.
• Domain accessed
• Path portion of the URL (the HTTP service can get the full URL path)
• IP address of the server from which the data was retrieved
• The URL category for every access event
To view the URL access log:
1. Open the IWSVA Web console and click Logs > Log Query > URL Access Log
in the main menu.
10-27
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
2. Select a Time period (All Dates, Today, Last 7 days, Last 30 days) from the
drop-down menu.
Click Range to select a time range, then select the start and end dates.
3. Under Protocol, select a Web protocol type for which you want to view logs.
4. Under Sort by, select a sort option.
5. Click Show Log. The URL Access Log viewing screen opens.
6. Click Refresh to update the URL access log.
Virus Log
The virus log contains information about viruses that IWSVA has detected.
To view the virus log:
1. Click Logs > Log Query > Virus Log in the main menu.
2. Under Time period, select the time for which you want a report generated.
Click Range to view the virus log in a given time range, then select the start and
end dates.
3. Under Viruses, select the virus(es) for which you want to view log entries. Click
Add (or Add All for all viruses listed). To remove virus(es) from the right list
box, click Remove (or Remove All for all viruses listed).
4. Under Protocol, select a Web protocol type for which you want to view logs.
5. Under the Sort by section, select an option by which to sort the display log.
6. Click Show Log. The Virus Log screen opens.
7. Click Refresh to update the screen.
Deleting Logs
If you no longer need to refer to text log files, you can delete them from the directory.
Note: The following procedure deletes text log files; logs in the database cannot be
deleted manually. Configure a scheduled deletion for database logs on the Logs >
Log Settings screen.
10-28
Reports, Logs, and Notifications
Log Settings
From the Log Settings screen, you can configure:
• Directories for reporting and system logs (for the text log files only)
• Whether to gather performance data or log HTTP/HTTPS/FTP access events,
and the logging interval for each
• Database log update interval, and the number of days to keep logs in the database
• Whether to write logs to database and log files, to the database only, or to the log
file only
Note: Text log files cannot be automatically deleted—they can be manually deleted on
the Logs > Log Deletion screen. Database logs cannot be manually deleted—a
deletion schedule can be configured on the Logs > Log Settings screen.
10-29
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
3. Click Save.
To configure the system log directories:
1. Click Logs > Log Settings > System Logs.
2. In the corresponding text boxes, type the folder locations for the log files.
3. Click Save.
System Logs
On the System Logs tab, configure the number of days to retain system logs before
automatically deleting them (default = 5 days).
Reporting Logs
On the Reporting Logs tab, you can configure IWSVA to gather performance data
and log HTTPs/HTTP/FTP access events. If you enable these, configure the logging
interval.
The default time period that logs are kept in the database is 30 days; customize this to
reflect your specific environment’s needs. In addition, set the time interval that the
database is updated with new logs (default = 30 seconds).
10-30
Reports, Logs, and Notifications
The naming conventions for each type of log are described in the table below:
V IRUS L OG virus.log.yyyy.mm.dd
P ERFORMANCE L OG perf.log.yyyy.mm.dd
FTP L OG ftp.log.yyyymmdd.0001
HTTP L OG http.log.yyyymmdd.0001
U PDATE L OG update.log.yyyymmdd.0001
A UDIT L OG audit.trail.log
10-31
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Note: Deleting a log does not necessarily prevent the corresponding data from appearing
in the IWSVA Web console. To prevent IWSVA from displaying data, you must
remove the corresponding data from the appropriate database table.
10-32
Reports, Logs, and Notifications
Syslog Configuration
With syslog server support, IWSVA can send logs to external syslog servers. You can
configure up to a maximum of four syslog servers and specify the type or priority
level of the logs to send to each syslog server.
To configure a syslog server:
1. Click Logs > Syslog Configuration in the main menu.
2. Click Add.
3. For Syslog Server Settings:
a. Select Enable Syslog to allow IWSVA to send logs to this syslog server
b. Specify the Server Name/IP Address
c. Specify the UDP Port (the default is 514)
4. Under Save the Following Logs, specify the logs to send. You can select to send
events to the syslog server by either the log type or the syslog priority level.
• Click By log type and select the type(s) of logs. Or,
• Click By syslog priority level and select the level(s)
5. Click Save.
10-33
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Introduction to Notifications
Notifications can be issued in response to scanning, blocking, alerting, and program
update events. There are two types of notifications—administrator notifications and
user notifications:
• Administrator notifications provide information about HTTP(s) scanning,
HTTP(s) file blocking, FTP blocked file type, FTP scanning, threshold alerts,
restricted tunnel traffic, and Applets/ActiveX security events, as well as pattern
file and scan engine updates. IWSVA sends administrator notifications through
email to addresses that you configure in the Email Settings screen.
• User notifications provide information about HTTPs access error, HTTPs
certificate warning, HTTP(s) scanning, HTTP(s) file blocking, FTP scanning,
URL blocking, FTP blocked file type, and Applets/ActiveX scanning events.
IWSVA presents user notifications in the client’s browser or FTP client in lieu of
the prohibited Web page or file that the client is trying to view or download.
The messages presented in both the administrator and user notifications are
configurable and can include “tokens” or variables to customize notification
messages with information about the event. In addition, user notification messages
support HTML tags to customize the appearance of the message and provide links to
other resources, such as security policy documents hosted on your intranet.
10-34
Reports, Logs, and Notifications
5. Click Save.
Notification Tokens/Parameters
To make notifications more meaningful, IWSVA can use tokens (or variables) as
information placeholders in a notification. When an event occurs, IWSVA
dynamically substitutes the specific information in place of the variable, providing
detailed information about that specific event.
For example, you could create a generic notification as follows:
A virus was detected in HTTP traffic.
This notification lets you know there is a problem, but does not provide any details.
Instead, you could configure the notification using variables as follows:
On %Y, IWSVA detected a security risk %v in the file %F. %N
attempted to download the file from %U.
With this information, administrators can contact the client and provide more
security information. The notification in this example uses five variables: %Y, %v,
%F, %N and %U.
The following table contains a list of variables that can be used in notification
messages and pages.
10-35
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
10-36
Reports, Logs, and Notifications
10-37
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
%X Reason
Threshold Notification
%m Metric
%t Threshold value
HTTPS Notifications
%h IWSVA hostname The IWSVA host name where
the event was triggered
%U URL/URI
%c IP address:port after Refer to the default message
"https://" for %c usage example
$$DETAILS Details of certificate failure
reason / access denied rea-
son
Configuring Notifications
To configure a notification, select the types of events that issues the notification and
edit the email and browser notification messages.
10-38
Reports, Logs, and Notifications
10-39
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
3. If you do not want to use the default notification message, highlight the default
text and type your own version. If applicable, insert tokens in the message as
described in Notification Tokens/Parameters starting on page 10-35.
4. Type the Headline to appear in the browser.
The default is IWSVA Security Event (Server Name). The header line is common
for virus infection messages, file-type blocking, and URL blocking messages.
5. For Message for downloaded file and Message for uploaded file:
a. Select Default to display the default warning message.
b. Select Customized to display a custom message and either type or import
the customized message’s content from an HTML file.
c. Verify that the notifications appear correctly by clicking Preview.
6. Click Save.
10-40
Reports, Logs, and Notifications
3. If you do not want to use the default notification message, highlight the default
text and type your own version. If applicable, insert tokens in the text as
described in Notification Tokens/Parameters starting on page 10-35.
4. For Headline, type the header line to appear in the browser.
The default headline is IWSVA Security Event (%h). The headline is common for
virus infection messages, file-type blocking, and URL blocking messages.
5. For the Message:
a. Select Default to display the default warning message.
b. Select Customized to display a custom message and either type or import
content from an HTML file.
6. Verify the notifications by clicking Preview.
7. Click Save.
10-41
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
10-42
Reports, Logs, and Notifications
Note: IWSVA will not send notifications for manual pattern updates.
10-43
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Note: IWSVA will not send notifications for manual engine updates.
10-44
Reports, Logs, and Notifications
Note: Configure threshold alert settings for email notifications. Threshold alert settings
do not affect when IWSVA sends SNMP traps.
10-45
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Note: To identify client by MAC addresses, you must select Host name (modified
HTTP headers) in the User Identification screen.
Host name identification is only supported for end-users browsing with Internet
Explorer on Microsoft Windows platforms.
10-46
Reports, Logs, and Notifications
10-47
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Introducing ARM
Trend Micro Advanced Reporting and Management (ARM) provides customers with
a high-performance, off-box reporting solution. ARM is based on new advanced
database technology which greatly enhances the current InterScan Web Security
product reporting capabilities and provides advanced features, such as dynamic
dashboard, drill-down reporting, custom reporting and real-time, problem-solving
capabilities.
ARM provides a centralized reporting and policy management solution that includes:
• Instant reporting capabilities for IWSVA pre-canned report types to eliminate or
reduce reports that take many hours to complete
• Centralized logging and reporting for multiple InterScan Web Security product
units
• Custom reporting with GUI interface for fast report creation, using iReport
• Real-time, historic, and ad hoc reporting capabilities
• Dynamic dashboard for true Network Operation Center (NOC) monitoring
• Ability to troubleshoot with drill down reporting
• Central policy management and synchronization between multiple managed
InterScan Web Security product units
10-48
Reports, Logs, and Notifications
Summary screen
• All statistic tabs, including "Scanning", "URL", "Spyware" and "Security
Risk Report,” do not display in the Summary screen.
• In the System Dashboard, the following are removed:
• Virus and Spyware Trend table
10-49
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
10-50
Reports, Logs, and Notifications
ARM management tool. You can click the link to access the ARM Web console.
The following figure shows an example.
• Log settings—Since IWSVA sends log data to the ARM database, settings to the
local database IWSVA uses are no longer relevant. Thus, the following local
database settings are disabled:
• Number of days to store logs in database
• “Text only” option for the Write logs to setting
• Reports—All report screens are disabled in the IWSVA Web console. A message
displays prompting you to access the ARM management tool to view generated
reports.
• Notification—In the IWSVA Web console, the threshold alerts setting for local
database is disabled.
10-51
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
C OMMAND D ESCRIPTION
10-52
Chapter 11
11-1
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Alternatively, you can create your own EICAR test virus by typing or copying the
following into a text file, and then naming the file eicar.com:
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H
*
Note: Flush the URL cache (HTTP > Configuration > URL Cache) and local browser
before testing. If either cache contains a copy of the test virus, it's possible an
attempt to download the file would get the file from the cache, rather than getting
it from the Internet, and IWSVA would not detect the file.
If the test is successful, you should receive an IWSVA Security Event message
stating, “This URL has a Web security rating that prohibits it from being accessed.”
11-2
Testing and Configuring IWSVA
FIGURE 11-1 This warning screen shows the detection of an EICAR test
virus.
11-3
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
6. Since the server certificate is not in the trusted list on IWSVA, a certificate error
notification displays. Click Visit site anyway.
7. A security warning screen displays. The warning message varies depending on
whether URL filtering is also enabled or not.
11-4
Testing and Configuring IWSVA
On the IWSVA server, you can view detail log information in the URL filtering log or
the virus log.
FIGURE 11-4 View the log for HTTPS decryption test in the Virus Log screen if
URL filtering is disabled
FIGURE 11-5 View the log for HTTPS decryption test in the URL Filtering Log
screen if URL filtering is enabled
2. Access the FTP server through IWSVA with it working as the FTP proxy.
11-5
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
For example, assume the following IP addresses: IWSVA FTP proxy server
(10.2.203.126), FTP server (10.2.202.168).
Open a command line prompt and type the following:
ftp 10.2.203.126
5. If you have configured the IWSVA FTP proxy mode correctly, IWSVA displays a
message similar to the following.
FIGURE 11-6 This is a warning message that shows the detection of a virus
in eicar_com.zip.
11-6
Testing and Configuring IWSVA
2. Click HTTP > URL Filtering > Policies and select Enable URL Filtering;
then, click URL Filtering Global Policy to edit the policy.
3. In the Rule tab, select Monitor and click the check box under Leisure Time for
"monitor" under Custom Categories; then, click Apply.
4. Select Monitor and click the check box under Leisure Time for Search
Engines/Portals under Computers/Communications; then, click Apply.
11-7
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
You should be able to access the Web sites without seeing any warning messages. To
query and view URL filtering log, access the IWSVA Web console and click Logs >
Log Query > URL Filtering Log.
If a client attempts to download an infected file, IWSVA blocks all other users’
access to that site for four hours by default. When other clients subsequently attempt
to access the same URL that contained the virus, they will see a URL blocking
message instead of the virus-warning message.
Configure the default block time (in hours) by changing the parameter
infected_url_block_length under the [Scan-configuration] section of the
intscan.ini file.
11-8
Testing and Configuring IWSVA
2. Click HTTP > URL Filtering > Policies from the Main menu.
3. Select Enable URL filtering and then click Save.
4. Click URL Filtering Global Policy and select the Block action to apply to the
categories that you want blocked during work and leisure times.
Keep the default settings in the Safe Search and Exception tabs.
5. Click Save to save any changes. Click Deploy Policies to make the policy
effective immediately.
6. Open a browser and access any site that is in a category to be blocked at the time
of the test. IWSVA blocks access to URLs belonging to the category that is set to
be blocked.
Note: Blocking all Java applets and ActiveX controls might be too restrictive for your
environment because it prevents many legitimate Web sites from functioning
11-9
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
properly. After testing, Trend Micro recommends going back to the Applets and
ActiveX Policy: Edit Global Policy screen to change the settings back to the
default or your own less-restrictive configuration.
11-10
Testing and Configuring IWSVA
IWSVA Web console or CLI through the separate management interface. The
following shows an example network topology:
WARNING! Do NOT configure the data (bridge/proxy) interface and the management
interface to be in the same network segment. If they are in the same net-
work segment, the firewall may block the HTTP(s) and FTP traffic.
11-11
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
4. Select Enable PING if you want IWSVA to respond to PING requests on this
interface.
5. Click Save. You can access the separate management interface to log into the
Web console and manage IWSVA.
11-12
Testing and Configuring IWSVA
Note: Non-SSL mode is the default; use it to access the IWSVA console using a
non-secure URL; for example:
http://<IWSVA device IP address:port>
The default non-secure port is 1812; you can change it to any unused port
(recognized by the firewall).
11-13
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
identifying clients through their host names or MAC addresses and through their
LDAP directories.
11-14
Testing and Configuring IWSVA
3. To configure access quota control for your network’s guest users, click Access
Quota Guest Policy and configure the settings. To configure access quota
control for other network users, click Add and configure a new policy.
4. Click Save.
For the new policy to take effect immediately, click Deploy Policies in the
HTTP > Access Quota Policies page.
11-15
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
11-16
Testing and Configuring IWSVA
Check the Trend Micro Web site regularly to download patches and service
packs:
• http://www.trendmicro.com/download
All releases include a readme file with the information you need to install,
deploy, and configure your product. Read the readme file carefully before
installing the hot fix, patch, or service pack file(s).
11-17
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
11-18
Testing and Configuring IWSVA
not used by other applications, they should also specify this SSL management port
number in the HTTP > Configuration > Access Control Settings screen as well
(see Using SSL with Damage Cleanup Services (DCS) on page 11-19).
If this port number is not specified in the Access Control Settings screen, the
consequence could be that the IWSVA progress page is blocked by IWSVA itself,
when using the HTTPS Web console. In other words, when clients try to access
URLs, they would see the progress bar blocked by IWSVA.
11-19
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Before rolling out URL filtering policies, Trend Micro recommends verifying that
the default categorizations are appropriate for your organization. For example, a
clothing retailer might need to remove a swimsuit Web site from the “Intimate
Apparel/Swimsuit” category located in the Adult group in order to allow legitimate
market and competitor research.
Additionally, you might need to configure URL exceptions to enable employee
access to specific sites that would otherwise be blocked, and review the definitions of
“work time” to ensure it reflects your workplace schedule.
To review URL filtering settings:
1. Click HTTP > URL Filtering > Policies > policy > Exceptions from the main
menu.
2. Choose an approved URL list from the drop- down list which contains the Web
sites that will be exempt from URL filtering so that they are always accessible to
your clients.
3. On the Schedule tab, the default setting for “work time” is Monday to Friday,
from 08:00 to 11:59, and from 13:00 to 17:00. Modify these time settings
according to employee schedules in your workplace.
4. Click HTTP > URL Filtering > Policies from the main menu and review the
category settings of the URL Filtering Guest Policy and URL Filtering Global
Policy.
11-20
Testing and Configuring IWSVA
11-21
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
11-22
Appendix A
A-1
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
To obtain Trend Micro contact information for your region/country, please visit
http://www.trendmicro.com
A-2
Contact Information and Web-based Resources
To inspect the files yourself, use a program like GDB, the GNU Project debugger.
Knowledge Base
The Trend Micro Knowledge Base is a 24x7 online resource that contains thousands
of do-it-yourself technical support procedures for Trend Micro products. Use
Knowledge Base, for example, if you are getting an error message and want to find
out what to do to. New solutions are added daily.
Also available in Knowledge Base are product FAQs, hot tips, preventive antivirus
advice, and regional contact information for support and sales.
http://esupport.trendmicro.com/
And, if you can't find an answer to a particular question, the Knowledge Base
includes an additional service that allows you to submit your question through an
email message. Response time is typically 24 hours or less.
A-3
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Note: Submissions made through the submission wizard/virus doctor are addressed promptly
and are not subject to the policies and restrictions set forth as part of the Trend Micro
Virus Response Service Level Agreement.
When you click Next, an acknowledgement screen opens. This screen also displays a
Tracking Number for the problem you submitted.
If you prefer to communicate by email, send a query to the following address:
[email protected]
In the United States, you can also call the following toll-free telephone number:
(877) TRENDAV, or 877-873-6328
A-4
Contact Information and Web-based Resources
TrendLabs
TrendLabs is Trend Micro’s global infrastructure of antivirus research and product
support centers that provide customers with up-to-the minute security information.
The “virus doctors” at TrendLabs monitor potential security risks around the world,
to ensure that Trend Micro products remain secure against emerging risks. The daily
culmination of these efforts are shared with customers through frequent virus pattern
file updates and scan engine refinements.
TrendLabs is staffed by a team of several hundred engineers and certified support
personnel that provide a wide range of product and technical support services.
Dedicated service centers and rapid-response teams are located in Tokyo, Manila,
Taipei, Munich, Paris, and Lake Forest, CA.
A-5
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
FIGURE A-2 Trend Micro World Virus Tracking Program virus map
A-6
Contact Information and Web-based Resources
• Subscribe, free, to Trend Micro’s Virus Alert service, to learn about outbreaks as
they happen, and the Weekly Virus Report
• Learn about free virus update tools available to Webmasters
A-7
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
A-8
Appendix B
B-1
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
B-2
Mapping File Types to MIME Content-types
B-3
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
B-4
Mapping File Types to MIME Content-types
B-5
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
B-6
Appendix C
Main Components
The following are the main InterScan Web Security Virtual Appliance (IWSVA)
modules:
• Main Program: Installs the Web console and the basic library files necessary for
IWSVA.
• HTTP Scanning: Installs the services necessary for HTTP scanning (either ICAP
or HTTP scanning) and URL blocking.
• FTP Scanning: Installs the service that enables FTP scanning.
• URL Filtering: Installs the service necessary for URL filtering.
C-1
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
• Applets and ActiveX Scanning: Installs the service necessary for checking Java
applet and ActiveX object digital signatures, and instrumenting applets so their
execution can be monitored for prohibited operations.
• SNMP Notifications: Installs the service to send SNMP traps to SNMP-compliant
network management software.
• Control Manager Agent for IWSVA: Installs the files necessary for the Control
Manager agent to enable monitoring and configuration through Control Manager.
Main Services
To start or stop any of the services in this section, you must be logged into IWSVA as
root using either a local terminal or SSH. The root user can only stop or start the
HTTP and FTP services from within IWSVA CLI (see Enabling the HTTP(s) Traffic
Flow on page 3-2 and Enabling FTP Traffic and FTP Scanning on page 8-4). No other
services can be stopped or started from within IWSVA.
The following services are used by IWSVA:
• Trend Micro IWSVA Console (java): This service is the Web server hosting the
Web console.
• Trend Micro IWSVA for FTP (isftpd): This service enables the FTP traffic flow
and FTP virus scanning.
• Trend Micro IWSVA for HTTP (iwssd): This service enables the HTTP traffic
flow and HTTP scanning (including FTP over HTTP). It also handles Applets and
ActiveX security processing.
• Trend Micro IWSVA Log Import (logtodb): This service writes logs from text
files to the database.
• Trend Micro IWSVA Notification Delivery Service (isdelvd): This service
handles administrator notifications (through email) and user notifications (through
browser).
• Trend Micro SNMP Service (svcmonitor if using the Linux SNMP agent,
snmpmonitor if using the IWSVA-installed SNMP agent): This service sends
SNMP trap notifications to SNMP-capable network monitoring devices.
C-2
Architecture and Configuration Files
Scheduled Tasks
When installing IWSVA, the setup program creates several scheduled tasks.
• purgefile: Runs daily at 2:00 am to delete old text log files, subject to the
configured time interval to retain logs.
• schedulereport: Runs hourly to check if a scheduled report is configured to run.
• schedulepr_update: Runs daily to check if it is time to update the product
registration/license.
• schedule_au: Runs every 15 minutes to check if it is time to update the pattern file
or other program components.
• cleanfile: Runs hourly, to remove temporary files downloaded for scan-behind or
large file scanning.
• DbOldDataCleanup.sh: Runs daily at 2:05 am to clean up old reporting log data
in the database and cleans up the old access quota counters in the database.
• svc_snmpmonitor.sh: Runs every 5 minutes to verify that the logtodb, mail,
postgres and metric daemons are running. It restarts them if they are not.
• db_reindex.sh: Runs daily at 28 minutes past every other hour to rebuild
corrupted database indices containing any invalid data. This maintains optimum
database performance.
• db_vacuum.sh: Runs daily at 3:58 am to perform garbage collection to free up
unused space from database tables in order to maintain optimum database
performance.
C-3
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
There are three types of configuration files: main, protocol module, and scanning
module. All the configuration files are in the {IWSS root} directory; the default
location for {IWSS root} is /etc/iscan/. The main configuration file is in
intscan.ini.
• Settings specific to virus scanning are in:
{IWSS root}/IWSSPIScanVsapi.dsc
• Settings for default URL categories and their mapping information are in:
{IWSS root}/urlfcMapping.ini
• Settings for the list of IP address and IP ranges of all machines allowed to access
the IWSVA device are in:
{IWSS root}/ClientACL_http.ini (for HTTP)
{IWSS root}/ClientACL_ftp.ini (for FTP)
• Settings for rules that define what ports IWSVA forwards HTTP requests to are in:
{IWSS root}/HttpPortPermission_http.ini (for HTTP)
{IWSS root}/HttpPortPermission_ftp.ini (for FTP)
• Settings for rules that define what ports IWSVA allows HTTPS tunneling to are in:
{IWSS root}/HttpsConectACL_http.ini
• Settings for list of IP address and IP ranges of trusted servers are in:
{IWSS root}/ServerIPWhiteList_http.ini (for HTTP)
{IWSS root}/ServerIPWhiteList_ftp.ini (for FTP)
C-4
Architecture and Configuration Files
The IWSVA Web console varies depending on which modules are installed. If you
have been using a previous version of IWSVA, there are also many new features
available in IWSVA that require new .ini file entries.
Protocol Handlers
Functions responsible for interpreting and processing messages in some recognized
transmission protocols are encapsulated in a dynamic library referred to as a protocol
handler. IWSVA provides a choice of either an ICAP protocol handler, which enables
IWSVA to act as an ICAP server, or an HTTP proxy handler, wherein IWSVA acts
like a direct HTTP proxy server. (The HTTP protocol handler is also used in bridge
mode.) The application binary is independent of the protocol handler, allowing the
same application to support different protocols with a configuration change.
Provide the complete path of the active configuration file of the protocol in the
main/protocol_config_path entry in the intscan.ini file application.
Protocol handlers require their own specific configuration files, which contain entries
that pertain only to that protocol. These protocol configuration files are denoted with
a .pni filename extension.
Scanning Modules
Traffic scanning functionality is provided through dynamic libraries known as
scanning modules. The first scanning module available to IWSVA provides content
scanning using the scan engine.
Each scanning module has a configuration file with a .dsc extension. The IWSVA
application locates the available scanning modules by searching for .dsc files in the
directory that is provided in the scan/plugin_dir entry in the intscan.ini file.
C-5
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
C-6
Appendix D
OpenLDAP Reference
Though OpenLDAP supports Kerberos authentication, the packages to enable
Kerberos authentication support are not installed by default. This appendix covers
how to install and configure Kerberos support for OpenLDAP. In addition, this
appendix explains how to set up your OpenLDAP directory so InterScan Web
Security Virtual Appliance (IWSVA) can query it when using the user/group
authentication method.
This chapter includes the following topics:
• Software packages tested to enable Kerberos authentication when using IWSVA
with OpenLDAP
• Modifying OpenLDAP configuration files
• Sample user and group entries in LDIF format
D-1
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Configuration Files
Using OpenLDAP with IWSVA requires modifying the following configuration files:
/etc/openldap/ldap.conf
/etc/openldap/slapd.conf
Sample ldap.conf
#
# System-wide ldap configuration files. See ldap.conf(5) for
# details
# This file should be world readable but not world writable.
# OpenLDAP supports the ldap.conf file. You could use this file to
# specify a number of defaults for OpenLDAP clients. Normally this
# file can be found under /etc/openldap based on /etc/init.d/ldap
# start script's setting
# Set host IP address or fully qualified domain name
HOST example.peter.com
#HOST 10.2.1.1
# Set the default BASE DN where LDAP search will start off
BASE dc=peter,dc=com
# Set the default URI
D-2
OpenLDAP Reference
URI ldap://example.peter.com
# SASL options
# specify the sasl mechanism to use. This is a user-only option.
# SASL_MECH <mechanism>
# specify the realm. This is a user-only option
# SASL_REALM <realm>
# specify the authentication identity.
# SASL_AUTHCID <authcid>
Sample slapd.conf
#
# See slapd.conf(5) for details on configuration options.
# This file should NOT be world readable.
#
# Enforce all changes to follow the defined schemas loaded via
# include statements in the conf file
# NOTE 1
# All the OpenLDAP config files and backend databases are accessed
# and created by “ldap”, so if you touch these config files by
# "root", “a Permission Denied” error will occur. Please modify
# ownership accordingly.
# NOTE 2
# krb5-kdc.schema fails to work with current OpenLDAP 2.2.x distro
# krb5ValidStart, krb5ValidEnd, krb5PasswordEnd need to have
# "EQUALITY generalizedTimeMatch" inserted before the ORDERING
# statement.
# www.openldap.org/lists/openldap-bugs/200309/msg00029.html
# Enforce all changes to follow the defined schemas loaded via
# include statements in the conf file
schemacheck on
# Included schemas
include /usr/local/etc/openldap/schema/core.schema
include /usr/local/etc/openldap/schema/krb5-kdc.schema
include /usr/local/etc/openldap/schema/cosine.schema
include /usr/local/etc/openldap/schema/inetorgperson.schema
include /usr/local/etc/openldap/schema/nis.schema
include /usr/local/etc/openldap/schema/java.schema
D-3
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
D-4
OpenLDAP Reference
D-5
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
# NOTE 4
# Mapping of SASL authentication identities to LDAP entries
# The sasl-regexp line are particularly critical. They are what
# rewrite incoming connections who have SASL formatted DNs to the
# DNs that are in the directory DB. It's important to remember that
# they are processed in order, so you want to write them from most
# specific to most general
# NOTE 5
# We set the cn=.* since we are going to adopt different security
# mechanisms. If Kerberos v5 is the only one used, change wildcard
# to cn=GSSAPI,cn=auth
#sasl-regexp uid=(.*),cn=GSSAPI,cn=auth
#uid=$1,ou=people,dc=peter,dc=com
sasl-regexp uid=(.*),cn=.*,cn=auth uid=$1,ou=people,dc=peter,dc=com
# ldbm database definitions
# NOTE 6
# Correctly configuring the backend Berkeley DB is very critical
# follow the guideline at
# http://www.openldap.org/faq/data/cache/1073.html
# Cleartext passwords, especially for the rootdn, should
# be avoided. See slappasswd(8) and slapd.conf(5) for details.
# Use of strong authentication encouraged.
databasebdb
# These options specify a DN and passwd that can be used to
# authenticate as the super-user entry of the database. The DN and
# password specified here will always work, regardless of whether
# the entry named actually exists or has the password given.
# This solves the chicken-and-egg problem of how to authenticate and
# add entries before any entries yet exist
suffix"dc=peter,dc=com"
rootdn"cn=admin,dc=peter,dc=com"
rootpwadmin
# NOTE 7
# The database directory MUST exist prior to running slapd AND
# should only be accessible by the slapd/tools. Mode 700
# recommended.
directory/usr/local/var/openldap-data
D-6
OpenLDAP Reference
#Tell the slapd to store the 10000 most accessed entries in memory
#Having a properly configured cache size can drastically affect
#performance
cachesize 10000
# Indices to maintain
# Some versions of OpenLDAP don't support the index of uniqueMember
# "pres" indexing allows you to see a filter that asks if the
# attribute is present in an entry
# "eq" indexing allows to ask if an attribute has an exact value
# "apporx" indexing allows to ask if an attribute value sounds like
# something
# This option is tied to --enable-phonetic compile option in
# OpenLDAP
# "sub" indexing allows to do substring search on an attribute's
# values
index default eq,pres
index objectclass eq,pres
index cn,sn,givenname,mail eq,pres,approx,sub
index uideq,pres
index uidNumber,gidNumber,memberUid eq,pres
Tools
• Create the server database and associate indices by importing an existing LDIF file
NAME
slapadd - Add entries to a SLAPD database
SYNOPSIS
/usr/sbin/slapadd [-v] [-c] [-d level] [-b suffix] [-n dbnum]
[-f slapd.conf] [-l ldif-file]
DESCRIPTION
Slapadd is used to add entries specified in LDAP Directory Interchange Format
(LDIF) to a slapd database.
• Dump the server database to an LDIF file. This can be useful when you want to
make human-readable backup of current database.
NAME
D-7
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
DESCRIPTION
slapcat is used to generate an LDAP Directory Interchange Format (LDIF) output
based upon the contents of a slapd database.
• Rebuilds all indices based upon the current database contents
NAME
slapindex - SLAPD index to LDIF utility
SYNOPSIS
/usr/sbin/slapindex [-f slapd.conf] [-d level] [-b suffix] [-n
dbnum]
DESCRIPTION
Slapindex is used to regenerate slapd indices based upon the current contents of a
database.
• Check the settings of slapd.conf
NAME
Slaptest – Check the suitability of the slapd conf file
SYNOPSIS
/usr/sbin/slaptest [-v] [-d level] [-f slapd.conf]
DESCRIPTION
Slaptest is used to check the conformance of the slapd.conf configuration file. It
opens the slapd.conf configuration file, and parses it according to the general and the
backend-specific rules, checking its conformance.
• LDAP query utility
NAME
ldapsearch - LDAP search tool
D-8
OpenLDAP Reference
SYNOPSIS
ldapsearch [-D binddn] [-W] [-w bindpasswd] [-H ldapuri] [-h
ldaphost] [-p ldap- port] [-b searchbase] [-s base|one|sub] [-x]
[-Y mech] [-Z[Z]] filter [attrs...]
DESCRIPTION
ldapsearch opens a connection to an LDAP server, binds, and performs a search using
specified parameters.
EXAMPLE
The command performs a query using simple plain text authentication for a matched
entry with “uid=petery” and requests the mail attribute for a matched entry to be
returned by the LDAP server.
ldapsearch -x -D "cn=admin,dc=peter,dc=com" -w admin -b
"dc=peter,dc=com" -s sub "uid=petery" mail
D-9
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
The “Corporate group” field tells IWSVA the object class to use as part of the LDAP
search filter when searching for LDAP group objects. The “Corporate user” indicates
the object class to use as part of the search filter for user objects. Because LDAP
cannot distinguish whether an entry is group or user-specific, IWSVA needs this
“tag” to perform the query.
The Corporate memberOf field defines the group membership of an entry, a user or
a group while the “Corporate member” field specifies the members in a group entry
because a user is the finest entity and cannot contain any member. An attribute name
is the first column in this equivalence table and it specifies the attribute that contains
D-10
OpenLDAP Reference
relevant information. Default attributes are “ou” and “uniquemember” in the standard
OpenLDAP schema.
Attribute syntax is the second column in the equivalence table and it defines the
attribute that IWSVA needs to associate and look up to locate the group or member
entry in the LDAP server. IWSVA provides two options to configure this setting,
namely {“Common Name (CN)”, “Distinguished Name (DN)}.
Consider the following simple LDIF file as an example, keeping in mind the
following:
• LDIF is a method for representing data in an LDAP directory in a human readable
format.
• To simplify the example, some entries have been removed.
• To dump a LDIF file of an OpenLDAP server, execute slapcat, usually under the
OpenLDAP installation path or /usr/local/sbin.
slapcat –l [output_file_name]
D-11
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Team,ou=Engineering,ou=Groups,dc=client,dc=us,dc=Xnet,dc=org
ou: Groups #Corporate Group field
ou: Engineering
description: All of IWSVA Developer Team
objectClass: top
objectClass: groupOfUniqueNames
uniqueMember:uid=peterx,ou=People,dc=client,dc=us,dc=Xnet,dc=org
cn: All of IWSVA Developer Team
FIGURE D-3 Sample group entry in LDIF format
D-12
OpenLDAP Reference
Sample Configuration
Consider the following LDAP attribute mapping:
D-13
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
dn: uid=peterx,ou=People,dc=client,dc=us,dc=Xnet,dc=org
givenName: Peter
telephoneNumber: +1 408 555 5555
sn: Peter
ou: All of Developer Team
ou: Employee#Corporate User field
mail: [email protected]
objectClass: top
objectClass: person
objectClass: organizationalPerson
objectClass: inetOrgPerson
uid: peterx
cn: Peter X
FIGURE D-5 Sample user entry in LDIF format
D-14
Appendix E
Squid Configurations
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It
reduces bandwidth and improves response times by caching and reusing
frequently-requested Web pages. IWSVA includes Squid 3.0 as a mechanism for
providing on-box caching.
Squid service is disabled by default. IWSVA supports two types of Squid deployment
modes:
• Squid Proxy Downstream Mode
• Squid Proxy Upstream Mode
Important Notes
Before you continue, take note of the following:
• If you configure IWSVA to enable Squid service, in the Administration >
Network Configuration > Deployment Mode screen of the Web Console, you
will see IWSVA in Forward proxy mode. You cannot switch to Transparent Bridge
mode, Reverse Proxy mode, or ICAP mode using the Web console.
• You will have to disable Squid service before you can configure the
Administration > Network Configuration > Deployment Mode screen. See the
figure below. If Proxy Scan Settings is not in Forward Proxy mode, you cannot
enable Squid.
E-1
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
• In Forward proxy mode, IWSVA uses Simple Content Inspection Protocol (SCIP)
for outbound traffic and does not process upstream LDAP messages. Thus, basic,
NT LAN Manager (NTLM), or Kerberos authentication will not work for HTTPs
requests if the IWSVA server is in Forward proxy mode and you configure Squid
for LDAP authentication without enabling LDAP authentcation on the IWSVA
server.
E-2
Squid Configurations
Note: If you configure IWSVA to work in Squid Proxy Downstream mode, in the
Administration > Network Configuration > Deployment Mode screen of the Web
Console, you will not be able to change the HTTP Listening port — the HTTP
Listening port field will be disabled. See the figure below.
E-3
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
E-4
Squid Configurations
• Create a policy using the account of the IP address of Squid process. Then,
every client will use the same access quota size.
• Select accounts only by Host name. Refer to Host Name on page 4-7 for
details and its limitation.
• Cannot limit HTTP Access or FTP Access based on the client IP address.
• DCS is unable to connect to a client machine when IWSVA sends the cleanup
request.
This deployment mode will help the policy enforcement in your network, but will not
improve the performance. Each client must configure the IWSVA device as their
proxy server in their browser's Internet connection settings.
Note: When you configure IWSVA to work in Squid Proxy Upstream mode, the Server IP
White List does not take effect. Content from servers that you configure on the Server
IP White List still will be scanned or filtered.
E-5
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Note: If you configure IWSVA to work in Squid Proxy Upstream mode, on the
Administration > Network Configuration > Deployment Mode page and Updates
> Connection Settings page of the Web Console, you will see the Proxy server IP
address is 127.0.0.1 and the port is 3128.
Note: When you configure IWSVA to work in Squid Proxy Upstream mode or Squid Proxy
Downstream mode, you may find that some HTTPS sites are blocked because Squid
has its default access control list, and Squid only allows port 443 or 563 as safe
HTTPS port by default. Even if you configure IWSVA access control list to allow a
HTTPS site which is not using port 443 or 563, the site is still blocked by Squid
proxy.
E-6
Squid Configurations
Next, initiate traffic through IWSVA. You will notice that in the IWSVA CLI that the
access requests will be logged by IWSVA. To stop the logging, use CTRL+C.
Squid Support
The best place to obtain squid support from is the excellent resource
http://wiki.squid-cache.org. Here you will find good documentation and
information to aid with any questions or issues you may have regarding using Squid
within your environment.
E-7
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
Trend Micro Disclaimer: Trend Micro IWSVA pre-installs Squid to help reduce the
complexity of installing and configuring Squid to function with
IWSVA. Squid is disabled by default and must be enabled by
the customer through the IWSVA CLI after installation has
been completed. Support for Squid is obtained through open
source channels and it is the responsibility of the customer to
become acquainted with Squid's benefits and functionality
before enabling.
Additional information, documentation, and support on the
Squid application can be found at the official Squid Web Proxy
Cache Web site: www.squid-cache.org. Trend Micro will not
provide support for Squid's features, but will provide support
for the setup and integration of Squid and IWSVA through its
CLI commands.
E-8
Glossary of Terms
This glossary describes special terms as used in this document or the online help.
TERM EXPLANATION
access (verb) To read data from or write data to a storage device, such as a
computer or server.
GL-1
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
TERM EXPLANATION
active FTP Configuration of FTP protocol that allows the client to initiate
“handshaking” signals for the command session, but the host
initiates the data session.
GL-2
Glossary of Terms
TERM EXPLANATION
administrator account A user name and password that has administrator-level privi-
leges.
administrator email address The address used by the administrator of your Trend Micro
product to manage notifications and alerts.
GL-3
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
TERM EXPLANATION
GL-4
Glossary of Terms
TERM EXPLANATION
case-matching Scanning for text that matches both words and case. For
example, if “dog” is added to the content-filter, with
case-matching enabled, messages containing “Dog” pass
through the filter; messages containing “dog” do not.
compressed file A single file containing one or more separate files plus informa-
tion to allow them to be extracted by a suitable program, such
as WinZip.
configuration Selecting options for how your Trend Micro product will func-
tion, for example, selecting whether to quarantine or delete a
virus-infected email message.
GL-5
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
TERM EXPLANATION
content filtering Scanning email messages for content (words or phrases) pro-
hibited by your organization’s Human Resources or IT mes-
saging policies, such as hate mail, profanity, or pornography.
content violation An event that has triggered the content filtering policy.
daemon A program that is not invoked explicitly, but lies dormant wait-
ing for some condition(s) to occur. The perpetrator of the con-
dition need not be aware that a daemon is lurking.
damage routine The destructive portion of virus code, also called the payload.
De-Militarized Zone (DMZ) From the military term for an area between two opponents
where fighting is prevented. DMZ Ethernets connect networks
and computers controlled by different bodies. They might be
external or internal. External DMZ Ethernets link regional net-
works with routers.
dialer A type of Trojan that when executed, connects the user's sys-
tem to a pay-per-call location in which the unsuspecting user is
billed for the call without his or her knowledge.
GL-6
Glossary of Terms
TERM EXPLANATION
directory path The subsequent layers within a directory where a file can be
found, for example, the directory path for the ISVW for SMB
Quarantine directory is:
C:\Programs\Trend Micro\ISVW\Quarantine
DNS resolution When a DNS client requests host name and address data from
a DNS server, the process is called resolution. Basic DNS con-
figuration results in a server that performs default resolution.
For example, a remote server queries another server for data
on a machine in the current zone. Client software on the
remote server queries the resolver, which answers the request
from its database files.
domain name The full name of a system, consisting of its local host name
and its domain name, for example, tellsitall.com. A domain
name should be sufficient to determine a unique Internet
address for any host on the Internet. This process, called
“name resolution”, uses the Domain Name System (DNS).
DoS (Denial of Service) Group-addressed email messages with large attachments that
attack clog your network resources to the point where messaging ser-
vice is noticeably slow or even stopped.
GL-7
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
TERM EXPLANATION
DOS virus Also referred to as “COM” and “EXE file infectors.” DOS
viruses infect DOS executable programs- files that have the
extensions *.COM or *.EXE. Unless they have overwritten or
inadvertently destroyed part of the original program's code,
most DOS viruses try to replicate and spread by infecting other
host programs.
download (noun) Data that has been downloaded, for example, from a Web site
through HTTP.
download (verb) To transfer data or code from one computer to another. Down-
loading often refers to transfer from a larger "host" system
(especially a server or mainframe) to a smaller "client" system.
encryption Encryption is the process of changing data into a form that can
be read only by the intended receiver. To decipher the mes-
sage, the receiver of the encrypted data must have the proper
decryption key. In traditional encryption schemes, the sender
and the receiver use the same key to encrypt and decrypt data.
Public-key encryption schemes use two keys: a public key,
which anyone might use, and a corresponding private key,
which is possessed only by the person who created it. With this
method, anyone might send a message encrypted with the
owner's public key, but only the owner has the private key nec-
essary to decrypt it. PGP (Pretty Good Privacy) and DES (Data
Encryption Standard) are two of the most popular public-key
encryption schemes.
GL-8
Glossary of Terms
TERM EXPLANATION
End User License Agree- An End User License Agreement or EULA is a legal contract
ment (EULA) between a software publisher and the software user. It typically
outlines restrictions on the side of the user, who can refuse to
enter into the agreement by not clicking “I accept” during instal-
lation. Clicking “I do not accept” will, of course, end the installa-
tion of the software product.
Many users inadvertently agree to the installation of spyware
and adware into their computers when they click “I accept” on
EULA prompts displayed during the installation of certain free
software.
EXE file infector An executable program with a .exe file extension. Also see
DOS virus.
false positive An email message that was "caught" by the spam filter and
identified as spam, but is actually not spam.
GL-9
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
TERM EXPLANATION
file type The kind of data stored in a file. Most operating systems use
the file name extension to determine the file type. The file type
is used to choose an appropriate icon to represent the file in a
user interface, and the correct application with which to view,
edit, run, or print the file.
file name extension The portion of a file name (such as .dll or .xml) which indicates
the kind of data stored in the file. Apart from informing the user
what type of content the file holds, file name extensions are
typically used to decide which program to launch when a file is
run.
filtering, dynamic IP service that can be used within VPN tunnels. Filters are one
way GateLock controls traffic from one network to another.
When TCP/IP sends data packets to the firewall, the filtering
function in the firewall looks at the header information in the
packets and directs them accordingly. The filters operate on
criteria such as IP source or destination address range, TCP
ports, UDP, Internet Control Message Protocol (ICMP), or TCP
responses. Also see tunneling and Virtual Private Network
(VPN).
GL-10
Glossary of Terms
TERM EXPLANATION
group file type Types of files that have a common theme, for example:
- Audio/Video
- Compressed
- Executable
- Images
- Java
- Microsoft Office
hacking tool Tools such as hardware and software that enables penetration
testing of a computer system or network for the purpose of
finding security vulnerabilities that can be exploited.
hard disk (or hard drive) One or more rigid magnetic disks rotating about a central axle
with associated read/write heads and electronics, used to read
and write hard disks or floppy disks, and to store data. Most
hard disks are permanently connected to the drive (fixed disks)
though there are also removable disks.
header (networking defini- Part of a data packet that contains transparent information
tion) about the file or the transmission.
heuristic rule-based scan- Scanning network traffic, using a logical analysis of properties
ning that reduces or limits the search for solutions.
GL-11
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
TERM EXPLANATION
installation script The installation screens used to install UNIX versions of Trend
Micro products.
GL-12
Glossary of Terms
TERM EXPLANATION
Internet Protocol (IP) An Internet standard protocol that defines a basic unit of data
called a datagram. A datagram is used in a connectionless,
best-effort, delivery system. The Internet protocol defines how
information gets passed between systems across the Internet.
“in the wild” Describes known viruses that are actively circulating. Also see
“in the zoo.”
“in the zoo” Describes known viruses that are currently controlled by antivi-
rus products. Also see “in the wild.”
GL-13
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
TERM EXPLANATION
Java applets Java applets are small, portable Java programs embedded in
HTML pages that can run automatically when the pages are
viewed. Java applets allow Web developers to create interac-
tive, dynamic Web pages with broader functionality.
Authors of malicious code have used Java applets as a vehicle
for attack. Most Web browsers, however, can be configured so
that these applets do not execute - sometimes by simply
changing browser security settings to “high.”
Java malicious code Virus code written or embedded in Java. Also see Java file.
GL-14
Glossary of Terms
TERM EXPLANATION
keylogger Keyloggers are programs that catch and store all keyboard
activity. There are legitimate keylogging programs that are
used by corporations to monitor employees and by parents to
monitor their children. However, criminals also use keystroke
logs to sort for valuable information such as logon credentials
and credit card numbers.
LAN (Local Area Network) A data communications network which is geographically lim-
ited, allowing easy interconnection of computers within the
same building.
LDAP (Lightweight Direc- An internet protocol that email programs use to locate contact
tory Access Protocol) information from a server. For example, suppose you want to
locate all persons in Boston who have an email address con-
taining the name “Bob.” An LDAP search would enable you to
view the email addresses that meet this criteria.
license certificate A document that proves you are an authorized user of a Trend
Micro product.
link (also called hyperlink) A reference from some point in one hypertext document to
some point in another document or another place in the same
document. Links are usually distinguished by a different color
or style of text, such as underlined blue text. When you acti-
vate the link, for example, by clicking on it with a mouse, the
browser displays the target of the link.
listening port A port utilized for client connection requests for data exchange.
load balancing Load balancing is the mapping (or re-mapping) of work to pro-
cessors, with the intent of improving the efficiency of a concur-
rent computation.
GL-15
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
TERM EXPLANATION
local area network (LAN) Any network technology that interconnects resources within an
office environment, usually at high speeds, such as Ethernet. A
local area network is a short-distance network used to link a
group of computers together within a building. 10BaseT Ether-
net is the most commonly used form of LAN. A hardware
device called a hub serves as the common wiring point,
enabling data to be sent from one machine to another over the
network. LANs are typically limited to distances of less than
500 meters and provide low-cost, high-bandwidth networking
capabilities within a small geographical area.
log storage directory Directory on your server that stores log files.
macro virus Macro viruses are often encoded as an application macro and
included in a document. Unlike other virus types, macro
viruses aren't specific to an operating system and can spread
through email attachments, Web downloads, file transfers, and
cooperative applications.
malware (malicious soft- Programming or files that are developed for the purpose of
ware) doing harm, such as viruses, worms, and Trojans.
Web console The user interface for your Trend Micro product.
GL-16
Glossary of Terms
TERM EXPLANATION
mass mailer (also known as A malicious program that has high damage potential, because
a Worm) it causes large amounts of network traffic.
Media Access Control An address that uniquely identifies the network interface card,
(MAC) address such as an Ethernet adapter. For Ethernet, the MAC address is
a 6 octet address assigned by IEEE. On a LAN or other net-
work, the MAC address is a computer's unique hardware num-
ber. (On an Ethernet LAN, it's the same as the Ethernet
address.) When you're connected to the Internet from your
computer (or host as the Internet protocol thinks of it), a corre-
spondence table relates your IP address to your computer's
physical (MAC) address on the LAN. The MAC address is
used by the Media Access Control sublayer of the Data-Link
Control (DLC) layer of telecommunication protocols. There is a
different MAC sublayer for each physical device type.
Microsoft Office file Files created with Microsoft Office tools such as Excel or
Microsoft Word.
mixed threat attack Complex attacks that take advantage of multiple entry points
and vulnerabilities in enterprise networks, such as the “Nimda”
or “Code Red” threats.
MTA (Mail Transfer Agent) The program responsible for delivering email messages. Also
see SMTP server.
GL-17
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
TERM EXPLANATION
network virus A type of virus that uses network protocols, such as TCP, FTP,
UDP, HTTP, and email protocols to replicate. Network viruses
often do not alter system files or modify the boot sectors of
hard disks. Instead, they infect the memory of client machines,
forcing them to flood the network with traffic, which can cause
slowdowns or even complete network failure.
open source Programming code that is available to the general public for
use or modification free of charge and without license restric-
tions.
operating system The software which handles tasks such as the interface to
peripheral hardware, scheduling tasks, and allocating storage.
In this documentation, the term also refers to the software that
presents a window system and graphical user interface.
outgoing Email messages or other data leaving your network, routed out
to the Internet.
passive FTP Configuration of FTP protocol that allows clients within your
local area network to initiate the file transfer, using random
upper port numbers (1024 and above).
GL-18
Glossary of Terms
TERM EXPLANATION
pattern file (also known as The pattern file, as referred to as the Official Pattern Release
Official Pattern Release) (OPR), is the latest compilation of patterns for identified
viruses. It is guaranteed to have passed a series of critical
tests to ensure that you get optimum protection from the latest
virus threats. This pattern file is most effective when used with
the latest scan engine.
policies Policies provide the initial protection mechanism for the fire-
wall, allowing you to determine what traffic passes across it
based on IP session details. They protect the Trusted network
from outsider attacks, such as the scanning of Trusted servers.
Policies create an environment in which you set up security
policies to monitor traffic attempting to cross your firewall.
proxy server A World Wide Web server which accepts URLs with a special
prefix, used to fetch documents from either a local cache or a
remote server, then returns the URL to the requester.
GL-19
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
TERM EXPLANATION
remote access tool (RAT) Hardware and software that allow a legitimate system adminis-
trator to manage a network remotely. However, these same
tools can also be used by intruders to attempt a breach of your
system security.
GL-20
Glossary of Terms
TERM EXPLANATION
router This hardware device routes data from a local area network
(LAN) to a phone line's long distance line. Routers also act as
traffic cops, allowing only authorized machines to transmit data
into the local network so that private information can remain
secure. In addition to supporting these dial-in and leased con-
nections, routers also handle errors, keep network usage sta-
tistics, and handle security issues.
scan engine The module that performs antivirus scanning and detection in
the host product to which it is integrated.
Secure Socket Layer (SSL) Secure Socket Layer (SSL), is a protocol designed by
Netscape for providing data security layered between applica-
tion protocols (such as HTTP, Telnet, or FTP) and TCP/IP. This
security protocol provides data encryption, server authentica-
tion, message integrity, and optional client authentication for a
TCP/IP connection.
GL-21
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
TERM EXPLANATION
server farm A server farm is a network where clients install their own com-
puters to run Web servers, email, or any other TCP/IP based
services they require, making use of leased permanent Inter-
net connections with 24-hour worldwide access. Instead of
expensive dedicated-line connections to various offices, serv-
ers can be placed on server farm networks to have them con-
nected to the Internet at high-speed for a fraction of the cost of
a leased line.
shared drive A computer peripheral device that is used by more than one
person, thus increasing the risk of exposure to viruses.
GL-22
Glossary of Terms
TERM EXPLANATION
subnet mask In larger networks, the subnet mask lets you define subnet-
works. For example, if you have a class B network, a subnet
mask of 255.255.255.0 specifies that the first two portions of
the decimal dot format are the network number, while the third
portion is a subnet number. The fourth portion is the host num-
ber. If you do not want to have a subnet on a class B network,
you would use a subnet mask of 255.255.0.0.
A network can be subnetted into one or more physical net-
works which form a subset of the main network. The subnet
mask is the part of the IP address which is used to represent a
subnetwork within a network. Using subnet masks allows you
to use network address space which is normally unavailable
and ensures that network traffic does not get sent to the whole
network unless intended. Subnet masks are a complex fea-
ture, so great care should be taken when using them. Also see
IP address.
Telnet The Internet standard protocol for remote login that runs on top
of TCP/IP (Transmission Control Protocol/Internet Protocol).
This term can also refer to networking software that acts as a
terminal emulator for a remote login session.
top-level domain The last and most significant component of an Internet fully
qualified domain name, the part after the last “.”. For example,
host wombat.doc.ic.ac.uk is in top-level domain “uk” (for United
Kingdom).
GL-23
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
TERM EXPLANATION
Total Solution CD A CD containing the latest product versions and all the patches
that have been applied during the previous quarter. The Total
Solution CD is available to all Trend Micro Premium Support
customers.
traffic Data flowing between the Internet and your network, both
incoming and outgoing.
Transmission Control Pro- A communications protocol which allows computers with differ-
tocol/Internet Protocol ent operating systems to communicate with each other. Con-
(TCP/IP) trols how data is transferred between computers on the
Internet.
trusted domain A domain from which your Trend Micro product will always
accept messages, without considering whether the message is
spam. For example, a company called Dominion, Inc. has a
subsidiary called Dominion-Japan, Inc. Messages from domin-
ion-japan.com are always accepted into the dominion.com net-
work, without checking for spam, because the messages are
from a known and trusted source.
trusted host A server that is allowed to relay mail through your network
because they are trusted to act appropriately and not, for
example, relay spam through your network.
GL-24
Glossary of Terms
TERM EXPLANATION
tunnel zone A tunnel zone is a logical segment that hosts one or more tun-
nel interfaces. A tunnel zone is associated with a security zone
that acts as its carrier.
GL-25
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
TERM EXPLANATION
virtual IP address (VIP A VIP address maps traffic received at one IP address to
address) another address based on the destination port number in the
packet header.
Virtual Local Area Network A logical (rather than physical) grouping of devices that consti-
(VLAN) tute a single broadcast domain. VLAN members are not identi-
fied by their location on a physical subnetwork but through the
use of tags in the frame headers of their transmitted data.
VLANs are described in the IEEE 802.1Q standard.
Virtual Private Network A VPN is an easy, cost-effective and secure way for corpora-
(VPN) tions to provide telecommuters and mobile professionals local
dial-up access to their corporate network or to another Internet
Service Provider (ISP). Secure private connections over the
Internet are more cost-effective than dedicated private lines.
VPNs are possible because of technologies and standards
such as tunneling and encryption.
GL-26
Glossary of Terms
TERM EXPLANATION
virus kit A template of source code for building and executing a virus,
available from the Internet.
virus signature A virus signature is a unique string of bits that identifies a spe-
cific virus. Virus signatures are stored in the Trend Micro virus
pattern file. The Trend Micro scan engine compares code in
files, such as the body of an email message, or the content of
an HTTP download, to the signatures in the pattern file. If a
match is found, the virus is detected, and is acted upon (for
example, cleaned, deleted, or quarantined) according to your
security policy.
virus trap Software that helps you capture a sample of virus code for
analysis.
virus writer Another name for a computer hacker, someone who writes
virus code.
Web The World Wide Web, also called the Web or the Internet.
GL-27
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
TERM EXPLANATION
Web server A server process running at a Web site which sends out Web
pages in response to HTTP requests from remote browsers.
working directory The destination directory in which the main application files are
stored, such as /etc/iscan/IWSVA.
zip file A compressed archive (in other words, “zip file") from one or
more files using an archiving program such as WinZip.
"Zip of Death" A zip (or archive) file of a type that when decompressed,
expands enormously (for example 1000 percent) or a zip file
with thousands of attachments. Compressed files must be
decompressed during scanning. Huge files can slow or stop
your network.
GL-28
Index
A thread groups 5-46
access control ARM 1-8
by client IP 3-14 audit log 10-21
FTP 8-10
identifying clients/servers 3-14
B
Blue Coat appliance
settings 3-13
setting up 3-20
access control settings 11-15
access log 10-20 C
upstream proxy 10-20
cache
access quota policies 11-14 flushing 3-26
access quotas 1-11–1-12, 6-1
policy settings 11-17
adding 6-2
cache appliance
deactivating 6-3 flushing 3-26
exceeding during a download 6-2
Cisco CE ICAP server 3-23
Guest Policy 6-2
client certificate handling 5-11
introducing 6-2 client IP to user ID cache 11-21
managing 6-2
cluster configuration 3-25
actions
compressed files 8-8
infected file (FTP) 8-9 security settings 5-22
Macro Scan (FTP) 8-10
configuration files C-1, C-4
password-protected file (FTP) 8-9
controlled pattern releases (CPRs) 2-14
uncleanable file (FTP) 8-9 incremental updates 2-15
active FTP 8-3
installing 2-14
ActiveUpdate 2-3
custom category 1-4
incremental updates 2-10 cyrus-sasl-2.1.19 D-2
without Control Manager 2-3
ActiveX objects D
security rules 5-47 database
signature verification 5-38, 5-50 and log files 10-20
additional risks connection settings 11-17
defined 5-28 testing connection 11-17
Advanced Reporting and Management (ARM) 1-8–1-9, dedicated management interface 1-7
1-15, 10-34, 10-48 delete 10-16
anonymous FTP 3-11 dependent mode 3-5
Anti-virus scan engine 2-5 destination ports (FTP) 8-12
Applets and ActiveX security 1-2, 1-10 digital certificates
adding/modifying policies 5-41 managing 5-53
digital certificates 5-53 directory (LDAP) server
enabling 5-41 performance 11-20
how it works 5-37–5-38 disease vector 6-11
notifications 5-50, 10-42
IN–1
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
IN–2
Index
IN–3
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
N categories 6-11
NetCache appliance criteria for inclusion 6-11
setting up 3-18 defined rule 10-25
notifications 1-12, 8-9 overview 6-11
administrator vs. user 10-34 submitting URLs 6-12
configuring 10-38 phishing 6-10–6-11
email settings 10-34 URLs 6-12
ESMTP support 10-34 policies
introduction 10-34 configuring the scope 4-19
tokens 10-35 default 4-3
using HTML tags 10-38 how they work 4-2
using variables in 10-35 practical examples 4-2
NTP (Network Time Protocol) 1-6 request mode 3-22
response mode 3-22
O product maintenance A-5
online help 1-xvi progress page 5-23
OpenLDAP D-1 protocol handlers C-5
attribute equivalence D-10 proxy
sample ldap.conf D-2 caching 3-5
sample slapd.com D-3 configuring 3-5
software compatibility D-2 listening port 3-10
openldap-2.2.17 D-2 reverse 1-15, 3-9
openssl-0.9.7d D-2 settings 2-3, 3-10
Outbreak Prevention Policy (OPP) 10-25 stand-alone mode 3-4
defined rule 10-25 upstream proxy (dependent mode) 3-5
ID 10-25, 10-27
out-of-band management interface 1-7 Q
quarantined files
P encrypting 8-6
passive FTP 8-3
password 11-18 R
tips for creating 11-18 readme 1-xvi, 2-2
patches 2-2, 11-16 RealAudio 5-20
pattern files 2-4–2-5 receive greeting 8-9
deleting 2-14 register_user_agent_header.exe 4-9
manually deleting 2-14 registration
several on server 2-6 URL 2-2
spyware/grayware 2-7 Registration Profile 2-2
version numbering 2-6–2-7 report distribution 1-5
pattern matching 2-5 reports 1-16
performance log 10-23 archiving 10-18
performance tuning 11-20 availability 10-15
Phish 2-6 chart types 10-13
benefits 6-11 configuring logs 10-29
blocking 6-11 customizing 10-18
IN–4
Index
IN–5
Trend Micro™ InterScan Web Security Virtual Appliance™ Administrator’s Guide
IN–6