165

Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory
Page 2: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro Incorporated reserves the right to make changes to this document and tothe product described herein without notice. Before installing and using the product,please review the readme files, release notes, and/or the latest version of the applicabledocumentation, which are available from the Trend Micro website at:

http://docs.trendmicro.com/en-us/enterprise/interscan-messaging-security.aspx

Trend Micro, the Trend Micro t-ball logo, Control Manager, eManager, InterScan, andTrendLabs are trademarks or registered trademarks of Trend Micro Incorporated. Allother product or company names may be trademarks or registered trademarks of theirowners.

Copyright © 2012. Trend Micro Incorporated. All rights reserved.

Document Part No.: MSEM85804/121129

Release Date: December 2012

Protected by U.S. Patent No.: Patents pending

Page 3: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

This documentation introduces the main features of the product and/or providesinstallation instructions for a production environment. Read through the documentationbefore installing or using the product.

Detailed information about how to use specific features within the product may beavailable in the Trend Micro Online Help and/or the Trend Micro Knowledge Base atthe Trend Micro website.

Trend Micro always seeks to improve its documentation. If you have questions,comments, or suggestions about this or any Trend Micro document, please contact us [email protected].

Evaluate this documentation on the following site:

http://www.trendmicro.com/download/documentation/rating.asp

Page 4: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory
Page 5: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

i

Table of ContentsPreface

Preface .................................................................................................................. v

What’s New ........................................................................................................ vi

Audience ............................................................................................................ xii

InterScan Messaging Security Virtual Appliance Documentation ............ xii

Document Conventions ................................................................................. xiii

Chapter 1: Introducing InterScan Messaging SecurityVirtual Appliance

About InterScan Messaging Security Virtual Appliance ........................... 1-2

IMSVA Main Features and Benefits ............................................................ 1-2

About Cloud Pre-Filter ................................................................................ 1-10

About Email Encryption ............................................................................. 1-10

About Spyware/Grayware .......................................................................... 1-11How Spyware/Grayware Gets into your Network ......................... 1-12Potential Risks and Threats ................................................................ 1-12

About Trend Micro Control Manager ...................................................... 1-13Control Manager Support ................................................................... 1-13

Trend Micro Smart Protection Network .................................................. 1-16Email Reputation Services .................................................................. 1-16File Reputation Services ...................................................................... 1-16Web Reputation Services .................................................................... 1-17Smart Feedback .................................................................................... 1-17

Chapter 2: Component DescriptionsAbout IMSVA Components ......................................................................... 2-2

Cloud Pre-Filter Service Overview .............................................................. 2-2Sender Filtering ....................................................................................... 2-2

Page 6: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

ii

Reputation-Based Source Filtering ...................................................... 2-2Virus and Spam Protection ................................................................... 2-2

About Spam Prevention Solution ................................................................ 2-3Spam Prevention Solution Technology .............................................. 2-3Using Spam Prevention Solution ......................................................... 2-3

IP Filtering ....................................................................................................... 2-3How IP Profiler Works ......................................................................... 2-4

Email Reputation ............................................................................................ 2-5Types of Email Reputation ................................................................... 2-5How Email Reputation Technology Works ....................................... 2-6

About End-User Quarantine (EUQ) ........................................................... 2-7

About Centralized Reporting ........................................................................ 2-8

Chapter 3: Planning for DeploymentDeployment Checklist .................................................................................... 3-2

Network Topology Considerations ............................................................. 3-4IMSVA Deployment with Cloud Pre-Filter ....................................... 3-4Deployment at the Gateway or Behind the Gateway ....................... 3-5Installing without a Firewall .................................................................. 3-8Installing in Front of a Firewall ............................................................ 3-9Installing Behind a Firewall ................................................................ 3-10Installing in the De-Militarized Zone ................................................ 3-11

About Device Roles ..................................................................................... 3-12

About Device Services ................................................................................. 3-12Service Selection ................................................................................... 3-13Deployment with IP Filtering ............................................................ 3-13Understanding Internal Communication Port ................................. 3-13

Understanding POP3 Scanning .................................................................. 3-14Requirements for POP3 Scanning ..................................................... 3-15Configuring a POP3 Client that Receives Email Through IMSVA .................................................................................................................. 3-15

Opening the IMSVA Management Console ............................................ 3-16

Page 7: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Table of Contents

iii

Setting Up a Single Parent Device ............................................................. 3-17Step 1: Configuring System Settings .................................................. 3-18Step 2: Configuring Deployment Settings ........................................ 3-20Step 3: Configuring SMTP Routing Settings ................................... 3-21Step 4: Configuring Notification Settings ......................................... 3-22Step 5: Configuring the Update Source ............................................ 3-23Step 6: Configuring LDAP Settings .................................................. 3-25Step 7: Configuring Internal Addresses ............................................ 3-28Step 8: Configuring Control Manager Server Settings .................... 3-30Step 9: Activating the Product ........................................................... 3-32Step 10: Reviewing the Settings ......................................................... 3-33

Setting Up a Child Device ........................................................................... 3-34

Verifying Successful Deployment .............................................................. 3-35

Chapter 4: Installing IMSVA 8.2System Requirements ..................................................................................... 4-2

Additional Requirements and Tools .................................................... 4-3

Installing IMSVA ............................................................................................ 4-5

Chapter 5: Upgrading from Previous VersionsUpgrading from an Evaluation Version ...................................................... 5-2

Upgrading from IMSVA 8.0 ......................................................................... 5-4Upgrading a Single IMSVA ................................................................... 5-4Upgrading a Distributed Environment ............................................... 5-6Verify the Upgrade Using SSH ............................................................ 5-9Rolling Back an Upgrade ....................................................................... 5-9

Migrating from Previous Versions ............................................................. 5-10Migration Process ................................................................................. 5-10Migrating from IMSS for Windows .................................................. 5-13Migrating from IMSS for Linux ......................................................... 5-15Migrating from IMSVA 8.0 ................................................................ 5-15Exporting Debugging Files ................................................................. 5-15

Page 8: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

iv

Chapter 6: Troubleshooting and Support InformationTroubleshooting .............................................................................................. 6-2

Troubleshooting Utilities ....................................................................... 6-2Installation Troubleshooting Issues .................................................... 6-3

Support Information ...................................................................................... 6-5The Trend Micro Knowledge Base ..................................................... 6-5Contacting Technical Support .............................................................. 6-6TrendLabs ................................................................................................ 6-7Security Intelligence ............................................................................... 6-8Staying Up-to-Date ................................................................................ 6-8

Appendix A: Creating a New Virtual Machine Under VMwareESX for IMSVA

Creating a New Virtual Machine ................................................................. A-2

Appendix B: Creating a New Virtual Machine UnderMicrosoft Hyper-V for IMSVA

Understanding Hyper-V Installation ........................................................... B-2IMSVA Support for Hyper-V .............................................................. B-2Hyper-V Virtualization Modes ............................................................ B-2

Installing IMSVA on Microsoft Hyper-V .................................................. B-2Creating a Virtual Network Assignment ............................................ B-3Creating a New Virtual Machine ......................................................... B-6

Using Para-Virtualization Mode ................................................................ B-18

IndexIndex .............................................................................................................. IN-1

Page 9: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

v

Preface

PrefaceWelcome to the Trend Micro™ InterScan™ Messaging Security Virtual ApplianceInstallation Guide. This manual contains information on InterScan Messaging SecurityVirtual Appliance (IMSVA) features, system requirements, as well as instructions oninstallation and upgrading IMSVA settings.

Refer to the IMSVA 8.2 Administrator’s Guide for information on how to configureIMSVA settings and the Online Help in the management console for detailedinformation on each field on the user interface.

Topics include:

• What’s New on page vi

• Audience on page xii

• InterScan Messaging Security Virtual Appliance Documentation on page xii

• Document Conventions on page xiii

Page 10: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

vi

What’s NewIMSVA 8.2 Service Pack 2 New Features

The following table provides an overview of new features available in IMSVA ServicePack 8.2.

TABLE 1. IMSVA 8.2 Service Pack 2 New Features

NEW FEATURE DESCRIPTION

Advanced anti-malwareprotection

The Advanced Threat Scan Engine (ATSE) uses acombination of pattern-based scanning andaggressive heuristic scanning to detect documentexploits and other threats used in targeted attacks.

Integration with Deep DiscoveryAdvisor

Trend Micro™ Deep Discovery Advisor is a separatelylicensed product that provides unique security visibilitybased on Trend Micro’s proprietary threat analysisand recommendation engines. IMSVA integrates withthe Virtual Analyzer in Deep Discovery Advisor.

Distribution list End-UserQuarantine (EUQ) management

The web-based EUQ service also allows end-users tomanage the spam quarantine of distribution lists thatthey belong to.

EUQ digest inline action links IMSVA enables users to apply actions to quarantinedmessages through links in the EUQ digest.

IMSVA 8.2 New Features

The following table provides an overview of new features available in IMSVA 8.2.

Page 11: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Preface

vii

TABLE 2. IMSVA 8.2 New Features

NEW FEATURE DESCRIPTION

Email encryption Trend Micro Email Encryption integrates with IMSVAto protect sensitive email content by encryptinginbound and outbound email messages according tospecific policies.

IMSVA can also scan encrypted messages forthreats.

IMSVA provides reports and notifications to monitorencrypted email traffic.

Multiple LDAP server support IMSVA supports using more than one LDAP serverand has support for more LDAP server types.

Dashboard and widgets Real-Time summaries have been replaced with adashboard and widgets. This will provideadministrators with more flexibility when viewingIMSVA data.

The System Summary has been renamed "SystemStatus" and appears in the left menu.

Regulatory compliance support IMSVA provides support for regulatory compliance inpolicies.

Expanded platform support IMSVA can now be installed on Hyper-V platforms.

Cloud Pre-Filter enhancements Cloud Pre-Filter now supports protection againstdirectory harvest attacks (DHA).

Accounts other than the "admin" account can begranted access to Cloud Pre-Filter

Expanded Control Managersupport

IMSVA now supports registering to Control Manager5.5.

Microsoft Hyper-V support IMSVA now supports installation on Microsoft Hyper-V.

EUQ enhancement EUQ now supports single sign-on with Kerberos� andsynchronized messages with Cloud Pre-Filter.

Page 12: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

viii

NEW FEATURE DESCRIPTION

New migration Tools New tools have been provided to help customersmigrating from previous product versions.

IMSVA 8.0 New Features

The following table provides an overview of new features available in IMSVA 8.0.

TABLE 3. IMSVA 8.0 New Features

NEW FEATURE DESCRIPTION

Cloud Pre-Filter Cloud Pre-Filter is a hosted email security service thatcan filter all of your email messages before they reachyour network. Pre-filtering your email messages cansave you time and money.

Smart Search Text Box Allows users to quickly navigate to screens on theweb console by typing the name of the screen orfeature in the Smart Search text field.

Common Policy Objects Several information objects that can be used bypolicies have been removed from policy creation andgiven their own areas for configuration:

• Address Groups

• BATV Keys

• Keywords & Expressions

• Policy Notifications

• Stamps

• DKIM Approved List

• Web Reputation Approved List

Web Reputation Protect your clients from malicious URLs embeddedin email messages with Web reputation.

BATV Support Bounce Address Tag Validation (BATV) protects yourclients from bounced email message attacks.

Page 13: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Preface

ix

NEW FEATURE DESCRIPTION

NRS Terminology Change Network Reputation Service (NRS) has been changedto Email reputation.

Detection CapabilityEnhancement

Use DomainKeys Identified Mail (DKIM) enforcement,with the DKIM Approved List, in policies to assist inphishing protection and to reduce the number of falsepositives regarding domains.

X-Header Support Insert X-Headers into email messages to track andcatalog the messages.

Expanded File ScanningSupport

IMSVA now supports scanning Microsoft® Office2007 and Adobe® Acrobat® 8 documents.

Scan Exception Enhancement IMSVA now supports configuring custom policysettings for encrypted messages and passwordprotected attachments. Special actions can be takenon encrypted messages or password protected filessent/received by specified users or groups.

EUQ Enhancement IMSVA now allows users to review and delete orapprove messages that are quarantined byadministrator-created content filters and thosequarantined by the Spam Prevention Solution.

EUQ Single Sign-on (SSO) IMSVA now allows users to log in once to theirdomain and then to EUQ without re-entering theirdomain name and password.

NoteIMSVA 8.0 only supports Internet Explorer andFirefox with Windows Active Directory as theLDAP server.

Antispoofing filter With this filter, a message that has the sender domainthat is the same as the recipient(s) domain, and themessage does not come from an internal IP address,IMSVA takes action on the message.

New Migration Tools New tools have been provided to help customersmigrating from previous product versions.

Page 14: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

x

IMSVA 7.0 New Features

The following table provides an overview of new features available in IMSVA 7.0.

TABLE 4. IMSVA 7.0 New Features

NEW FEATURE DESCRIPTION

Data port redundancy A second data port to connect to your network if aproblem arises with the main data port. The seconddata port has the same IP address as the main dataport, but a different MAC address.

New hard disks Two 250GB raid hard disks.

Self-contained Installation IMSVA provides a self-contained installation thatprovides a purpose-built, hardened, and performancetuned CentOS Linux operating system. This dedicatedoperating system installs with IMSVA to provide aturnkey solution. A separate operating system, suchas Linux, Windows, or Solaris, is not required.

Bare Metal and VMware ESXSupport

IMSVA can be installed on bare metal serverplatforms (servers without an operating system) or onVMware virtual platforms. IMSVA is fully supportedwhen running on VMware ESX Server 3.5.

Command Line Interface IMSVA provides a native Command Line Interface(CLI) to perform system monitoring, systemadministration, debugging, troubleshooting functions,through a secure shell or direct console access.IMSVA’s new CLI interface offers stronger consolesecurity by preventing unauthorized access to the OSshell. The IMSVA CLI is modeled after industrystandard CLI syntax and navigation formats to greatlyreduce the learning time.

Multiple Network InterfacesSupport

Route Configuration

IMSVA supports multiple network interfaces, andprovides a user interface to configure the route forusers to deploy IMSVA more conveniently.

Multiple Antivirus and MalwarePolicies

Multiple IMSVA policies with LDAP support help youconfigure filtering settings that apply to specificsenders and receivers based on different criteria.

Page 15: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Preface

xi

NEW FEATURE DESCRIPTION

Centralized Logging andReporting

A consolidated, detailed report provides top usagestatistics and key mail usage data.

Centralized Archive andQuarantine Management

IMSVA provides an easy way to search multipleIMSVA quarantine and archive areas for messages.

Scalable Web End-UserQuarantine (Web EUQ)

Multiple Web EUQ services offer end-users the abilityto view quarantined email messages that IMSVAdetected as spam.

Together with EUQ notification, IMSVA will help lowerthe cost of helpdesk administrative tasks.

Multiple Spam PreventionTechnologies

Three layers of spam protection:

• Email reputation filters spam senders at theconnection layer.

• IP Profiler helps protect the mail server fromattacks with smart profiles (SMTP IDS).

• Trend Micro Anti-spam engine detects and takesaction on spam.

IntelliTrap IntelliTrap provides heuristic evaluation ofcompressed files that helps reduce the risk that avirus in a compressed file will enter your networkthrough email.

Delegated Administration LDAP-integrated account management allows usersto assign administrative rights for differentconfiguration tasks.

Easy Deployment withConfiguration Wizard

An easy-to-use configuration wizard to get IMSVA upand running.

Advance MTA Functions Opportunistic TLS, domain based delivery, and otherMTA functions help IMSVA handle email efficientlyand securely.

Migration Easy upgrade process ensures that settings will bemigrated with minimum effort during setup.

Page 16: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

xii

NEW FEATURE DESCRIPTION

Mail Auditing and Tracking IMSVA provides detailed logging for all messages totrack and identify message flow related issues.

Integration with Trend MicroControl ManagerTM

Perform log queries on Email reputation detectionsfrom Control Manager, in addition to other supportedfeatures.

Supports 8 bit to 7 bit-MIMEtransformation

IMSVA 7.0 Service Pack 1 supports thetransformation of 8 bit to 7 bit-MIME according to thestandard defined in RFC 1652 SMTP ServiceExtension for 8bit-MIME transport. In the event thatthe next hop of the SMTP server does not support 8bit MIME, IMSS will convert the message from 8 bitMIME to 7 bit MIME.

AudienceThe IMSVA documentation is written for IT administrators in medium and largeenterprises. The documentation assumes that the reader has in-depth knowledge ofemail messaging networks., including details related to the following:

• SMTP and POP3 protocols

• Message transfer agents (MTAs), such as Postfix or Microsoft™ Exchange

• LDAP

• Database management

The documentation does not assume the reader has any knowledge of antivirus orantispam technology.

InterScan Messaging Security VirtualAppliance Documentation

The IMSVA documentation consists of the following:

Page 17: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Preface

xiii

• Installation Guide: Contains introductions to IMSVA features, systemrequirements, and provides instructions on how to deploy and upgrade IMSVA invarious network environments.

• Administrator’s Guide: Helps you get IMSVA up and running with post-installation instructions on how to configure and administer IMSVA.

• Online Help: Provides detailed instructions on each field and how to configure allfeatures through the user interface. To access the online help, open the webmanagement console, then click the help icon.

• Readme File: Contain late-breaking product information that might not be foundin the other documentation. Topics include a description of features, installationtips, known issues, and product release history.

The Installation Guide, Administrator’s Guide and readme file are available at:

http://docs.trendmicro.com

Document ConventionsTo help you locate and interpret information easily, the IMSVA documentation uses thefollowing conventions.

TABLE 5. Document Conventions

CONVENTION DESCRIPTION

ALL CAPITALS Acronyms, abbreviations, and names of certain commandsand keys on the keyboard

Bold Menus and menu commands, command buttons, tabs,options, and other user interface items

Italics References to other documentation

Monospace Examples, sample command lines, program code, web URL,file name, and program output

Page 18: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

xiv

CONVENTION DESCRIPTION

Note Configuration notes

Tip Recommendations

WARNING! Reminders on actions or configurations that must be avoided

Page 19: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

1-1

Chapter 1

Introducing InterScan™ MessagingSecurity Virtual Appliance

This chapter introduces InterScan™ Messaging Security Virtual Appliance (IMSVA)features, capabilities, and technology, and provides basic information on other TrendMicro products that will enhance your anti-spam capabilities.

Topics include:

• About InterScan Messaging Security Virtual Appliance on page 1-2

• IMSVA Main Features and Benefits on page 1-2

• About Cloud Pre-Filter on page 1-10

• About Email Encryption on page 1-10

• About Spyware/Grayware on page 1-11

• file:/C:/zims/Chap01_Introducing_ag_ig/threat-connect-about.xml#id12B5KI0K07Q

• About Trend Micro Control Manager on page 1-13

• Trend Micro™ Smart Protection Network™ on page 1-16

Page 20: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

1-2

About InterScan Messaging Security VirtualAppliance

InterScan Messaging Security Virtual Appliance (IMSVA) integrates multi-tiered spamprevention and anti-phishing with award-winning antivirus and anti-spyware. Contentfiltering enforces compliance and prevents data leakage. This easy-to-deploy appliance isdelivered on a highly scalable platform with centralized management, providing easyadministration. Optimized for high performance and continuous security, the applianceprovides comprehensive gateway email security.

IMSVA Main Features and BenefitsThe following table outlines the main features and benefits that IMSVA can provide toyour network.

TABLE 1-1. Main Features and Benefits

FEATURE DESCRIPTIONS BENEFITS

Data and system protection

Cloud-basedpre-filtering ofmessages

Cloud Pre-Filter integrates withIMSVA to scan all email trafficbefore it reaches your network.

Cloud Pre-Filter can stopsignificant amounts of spam andmalicious messages (up to 90%of your total message traffic)from ever reaching your network.

Emailencryption

Trend Micro Email Encryptionintegrates with IMSVA to encrypt ordecrypt all email traffic entering andleaving your network.

Trend Micro Email Encryptionprovides IMSVA the ability toencrypt all email messagesleaving your network. Byencrypting all email messagesleaving a network administratorscan prevent sensitive data frombeing leaked.

Page 21: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Introducing InterScan Messaging Security Virtual Appliance

1-3

FEATURE DESCRIPTIONS BENEFITS

Advanced anti-malwareprotection

The Advanced Threat Scan Engine(ATSE) uses a combination ofpattern-based scanning andaggressive heuristic scanning todetect document exploits and otherthreats used in targeted attacks.

ATSE identifies both known andunknown advanced threats,protecting your system from newthreats that have yet to be addedto patterns.

Regulatorycompliance

Administrators can meetgovernment regulatoryrequirements using the new defaultpolicy scanning conditionsCompliance templates.

Compliance templates provideadministrators with regulatorycompliance for the following:

• GLBA

• HIPAA

• PCI-DSS

• SB-1386

• US PII

Real-timeStatistics andMonitor

Administrators can monitor the scanperformance and IP filteringperformance of all IMSVA devices(within a group) on themanagement console.

IMSVA provides administratorswith an overview of the systemthat keeps administratorsinformed on the first sign of mailprocessing issues. Detailedlogging helps administratorsproactively manage issuesbefore they become a problem.

Page 22: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

1-4

FEATURE DESCRIPTIONS BENEFITS

IntelliTrap Virus writers often attempt tocircumvent virus filtering by usingdifferent file compression schemes.IntelliTrap provides heuristicevaluation of these compressedfiles.

Because there is the possibility thatIntelliTrap may identify a non-threatfile as a security risk, Trend Microrecommends quarantining messageattachments that fall into thiscategory when IntelliTrap isenabled. In addition, if your usersregularly exchange compressedfiles, you may want to disable thisfeature.

By default, IntelliTrap is turned onas one of the scanning conditionsfor an antivirus policy, and isconfigured to quarantine messageattachments that may be classifiedas security risks.

IntelliTrap helps reduce the riskthat a virus compressed usingdifferent file compressionschemes will enter your networkthrough email.

Contentmanagement

IMSVA analyzes email messagesand their attachments, traveling toand from your network, forappropriate content.

Content that you deeminappropriate, such as personalcommunication, largeattachments, and so on, can beblocked or deferred effectivelyusing IMSVA.

Protection against other email threats

DoS attacks By flooding a mail server with largeattachments, or sending messagesthat contain multiple viruses orrecursively compressed files,individuals with malicious intent candisrupt mail processing.

IMSVA allows you to configurethe characteristics of messagesthat you want to stop at theSMTP gateway, thus reducingthe chances of a DoS attack.

Page 23: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Introducing InterScan Messaging Security Virtual Appliance

1-5

FEATURE DESCRIPTIONS BENEFITS

Maliciousemail content

Many types of file attachments,such as executable programs anddocuments with embedded macros,can harbor viruses. Messages withHTML script files, HTML links, Javaapplets, or ActiveX controls canalso perform harmful actions.

IMSVA allows you to configurethe types of messages that areallowed to pass through theSMTP gateway.

Degradation ofservices

Non-business-related email traffichas become a problem in manyorganizations. Spam messagesconsume network bandwidth andaffect employee productivity. Someemployees use companymessaging systems to sendpersonal messages, transfer largemultimedia files, or conductpersonal business during workinghours.

Most companies haveacceptable usage policies fortheir messaging system—IMSVAprovides tools to enforce andensure compliance with existingpolicies.

Legal liabilityand businessintegrity

Improper use of email can also puta company at risk of legal liability.Employees may engage in sexualor racial harassment, or other illegalactivity. Dishonest employees canuse a company messaging systemto leak confidential information.Inappropriate messages thatoriginate from a company’s mailserver damage the company’sreputation, even if the opinionsexpressed in the message are notthose of the company.

IMSVA provides tools formonitoring and blocking contentto help reduce the risk thatmessages containinginappropriate or confidentialmaterial will be allowed throughyour gateway.

Page 24: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

1-6

FEATURE DESCRIPTIONS BENEFITS

Mass mailingviruscontainment

Email-borne viruses that mayautomatically spread bogusmessages through a company’smessaging system can beexpensive to clean up and causepanic among users.

When IMSVA detects a mass-mailing virus, the action performedagainst this virus can be differentfrom the actions against other typesof viruses.

For example, if IMSVA detects amacro virus in a Microsoft Officedocument with importantinformation, you can configure theprogram to quarantine the messageinstead of deleting the entiremessage, to ensure that importantinformation will not be lost.However, if IMSVA detects a mass-mailing virus, the program canautomatically delete the entiremessage.

By auto-deleting messages thatcontain mass-mailing viruses,you avoid using server resourcesto scan, quarantine, or processmessages and files that have noredeeming value.

The identities of known mass-mailing viruses are in the MassMailing Pattern that is updatedusing the TrendLabs℠ActiveUpdate Servers. You cansave resources, avoid help deskcalls from concerned employeesand eliminate post-outbreakcleanup work by choosing toautomatically delete these typesof viruses and their emailcontainers.

Protection from spyware and other types of grayware

Spyware andother types ofgrayware

Other than viruses, your clients areat risk from potential threats suchas spyware, adware and dialers.For more information, see AboutSpyware/Grayware on page 1-11.

IMSVA’s ability to protect yourenvironment against spywareand other types of graywareenables you to significantlyreduce security, confidentiality,and legal risks to yourorganization.

Integrated anti-spam features

Page 25: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Introducing InterScan Messaging Security Virtual Appliance

1-7

FEATURE DESCRIPTIONS BENEFITS

SpamPreventionSolution (SPS)

Spam Prevention Solution (SPS) isa licensed product from TrendMicro that provides spam detectionservices to other Trend Microproducts. To use SPS, obtain anSPS Activation Code. For moreinformation, contact your salesrepresentative.

SPS works by using a built-in spamfilter that automatically becomesactive when you register andactivate the SPS license.

The detection technology usedby Spam Prevention Solution(SPS) is based on sophisticatedcontent processing and statisticalanalysis. Unlike otherapproaches to identifying spam,content analysis provides high-performance, real-time detectionthat is highly adaptable, even asspam senders change theirtechniques.

Spam Filteringwith IP Profilerand Emailreputation

IP Profiler is a self-learning, fullyconfigurable feature that proactivelyblocks IP addresses of computersthat send spam and other types ofpotential threats. Email reputationblocks IP addresses of known spamsenders that Trend Micro maintainsin a central database.

NoteActivate SPS before youconfigure IP Profiler andEmail reputation.

With the integration of IPFiltering, which includes IPProfiler and Email reputation,IMSVA can block spammers atthe IP level.

Administration and integration

Page 26: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

1-8

FEATURE DESCRIPTIONS BENEFITS

LDAP anddomain-basedpolicies

You can configure LDAP settings ifyou are using LDAP directoryservices such as Lotus Domino™or Microsoft™ Active Directory™ foruser-group definition andadministrator privileges.

NoteYou must have LDAP to useEnd-User Quarantine.

Using LDAP, you can definemultiple rules to enforce yourcompany’s email usageguidelines. You can define rulesfor individuals or groups, basedon the sender and recipientaddresses.

Web-basedmanagementconsole

The management console allowsyou to conveniently configureIMSVA policies and settings.

The management console isSSL-compatible. Being SSL-compatible means access toIMSVA is more secure.

End-UserQuarantine(EUQ)

IMSVA provides web-based EUQ toimprove spam management. Theweb-based EUQ service allowsend-users to manage the spamquarantine of their personalaccounts and of distribution liststhat they belong to. IMSVAquarantines messages that itdetermines are spam. The EUQindexes these messages into adatabase. The messages are thenavailable for end-users to review,delete, or approve for delivery.

With the web-based EUQmanagement console, end-userscan manage messages thatIMSVA quarantines.

IMSVA also enables users toapply actions to quarantinedmessages and to add senders tothe Approved Senders listthrough links in the EUQ digest.

Delegatedadministration

IMSVA offers the ability to createdifferent access rights to themanagement console. You canchoose which sections of theconsole are accessible for differentadministrator logon accounts.

By delegating administrativeroles to different employees, youcan promote the sharing ofadministrative duties.

Page 27: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Introducing InterScan Messaging Security Virtual Appliance

1-9

FEATURE DESCRIPTIONS BENEFITS

Centralizedreporting

Centralized reporting gives you theflexibility of generating one time (ondemand) reports or scheduledreports.

Helps you analyze how IMSVA isperforming.

One time (on demand) reportsallow you to specify the type ofreport content as and whenrequired. Alternatively, you canconfigure IMSVA to automaticallygenerate reports daily, weekly,and monthly.

Systemavailabilitymonitor

A built-in agent monitors the healthof your IMSVA server and deliversnotifications through email or SNMPtrap when a fault conditionthreatens to disrupt the mail flow.

Email and SNMP notification ondetection of system failure allowsyou to take immediate correctiveactions and minimize downtime.

POP3scanning

You can choose to enable ordisable POP3 scanning from themanagement console.

In addition to SMTP traffic,IMSVA can also scan POP3messages at the gateway asmessaging clients in yournetwork retrieve them.

Integrationwith DeepDiscoveryAdvisor

Trend Micro™ Deep DiscoveryAdvisor is a separately licensedproduct that provides uniquesecurity visibility based on TrendMicro’s proprietary threat analysisand recommendation engines.IMSVA integrates with the VirtualAnalyzer in Deep DiscoveryAdvisor.

IMSVA sends suspiciousmessages, includingattachments, to Virtual Analyzerfor further analysis. VirtualAnalyzer performs contentsimulation and analysis in anisolated virtual environment toidentify characteristics commonlyassociated with many types ofmalware. In particular, VirtualAnalyzer checks if files attachedto messages contain exploitcode.

Page 28: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

1-10

FEATURE DESCRIPTIONS BENEFITS

Integrationwith TrendMicro ControlManager™

Trend Micro Control Manager™(TMCM) is a software managementsolution that gives you the ability tocontrol antivirus and contentsecurity programs from a centrallocation regardless of the program’sphysical location or platform. Thisapplication can simplify theadministration of a corporate virusand content security policy.

Outbreak Prevention Servicesdelivered through Trend MicroControl Manager™ reduces therisk of outbreaks. When a TrendMicro product detects a newemail-borne virus, TrendLabsissues a policy that uses theadvanced content filters inIMSVA to block messages byidentifying suspiciouscharacteristics in thesemessages. These rules helpminimize the window ofopportunity for an infectionbefore the updated pattern file isavailable.

About Cloud Pre-FilterCloud Pre-Filter is a cloud security solution that integrates with IMSVA to provideproactive protection in the cloud with the privacy and control of an on-premise, virtualappliance.

Cloud Pre-Filter reduces inbound email volume up to 90% by blocking spam andmalware outside your network. Cloud Pre-Filter is integrated with IMSVA at thegateway allowing flexible control over sensitive information. And local quarantinesensure your email stays private. No email is stored in the cloud. With Cloud Pre-Filter,you can reduce complexity and overhead to realize significant cost savings.

About Email EncryptionTrend Micro Email Encryption provides IMSVA with the ability to perform encryptionand decryption of email. With Email Encryption, IMSVA has the ability to encrypt anddecrypt email regardless of the email client or platform from which it originated. Theencryption and decryption of email on Trend Micro Email Encryption is controlled by a

Page 29: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Introducing InterScan Messaging Security Virtual Appliance

1-11

Policy Manager that enables an administrator to configure policies based on variousparameters, such as sender and recipient email addresses, keywords or where the email(or attachments) contain credit card numbers. Trend Micro Email Encryption presentsitself as a simple mail transfer protocol (SMTP) interface and delivers email out overSMTP to a configured outbound mail transport agent (MTA). This enables easyintegration with other email server-based products, be them content scanners, mailservers or archiving solutions.

About Spyware/GraywareYour clients are at risk from potential threats other than viruses/malware. Grayware cannegatively affect the performance of the computers on your network and introducesignificant security, confidentiality, and legal risks to your organization.

TABLE 1-2. Types of Grayware

TYPE DESCRIPTION

Spyware Gathers data, such as account user names and passwords, andtransmits them to third parties

Adware Displays advertisements and gathers data, such as user websurfing preferences, to target advertisements at the userthrough a web browser

Dialers Change computer Internet settings and can force a computer todial pre-configured phone numbers through a modem

Joke Programs Cause abnormal computer behavior, such as closing andopening the CD-ROM tray and displaying numerous messageboxes

Hacking Tools Help hackers enter computers

Remote Access Tools Help hackers remotely access and control computers

Password CrackingApplications

Help hackers decipher account user names and passwords

Other Other types not covered above

Page 30: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

1-12

How Spyware/Grayware Gets into your NetworkSpyware/grayware often gets into a corporate network when users download legitimatesoftware that has grayware applications included in the installation package.

Most software programs include an End User License Agreement (EULA), which theuser has to accept before downloading. Often the EULA does include informationabout the application and its intended use to collect personal data; however, users oftenoverlook this information or do not understand the legal jargon.

Potential Risks and ThreatsThe existence of spyware/grayware on your network has the potential to introduce thefollowing:

TABLE 1-3. Types of Risks

TYPE DESCRIPTION

Reduced computerperformance

To perform their tasks, spyware/grayware applications oftenrequire significant CPU and system memory resources.

Increased webbrowser-relatedcrashes

Certain types of grayware, such as adware, are often designedto create pop-up windows or display information in a browserframe or window. Depending on how the code in theseapplications interacts with system processes, grayware cansometimes cause browsers to crash or freeze and may evenrequire a system reboot.

Reduced userefficiency

By needing to close frequently occurring pop-up advertisementsand deal with the negative effects of joke programs, users canbe unnecessarily distracted from their main tasks.

Degradation ofnetwork bandwidth

Spyware/grayware applications often regularly transmit the datathey collect to other applications running on your network or tolocations outside of your network.

Loss of personal andcorporate information

Not all data that spyware/grayware applications collect is asinnocuous as a list of websites users visit. Spyware/graywarecan also collect the user names and passwords users type toaccess their personal accounts, such as a bank account, andcorporate accounts that access resources on your network.

Page 31: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Introducing InterScan Messaging Security Virtual Appliance

1-13

TYPE DESCRIPTION

Higher risk of legalliability

If hackers gain access to the computer resources on yournetwork, they may be able to utilize your client computers tolaunch attacks or install spyware/grayware on computersoutside your network. Having your network resources unwillinglyparticipate in these types of activities could leave yourorganization legally liable to damages incurred by other parties.

About Trend Micro Control ManagerTrend Micro™ Control Manager™ is a software management solution that gives youthe ability to control antivirus and content security programs from a central location-regardless of the program’s physical location or platform. This application can simplifythe administration of a corporate virus/malware and content security policy.

• Control Manager server: The Control Manager server is the machine upon whichthe Control Manager application is installed. The web-based Control Managermanagement console is hosted from this server.

• Agent: The agent is an application installed on a managed product that allowsControl Manager to manage the product. The agent receives commands from theControl Manager server, and then applies them to the managed product. The agentcollects logs from the product, and sends them to Control Manager.

• Entity: An entity is a representation of a managed product on the ProductDirectory link. Each entity has an icon in the directory tree. The directory treedisplays all managed entities residing on the Control Manager console.

Control Manager SupportThe following table shows a list of Control Manager features that IMSVA supports.

Page 32: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

1-14

TABLE 1-4. Supported Control Manager Features

FEATURE DESCRIPTION SUPPORTED?

2-way communication Using 2-way communication,either IMSVA or ControlManager may initiate thecommunication process.

No.

Only IMSVA can initiate acommunication process withControl Manager.

Outbreak PreventionPolicy

The Outbreak PreventionPolicy (OPP) is a quickresponse to an outbreakdeveloped by TrendLabs thatcontains a list of actionsIMSVA should perform toreduce the likelihood of theIMSVA server or its clientsfrom becoming infected.

Trend Micro ActiveUpdateServer deploys this policy toIMSVA through ControlManager.

Yes

Log upload for query Uploads IMSVA virus logs,Content Security logs, andEmail reputation logs toControl Manager for querypurposes.

Yes

Single Sign-on Manage IMSVA from ControlManager directly without firstlogging on to the IMSVAmanagement console.

No.

You need to first log on to theIMSVA management consolebefore you can manageIMSVA from Control Manager.

Configurationreplication

Replicate configurationsettings from an existingIMSVA server to a newIMSVA server from ControlManager.

Yes

Pattern update Update pattern files used byIMSVA from Control Manager

Yes

Page 33: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Introducing InterScan Messaging Security Virtual Appliance

1-15

FEATURE DESCRIPTION SUPPORTED?

Engine update Update engines used byIMSVA from Control Manager.

Yes

Product componentupdate

Update IMSVA productcomponents such as patchesand hot fixes from ControlManager.

No.

Refer to the specific patch orhot fix readme file forinstructions on how to updatethe product components.

Configuration by userinterface redirect

Configure IMSVA through theIMSVA management consoleaccessible from ControlManager.

Yes

Renew productregistration

Renew IMSVA productlicense from Control Manager.

Yes

Customized reportingfrom Control Manager

Control Manager providescustomized reporting and logqueries for email-related data.

Yes

Control Manager agentinstallation/uninstallation

Install or uninstall IMSVAControl Manager agent fromControl Manager.

No.

IMSVA Control Manageragent is automaticallyinstalled when you installIMSVA. To enable/disable theagent, do the following fromthe IMSVA managementconsole:

1. Navigate toAdministration >Connections.

2. Click the TMCM Servertab.

3. To enable/disable theagent, select/clear thecheck box next to EnableMCP Agent.

Page 34: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

1-16

FEATURE DESCRIPTION SUPPORTED?

Event notification Send IMSVA eventnotification from ControlManager.

Yes

Command tracking forall commands

Track the status of commandsthat Control Manager issuesto IMSVA.

Yes

Trend Micro™ Smart Protection Network™The Trend Micro™ Smart Protection Network™ is a next-generation cloud-clientcontent security infrastructure designed to protect customers from security risks andweb threats. It powers both on-premise and Trend Micro hosted solutions to protectusers whether they are on the network, at home, or on the go. Smart ProtectionNetwork uses lighter-weight clients to access its unique in-the-cloud correlation ofemail, web, and file reputation technologies, as well as threat databases. Customers’protection is automatically updated and strengthened as more products, services andusers access the network, creating a real-time neighborhood watch protection service forits users.

Email Reputation ServicesTrend Micro’s email reputation technology validates IP addresses by checking themagainst a reputation database of known spam sources and by using a dynamic servicethat can assess email sender reputation in real time. Reputation ratings are refinedthrough continuous analysis of the IP addresses’ “behavior,” scope of activity and priorhistory. Email reputation blocks malicious email messages in the cloud based on thesender’s IP address, preventing threats from reaching the network or the user’s PC.

File Reputation ServicesFile Reputation Services checks the reputation of each file against an extensive in-the-cloud database. Since the malware information is stored in the cloud, it is availableinstantly to all users. High performance content delivery networks and local caching

Page 35: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Introducing InterScan Messaging Security Virtual Appliance

1-17

servers ensure minimum latency during the checking process. The cloud-clientarchitecture offers more immediate protection and eliminates the burden of patterndeployment besides significantly reducing the overall client footprint.

Web Reputation ServicesWith one of the largest domain-reputation databases in the world, Trend Micro webreputation technology tracks the credibility of web domains by assigning a reputationscore based on factors such as a website's age, historical location changes andindications of suspicious activities discovered through malware behavior analysis. Webreputation then continues to scan sites and block users from accessing infected ones.web reputation features help ensure that the pages that users access are safe and freefrom web threats, such as malware, spyware, and phishing scams that are designed totrick users into providing personal information. To increase accuracy and reduce falsepositives, Trend Micro web reputation technology assigns reputation scores to specificpages or links within sites instead of classifying or blocking entire sites, since often, onlyportions of legitimate sites are hacked and reputations can change dynamically overtime.

Smart FeedbackTrend Micro Smart Feedback provides continuous communication between TrendMicro products and its 24/7 threat research centers and technologies. Each new threatidentified through every single customer's routine reputation check automaticallyupdates all Trend Micro threat databases, blocking any subsequent customer encountersof a given threat.

By continuously processing the threat intelligence gathered through its extensive globalnetwork of customers and partners, Trend Micro delivers automatic, real-timeprotection against the latest threats and provides "better together" security, much like anautomated neighborhood watch that involves the community in the protection ofothers. Because the gathered threat information is based on the reputation of thecommunication source, not on the content of the specific communication, the privacyof a customer's personal or business information is always protected.

Page 36: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory
Page 37: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

2-1

Chapter 2

Component DescriptionsThis chapter explains the requirements necessary to manage IMSVA and the varioussoftware components the product needs to function.

Topics include:

• Cloud Pre-Filter Service Overview on page 2-2

• IP Filtering on page 2-3

• Email Reputation on page 2-5

• About End-User Quarantine (EUQ) on page 2-7

Page 38: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

2-2

About IMSVA ComponentsThe new architecture of IMSVA separates the product into distinct components thateach perform a particular task in message processing. The following sections provide anoverview of each component.

Cloud Pre-Filter Service OverviewCloud Pre-Filter service is a managed email security service powered by the Trend MicroEmail Security Platform. By routing your inbound messages through the service, youprotect your domains against spam, phishing, malware, and other messaging threatsbefore the threats reach your network.

Sender FilteringBy approving senders, Cloud Pre-Filter Service subscribers automatically allow messagesfrom trusted mail servers or email addresses. Messages from approved senders are notchecked for spam or source reputation. Messages from approved senders are scannedfor viruses.

By blocking senders, subscribers automatically block messages from untrusted sources.

Reputation-Based Source FilteringWith Trend Micro Email Reputation, Cloud Pre-Filter service verifies email sourcesagainst dynamic and self-updating reputation databases to block messages from thelatest botnets and other IP addresses controlled by spammers, phishers, and malwaredistributors.

Virus and Spam ProtectionWith Trend Micro antivirus technology, Cloud Pre-Filter Service protects againstinfectious messages from mass-mailing worms or manually crafted messages thatcontain Trojans, spyware, or other malicious code.

Page 39: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Component Descriptions

2-3

Cloud Pre-Filter Service checks messages for spam characteristics to effectively reducethe volume of unsolicited messages.

About Spam Prevention SolutionSpam Prevention Solution (SPS) is a licensed product from Trend Micro that providesspam-detection services to other Trend Micro products. The SPS license is included inthe Trend Micro Antivirus and Content Filter license. For more information, contactto your sales representative.

Spam Prevention Solution TechnologySPS uses detection technology based on sophisticated content processing and statisticalanalysis. Unlike other approaches to identifying spam, content analysis provides highperformance, real-time detection that is highly adaptable, even as spammers change theirtechniques.

Using Spam Prevention SolutionSPS works through a built-in spam filter that automatically becomes active when youregister and activate the Spam Prevention Solution license.

IP FilteringIMSVA includes optional IP Filtering, which consists of two parts:

• IP Profiler: Allows you to configure threshold settings used to analyze emailtraffic. When traffic from an IP address violates the settings, IP Profiler adds theIP address of the sender to its database and then blocks incoming connectionsfrom the IP address.

IP profiler detects any of these four potential Internet threats:

• Spam: Email with unwanted advertising content.

Page 40: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

2-4

• Viruses: Various virus threats, including Trojan programs.

• Directory Harvest Attack (DHA): A method used by spammers to collectvalid email addresses by generating random email addresses using acombination of random email names with valid domain names. Emails arethen sent to these generated email addresses. If an email message is delivered,the email address is determined to be genuine and thus added to the spamdatabases.

• Bounced Mail: An attack that uses your mail server to generate emailmessages that have the target's email domain in the "From" field. Fictitiousaddresses send email messages and when they return, they flood the target'smail server.

• Email Reputation: Blocks email from known spam senders at the IP-level.

How IP Profiler WorksIP Profiler proactively identifies IP addresses of computers that send email containingthreats mentioned in the section IP Filtering on page 2-3. You can customize severalcriteria that determine when IMSVA will start taking a specified action on an IP address.The criteria differ depending on the potential threat, but commonly include a durationduring which IMSVA monitors the IP address and a threshold.

The following process takes place after IMSVA receives a connection request from asending mail server:

1. FoxProxy queries the IP Profiler’s DNS server to see if the IP address is on theblocked list.

2. If the IP address is on the blocked list, IMSVA denies the connection request.

If the IP address is not on the blocked list, IMSVA analyzes the email trafficaccording to the threshold criteria you specify for IP Profiler.

3. If the email traffic violates the criteria, IMSVA adds the sender IP address to theblocked list.

Page 41: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Component Descriptions

2-5

Email ReputationTrend Micro designed Email reputation to identify and block spam before it enters acomputer network by routing Internet Protocol (IP) addresses of incoming mailconnections to Trend Micro Smart Protection Network for verification against anextensive Reputation Database.

Types of Email ReputationThere are two types of Email reputation: Standard on page 2-5 and Advanced on page2-5.

Email Reputation: StandardThis service helps block spam by validating requested IP addresses against the TrendMicro reputation database, powered by the Trend Micro Smart Protection Network.This ever-expanding database currently contains over 1 billion IP addresses withreputation ratings based on spamming activity. Trend Micro spam investigatorscontinuously review and update these ratings to ensure accuracy.

Email reputation: Standard is a DNS single-query-based service. Your designated emailserver makes a DNS query to the standard reputation database server whenever anincoming email message is received from an unknown host. If the host is listed in thestandard reputation database, Email reputation reports that email message as spam.

Email Reputation: AdvancedEmail reputation: Advanced identifies and stops sources of spam while they are in theprocess of sending millions of messages.

This is a dynamic, real-time antispam solution. To provide this service, Trend Microcontinuously monitors network and traffic patterns and immediately updates thedynamic reputation database as new spam sources emerge, often within minutes of thefirst sign of spam. As evidence of spam activity ceases, the dynamic reputation databaseis updated accordingly.

Like Email reputation: Standard, Email reputation: Advanced is a DNS query-basedservice, but two queries can be made to two different databases: the standard reputation

Page 42: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

2-6

database and the dynamic reputation database (a database updated dynamically in realtime). These two databases have distinct entries (no overlapping IP addresses), allowingTrend Micro to maintain a very efficient and effective database that can quickly respondto highly dynamic sources of spam. Email reputation: Advanced has blocked more than80% of total incoming connections (all were malicious) in customer networks. Resultswill vary depending on how much of your incoming email stream is spam. The morespam you receive, the higher the percentage of blocked connections you will see.

How Email Reputation Technology WorksTrend Micro Email reputation technology is a Domain Name Service (DNS) query-based service. The following process takes place after IMSVA receives a connectionrequest from a sending mail server:

1. IMSVA records the IP address of the computer requesting the connection.

2. IMSVA forwards the IP address to the Trend Micro Email reputation DNS serversand queries the Reputation Database. If the IP address had already been reportedas a source of spam, a record of the address will already exist in the database at thetime of the query.

3. If a record exists, Email reputation instructs IMSVA to permanently or temporarilyblock the connection request. The decision to block the request depends on thetype of spam source, its history, current activity level, and other observedparameters.

Page 43: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Component Descriptions

2-7

The figure below illustrates how Email reputation works.

FIGURE 2-1. How Email reputation works

For more information on the operation of Trend Micro Email reputation, visit http://us.trendmicro.com/us/products/enterprise/network-reputation-services/index.html.

About End-User Quarantine (EUQ)IMSVA provides Web-based EUQ to improve spam management. The Web-basedEUQ service allows end users to manage their own spam quarantine. Messages thatSpam Prevention Solution (licensed separately from IMSVA), or administrator-createdcontent filters, determine to be spam, are placed into quarantine. These messages are

Page 44: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

2-8

indexed into a database by the EUQ agent and are then available for end users to reviewand delete or approve for delivery.

About Centralized ReportingTo help you analyze how IMSVA is performing, use the centralized reporting feature.You can configure one time (on demand) reports or automatically generate reports(daily, weekly, and monthly).

Page 45: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

3-1

Chapter 3

Planning for DeploymentThis chapter explains how to plan for IMSVA deployment. For instructions onperforming initial configuration, see the Administrator’s Guide.

Topics include:

• Deployment Checklist on page 3-2

• Network Topology Considerations on page 3-4

• About Device Roles on page 3-12

• Planning for Deployment on page 3-1

• Understanding POP3 Scanning on page 3-14

• Opening the IMSVA Management Console on page 3-16

• Setting Up a Single Parent Device on page 3-17

• Setting Up a Child Device on page 3-34

• Verifying Successful Deployment on page 3-35

Page 46: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

3-2

Deployment ChecklistThe deployment checklist provides step-by-step instructions on the pre-installation andpost-installation tasks for deploying IMSVA.

TABLE 3-1. Deployment Checklist

TICK WHENCOMPLETED

TASKS OPTIONAL REFERENCE

Step 1 - Deploy IMSVA with Cloud Pre-Filter

Deploy with Cloud Pre-Filter Yes IMSVA Deployment with CloudPre-Filter on page 3-4

Step 2 - Identify the location of IMSVA

Select one of the following locations on your network where you would liketo install IMSVA.

At the gateway Deployment at the Gateway orBehind the Gateway on page3-5

Behind the gateway Deployment at the Gateway orBehind the Gateway on page3-5

Without a firewall Installing without a Firewall onpage 3-8

In front of a firewall Installing in Front of a Firewallon page 3-9

Behind a firewall Installing Behind a Firewall onpage 3-10

In the De-Militarized Zone Installing in the De-MilitarizedZone on page 3-11

Step 3 - Plan the scope

Decide whether you would like to install a single IMSVA device or multipledevices.

Page 47: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Planning for Deployment

3-3

TICK WHENCOMPLETED

TASKS OPTIONAL REFERENCE

Single device installation About Device Roles on page3-12

Multiple IMSVA devices About Device Roles on page3-12

Step 4 - Deploy or Upgrade

Deploy a new IMSVA device or upgrade from a previous version.

Upgrade from a previousversion

Upgrading from IMSVA 8.0 onpage 5-4

Step 5 - Start services

Activate IMSVA services to start protecting your network against variousthreats.

Scanner IMSVA Services section of theAdministrator’s Guide

Policy

EUQ Yes

Step 6 - Configure other IMSVA settings

Configure various IMSVA settings to get IMSVA up and running.

IP Filtering Rules Yes IP Filtering Service section ofthe Administrator’s Guide

SMTP Routing Scanning SMTP Messagessection of the Administrator’sGuide

POP3 Settings Yes Scanning POP3 Messagessection of the Administrator’sGuide

Policy and scanningexceptions

Managing Policies section ofthe Administrator’s Guide

Page 48: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

3-4

TICK WHENCOMPLETED

TASKS OPTIONAL REFERENCE

Perform a manual update ofcomponents and configurescheduled updates

Updating Scan Engine andPattern Files section of theAdministrator’s Guide

Log settings Configuring Log Settingssection of the Administrator’sGuide

Step 7 - Back up IMSVA

Perform a backup of IMSVA as a precaution against system failure.

Back up IMSVA settings Backing Up IMSVA section ofthe Administrator’s Guide

Network Topology ConsiderationsDecide how you want to use IMSVA in your existing email and network topology. Thefollowing are common scenarios for handling SMTP traffic.

IMSVA Deployment with Cloud Pre-Filter

Cloud Pre-Filter has no impact on how IMSVA should be deployed.

Note

Cloud Pre-Filter uses port 9000 as the web service listening port. This port must be openon the firewall for IMSVA to connect to Cloud Pre-Filter.

However, when adding Cloud Pre-Filter policies you must change the MX records, ofthe domain specified in the policy, to that of the Cloud Pre-Filter inbound addresses.The address is provided on the bottom of Cloud Pre-Filter Policy List screen. ClickCloud Pre-Filter in the IMSVA management console to display the Cloud Pre-FilterPolicy List screen.

Page 49: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Planning for Deployment

3-5

Tip

Trend Micro recommends adding IMSVA’s address to the domain’s MX records, andplacing IMSVA at a lower priority than Cloud Pre-Filter. This allows IMSVA to provideemail service continuity as a backup to Cloud Pre-Filter.

Deployment at the Gateway or Behind the Gateway

TABLE 3-2. Common scenarios for handling SMTP traffic

SINGLE DEVICE MULTIPLE DEVICES

At the Gateway The only setup if you planto use IP Filtering with thedevice. IMSVA is deployedat the gateway to provideantivirus, content filtering,spam prevention and IPFiltering services, whichinclude Network ReputationServices and IP Profiler.See Figure 3-1: SingleIMSVA device at thegateway on page 3-6.

The only setup if you planto use IP Filtering with atleast one of the devices.You can enable or disableservices on differentdevices. See the following:

• Figure 3-3: IMSVAgroup at the gatewayon page 3-7

• Service Selection onpage 3-13

Behind the Gateway The most common setup.IMSVA is deployedbetween upstream anddownstream MTAs toprovide antivirus, contentfiltering and spamprevention services. SeeFigure 3-2: Single IMSVAdevice behind the gatewayon page 3-6.

The most common groupsetup. IMSVA devices aredeployed betweenupstream and downstreamMTAs to provide antivirus,content filtering and spamprevention services. Youcan enable or disableservices on differentdevices. See the following:

• Figure 3-4: IMSVAgroup behind thegateway on page 3-7

• Service Selection onpage 3-13

Page 50: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

3-6

SINGLE DEVICE MULTIPLE DEVICES

Trend Micro Control Manager scenario

If you have multiple groups, you can use Trend Micro Control Manager (TMCM) tomanage the devices.

FIGURE 3-1. Single IMSVA device at the gateway

FIGURE 3-2. Single IMSVA device behind the gateway

Page 51: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Planning for Deployment

3-7

FIGURE 3-3. IMSVA group at the gateway

FIGURE 3-4. IMSVA group behind the gateway

Page 52: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

3-8

Installing without a FirewallThe following figure illustrates how to deploy IMSVA and Postfix when your networkdoes not have a firewall.

FIGURE 3-5. Installation topology: no firewall

NoteTrend Micro does not recommend installing IMSVA without a firewall. Placing the serverhosting IMSVA at the edge of the network may expose it to security threats.

Page 53: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Planning for Deployment

3-9

Installing in Front of a Firewall

The following figure illustrates the installation topology when you install IMSVA infront of your firewall.

FIGURE 3-6. Installation topology: in front of the firewall

Incoming Traffic

• Postfix should receive incoming messages first, then transfer them to IMSVA.Configure IMSVA to reference your SMTP server(s) or configure the firewall topermit incoming traffic from the IMSVA server.

• Configure the Relay Control settings to only allow relay for local domains.

Outgoing Traffic

• Configure the firewall (proxy-based) to route all outbound messages to IMSVA, sothat:

• Outgoing SMTP messages to IMSVA servers.

• Incoming SMTP messages can only come from Postfix to IMSVA servers.

• Configure IMSVA to allow internal SMTP gateways to relay, through Postfix, toany domain through IMSVA.

Page 54: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

3-10

Tip

For more information, see the Configuring SMTP Routing section of theAdministrator’s Guide.

Installing Behind a Firewall

The following figure illustrates how to deploy IMSVA and Postfix behind your firewall.

FIGURE 3-7. Installation scenario: behind a firewall

Incoming Traffic

• Configure your proxy-based firewall, as follows:

• Outgoing SMTP messages go to Postfix first and then to the IMSVA serveror the switch performing load balancing between scanners.

• Incoming SMTP messages go first to Postfix, then to IMSVA , and then tothe SMTP servers in the domain.

• Configure IMSVA to route messages destined for your local domain(s) to theSMTP gateway or your internal mail server.

• Configure relay restriction to only allow relay for local domain(s).

Page 55: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Planning for Deployment

3-11

Outgoing Traffic

• Configure all internal SMTP gateways to send outgoing messages to Postfix andthen to IMSVA servers.

• If you are replacing your SMTP gateway with IMSVA, configure your internal mailserver to send outgoing messages through Postfix and then to IMSVA servers.

• Configure Postfix and IMSVA to route all outgoing messages (to domains otherthan local), to the firewall, or deliver the messages .

• Configure IMSVA to allow internal SMTP gateways to relay to any domain usingIMSVA.

Tip

For more information, see the Configuring SMTP Routing section of theAdministrator’s Guide.

Installing in the De-Militarized Zone

You can also install IMSVA and Postfix in the De-Militarized Zone (DMZ).

Incoming Traffic

• Configure your packet-based firewall.

• Configure IMSVA to route messages destined for your local domain(s) to theSMTP gateway or your internal mail server.

Outgoing Traffic

• Configure Postfix to route all outgoing messages (destined for domains other thanthe local domains) to the firewall or deliver them using IMSVA .

• Configure all internal SMTP gateways to forward outgoing mail to Postfix and thento IMSVA.

Page 56: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

3-12

• Configure IMSVA to allow internal SMTP gateways to relay to any domain,through Postfix and IMSVA.

TipFor more information, see the Configuring SMTP Routing section of theAdministrator’s Guide.

About Device RolesIMSVA can act as a parent or child device. Parent and child devices compose a group,where the parent provides central management services to the child devices registered toit.

• Parent: Manages child devices. If you are deploying a single IMSVA device, selectparent mode during setup so that all IMSVA components are deployed.

• Child: Managed by a single parent device and uses all global settings that youconfigure through the parent device’s management console.

A group refers to a parent device with at least one child device registered to it.

About Device ServicesYou can enable different kinds of services on IMSVA devices.

Parent-only services:

• Admin user interface service (management console): Manages global settings.

Parent and child services:

• Policy service: Manages the rules that you configure.

• Scanner service: Scans email traffic.

• EUQ service: Manages End-User Quarantine, which allows your users to viewtheir messages that IMSVA determined were spam.

Page 57: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Planning for Deployment

3-13

• Command Line Interface (CLI) service: Provides access to CLI features.

A child device is functional only when it is registered to a parent.

Service SelectionYou can enable different types of services on parent and child devices. For example, toincrease throughput, add more child devices, enable all their services and allow the childdevices to scan traffic and provide EUQ services.

You can deploy IMSVA devices in a parent/child group in either deployment scenario.However, if you enable the scanner service on parent and child devices, you must usethe same type of deployment for all devices in a single group. You cannot deploy somechild devices at the gateway and others behind the gateway.

In addition to the above SMTP-scanning scenarios, you might want IMSVA to scanPOP3 traffic. See Understanding POP3 Scanning on page 3-14 for more information.

Deployment with IP FilteringThe Trend Micro IP Filtering, which includes IP Profiler and Email Reputation blocksconnections at the IP level.

To use IP Filtering, any firewall between IMSVA and the edge of your network mustnot modify the connecting IP address as IP Filtering is not compatible with networksusing network address translation (NAT). If IMSVA accepts SMTP connections fromthe same source IP address, for instance, IP Filtering will not work, as this addresswould be the same for every received message and the IP filtering software would beunable to determine whether the original initiator of the SMTP session was a knownsender of spam.

Understanding Internal Communication PortIMSVA supports multiple network interfaces. This means one IMSVA device may havemultiple IP addresses. This introduces challenges when devices try to communicateusing a unique IP address. IMSVA incorporates the use of an Internal CommunicationPort to overcome this challenge.

Page 58: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

3-14

• Users must specify one network interface card (NIC) as an InternalCommunication Port to identify the IMSVA device during installation.

• After installation, users can change the Internal Communication Port on theIMSVA management console through the Configuration Wizard or the commandline interface (CLI).

• In a group scenario, parent devices and child devices must use their InternalCommunication Port to communicate with each other. When registering a childdevice to parent device, the user must specify the IP address of the parent device’sInternal Communication Port.

Tip

Trend Micro recommends configuring a host route entry on each IMSVA device ofthe group to ensure that parent-child communication uses the InternalCommunication Port.

• IMSVA devices use the Internal Communication Port’s IP address to register toControl Manager servers. When users want to configure IMSVA devices from theControl Manager management console, the management console service on theInternal Communication Port needs to be enabled. By default, the managementconsole service is enabled on all ports.

Understanding POP3 ScanningIn addition to SMTP traffic, IMSVA can scan POP3 messages at the gateway as yourclients retrieve them. Even if your company does not use POP3 email, your employeesmight access personal, web-based POP3 email accounts, which can create points ofvulnerability on your network if the messages from those accounts are not scanned.

The most common email scanning deployments will use IMSVA to scan SMTP traffic,which it does by default. However, to scan POP3 traffic that your organization mightreceive from a POP3 server over the Internet, enable POP3 scanning.

With POP3 scanning enabled, IMSVA acts as a proxy, positioned between mail clientsand POP3 servers, to scan messages as the clients retrieve them.

Page 59: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Planning for Deployment

3-15

To scan POP3 traffic, configure your email clients to connect to the IMSVA serverPOP3 proxy, which connects to POP3 servers to retrieve and scan messages.

Requirements for POP3 Scanning

For IMSVA to scan POP3 traffic, a firewall must be installed on the network andconfigured to block POP3 requests from all computers except IMSVA. Thisconfiguration ensures that all POP3 traffic passes through the firewall to IMSVA andthat only IMSVA scans the POP3 traffic.

Note

If you disable POP3 scanning, your clients cannot receive POP3 mail.

Configuring a POP3 Client that Receives Email ThroughIMSVA

To configure a POP3 client using a generic POP3 connection, configure the following:

• IP address/Domain name: The IMSVA IP address or domain name

• Port: IMSVA Generic POP3 port

• Account: account_name#POP3_Server_Domain-name

For example: user#10.18.125.168

To configure a POP3 client using dedicated POP3 connections, configure the following:

• IP address: The IMSVA IP address

• Port: The IMSVA dedicated POP3 port

• Account: account_name

For example: user

Page 60: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

3-16

Opening the IMSVA Management ConsoleYou can view the IMSVA management console with a web browser from the serverwhere you deployed the program, or remotely across the network.

To view the console in a browser, go to the following URL:

https://{IMSVA}:8445

where {IMSVA} refers to the IP address or Fully Qualified Domain Name.

For example: https://196.168.10.1:8445 or https://IMSVA1:8445

An alternative to using the IP address is to use the target server’s fully qualified domainname (FQDN). To view the management console using SSL, type “https://” before thedomain name and append the port number after it.

The default logon credentials are as follows:

• Administrator user name: admin

• Password: imsva

Type the logon credentials the first time you open the console and click Log on. Toprevent unauthorized changes to your policies, Trend Micro recommends that you set anew logon password immediately following deployment.

Note

If you are using Internet Explorer (IE) 7.0 to access the management console, IE will blockthe access and display a popup dialog box indicating that the certificate was issued from adifferent web address. Simply ignore this message and click Continue to this web site toproceed.

Tip

To prevent unauthorized changes to your policies, Trend Micro recommends changing thepassword regularly.

Page 61: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Planning for Deployment

3-17

Setting Up a Single Parent DeviceIMSVA provides a Configuration Wizard to help you configure all the settings youneed to get IMSVA up and running.

Procedure

1. Make sure that your management computer can ping IMSVA’s IP address that youconfigured during installation.

2. On the management computer, open Internet Explorer (version 6.0 or later) orFirefox (version 3.5 or later).

3. Type the following URL (accept the security certificate if necessary):

https://<IP address>:8445

The logon screen appears.

4. Select the Open Configuration Wizard check box.

5. Type the following default user name and password:

• User name: admin

• Password: imsva

Page 62: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

3-18

The Configuration Wizard screen appears.

FIGURE 3-8. Configuration Wizard screen

6. Progress through the Configuration Wizard screens to configure the settings.

Step 1: Configuring System Settings

Procedure

1. After you read the welcome screen, click Next. The Local System Settings screenappears.

Page 63: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Planning for Deployment

3-19

FIGURE 3-9. Local System Settings

2. Modify the device host name, IP address, and netmask if necessary. Also, configureyour network settings and set the device system time.

Page 64: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

3-20

Note

The local system settings take effect immediately when you click the Next> button.If the IP address or time settings are changed, IMSVA will restart. Wait until IMSVAis online and then log on again.

Step 2: Configuring Deployment Settings

Procedure

1. Click Next.

The Deployment Settings screen appears.

FIGURE 3-10. Deployment Settings

Page 65: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Planning for Deployment

3-21

2. Select Parent Device or Child Device. If this is the first device you are setting up,you must select Parent Device. You can configure additional child devices at alater time.

To deploy the device between upstream and downstream MTAs, clear the gatewaydeployment check box.

Also, decide if you want to use EUQ or NTP services.

Step 3: Configuring SMTP Routing Settings

Procedure

1. Click Next.

Page 66: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

3-22

The SMTP Routing Settings screen appears.

FIGURE 3-11. SMTP Routing Settings

2. Add all SMTP server domains and their corresponding SMTP server names to therelay domain list. IMSVA needs this information to pass messages to SMTP serversfor delivery.

Step 4: Configuring Notification Settings

Procedure

1. Click Next.

Page 67: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Planning for Deployment

3-23

The Notification Settings screen appears.

FIGURE 3-12. Notification Settings

2. If you want to receive notifications for system and policy events, configure theEmail or SNMP Trap notification settings.

Step 5: Configuring the Update Source

Procedure

1. Click Next.

Page 68: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

3-24

The Update Source screen appears.

FIGURE 3-13. Update Source

2. Configure the following update settings, which will determine from where IMSVAwill receive its component updates and through which proxy (if any) IMSVA needsto connect to access the Internet:

• Source: Click Trend Micro ActiveUpdate (AU) server to receive updatesdirectly from Trend Micro. Alternatively, click Other Internet source andtype the URL of the update source that will check the Trend Micro AU serverfor updates. You can specify an update source of your choice or type the URLof your Control Manager server http://<TMCM server address>/ControlManager/download/activeupdate/, if applicable.

Page 69: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Planning for Deployment

3-25

• Proxy Settings: Select the Use proxy server check box and configure theproxy type, server name, port, user name, and password.

Step 6: Configuring LDAP Settings

Procedure

1. Click Next.

Page 70: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

3-26

The LDAP Settings screen appears.

FIGURE 3-14. LDAP Settings

Page 71: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Planning for Deployment

3-27

2. Type a meaningful description for the LDAP server.

3. Configure LDAP settings only if you will use LDAP for user-group definition,administrator privileges, or web quarantine authentication.

a. For LDAP server type, select one of the following:

• Domino

• Microsoft Active Directory

• Microsoft AD Global Catalog

• OpenLDAP

• Sun iPlanet Directory

b. To enable one or both LDAP servers, select the check boxes next to EnableLDAP 1 or Enable LDAP 2.

c. Type the names of the LDAP servers and the port numbers they listen on.

d. Under LDAP Cache Expiration for Policy Services and EUQ services,type a number that represents the time to live next to the Time To Live inminutes field.

e. Under LDAP Admin, type the administrator account, its correspondingpassword, and the base-distinguished name. See the following table for aguide on what to specify for the LDAP admin settings.

TABLE 3-3. LDAP admin settings

LDAP SERVERLDAP ADMIN

ACCOUNT (EXAMPLES)

BASEDISTINGUISHED

NAME (EXAMPLES)

AUTHENTICATION METHOD

ActiveDirectory

Without Kerberos:[email protected](UPN) or domain\user1

With Kerberos:[email protected]

dc=domain,dc=com

Simple

Advanced(withKerberos)

Page 72: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

3-28

LDAP SERVERLDAP ADMIN

ACCOUNT (EXAMPLES)

BASEDISTINGUISHED

NAME (EXAMPLES)

AUTHENTICATION METHOD

ActiveDirectoryGlobal Catalog

Without Kerberos:[email protected](UPN) or domain\user1

With Kerberos:[email protected]

dc=domain,dc=com

dc=domain1,dc=com (if multipleunique domainsexist)

Simple

Advanced(withKerberos)

Lotus Domino cn=manager,dc=test1, dc=com

dc=test1, dc=com Simple

Lotus Domino user1/domain Not applicable Simple

Sun iPlanetDirectory

uid=user1,ou=people,dc=domain, dc=com

dc=domain,dc=com

Simple

f. For Authentication method, click Simple or Advanced authentication. ForActive Directory advanced authentication, configure the Kerberosauthentication default realm, Default domain, KDC and admin server, andKDC port number.

Note

Specify LDAP settings only if you will use LDAP for user-group definition,administrator privileges, or web quarantine authentication. You must enableLDAP to use End-User Quarantine.

Step 7: Configuring Internal Addresses

Procedure

1. Click Next.

Page 73: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Planning for Deployment

3-29

The Internal Addresses screen appears.

FIGURE 3-15. Internal Addresses

2. IMSVA uses the internal addresses to determine whether a policy or an event isinbound or outbound.

• If you are configuring a rule for outgoing messages, the internal address listapplies to the senders.

• If you are configuring a rule for incoming messages, the internal address listapplies to the recipients.

To define internal domains and user groups, do one of the following:

• Select Enter domain from the drop-down list, type the domain in the textbox, and then click >>.

Page 74: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

3-30

• Select Search for LDAP groups from the drop-down list. A screen forselecting the LDAP groups appears. Type an LDAP group name for whichyou want to search in the text box and click Search. The search result appearsin the list box. To add it to the Selected list, click >>.

Step 8: Configuring Control Manager Server Settings

Procedure

1. Click Next.

Page 75: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Planning for Deployment

3-31

The TMCM Server Settings screen appears.

FIGURE 3-16. TMCM Server Settings

2. If you will use Control Manager to manage IMSVA, do the following:

a. Select Enable MCP Agent (included with IMSVA by default).

b. Next to Server, type the Control Manager IP address or FQDN.

c. Next to Communication protocol, select HTTP or HTTPS and type thecorresponding port number. The default port number for HTTP access is 80,and the default port number for HTTPS is 443.

Page 76: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

3-32

d. Under Web server authentication, type the user name and password for theweb server if it requires authentication.

e. If a proxy server is between IMSVA and Control Manager, select Enableproxy.

f. Type the proxy server port number, user name, and password.

Step 9: Activating the Product

Procedure

1. Click Next.

The Product Activation screen appears.

FIGURE 3-17. Product Activation

Page 77: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Planning for Deployment

3-33

2. Type the Activation Codes for the products or services you want to activate. If youdo not have an Activation Code, click Register Online and follow the directionsat the Trend Micro Registration web site.

Step 10: Reviewing the Settings

Procedure

1. Click Next.

The Review Settings screen appears.

FIGURE 3-18. Review Settings

2. If your settings are correct, click Finish.

Page 78: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

3-34

To modify any of your settings, click Back and keep moving through the screensuntil your settings are complete. IMSVA will be operational after you click Finishand exit the Wizard.

Setting Up a Child DeviceThis section explains how to set up a child device and register it to the parent device.

Procedure

1. Determine the IP address of the child device.

2. On the parent device, do the following:

a. After you set up a parent device (see Setting Up a Single Parent Device on page3-17), make sure the parent device is operational.

b. Log on to the management console. Make sure that you are logging on theparent device management console.

c. Navigate to Administration > IMSVA Configuration > Connections >Child IP.

d. Under Add IP Address, add the IP address for the Internal CommunicationPort of the child device.

3. On the child device, do the following:

a. Just as you did for the parent device, connect a management computer to thechild device and log on to the management console. All IMSVA devices havethe same default management console login credentials.

b. In the Setup Wizard, configure the local system settings and then clickNext>.

c. On the Deployment Settings screen, select Child Server and add the IPaddress for the Internal Communication Port of the parent device.

d. Click Finish.

Page 79: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Planning for Deployment

3-35

4. On the parent device, do the following:

a. Navigate to System Status.

b. Verify that the child device appears under Managed Services and that agreen check mark appears under Connection. You can start or stop Scanner,Policy, or EUQ services.

NoteIf you enabled EUQ on the parent, it will also be enabled on the child.

5. If you want to use EUQ on the child device, redistribute the data across the EUQdatabases:

a. On the parent device, navigate to Administration > End-User Quarantine.

The EUQ Management tab appears by default.

b. Select Redistribute all or Only redistribute approved senders. TrendMicro recommends selecting Redistribute all.

c. Click Redistribute.

NoteIf you registered an EUQ-enabled child device to its parent device, add senders to theapproved senders list, and then re-distribute EUQ data, some of the newly addedapproved senders might not appear.

Trend Micro recommends the following:

• After redistributing EUQ, the administrator informs all end users to verify thatthe newly added approved senders are still available.

• That the administrator notifies all end users not to add EUQ approved senderslist when the administrator is adding a child device and redistributing EUQ.

Verifying Successful DeploymentAfter you have set up the IMSVA devices, the services should start automatically.

Page 80: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

3-36

Procedure

1. Navigate to System Status.

2. Under Managed Services, ensure that the scanner and policy services are active.Otherwise, click the Start button to activate them.

NoteYou can choose to enable or disable the EUQ services.

Page 81: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

4-1

Chapter 4

Installing IMSVA 8.2This chapter explains how to install IMSVA under different scenarios.

Topics include:

• System Requirements on page 4-2

• Installing IMSVA on page 4-5

Page 82: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

4-2

System RequirementsThe following table provides the recommended and minimum system requirements forrunning IMSVA.

TABLE 4-1. System Requirements

HARDWARE/SOFTWARE

DESCRIPTION

Operating System IMSVA provides a self-contained installation that provides apurpose-built, hardened, and performance tuned CentOS Linuxoperating system. This dedicated operating system installs withIMSVA to provide a turnkey solution. A separate operating system,such as Linux, Windows, or Solaris, is not required.

NoteIMSVA uses a 64-bit operating system. When installing a64-bit OS on ESX/ESXi, you need to enter the BIOS andenable VT (Virtualization Technology).

CPU • Recommended:

Four Intel™ Xeon™ processors

• Minimum:

Two Intel™ Xeon processors

Memory • Recommended:

8GB RAM

• Minimum:

4GB RAM

Page 83: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Installing IMSVA 8.2

4-3

HARDWARE/SOFTWARE

DESCRIPTION

Disk Space • Recommended:

250GB

NoteIMSVA automatically partitions the detected disk spaceas per recommended Linux practices

• Minimum:

120GB

NoteIMSVA automatically partitions the detected disk spaceas per recommended Linux practices

Monitor Monitor that supports 800 x 600 resolution with 256 colors orhigher

LDAP server • Domino

• Microsoft Active Directory

• Microsoft AD Global Catalog

• OpenLDAP

• Sun iPlanet Directory

Trend MicroControl Manager

Version 5.5 and 6.0

Additional Requirements and ToolsThe following table lists the minimum application requirements to access the CLI andmanagement console interfaces and to manage IMSVA with Control Manager.

Page 84: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

4-4

TABLE 4-2. Minimum Software Requirements

APPLICATION SYSTEM REQUIREMENTS DETAILS

SSHcommunications application

SSH protocol version 2 To adequately view the IMSVACLI through an SSH connection,set the terminal window size to 80columns and 24 rows.

VMware™ESX server

Version 4.0/4.1 If you want to install IMSVA asvirtual machine, install IMSVA ona VMware ESX server 4.0/4.1.

Hyper-V • Windows Server 2008 R2

• Windows Server 2008 R2with SP1 or later

IMSVA only supports Hyper-V onWindows Server 2008 R2 andWindows Server 2008 R2 withSP1 or later.

InternetExplorer™

• Version 8.0

• Version 7.0

• Version 6.0 SP2

To access the web console, whichallows you to configure all IMSVAsettings, use Internet Explorer 6.0SP 2 or above or Firefox 3.5 orabove. Using the data port IPaddress you set during initialconfiguration, enter the followingURL:https://[IP Address]:8445

NoteWhen accessing theDashboard using InternetExplorer 9.0, CompatibilityMode must be used tocorrectly render the screen.

To Compatibility Mode forthe Dashboard when usingInternet Explorer 9.0, inInternet Explorer click Page> Compatibility ViewSettings, and add IMSVAto the list.

MozillaFirefox™

• Version 5.0

• Version 4.0

• Version 3.6

Page 85: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Installing IMSVA 8.2

4-5

APPLICATION SYSTEM REQUIREMENTS DETAILS

Java™ VirtualMachine

Version 5.0 or later or SUN JRE1.4+

To view certain items in the webconsole, the computer must haveJVM.

Trend MicroControlManager

Version 5.5 Use Trend Micro Control Manager5.5 to manage IMSVA.

Installing IMSVAIMSVA only supports upgrading from IMSVA 8.2. IMSVA supports migrating existingconfiguration and policy data from other InterScan Messaging Security products.

The IMSVA installation process formats your existing system to install IMSVA. Theinstallation procedure is basically the same for both a Bare Metal and a VMware ESXvirtual machine platform. The Bare Metal installation boots off of the IMSVAinstallation DVD to begin the procedure and the VMware installation requires thecreation of a virtual machine before installation.

WARNING!

Any existing data or partitions are removed during the installation process. Back up anyexisting data on the system (if any) before installing IMSVA.

Procedure

1. Start the IMSVA installation:

• On a Bare Metal Server

a. Insert the IMSVA Installation DVD into the DVD drive of the desiredserver.

b. Power on the Bare Metal server.

• On a VMware ESX Virtual Machine

Page 86: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

4-6

WARNING!

If you install IMSVA on an ESX server, disable the snapshot feature for thevirtual machine because the snapshot will exhaust hard disk space.

a. Create a virtual machine on your VMware ESX server.

b. Start the virtual machine.

c. Insert the IMSVA Installation DVD into the virtual DVD drive with anyone of the following methods.

• Insert the IMSVA Installation DVD into the physical DVD driveof the ESX server, and then connect the virtual DVD drive of thevirtual machine to the physical DVD drive.

• Connect the virtual DVD drive of the virtual machine to theIMSVA-8.2.xxxx-86_64.iso file. TheIMSVA-8.2.xxxx-86_64.iso file is available at:

http://www.trendmicro.com/download

d. Restart the virtual machine by clicking VM > Send Ctrl+Alt+Del onthe VMware web console.

For both a VMware ESX Virtual Machine and a Bare Metal Server installation, apage appears displaying the IMSVA Installation Menu with the followingoptions:

• Install IMSVA: Select this option to install IMSVA onto the new hardwareor virtual machine

• System Recovery: Select this option to recover the IMSVA system in theevent that the administrative passwords cannot be recovered.

• System Memory Test: Select this option to perform memory diagnostic teststo rule out any memory issues

• Exit Installation: Select this option to exit the installation process and toboot from the local disk.

Page 87: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Installing IMSVA 8.2

4-7

2. Select Install IMSVA.

Page 88: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

4-8

The License Agreement page appears. From this page, you can access the readme(Readme button).

3. Click Accept to continue.

Page 89: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Installing IMSVA 8.2

4-9

A page appears where you select the keyboard language.

4. Select the keyboard language for the system and then click Next.

5. Specify the drive or drives IMSVA uses for installation and normal operation andthen click Next.

Page 90: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

4-10

The IMSVA installer scans your hardware to determine if the minimumspecifications have been met and displays the results as illustrated below. If thehost hardware contains any components that do not meet the minimum

Page 91: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Installing IMSVA 8.2

4-11

specifications, the installation program will highlight the non-conformingcomponents and the installation will stop.

6. Click Next.

The IMSVA installer detects hard disk drives and displays all available hard diskdrives. At least one drive must be selected for IMSVA installation.

7. Select the drive(s) for IMSVA installation and then click Next.

Page 92: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

4-12

The Network Settings screen appears.

NoteDuring installation only the default network device (eth0) can be selected. To use adifferent ethernet card, use the Configuration Wizard to specify the ethernet card youwant to use, after IMSVA installs.

The table below describes the information required.

Page 93: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Installing IMSVA 8.2

4-13

TABLE 4-3. Network Device Settings

CONFIGURATION PARAMETER DESCRIPTION

IPv4 Address This is the IP address of the IMSVAmanagement interface. Type in the IPaddress and appropriate subnet mask tocomplete the configuration.

Hostname Type in the applicable FQDN hostnamefor this IMSVA host.

Gateway Type in the applicable IP address to beused as the gateway for this IMSVAinstallation.

Primary DNS Type in the applicable IP address to beused as the primary DNS server for thisIMSVA installation.

Secondary DNS Type in the applicable IP address to beused as the secondary DNS server forthis IMSVA installation.

8. Provide all the information to install IMSVA, and click Next.

Page 94: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

4-14

The NTP settings screen appears.

9. Specify the IMSVA server’s time and clock settings

a. Select the location of the IMSVA server.

b. Specify whether the server’s system clock uses UTC or GMT by selecting orclearing the System clock uses UTC check box.

10. Click Next.

Page 95: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Installing IMSVA 8.2

4-15

The Account Settings screen appears.

11. Specify passwords for the root and enable accounts.

IMSVA uses two different levels of administrator types to secure the system.

The password must be a minimum of 6 characters and a maximum of 32characters.

Tip

For the best security, create a highly unique password only known to you. You canuse both upper and lower case alphabetic characters, numerals, and any specialcharacters found on your keyboard to create your passwords.

• Root Account: Used to gain access to the operating system shell and has allrights to the server. This is the most powerful user on the system.

Page 96: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

4-16

• Enable Account: Used to gain access to the command line interface'sprivilege mode. This account has all rights to execute any CLI command.

• Admin Account: The default administration account used to access theIMSVA web and CLI management interfaces. It has all rights to the IMSVAapplication, but no access rights to the operating system shell.

As you type the passwords, the password strength meter on the right indicates howstrong the selected password is.

12. Click Next.

The Review Settings screen appears.

13. Confirm that the selected values are correct and then click Next.

The installation process prompts you to begin the installation.

Selecting Continue erases any data on the hard disk partition and formats the harddisk. If you have data on the hard disk that you would like to keep, cancel theinstallation and back up the information before proceeding.

14. Click Continue.

Page 97: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Installing IMSVA 8.2

4-17

A screen appears that provides the formatting status of the local drive for theIMSVA installation. When formatting completes, the IMSVA installation begins.

Page 98: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

4-18

Once the installation is complete a summary screen appears. The installation log issaved in the /root/install.log file for reference.

15. Click Reboot to restart the system.

• Bare Metal installation:

The DVD automatically ejects. Remove the DVD from the drive to preventreinstallation.

• Virtual machine installation:

Trend Micro recommends disconnecting the DVD-ROM device from thevirtual machine now that IMSVA is installed.

Page 99: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Installing IMSVA 8.2

4-19

After IMSVA reboots, the initial CLI login screen appears.

NoteDuring installation, you may receive the following messages:

for crash kernel (0x0 to 0x0) notwhitin permissible range

powernow-k8: bios error -no psb or acpi_pss objects

Both of these messages are normal. The latter message indicates that the systemBIOS is not reporting or presenting any PSB or ACPI objects or hooks to the Linuxkernel. Either the CPU or BIOS does not support PSB or ACPI objects or hooks, orthey are simply disabled.

16. Log on either in the CLI or in the IMSVA management console to launch IMSVA.

Log on to the CLI shell if you need to perform additional configuration,troubleshooting, or housekeeping tasks.

Page 100: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory
Page 101: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

5-1

Chapter 5

Upgrading from Previous VersionsThis chapter provides instructions on upgrading from previous versions of IMSVA.

Topics include:

• Upgrading from an Evaluation Version on page 5-2

• Upgrading from IMSVA 8.0 on page 5-4

• Migrating from Previous Versions on page 5-10

Page 102: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

5-2

Upgrading from an Evaluation VersionIf you provided an evaluation Activation Code to activate IMSVA previously, you havestarted an evaluation period that allows you to try the full functionality of the product.The evaluation period varies depending on the type of Activation Code used.

Fourteen (14) days prior to the expiry of the evaluation period, IMSVA will display awarning message on the management console alerting you of the impending expiration.

To continue using IMSVA, purchase the full version license for the product. You willthen be provided a new Activation Code.

Procedure

1. Navigate to Administration > Product Licenses.

Page 103: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Upgrading from Previous Versions

5-3

Page 104: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

5-4

2. Click the Enter a new code hyperlink in section for the product or service youwant to activate.

The Enter A New Code screen appears.

3. Type the new Activation Code in the box provided.

Note

When you purchase the full licensed version of IMSVA, Trend Micro will send thenew Activation Code to you by email. To prevent mistakes when typing theActivation Code (in the format xx-xxxx-xxxxx-xxxxx-xxxxx-xxxxx-xxxxx), you cancopy the Activation Code from the email and paste it in the box provided.

4. Click Activate.

5. Repeat steps 2 to 5 for all the products or services you want to activate.

Upgrading from IMSVA 8.0IMSVA 8.0 can be upgraded as a single device or an entire distributed environment canbe upgraded.

Upgrading a Single IMSVA

This upgrade scenario upgrade a single IMSVA 8.0 to version 8.2.

Page 105: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Upgrading from Previous Versions

5-5

Procedure

1. Backup IMSVA 8.0 to safeguard against any issues that may occur during theupgrade.

TipIMSVA 8.0 backs up the configuration settings and performs an auto-rollback if theupgrade is not successful. However Trend Micro recommends backing up IMSVA8.0 in one of the following ways, before attempting to upgrade to IMSVA 8.2:

• Ghost the entire computer where IMSVA 8.0 is installed.

• Clone IMSVA 8.0, if it is installed on a virtual machine.

• Backup the IMSVA 8.0 app_data partition. To perform this task, open theoperating system shell console and run the following commands:

/opt/trend/imss/script/imssctl.sh stop

service crond stop

/opt/trend/imss/script/imssstop.sh

cp –rf -–preserve /var/app_data/* /var/udisk/app_data_backup/

2. Download the IMSVA 8.2 upgrade package. For example,IMSVA__1144.tar.gz and run.sh.

3. Use the following command in the CLI console to verify there are no messages inthe Postfix queue:

Postqueue –p

4. Stop all IMSVA services, except the database, using the following commands:

/opt/trend/imss/script/imssctl.sh stop

/opt/trend/imss/script/dbctl.sh start

5. Navigate to the directory where the upgrade package is stored and type thefollowing command:

./run.sh

Page 106: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

5-6

The upgrade script launches and performs a pre-installation check. If the pre-installation check is not successful, installation stops.

The upgrade package reboots IMSVA automatically after it finishes the pre-installation check.

After rebooting IMSVA, the upgrade package installs IMSVA 8.2.

6. Once IMSVA 8.2 installation completes, restart IMSVA services from the CLIconsole with the following command:

/mnt/backup/upgrade/dry_run.sh

7. Verify that IMSVA is working correctly after the upgrade.

8. To roll back to IMSVA 8.0, use the following commands:

/mnt/backup/upgrade/confirm.sh

“no”

9. If the IMSVA is working correctly after the upgrade, use the following commandsto complete the upgrade:

/mnt/backup/upgrade/confirm.sh

“yes”

If you do not roll back to IMSVA 8.0 within 2 hours, all IMSVA services will stopautomatically. You must then decide to roll back to IMSVA 8.0, or to complete theupgrade, using the following command:

/mnt/backup/upgrade/confirm.sh

Type yes to complete the upgrade or no to roll back.

Upgrading a Distributed Environment

IMSVA now supports upgrading an entire distributed deployment. For example, in anetwork where IMSVA is being used in a parent-child deployment.

Page 107: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Upgrading from Previous Versions

5-7

Procedure

1. Backup IMSVA 8.0 to safeguard against any issues that may occur during theupgrade.

TipIMSVA 8.0 backs up the configuration settings and performs an auto-rollback if theupgrade is not successful. However Trend Micro recommends backing up IMSVA8.0 in one of the following ways, before attempting to upgrade to IMSVA 8.2:

• Ghost the entire computer where IMSVA 8.0 is installed.

• Clone IMSVA 8.0, if it is installed on a virtual machine.

• Backup the IMSVA 8.0 app_data partition. To perform this task, open theoperating system shell console and run the following commands:

/opt/trend/imss/script/imssctl.sh stop

service crond stop

/opt/trend/imss/script/imssstop.sh

cp –rf -–preserve /var/app_data/* /var/udisk/app_data_backup/

2. Download the IMSVA 8.2 upgrade package. For example,IMSVA__1144.tar.gz and run.sh.

3. Use the following command in the CLI console to verify there are no messages inthe Postfix queue:

Postqueue –p

4. Stop all IMSVA services, except the database, using the following commands:

/opt/trend/imss/script/imssctl.sh stop

/opt/trend/imss/script/dbctl.sh start

5. On the Parent IMSVA, navigate to the directory where the upgrade package isstored and type the following command:

./run.sh

Page 108: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

5-8

The upgrade script launches and performs a pre-installation check. If the pre-installation check is not successful, installation stops.

The upgrade package reboots IMSVA automatically after it finishes the pre-installation check.

After rebooting IMSVA, the upgrade package installs IMSVA 8.2.

WARNING!Do not restart IMSVA services after upgrading the Parent IMSVA.

6. Upgrade all the Child IMSVAs one at a time, a few at a time, or all at once.

WARNING!Do not restart IMSVA services until all IMSVAs have been upgraded.

If one of the Child IMSVAs encounters issues while upgrading, you can unregisterthe Child using the CLI, or if you are able to resolve the issue, you can retry theupgrade.

7. After upgrading all IMSVAs, restart IMSVA services for each IMSVA from theCLI console with the following command:

/mnt/backup/upgrade/dry_run.sh

8. Verify that IMSVA is working correctly after the upgrade.

9. To roll back to IMSVA 8.0, first roll back all Child IMSVAs and then the Parentwith the following commands:

/mnt/backup/upgrade/confirm.sh

“no”

10. If the IMSVA is working correctly after the upgrade, use the following commandsto complete the upgrade:

/mnt/backup/upgrade/confirm.sh

“yes”

Page 109: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Upgrading from Previous Versions

5-9

If you do not roll back to IMSVA 8.0 within 2 hours, all IMSVA services will stopautomatically. You must then decide to roll back to IMSVA 8.0, or to complete theupgrade, using the following command:

/mnt/backup/upgrade/confirm.sh

Type yes to complete the upgrade or no to roll back.

Verify the Upgrade Using SSH

Procedure

1. Use the following command to check the upgrade status:

grep "\[IMSVA Upgrade\]" /mnt/backup/upgrade_log/imsva-upgrade.log; tail -f --lines=0 /mnt/backup/upgrade_log/imsva-upgrade.log | grep "\[IMSVA Upgrade\]"

Rolling Back an UpgradeIMSVA rolls back automatically if there are problems during the upgrade process.However, if the automatic rollback encounters issues, you need to perform a manualrollback.

Procedure

1. If you created a ghost image or have a virtual machine image of your originalIMSVA, replace the upgraded image with the original image.

2. If you backed up the data using backup app_data:

a. Start the manual rollback with the following command:

/mnt/backup/upgrade/manual_rollback.sh

b. Remove the data under /var/app_data.

c. Copy your backup data to IMSVA, using the following commands:

Page 110: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

5-10

cp –rf -–preserve /var/udisk/App_data_backup/* /var/app_data/

d. Reboot IMSVA.

Migrating from Previous VersionsIMSVA 8.2 Service Pack 2 supports migration from previous versions of IMSS andIMSVA .

The following table lists the minimum versions that support migration to IMSVA 8.2Service Pack 2:

TABLE 5-1. Supported Migration Platform and Versions

PLATFORM VERSION

IMSS for Solaris 7.0 Service Pack 1 Patch 4

IMSS for Linux 7.1 Patch 3

IMSS for Windows 7.1 Patch 2

IMSVA 8.0 Patch 1

Migration Process

The migration process requires the following tasks:

• Step 1: Exporting the settings from previous versions of IMSS or IMSVA

• Step 2: Importing the settings to IMSVA 8.2

Exporting Settings from Previous Versions of IMSS orIMSVA

The following settings do not migrate:

Page 111: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Upgrading from Previous Versions

5-11

TABLE 5-2. Settings that Cannot Migrate

MTA SETTINGS SETTINGS NOT MIGRATED

MTA Settings IP address of SMTP Interface

Configuration Settings Database settings (example: Internal file path)

Management console password

Control Manager settings

Activation Codes

NoteIMSVA 8.0 will migrate the Cloud Pre-Filter ActivationCode to IMSVA 8.2

ImportantWhen exporting configuration settings, ensure that the IMSS or IMSVA server is:

• Not performing database-related tasks.

• Not stopped or started.

Procedure

1. Navigate to Administration > Import/Export from the IMSS servers or IMSVAto migrate from.

The Import/Export screen appears.

2. Click Export.

The configuration settings export to a package that IMSVA can import.

Page 112: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

5-12

Exporting Settings from IMSS 7.0 Service Pack 1 Patch 4 forSolaris

Procedure

1. Copy the migration tool package (export_tool_sol_70.tar.gz) on to theIMSS 7.0 for Solaris server.

2. Extract the export tool using the following command.

gzip –d export_tool_sol_70.tar.gztar xf export_tool_sol_70.tar

NoteThe tool exports configuration settings to an encrypted package that can be used toduplicate these settings on other InterScan Messaging Security products.

3. Change the current working directory using the following command.

cd export70sol

4. Run the following command.

./export_tool_70.sh

The tool creates the exported settings package (imss_config_70.tar.gz) anda detailed log file (export_70.<xxxxxxxx>.log) in the current directory.

Importing Settings to IMSVA 8.2

Procedure

1. Perform a fresh installation of IMSVA 8.2.

TipTrend Micro recommends importing configuration packages to a fresh installation ofIMSVA 8.2, because the imported configuration settings overwrite all existingsettings.

Page 113: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Upgrading from Previous Versions

5-13

2. Retrieve the package that contains the configuration settings that you wish tomigrate.

3. Navigate to Administration > Import/Export on the IMSVA 8.2 managementconsole.

The Import/Export screen appears.

4. Import the configuration package.

Migrating from IMSS for WindowsTo migrate from IMSS for Windows to IMSVA 8.2, see Migration Process on page 5-10.

IMSS 7.1 for Windows Settings that Change

The following table provides information on all settings for IMSS 7.1 for Windows thatchange during migration.

TABLE 5-3. IMSS 7.1 for Windows Settings that Change

SETTING CHANGE

Email Reputation During migration IMSVA 8.2 changes all customized actions toDefault intelligent action, unless the customized action isConnection rejected with in which case the setting remainsunchanged.

Page 114: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

5-14

SETTING CHANGE

Transport LayerSecurity (TLS)

• Enable TLS on messages entering IMSS changes to thefollowing in IMSVA 8.2:

Enable incoming Transport Layer Security

• Server Certificate settings are contained in the Private keykey.pem and SMTP server certification cert.pem in IMSVA8.2

• Trusted CA Certificate settings do not migrate. The settingsmust be retrieved from the IMSS 7.1 for Windows console andapplied manually to the postfix settings.

• The TLS IP Address/Domain List does not migrate.

• All TLS Messages Exiting IMSS settings, except for thestatus, do not migrate. The status migrates to Enableoutgoing Transport Layer Security.

Domain-BasedDelivery

• Default Delivery with Smart Host set, changes to * smtp:[IP]:port

• If several Smart Hosts of a Domain were set, only the firstSmart Host in the list migrates to IMSVA 8.2

Message Rulesettings

The maximum date size/messages per connection settings arereduced.

Other settings The following Administration > Connections > Componentsinternal ports do not migrate:

• IMSS manager port

• Policy service port

Notifications Free disk space on any scanner less than changes to thefollowing in IMSVA 8.2:

Data partition on free space on any host less than

Policy migration The BATV rule and all related settings do not migrate.

Page 115: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Upgrading from Previous Versions

5-15

Migrating from IMSS for LinuxTo migrate from IMSS for Linux to IMSVA 8.2, see Migration Process on page 5-10.

IMSS 7.1 for Linux Settings that ChangeThe following table provides information on all settings for IMSS 7.1 for Windows thatchange during migration.

TABLE 5-4. IMSS 7.1 for Linux Settings that Change

SETTING CHANGE

Notifications The Administration > Notifications > Events notification:

Free disk space on any scanner less than changes to thefollowing in IMSVA 8.2:

Data partition on free space on any host less than

Migrating from IMSVA 8.0To migrate from IMSVA 8.0 to IMSVA 8.2, see Migration Process on page 5-10.

IMSVA 8.0 Settings that ChangeAll IMSVA 8.0 settings migrate to IMSVA 8.2.

Exporting Debugging FilesIf you need to analyze the debug files for troubleshooting purposes, you can exportdebug logs for up to the past two days for the parent device or any device that isregistered to the parent device.

NoteThe debug logs are contained in a password protected zip file. The default password forthe file is trend.

Page 116: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

5-16

Procedure

1. Navigate to Administration > Export Debugging Files.

2. Next to Scanner, select a device.

3. Select the number of days to export.

4. Click Export.

The process might take 10 minutes to 1 hour or more depending on the total logfile size.

Page 117: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

6-1

Chapter 6

Troubleshooting and SupportInformation

This chapter explains how to troubleshoot common IMSVA issues, search the TrendMicro Knowledge Base, and contact support.

Topics include:

• Troubleshooting on page 6-2

• Support Information on page 6-5

Page 118: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

6-2

TroubleshootingFor common issues that you might encounter when installing IMSVA, see InstallationTroubleshooting Issues on page 6-3. If you have additional problems, check the TrendMicro Knowledge Base.

For troubleshooting and FAQ information pertaining to the administration ormaintenance of IMSVA, refer to the IMSVA Administrator’s Guide.

Troubleshooting UtilitiesUse the following troubleshooting-related utilities and commands with caution. TrendMicro recommends contacting your support provider before modifying any internalIMSVA files.

• Firewall setting check:

iptables -nvxL

• PostgreSQL command line tool:

/opt/trend/imss/PostgreSQL/bin/psql -U sa -d imss

• cdt (password: “trend”)—Collect the following information:

• Configuration information

• Logs

• Core dumps

• Other utilities:

• pstack: shows the callstack of the process, including all threads

• ipcs: lists all IPCs in the current system

• gdb: the debugger

• tcpdump: sniffs network packages

• netstat: lists current network connection

Page 119: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Troubleshooting and Support Information

6-3

Installation Troubleshooting Issues

ISSUE SUGGESTED RESOLUTION

IMSVA cannot worknormally due to a databaseaccess issue, if IMSVA isinstalled on Windows 2000SP4.

The MDAC version is lower than 2.8 SP1.

Download and install the latest Microsoft MDAC versionfrom the Microsoft website:

http://msdn2.microsoft.com/en-us/data/aa937729.aspx

Devices in a group cannotcommunicate

If several IMSVA devices are deployed in a group, theymust communicate with each other. Verify that thefollowing ports are accessible on all devices:

• 5060: Policy service

• 15505: IMSVA control service

• 53 UDP/TCP: IP Profiler

• 5432: Database service

• 8009: EUQ internal service

• 389: LDAP local cache service

Also, verify the following:

• The current firewall settings in “iptables”.

• The firewall configuration files in /etc/conf/fw.rules.

• The table “tb_trusted_ip_list” in the database has theIP addresses of the correct devices. The IP address ofany other devices trying to access this device must bein this list.

Also, verify that all the necessary port IMSVA uses areaccessible for the relevant services (see ).

Page 120: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

6-4

ISSUE SUGGESTED RESOLUTION

Child device has troubleregistering to a parent

Do the following:

1. Open the parent device’s management console andnavigate to Administration > IMSVA Configuration> Connections > Child IP.

2. Verify that the IP address of the child is on the ChildIP Address List.

3. In the Configuration Wizard, verify that Child isselected for the device role.

4. Verify that the Admin Database is accessible.

5. Unregister the MCP agent (if MCP agent is enabled).

6. Verify that no other child device registered to theparent has the same IP address as the device you aretrying to register.

7. Remove all the logs and quarantined messages.

8. Change the configuration and restart the services.

The parent device management console (in theConfiguration Wizard) makes the initial request. If youencounter any registration issues, run the followingcommand to get the error message from the console:

/opt/trend/imss/script/cfgtool.sh reg IPADDR sapostgreSQL

Page 121: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Troubleshooting and Support Information

6-5

ISSUE SUGGESTED RESOLUTION

Child device has troubleunregistering from theparent

Do the following:

1. Connect to the child device through the command lineinterface.

2. Check whether the Admin Database is accessible. Ifyes, remove the child device from the Child IP list onthe parent management console and update thetrusted child list.

3. Rescue the device, which will forcibly unregister itfrom the parent.

4. Update the patches.

To verify that a child is unregistered from its parent, try toaccess the management console on the child device. If theconsole is accessible, the device is successfullyunregistered.

You can also run the following command:

/opt/trend/imss/script/cfgtool.sh dereg

Support Information

The Trend Micro Knowledge Base

The Trend Micro Knowledge Base, maintained at the Trend Micro website, has themost up-to-date answers to product questions.

Trend Micro updates the contents of the Knowledge Base continuously and adds newsolutions daily. If the product documentation does not provide a viable solution,describe the problem in an message and send it directly to a Trend Micro supportengineer who can investigate the issue and respond as soon as possible.

Learn more about the Knowledge Base at:

http://esupport.trendmicro.com

Page 122: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

6-6

Contacting Technical SupportTrend Micro provides technical support, pattern downloads, and program updates forone year to all registered users. After one year, users must purchase renewalmaintenance. To get help or to submit feedback, feel free to contact Trend Micro anytime.

• Get a list of the worldwide support offices at:http://esupport.trendmicro.com

• Get the latest Trend Micro product documentation at:http://docs.trendmicro.com

In the United States, reach Trend Micro representatives by phone, fax, or email:

Address Trend Micro, Inc. 10101 North De Anza Blvd., Cupertino, CA 95014

Phone Toll free: +1 (800) 228-5651 (sales)

Voice: +1 (408) 257-1500 (main)

Fax +1 (408) 257-2003

Website http://www.trendmicro.com

Email address [email protected]

Resolve Issues Faster

To help resolve issues faster, have the following information available before contactingTrend Micro Support:

• Steps to reproduce the problem

• Appliance or network information

• Computer brand, model, and any additional hardware connected to workstation

• Amount of memory and free hard disk space

• Detailed description of installation environment

• Operating system version and Service Pack versions

Page 123: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Troubleshooting and Support Information

6-7

• Endpoint client version

• Product serial number

• Exact text of any error message received

TrendLabs

TrendLabs℠ is the Trend Micro global network of research, development, and actioncenters committed to 24/7 threat surveillance, attack prevention, and timely andseamless solutions delivery. With a 1,000-strong staff of threat experts and supportengineers deployed in round-the-clock operations, it stays at the forefront of theInternet security industry and serves as the backbone of the Trend Micro serviceinfrastructure.

Your Web Security Lifeline

With accurate, real-time data, TrendLabs delivers more effective security measuresdesigned to detect, preempt, and eliminate attacks. TrendLabs monitors the threatlandscape and conducts research and analysis used to develop the technologies neededto combat new threats. It also houses the Trend Micro support organization thatprovides continuous coverage to Trend Micro customers worldwide.

Global Presence and Operations

Headquartered in the Philippines, TrendLabs is the only multinational research,development, and support center with an extensive regional presence. With regional labsin at least ten key cities around the world, TrendLabs enables Trend Micro to identifyand respond more quickly to targeted threats.

Because TrendLabs research and support groups never sleep and are capable ofunderstanding local languages, they can respond to customers as well as to new threatsin real time. As a result, customers can minimize damages, reduce costs, and ensurebusiness continuity.

Learn more about TrendLabs at:

http://cloudsecurity.trendmicro.com/us/technology-innovation/experts/index.html#trendlabs

Page 124: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

6-8

Security IntelligenceComprehensive security information is available at the Trend Micro website.

http://www.trendmicro.com/vinfo

Security information includes:

• List of malware and malicious mobile code currently active or "in the wild"

• Computer malware hoaxes

• Internet threat advisories

• Malware weekly report

• Threat Encyclopedia, which includes a comprehensive list of names and symptomsfor known malware, spam, malicious URLs, and known vulnerabilities, plus write-ups on web attacks and online trends.

Staying Up-to-DateFrom time to time, Trend Micro may release a patch for a reported known issue or anupgrade that applies to your product. To find out whether there are any patchesavailable, visit the following URL:

http://www.trendmicro.com/download/

The Update Center screen displays. Select your product from the links on this screen.Patches are dated. If you find a patch that you have not applied, open the readmedocument to determine whether the patch applies to you. If so, follow the installationinstructions in the readme.

Page 125: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

A-1

Appendix A

Creating a New Virtual MachineUnder VMware ESX for IMSVA

This appendix describes how to create a new virtual machine for IMSVA.

Topic included:

• Creating a New Virtual Machine on page A-2

Page 126: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

A-2

Creating a New Virtual MachineThe actual installation of ESX 4.1/4.0 is not covered in this document. Please refer toVMware's product documentation to install this product.

The steps outlined below detail the process to create a new virtual machine underVMware ESX to install IMSVA. Please use the following steps as a guideline for creatingthe virtual machine for your environment. The number of CPUs, NIC cards, memoryand hard disk space selected should reflect the requirements for your deployment. Thevalues entered here are for instructional purposes.

Procedure

1. From the menu bar, select File > New > Virtual Machine.

Page 127: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Creating a New Virtual Machine Under VMware ESX for IMSVA

A-3

The New Virtual Machine Wizard appears.

FIGURE A-1. Virtual Machine Configuration

2. Under Virtual Machine Configuration, leave the Typical radio button selected.

3. Click Next.

Page 128: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

A-4

The Name and Location screen appears.

FIGURE A-2. Select a Name and Location for this Virtual Machine

4. In the Name field, type an appropriate machine name and then click Next.

Page 129: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Creating a New Virtual Machine Under VMware ESX for IMSVA

A-5

The Datastore screen appears.

FIGURE A-3. Virtual Machine Datastore

5. Select the datastore where the virtual machine will reside.

6. Click Next.

Page 130: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

A-6

The Virtual Machine Version screen appears.

7. Specify the virtual machine version to use.

8. Click Next.

Page 131: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Creating a New Virtual Machine Under VMware ESX for IMSVA

A-7

The Guest Operating System screen appears.

FIGURE A-4. Virtual Machine Guest Operating System

9. For the guest operating system, select Linux > Other Linux (64-bit).

10. Click Next.

Page 132: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

A-8

The CPUs screen appears.

FIGURE A-5. Virtual Machine CPU

11. Select the number of processors for the virtual machine. IMSVA takes advantageof the Virtual SMP, so select the maximum number of virtual processors available.

12. Click Next.

Page 133: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Creating a New Virtual Machine Under VMware ESX for IMSVA

A-9

The Memory screen appears.

FIGURE A-6. Virtual Machine Memory

13. Allocate 4096MB of memory as a minimum for IMSVA.

TipFor improved performance, Trend Micro recommends at least 8192MB of RAM.

14. Click Next.

Page 134: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

A-10

The Network screen appears.

FIGURE A-7. Virtual Machine Network

15. Accept the default network settings.

16. Click Next.

Page 135: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Creating a New Virtual Machine Under VMware ESX for IMSVA

A-11

The SCSI Controller screen appears.

17. Select LSI Logic Parallel.

18. Click Next.

Page 136: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

A-12

The Select a Disk screen appears.

19. Select Create a new virtual disk.

20. Click Next.

Page 137: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Creating a New Virtual Machine Under VMware ESX for IMSVA

A-13

The Create a Disk screen appears.

FIGURE A-8. Virtual Disk Capacity

21. Specify at least 120GB of disk space. IMSVA requires at least 120GB disk space.See for more information on disk space allocation.

TipTrend Micro recommends 250GB or more of disk space for message quarantine andlogging purposes.

22. Click Next.

Page 138: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

A-14

The Advanced Options screen appears.

23. Specify the advanced options if required. Usually these options do not need to bechanged.

24. Click Next.

Page 139: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Creating a New Virtual Machine Under VMware ESX for IMSVA

A-15

The Ready to Complete screen appears.

FIGURE A-9. Ready to Complete

25. Click Continue.

If you want to modify the system component settings, check the Edit the virtualmachine settings before submitting check box and then click Continue.

26. Verify your settings and then click Finish.

The new Virtual Machine is now ready and configured to be powered on and beginthe installation process.

Page 140: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory
Page 141: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

B-1

Appendix B

Creating a New Virtual MachineUnder Microsoft Hyper-V for IMSVA

This appendix describes how to create a new virtual machine for IMSVA underMicrosoft Hyper-V.

Topics include:

• Understanding Hyper-V Installation on page B-2

• Installing IMSVA on Microsoft Hyper-V on page B-2

• Using Para-Virtualization Mode on page B-18

Page 142: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

B-2

Understanding Hyper-V InstallationIMSVA supports installation on Microsoft Hyper-V based virtual platforms. Thisappendix provides step-by-step instructions to install IMSVA on Hyper-V based virtualmachines. The actual installation of Hyper-V is not covered in this document. Refer toMicrosoft product documentation to install Hyper-V. The procedure outlined in thisappendix describes how to install IMSVA on a Windows 2008 Server R2 Hyper-Vserver.

IMSVA Support for Hyper-VIMSVA only supports Hyper-V on Windows Server 2008 R2 and Windows Server 2008R2 with SP1 or later.

Hyper-V Virtualization ModesHyper-V provides two virtualization modes that support IMSVA:

• Full-virtualization

• Para-virtualization

TipTrend Micro recommends installing IMSVA in para-virtualization mode. This allowsIMSVA to achieve much higher throughput performance and supports enterprisenetworking environments. IMSVA provides the necessary integrated Hyper-V drivers tosupport the installation under Hyper-V as a para-virtualization virtual machine.

Installing IMSVA on Microsoft Hyper-VUse the following steps as a guideline for creating a virtual machine for yourenvironment. The number of CPUs, NIC cards, memory, and hard disk space selectedshould reflect the requirements for your deployment. The values provided are forinstructional purposes.

Page 143: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Creating a New Virtual Machine Under Microsoft Hyper-V for IMSVA

B-3

NoteCreating a New Virtual Machine on page B-6 only covers installing IMSVA on Hyper-V infull-virtualization mode. Using Para-Virtualization Mode on page B-18 describes how toconvert full-virtualization to para-virtualization.

Creating a Virtual Network Assignment

Procedure

1. From the Hyper-V Server Manager menu, right-click Hyper-V Manager.

A menu appears.

FIGURE B-1. Connect to Server

2. Select Connect to Server.

Page 144: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

B-4

A dialog box appears prompting you to select the location of the virtualizationserver that you want to connect to.

FIGURE B-2. Location of Virtualization Server

3. Specify the location of the virtualization server and click OK.

4. Right-click the Windows 2008 R2 server and select Virtual Network Manager.

FIGURE B-3. Select Virtual Network Manager

5. Create a new virtual network by selecting External from the list of options andclicking Add.

Page 145: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Creating a New Virtual Machine Under Microsoft Hyper-V for IMSVA

B-5

FIGURE B-4. Adding the “External” Virtual Network

6. From the External drop-down menu, select the physical network adaptor youwant to connect to.

NoteThe physical adaptor must be connected to the network and have access to thecorporate network and the Internet.

Page 146: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

B-6

FIGURE B-5. Physical Network Adaptor Selection

Creating a New Virtual Machine

Procedure

1. From the Hyper-V Server Manager menu, right-click the Windows 2008 R2 server,and select New > Virtual Machine.

Page 147: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Creating a New Virtual Machine Under Microsoft Hyper-V for IMSVA

B-7

The New Virtual Machine Wizard appears.

FIGURE B-6. New Virtual Machine Wizard

2. Click Next.

Page 148: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

B-8

The Specify Name and Location screen appears.

FIGURE B-7. Specify Name and Location

3. In the Name field, type a meaningful machine name. If you plan to store thevirtual machine to another folder, select Store the virtual machine in a differentlocation and provide the correct location.

4. Click Next.

Page 149: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Creating a New Virtual Machine Under Microsoft Hyper-V for IMSVA

B-9

The Assign Memory screen appears.

FIGURE B-8. Assign Memory

5. Allocate at least 4096MB of memory for IMSVA.

TipTrend Micro recommends allocating 8192MB of RAM.

6. Click Next.

Page 150: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

B-10

The Configure Networking screen appears.

FIGURE B-9. Configure Networking

7. Keep the default network settings Not Connected.

8. Click Next.

Page 151: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Creating a New Virtual Machine Under Microsoft Hyper-V for IMSVA

B-11

The Connect Virtual Hard Disk screen appears.

FIGURE B-10. Connect the Virtual Hard Disk

9. Specify at least 120GB disk space for IMSVA.

TipTrend Micro recommends 250GB or more of disk space for message quarantine andlogging purposes.

10. Specify a location to store the virtual hard disk, and click Next.

Page 152: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

B-12

The Installation Options screen appears.

FIGURE B-11. Installation Options

11. Keep the default setting Install an operating system later, and click Next.

Page 153: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Creating a New Virtual Machine Under Microsoft Hyper-V for IMSVA

B-13

The Completing the New Virtual Machine Wizard screen appears.

FIGURE B-12. Completing the New Virtual Machine Wizard

12. Verify your settings and click Finish. Some manual configuration is still required.

13. Right-click your new Virtual Machine, and select Settings.

The Settings for test screen appears.

14. Click Add Hardware, and select Legacy Network Adapter.

Page 154: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

B-14

FIGURE B-13. Add Hardware: Legacy Network Adapter

15. Select the correct virtual network adapter.

16. Click OK.

Page 155: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Creating a New Virtual Machine Under Microsoft Hyper-V for IMSVA

B-15

FIGURE B-14. Configure Legacy Network Adapter

17. Remove the Network Adapter from the Hardware list.

18. Click OK.

Page 156: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

B-16

FIGURE B-15. Remove Network Adapter

19. Select the image file for IMSVA from the DVD Drive in the Hardware list.

20. Click OK.

Page 157: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Creating a New Virtual Machine Under Microsoft Hyper-V for IMSVA

B-17

FIGURE B-16. Add Image file into DVD Drive

Page 158: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

B-18

The virtual machine is now ready to be powered on to begin the installationprocess.

FIGURE B-17. IMSVA installed on a Hyper-V virtual machine

Using Para-Virtualization ModeIf IMSVA has been installed on a Hyper-V virtual machine with Full-VirtualizationMode, you can enable the appropriate drivers to make IMSVA enter Para-VirtualizationMode.

Page 159: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Creating a New Virtual Machine Under Microsoft Hyper-V for IMSVA

B-19

TipTrend Micro recommends using IMSVA in Para-Virtualization Mode. This allows IMSVAto achieve much higher throughput performance and supports enterprise networkingenvironments. IMSVA provides the necessary integrated Hyper-V drivers to support theinstallation under Hyper-V as a para-virtualization virtual machine.

Procedure

1. Open the CLI console and backup your current network configuration.

2. Enable Hyper-V Para-Virtualization drivers using the following commands:

[root@imsva8 ~]# enable-hyperv.shBacking up /boot/initrd-2.6.18-128.1.OpenVA.2.0.1020.img to/boot/initrd-2.6.18-128.1.OpenVA.2.0.1020.img.backup0Done. Updated /boot/initrd-2.6.18-128.1.OpenVA.2.0.1020.imgDone.Checking for new synthetic nics…Hyper-V Driver Installation finished.

Page 160: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

B-20

FIGURE B-18. Move to Para-Virtualization Mode

3. Shut down IMSVA:

[root@imsva82 ~]# poweroff

4. Reconfigure the Virtual Network Adapter on the Virtual Machine Settings screen.

• Remove the Network Adapter

Page 161: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Creating a New Virtual Machine Under Microsoft Hyper-V for IMSVA

B-21

• Add a network adapter with the correct virtual network adapter.

FIGURE B-19. Change Network Adapter

5. Power on the virtual machine. Open the CLI console and reconfigure the networkconfiguration. The virtual machine is now in Para-Virtualization Mode.

Page 162: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory
Page 163: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

IN-1

IndexAabout IMSS appliances, 1-2adware, 1-11archive, xiaudience, xii

Ccentralized archive and quarantine, xicentralized logging, xicentralized policy, xCentralized Reporting, 2-8configuration wizard, xiControl Manager

see Trend Micro Control Manager, 1-13Control Manager version requirements, 4-3CPU requirements, 4-2

Ddialers, 1-11disk space requirements, 4-3documentation

IMSVA related, xii

EEmail reputation, xi

about, 2-5types, 2-5

Email Reputation Services, 1-16email threats

spam, 1-5unproductive messages, 1-5

End-User Quarantine, 2-7EUQ, xi

FFile Reputation Services, 1-16

filtering, how it works, 1-7

Hhacking tools, 1-11

IIMSS appliances

about, 1-2installing

before a firewall, 3-9behind a firewall, 3-10in the DMZ, 3-11no firewall, 3-8

IP Filteringabout, 2-3

IP Profiler, xiabout, 2-3detects, 2-3how it works, 2-4

Jjoke program, 1-11

LLDAP server requirements, 4-3logs, xi

Mmass mailing viruses

pattern, 1-6memory requirements, 4-2migrate

from IMSS for Linux, 5-15from IMSS for Windows, 5-13from IMSVA, 5-15

minimum requirements, 4-2

Page 164: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory

Trend Micro InterScan Messaging Security Virtual Appliance Installation Guide

IN-2

MTA features, opportunistic TLS, xi

Nnew features, vi

Oonline help, xiii

Ppassword cracking applications, 1-11policy, xPOP3

deployment planning, 3-14Pre-Filter, viiiPre-Filter Service, 2-2

Qquarantine, xi

Rreadme file, xiiiremote access tools, 1-11reports, xirequirements, 4-2

Ssecurity risks

spyware/grayware, 1-11Smart Protection, 1-16

Email Reputation Services, 1-16File Reputation Services, 1-16Smart Protection Network, 1-16

Smart Protection Network, 1-16spam prevention, xispyware/grayware, 1-11

adware, 1-11dialers, 1-11entering the network, 1-12hacking tools, 1-11

joke program, 1-11password cracking applications, 1-11remote access tools, 1-11risks and threats, 1-12

supportknowledge base, 6-5resolve issues faster, 6-6technical support, 6-6TrendLabs, 6-7

system requirements, 4-2

Ttechnical support, 6-6TrendLabs, 6-7Trend Micro Control Manager, 1-13

agent, 1-13server, 1-13

troubleshooting, 6-2

WWeb EUQ, xiWeb Reputation Services, 1-17what’s new, vi

Page 165: Copyright © 2012. Trend Micro Incorporated. All rights ... sp2/en-us/imsva8.2_s… · Step 8: Configuring Control Manager Server Settings ..... 3-30 Step 9: Activating the ... Regulatory