Log Manager for Trend Micro ScanMail
Date Published: October 2009
Log Manager for Trend Micro ScanMail collects antivirus event information from logs and stores it in secure repositories so you can archive this data, create reports for management or auditing purposes, and analyze critical events to research issues. Log Manager for Trend Micro ScanMail also collects Security Manager script-generated events used to provide additional critical information, and generates an alert when the script encounters an unexpected error.
Log Manager for Trend Micro ScanMail captures and archives all native NT Event Log events from Trend Micro ScanMail, normalizing important events related to attachment blocking, content filtering, and virus detection. This module also provides predefined forensic queries for these events.
This module for the Security Manager product includes usability improvements and resolves several previous issues. Many of these improvements were made in direct response to suggestions from our customers. We thank you for your time and valuable input. We hope you continue to help us ensure our products meet all your needs. You can post feedback in the Security Manager forum on Qmunity, our community Web site that also includes product notifications, blogs, and the Security Manager user group.
This document outlines why you should install this module, lists any installation requirements, and identifies any known issues.
This release supports the following products:
Why Install This Module?
Log Manager for Trend Micro ScanMail provides support for Trend Micro ScanMail for Microsoft Exchange 7.0 and 8.0. Log Manager for Trend Micro ScanMail monitors events generated by Trend Micro ScanMail, highlighting events that may indicate possible service outages of the virus detection system, as well as virus infections, so you can quickly take corrective or preventative actions.
In this release, Log Manager for Trend Micro ScanMail includes a number of improvements to increase performance and usability of the module.
The following table lists additional requirements for a Windows agent computer monitoring Trend Micro ScanMail. For more information about agent requirements, see the Installation Guide for NetIQ Security Manager.
Installing This Module
Install this module using the Module Installer utility. If you are also planning to use Event Manager for Trend Micro ScanMail, install Log Manager for Trend Micro ScanMail first.
After the installation completes, you can verify successful installation of the module in the Module Installer. Verify the Status column indicates the module is current and the module version listed in the Installed Version column is the same as the version in the Available Version column. For more information about installing modules, see the Installation Guide for NetIQ Security Manager.
Configuring the Trend Micro ScanMail Module
This module does not require any special configuration in the Configuration Wizard, unless you want to disable the default filter on EICAR test virus signature events. If you disable the filter, Security Manager generates alerts and stores matching EICAR test virus events in the OnePoint database. For more information about using the Configuration Wizard, see the User Guide for NetIQ Security Manager.
The processing rules for this module are deployed automatically to agents monitoring Trend Micro ScanMail through the use of attributes and computer groups. However, in order for Security Manager to receive events, you must configure each of the functional areas of Trend Micro ScanMail (Virus, Content Filtering, and Attachment Blocking) to send notifications to the NT Event Log.
To configure Trend Micro ScanMail:
Monitoring the Product
You can monitor the product by examining product-specific views in the Security Manager Control Center and Web Console. You can also query stored log data and run Forensic Analysis reports in the Control Center. For more information about views and reports, see the User Guide for NetIQ Security Manager.
NetIQ Corporation strives to ensure our products provide quality solutions for your enterprise software needs. The following issues are currently being researched. If you need further assistance with any issue, contact Technical Support.
Removal of Monitoring Guides
Since monitoring information for updated Security Manager modules is now available in the module release notes, monitoring guides have been discontinued. However, a known issue exists where Security Manager cannot simply remove old monitoring guides when installing updated modules. To reduce the risk of users referencing outdated monitoring guides, Security Manager now replaces the old monitoring guide in the default documentation folder with a blank monitoring guide. Monitoring guides are installed by default in the \Program Files\NetIQ Security Manager\OnePoint\Documentation\Monitoring Guides folder on the central computer, but may have been moved or copied to a different location in your environment. After installing an updated module, you should manually delete any outdated monitoring guides that were copied or moved to other folders.
Module Installer Does Not Show Update
If you are upgrading from the old Trend Micro Antivirus module, the Module Installer shows "Update Available" for Log Manager for Trend Micro OfficeScan, but shows "Not Installed" for Log Manager for Trend Micro ScanMail. When the Trend Micro Antivirus module was separated into the new Trend Micro OfficeScan and Trend Micro ScanMail modules, the Trend Micro OfficeScan module re-used the existing module components. Since the Trend Micro ScanMail module created new components, the Module Installer displays it as a new module. If you want to monitor Trend Micro ScanMail in your environment, ensure you select the new Log Manager for Trend Micro ScanMail module in the Module Installer. (DOC277941)
Configuration Wizard Displays Old Module After Upgrade
If you previously used the Trend Micro Antivirus module and you upgrade to the new Trend Micro ScanMail module without also upgrading to the new Trend Micro OfficeScan module, a known issue exists where the Configuration Wizard continues to display the old Trend Micro Antivirus module. Ensure you install both the new Trend Micro OfficeScan module and the new Trend Micro ScanMail module to obtain all of the features available in the original Trend Micro Antivirus module. (DOC277939)
Old Computer Groups Are Not Removed After Upgrade
If you previously used the Trend Micro Antivirus module and you upgrade to the new Trend Micro ScanMail module, the old computer groups remain and the Security Manager agents continue to populate them. (DOC278134)
Old Canned Queries Are Not Removed After Upgrade
After upgrading to Trend Micro for ScanMail, the Control Center displays a folder named "Trend Micro Antivirus" that includes a ScanMail subfolder. The old canned queries in this subfolder may not function, or may return incorrect results and should not be used. Instead, ensure you use the queries in the new Trend Micro ScanMail folder. (DOC272601)
Old Objects Are Not Removed After Upgrade
After upgrading this module, Control Center continues to display a large number of attributes, computer groups, and scripts whose names begin with NetIQ::Trend Micro. These objects are safe to ignore, since this module no longer uses them. However, if you have custom content that uses these objects, NetIQ recommends that you discontinue their use or create your own custom attributes and computer groups, because the IDs for those objects may be re-used, replaced, or deleted in future module updates. For more information about creating custom attributes and computer groups, see the User Guide for NetIQ Security Manager.
Empty Legacy Processing Rule Groups
After installing or upgrading to Trend Micro ScanMail, there are two legacy processing rule groups listed in the Development Console: Trend Micro (Legacy) and Support for Trend Micro (Legacy). These processing rule groups are left over from previous versions of the Trend Micro modules, and are no longer functional. (ENG271554)
Please contact us with your questions and comments. We look forward to hearing from you.
For detailed contact information, see the Support Contact Information Web site.
For interactive conversations with your peers and NetIQ experts, become an active member of Qmunity, our community Web site that offers product forums, product notifications, blogs, and user groups.
THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET FORTH IN SUCH LICENSE AGREEMENT OR NON-DISCLOSURE AGREEMENT, NETIQ CORPORATION PROVIDES THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SOME STATES DO NOT ALLOW DISCLAIMERS OF EXPRESS OR IMPLIED WARRANTIES IN CERTAIN TRANSACTIONS; THEREFORE, THIS STATEMENT MAY NOT APPLY TO YOU.
This document and the software described in this document may not be lent, sold, or given away without the prior written permission of NetIQ Corporation, except as otherwise permitted by law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of NetIQ Corporation. Some companies, names, and data in this document are used for illustration purposes and may not represent real companies, individuals, or data.
This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time.
© 2009 NetIQ Corporation. All Rights Reserved.
U.S. Government Restricted Rights: If the software and documentation are being acquired by or on behalf of the U.S. Government or by a U.S. Government prime contractor or subcontractor (at any tier), in accordance with 48 C.F.R. 227.7202-4 (for Department of Defense (DOD) acquisitions) and 48 C.F.R. 2.101 and 12.212 (for non-DOD acquisitions), the government's rights in the software and documentation, including its rights to use, modify, reproduce, release, perform, display or disclose the software or documentation, will be subject in all respects to the commercial license rights and restrictions provided in the license agreement.
Check Point, FireWall-1, VPN-1, Provider-1, and SiteManager-1 are trademarks or registered trademarks of Check Point Software Technologies Ltd.
ActiveAgent, ActiveAnalytics, ActiveAudit, ActiveReporting, ADcheck, Aegis, AppAnalyzer, AppManager, the cube logo design, Change Administrator, Change Guardian, Compliance Suite, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowing is Everything, Knowledge Scripts, Mission Critical Software for E-Business, MP3check, NetConnect, NetIQ, the NetIQ logo, the NetIQ Partner Network design, Patch Manager, PSAudit, PSDetect, PSPasswordManager, PSSecure, Risk and Compliance Center, Secure Configuration Manager, Security Administration Suite, Security Analyzer, Security Manager, Server Consolidator, VigilEnt, Vivinet, Vulnerability Manager, Work Smarter, and XMP are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the United States and other jurisdictions. All other company and product names mentioned are used only for identification purposes and may be trademarks or registered trademarks of their respective companies.
For purposes of clarity, any module, adapter or other similar material ("Module") is licensed under the terms and conditions of the End User License Agreement for the applicable version of the NetIQ product or software to which it relates or interoperates with, and by accessing, copying or using a Module you agree to be bound by such terms. If you do not agree to the terms of the End User License Agreement you are not authorized to use, access or copy a Module and you must destroy all copies of the Module and contact NetIQ for further instructions.