Solution Readiness Support Training Trend Micro Worry-Free Business Module 2
Trend Micro Worry-Free Business Security Module 2 Marketing and Selling WFBS
WFBS New Starter Training Course Contents <ul><li>Today´s Threats </li></ul><ul><li>Product Overview </li></ul><ul><ul><li...
Trend Micro Worry-Free Business Security Chapter 1 Today’s Threats
You will be able to <ul><li>Describe different malware types and how they have evolved </li></ul><ul><li>Describe an infec...
The Malware Threat Describe different malware types and how they have evolved <ul><li>Spam, viruses and worms </li></ul><u...
Some definitions Virus  – Autonomous, malicious code, infects boot sector or files but cannot spread itself to another com...
Web Threats are Increasing Dramatically <ul><li>Total Growth of Unique Malware Samples since 2006 </li></ul>
Copyright 2008 - Trend Micro Inc. 04/27/08 5 Crimeware  is  Driving  Malware
What makes a bot a bot? © 2008 Craig A Schiller … botnet clients IRC protocol C&C 100 to 100000 Bot Bot Bot Bot Traditiona...
Today‘s Infection Chain Infection Vector Malware Writer Criminals Spyware/Trojan Downloader Web Drive By Downloader Email ...
Understand the motivation of today’s malware writers
Describe an infection chain involving a botnet <ul><li>In May 2009 after FBI agents in Omaha, Nebraska, began investigatin...
Describe the impact of malware in business terms  <ul><li>http://threatinfo.trendmicro.com/vinfo/virusencyclo/default5.asp...
List the things on your PC network you should protect
Providing Comprehensive Network Security <ul><li>Network and company assets must be protected. </li></ul><ul><li>Need spec...
Outline a policy for protecting a business network
List the features that a good small–business anti-malware product should have <ul><li>Spam protection </li></ul><ul><ul><l...
Review Question 1.1 <ul><li>Describe different malware types and how they have evolved </li></ul><ul><li>What is the diffe...
Review Question 1.2 <ul><li>Describe an infection chain involving a botnet </li></ul><ul><li>What is the best description ...
Review Question 1.3 <ul><li>Understand the motivation of today’s malware writers </li></ul><ul><li>What are the reasons pe...
Review Question 1.4 <ul><li>Describe the impact of malware in business terms </li></ul><ul><li>What malware variant has ca...
Review Question 1.5 <ul><li>List the things on your PC network you should protect </li></ul><ul><li>Name three things a sm...
Review Question 1.6 <ul><li>List methods you can use to protect yourself against attacks. </li></ul><ul><li>What advice wo...
Review Question 1.7 <ul><li>Outline a policy for protecting a business network </li></ul><ul><li>What items need to be pro...
Review Question 1.8 <ul><li>List the features that a good anti-malware product should have </li></ul><ul><li>Imagine you a...
Review Answer 1.1 <ul><li>Describe different malware types and how they have evolved </li></ul><ul><li>What is the differe...
Review Answer 1.2 <ul><li>Describe an infection chain involving a botnet </li></ul><ul><li>What is the best description of...
Review Answer 1.3 <ul><li>Understand the motivation of today’s malware writers </li></ul><ul><li>Today’s malware writers a...
Review Answer 1.4 <ul><li>Describe the impact of malware in business terms </li></ul><ul><li>What malware variant has caus...
Review Answer 1.5 <ul><li>List the things on your PC network you should protect </li></ul><ul><li>Examples of such assets ...
Review Answer 1.6 <ul><li>List methods you can use to protect yourself against attacks. </li></ul><ul><li>What advice woul...
Review Answer 1.7 <ul><li>Outline a policy for protecting a business network </li></ul>A Policy is a  formal, brief, and h...
Review Answer 1.8 <ul><li>List the features that a good anti-malware product should have </li></ul><ul><li>Support for XP,...
Exercise <ul><li>Netstat –ano + taskmanager </li></ul><ul><li>Housecall </li></ul><ul><li>rubotted </li></ul>
Trend Micro Worry-Free Business Security Chapter 2 Product Overview
You will be able to <ul><li>State the benefits of WFBS  </li></ul><ul><li>Explain how Worry Free provides protection again...
State the benefits of WFBS <ul><li>Worry-Free Security: </li></ul><ul><li>Automatic threat protection </li></ul><ul><li>Sm...
State the benefits of WFBS <ul><li>Safer—Stops more threats from the web </li></ul><ul><ul><li>Blocks increasing web threa...
Explain how Worry Free provides protection against today's coordinated threats
Describe the Client/Server architecture of WFBS
Next generation architecture Threat Protection Databases PAST Past Small Pattern DB Slowly Updating  Patterns < 50 Per Day...
Describe the “Smart Protection Network”
Trend Micro Smart Protection Network Threat Collection Partners <ul><li>ISPs </li></ul><ul><li>Routers </li></ul><ul><li>E...
Smart Protection Network  Correlation A compromised web site One click in a link. Fake news by email. TROJ_CHOST.E A fake ...
Smart Protection Network 06/17/11 Classification
Core Features of WFBS – Version 5.x onwards <ul><li>Client/Server Architecture </li></ul><ul><li>Manage Security and Secur...
Web Reputation Technology WEB REPUTATION
Behavior Monitoring
Other Features of WFBS – Version 5.x onwards <ul><li>Transaction Protector </li></ul><ul><li>Wireless Protection </li></ul...
Key Features of WFBS <ul><li>Security Server— </li></ul><ul><li>Location Awareness </li></ul><ul><li>Threat Status </li></...
Standard vs. Advanced Small and medium businesses with Microsoft desktops, laptops, file servers,  and SMTP / Exchange Mai...
WFBS Version 5 Onwards <ul><li>Previous version to Worry Free 5.x was </li></ul><ul><li>Client Server Messaging Security f...
Core Features of WFBS – Version 6.x onwards <ul><li>Smart Scanning </li></ul><ul><ul><li>Server-based scanning to relieve ...
Worry-Free Small Business Solutions 06/17/11 Classification
Smart Scanning
URL Web Content Filtering
Smart Protection Network Integration and Feedback
Other Features of WFBS – Version 6.x onwards <ul><li>Security Settings Import/Export </li></ul><ul><li>USB Device Control ...
What’s new in Worry Free 6 Service Pack 3
Basic information Classification  06/17/11 <ul><ul><li>SP3 will be the last SP for WFBS 6.0 </li></ul></ul><ul><ul><li>Ava...
WFBS 6.0 SP3 Overview Classification  06/17/11 <ul><ul><li>Information in console for further program updates via Active U...
Upgrade information Classification  06/17/11
SEG Patch Release/Notification Plan Classification  06/17/11 Critical Patch 1 Quarterly Patch 3~4 months One year Critical...
SMTP authentication Classification  06/17/11
UNC path for RealTime Scan exclusion Classification  06/17/11
Tool to reset console password Classification  06/17/11
IIS and DB recreate tool Classification  06/17/11
Connection test tool Classification  06/17/11
Roaming mode in Client Package Classification  06/17/11
How to information and FAQ Classification  06/17/11
Information during installation Classification  06/17/11
Error message during remote installation  Classification  06/17/11 <ul><ul><li>Connection Error – Please check 3 rd  party...
Temp file change Classification  06/17/11
Review Question 2.1 <ul><li>State the benefits of WFBS </li></ul><ul><li>What are the 3 basic benefits of WFBS? Give a sim...
Review Question 2.2 Explain how Worry Free provides protection against today's coordinated threats <ul><li>Match the lette...
Review Question 2.3 <ul><li>Position the WFBS product within the Trend Micro product range </li></ul><ul><li>What are the ...
Review Question 2.4 Describe the Client/Server architecture of WFBS <ul><li>Pick out the false statements: </li></ul><ul><...
Review Question 2.5 <ul><li>Describe the “Smart Protection Network” </li></ul>What are two key benefits of the Smart Prote...
Review Question 2.6 <ul><li>Describe what’s in WFBS up to and including version 6 Service Pack 3 </li></ul>A Protects user...
Review Question 2.7 <ul><li>Describe what’s in WFBS up to and including version 6 Service Pack 3 </li></ul>What’s the diff...
Review Answers 2.1 <ul><li>What are the 3xS benefits of WFBS? </li></ul>Trend Micro Worry-Free Business Security Advanced ...
Review Answer 2.2 <ul><li>Explain how Worry Free provides protection against today's coordinated threats </li></ul>A 2 B 1...
Review Answer 2.3 <ul><li>Position the WFBS product within the Trend Micro product range </li></ul><ul><li>What are the be...
Review Answer 2.4 <ul><li>Pick out the false statements: </li></ul><ul><li>In a typical configuration with WFBS 6 SP3 inst...
Review Answer 2.5 <ul><li>Describe the “Smart Protection Network” </li></ul>What are two key benefits of the Smart Protect...
Review Answers 2.6 <ul><li>Describe what’s in WFBS up to and including version 6 Service Pack 3 </li></ul>A Protects users...
Review Answer 2.7 <ul><li>Describe what’s in WFBS up to and including version 6 Service Pack 3 </li></ul>What’s the differ...
Exercise <ul><li>Try the Trend Micro recommender – see if you can get it to recommend you use Worry Free: </li></ul><ul><l...
Module Review
Thank You
Upcoming SlideShare
Loading in...5
×

Mod2 wfbs new starter

1,676

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,676
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Control Manager 3.5  2006 Trend Micro Incorporated
  • Control Manager 3.5  2006 Trend Micro Incorporated This portion of today’s training will focus on Worry Free Business Security. We’ll highlight some of the new features of version 6, which was just released last June. Worry Free Business Security is made up of different parts: the Security Server, the Security Dashboard, the Client/Server Security Agents, and the Messaging Security Agent. We’ll talk about the different ways to deploy and install these parts, both the Security Server and the CSA. To get a better understanding of each component, we’ll perform an installation. First we’ll install the Security Server, and then install a CSA client that we can use as an example in our discussion. We’ll go over the major features of WFBS, and point out some of the Best Practices or settings that we recommend. We’ll go over a lot of the common tasks and questions you might face when you’re out in the field using WFBS.
  • Zero-day Exploits Malware writers
  • It is the web threats that are increasing rapidly. Just a few years ago, the prevalent threats arrived in the form of email. Users would unknowingly click on malicious attachments and execute a virus on their system. Now phishing attempts are more common. People are clicking on links in emails and downloading malware which opens a backdoor on a user PC for a bot to be isntalled. Nowadays, web threats are the most common.
  • Traditionally hackers created malware for notoriety. They wanted the press to write about how good their code propagated and infected. Many of the threats weren’t done for malicious intent, but solely to see how good their code was. Today cybercrime is driving the creation of malware mainly because of the amount of money that is being made from it. Organized crime and regional cybergangs are turning this into an industry with an underground economy that is in the billions of dollars.
  • The operation was launched in May 2009 after FBI agents in Omaha, Nebraska, began investigating a computer fraud case that involved 46 unauthorized payments made to different bank accounts across the country. This type of fraud is the trademark of the Zeus network. In a typical Zeus theft, the criminals hack into the victim&apos;s online bank account and then move money out using the banking system&apos;s automated clearing house (ACH) money transfer system. &amp;quot;The cyber thieves targeted small- to medium-sized companies, and individuals, infecting their computers using a version of the Zeus Botnet,&amp;quot; the FBI said Friday in a press release. &amp;quot;The malware captured passwords, account numbers, and other data used to log into online banking accounts.&amp;quot; According to the FBI, the scammers tried to steal $220 million in total, and actually managed to move $70 million offshore from the U.S. There were about 390 victims in the U.S., the FBI said.
  • Zero-day Exploits Malware writers
  • Zero-day Exploits Malware writers
  • 1. Safer—Stops more threats from the web • Blocks increasing web threats and spam before they reach the business • URL filtering keeps employees safer and helps productivity by blocking risky or inappropriate websites 2. Smarter—Scans faster, provides more effective protection, with less impact on computers • Powered by the Trend Micro™ Smart Protection Network™, hosted technologies provide more effective protection with no maintenance or configuration needed • Using file reputation, Smart Scan stores detection technologies centrally, resulting in quicker updates and minimizing impact to PCs 3. Simpler—Easy-to-use, all-in-one solution protects small businesses • Single solution protects business assets and customer information from web threats and more • Easily manage security with an improved web-based “traffic light” console, or can also choose to manage via Microsoft Windows Essential Server consoles
  • Trend Micro is already ahead of the competition today, we will move further ahead over the next few months Past – little malware, not strongly financially motivated, slowly changing pattern files Today – most vendors still running with pattern file architecture Networks becoming overloaded Machines slow to boot due to need to load pattern files into memory from disk Too much PC memory being consumed Next generation Trend Micro already has been building out/investing in this infrastructure for more than 3 years now Email reputation, web reputation, file reputation in the cloud Trend Micro has had ER and WR operational for several years FR infrastructure is already in place with End-Point functionality being beta tested for the past 6 months with commercially available solutions this Spring Cloud rapidly updated with new information End-Points will hold a small database of Cache of recent patterns (recent apps for instance) to reduce network traffic/latency Store of critical and recent patterns for offline protection
  • Trend Micro’s approach is to use the power of the cloud. [Click to bring up Threat Collection] Trend Micro has a unique position in the security industry – having millions of sensors globally distributed feeding threat information back to our large network of threat collection systems. [Click to bring up ER, WR &amp; FR] Global Multi-Threat Detection Network Trend Micro maintains the world’s largest, most reliable email, file and web reputation databases with over a billion dynamically rated websites, files and spam sources used to block malicious emails, files and web threats. By combining messaging, file and web security businesses get the benefit of integrated threat intelligence across all three threat vectors.  And these reputation services are based on in-the-cloud technologies not static on-site updates. Thus, allowing users to always have access to the latest protection instantly – without having to wait for a signature update.  [Click to start arrows spinning] How Correlation Works Cybercriminals often use multiple threat vectors to propagate and manage their attacks. The Smart Protection Network correlates all three reputation databases, allowing us to source, analyze and provide protection against multiple components of an attack. Trend Micro is unique in owning all the security technology used in this collaboration process allowing us to effectively integrate feedback from our own anti-spam, anti-malware, webcrawlers, honeypots and other technologies. [Click to bring up lower half] Smart Protection Network is working already to protect customers from data theft and infection today with our endpoint, messaging and gateway products. Whether a user is on or off the network, they are protected immediately from new threats. We also secure some of our Alliance Partner products and finally we support easy management of all of our solutions. The result is real-time protection against the largest possible number of threats in the fastest possible time. Today we process over 5B requests through our 5 Global data centers daily.
  • One of Trend Micro’s unique advantages is that we own all of the threat protection available with the smart protection network and our ability to correlate all threat information we receive. Let me explain how this works. [Click to bring up TrendLabs image] TrendLabs is host to over 1000 researchers and automated systems that analyze all the different threat information we receive. [Click 3x to bring up the 3 reputation images] The solutions to these threats are added to our multiple reputation databases. [Click to bring up rotating arrows] All of the threat information is correlated together since most threats today have multiple components to make up an entire threat. Let me give you an example of how this correlation works. [Click to bring up email message] Many threats first start out as a spam message from a botnet controlled by a cybercriminal. [Click to send email message to Email Reputation] Trend Micro’s first line of defense is to check our Email Reputation database to determine if this email is coming from a spam source and if so we will block it. But we don’t stop there. [Click to bring up embedded links] The email you may have noticed had some embedded links. Most spam today use embedded links to entice the user into clicking. [Click to show URLs] [Click to send links to Web Reputation database] We extract those embedded links and check them against our Web Reputation database to see if they are malicious or not. But we don’t just stop there. If we have not seen these links before we automatically start a web crawling process that analyzes every new URL we see. [Click to bring up file image] From this process we are able to source many new files that are downloaded from these web pages. [Click to send file image to File Reputation database] Anytime we detect a new file we check it against our File Reputation database to determine if it is malicious or not. If we have not seen a file before TrendLabs will analyze it to determine if it is good or bad and add it to our whitelist or blacklist (virus pattern) [Click to show Trojan image] In this example you’ll see we detected a Trojan. [Click to bring up notepad image] You’ll see that in analyzing this trojan file we are able to find new IPs and domains that the cybercriminal will be using in their attack. [Click to send image to web reputation] We extract this threat information and add them to our Web Reputation database to block any new attempts to access these IPs and domains that we know are malicious. [Click to bring up red circle] So as you can see, we are able through our analysis of each threat we can provide protection for all aspects of a threat, from email, to web to file and add protection for our customers using any of our solutions that support the Smart Protection Network. In today’s threat landscape, the attack process does not take long. Even one minute of being unprotected can compromise security and infect the user. [Click to start build process] Users today can be infected by a number of methods. One click on a link in an email, falling for a phishing email, clicking on a legitimate site that’s been compromised or even clicking on a video link can provide an avenue for cybercrimals to steal data. But with Trend Micro Smart Protection Network and our correlation process we’re able to identify and analyze all components of an attack and provide immediate protection to our customers wherever they connect. It’s security made smarter.
  • Transaction Protector Browser plug-in tool that protects users against malicious hijacking activities when doing online transactions. Wireless Protection Wi-Fi Advisor plug-in protects against Evil Twin attacks and wireless access points being hacked maliciously. It provides security-level settings to support different encryption modes of on-corporate or off-corporate Wi-Fi users. TrendProtect When users browse the Web, plug-in warns users about potentially malicious and Phishing Web sites. Instant Messaging (IM) Protection Provides outbound content filtering protection and restriction of sensitive corporate data in the form of words or phrases being sent out through chat sessions. Plug-in Manager Facilitates the installation, deployment, and management of plug-in programs that enhance performance, add new features, and improve security. POP3 Anti-Spam protection Filters anti-spam emails for POP3 clients. This feature comes in a form of client toolbar plug-in and is compatible with the Outlook client. Worry-Free Remote Manager 1.6 5.1: Integrated install link for Worry-Free Remote Manager Agent 1.6, for multi-site management.
  • The difference with the Advanced version of WFBS is that it comes with messaging protection. There is a messaging agent that protects the Exchange server, and a license to implement InterScan Messaging Hosted Security (IMHS) Standard version. IMHS Standard is a hosted messaging solution that will scan your inbound emails before they reach your network. This is done by redirecting your MX Record so that all email will first be intercepted by IMHS, scanned for viruses and spam, before they are forwarded to your network.
  • [HIGHLIGHT WF SOLUTONS AND WHAT THEY PROTECT]
  • Security Settings Import/Export Allows administrators to export settings for desktops and servers and then later import them for new desktops and servers. This feature helps automate and migrate network security settings between subnets on the LAN. USB Device Control A function of WFBS’s Behavior Monitoring feature, USB Device Control protects against malware that could potentially auto-install from a R/W USB device. Autorun files are intercepted and blocked and a popup warns the user the autorun has been denied. Users can choose to continue or prevent the install. Streamlined Dashboard WFBS 6.0’s Dashboard is now streamlined, for simpler oversight and management. Threat, System, and License Status panels can now be expanded or contracted, and a View Mode lets you filter the Live Status view by the type of status displayed. Administrators can also customize email notifications for the various types of Threat Events. Improved Quarantine Tool asier display and recovery of quarantined files. CSA backs up encrypted files into a CSA folder before the quarantined file is sent to Security Server. The VSEncrypt tool provides a GUI mode to restore the encrypted files to original file paths. Integrated Install for WFRM 2.1 Integrated install is provided for the Worry-Free Remote Manager Agent 2.1, for multi-site reseller management of WFBS and IMHS customers.
  • Zero-day Exploits Malware writers
  • Zero-day Exploits Malware writers
  • Zero-day Exploits Malware writers
  • Zero-day Exploits Malware writers
  • Zero-day Exploits Malware writers
  • Zero-day Exploits Malware writers
  • Transcript of "Mod2 wfbs new starter"

    1. 1. Solution Readiness Support Training Trend Micro Worry-Free Business Module 2
    2. 2. Trend Micro Worry-Free Business Security Module 2 Marketing and Selling WFBS
    3. 3. WFBS New Starter Training Course Contents <ul><li>Today´s Threats </li></ul><ul><li>Product Overview </li></ul><ul><ul><li>Module 2 – Marketing and Selling WFBS – Today’s Threats and how WFBS is fighting them </li></ul></ul>
    4. 4. Trend Micro Worry-Free Business Security Chapter 1 Today’s Threats
    5. 5. You will be able to <ul><li>Describe different malware types and how they have evolved </li></ul><ul><li>Describe an infection chain involving a botnet </li></ul><ul><li>Understand the motivation of today’s malware writers </li></ul><ul><li>Describe the impact of malware in business terms </li></ul><ul><li>List the things on your PC network you should protect </li></ul><ul><li>List methods you can use to protect yourself against attacks. </li></ul><ul><li>Outline a policy for protecting a business network </li></ul><ul><li>List the features that a good anti-malware product should have </li></ul>
    6. 6. The Malware Threat Describe different malware types and how they have evolved <ul><li>Spam, viruses and worms </li></ul><ul><li>Attacks are increasing </li></ul><ul><li>Vulnerabilities are still being discovered. </li></ul><ul><ul><li>Microsoft is number one target but for how long? </li></ul></ul><ul><li>Mobile computing exacerbates the problem. </li></ul><ul><li>Threats form part of organised criminal activity </li></ul><ul><li>Zero-day exploits increase the challenges of patch management. </li></ul><ul><li>The new generation of malware writers is highly skilled and has far more aggressive goals, including total control of the target and the creation of bot-nets. </li></ul><ul><li>Bot-net – group of PCs that have been infected without knowledge of user and are now under the control of a criminal organisation </li></ul><ul><li>Trojans </li></ul>
    7. 7. Some definitions Virus – Autonomous, malicious code, infects boot sector or files but cannot spread itself to another computer. Spreads manually via floppy disks, later by email or web download. Worm – Autonomous, malicious code, spreads across the network via email, via network vulnerabilities Trojan – Malicious code that poses as legitimate code to get the user to execute it. Remote Access Trojan – Malicious code which poses as legitimate code to gain access, then permits the operator to gain remote control of the victim’s computer BotClients/Zombies – Malicious code which permits a victim’s computer to be controlled by an agent. The agent makes is easy for the operator (called a bot herder) to manage and operate Tens and Hundreds of Thousands of clients Army of Darkness – Collectively all of the zombies controlled by botherders
    8. 8. Web Threats are Increasing Dramatically <ul><li>Total Growth of Unique Malware Samples since 2006 </li></ul>
    9. 9. Copyright 2008 - Trend Micro Inc. 04/27/08 5 Crimeware is Driving Malware
    10. 10. What makes a bot a bot? © 2008 Craig A Schiller … botnet clients IRC protocol C&C 100 to 100000 Bot Bot Bot Bot Traditional Botnet In the original use of the term “Bot”, the bot client contained malicious code that would retrieve and execute commands that were sent by the botherder.
    11. 11. Today‘s Infection Chain Infection Vector Malware Writer Criminals Spyware/Trojan Downloader Web Drive By Downloader Email Spam Port Scan Vulnerabilities Spam & Phishing Dedicated Denial of Service Data Leakage Adware/Clickware Recruitment Activities Wait for Instructions Get Updates from Command & Control Fool the AV Host Management Host Infection HTTP IRC DNS Bot Herder Botnet Command & Controller
    12. 12. Understand the motivation of today’s malware writers
    13. 13. Describe an infection chain involving a botnet <ul><li>In May 2009 after FBI agents in Omaha, Nebraska, began investigating a computer fraud case </li></ul><ul><ul><li>46 unauthorized payments made to different bank accounts across the country. </li></ul></ul><ul><li>In a typical Zeus theft, the criminals hack into the victim's online bank account </li></ul><ul><ul><li>then move money out using the banking system's automated clearing house (ACH) money transfer system. </li></ul></ul><ul><li>The cyber thieves targeted small- to medium-sized companies, and individuals, infecting their computers using a version of the Zeus Botnet, </li></ul><ul><li>The malware captured passwords, account numbers, and other data used to log into online banking accounts. </li></ul><ul><li>According to the FBI, the scammers tried to steal $220 million in total </li></ul>
    14. 14. Describe the impact of malware in business terms <ul><li>http://threatinfo.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_NETSKY.P&Vsect=T#email </li></ul>
    15. 15. List the things on your PC network you should protect
    16. 16. Providing Comprehensive Network Security <ul><li>Network and company assets must be protected. </li></ul><ul><li>Need specific security strategies for different types of: </li></ul><ul><ul><li>Network access points </li></ul></ul><ul><ul><li>Threats/intrusion methods </li></ul></ul><ul><li>No single product or product suite can provide comprehensive security </li></ul><ul><ul><li>Need written security policies </li></ul></ul><ul><ul><li>Leadership & enforcement </li></ul></ul><ul><ul><li>Physical security </li></ul></ul><ul><li>All the elements of a security strategy work together. </li></ul>
    17. 17. Outline a policy for protecting a business network
    18. 18. List the features that a good small–business anti-malware product should have <ul><li>Spam protection </li></ul><ul><ul><li>Avoid receiving phishing attempts in the first place </li></ul></ul><ul><li>Virus/Spyware detection and removal </li></ul><ul><li>Web Reputation and URL Filtering </li></ul><ul><li>Monitor unauthorised system alterations </li></ul><ul><li>Easy deployment to desktops </li></ul><ul><li>Central reporting and control from a simple WEB-based GUI </li></ul><ul><li>Easy and swift deployment of malware definitions for prevention of zero day attacks </li></ul><ul><li>Reports and alerts </li></ul><ul><li>Small footprint on the PC </li></ul><ul><li>Low false positive rate </li></ul>
    19. 19. Review Question 1.1 <ul><li>Describe different malware types and how they have evolved </li></ul><ul><li>What is the difference between a virus, a network virus and a worm? </li></ul>
    20. 20. Review Question 1.2 <ul><li>Describe an infection chain involving a botnet </li></ul><ul><li>What is the best description of a botnet? </li></ul><ul><li>A hacker creates a botnet by sending a trojan to Microsoft servers </li></ul><ul><li>The hacker controls the botnet by inserting a keylog into infected computers </li></ul><ul><li>A botnet is a collection of network viruses running on a large group of computers </li></ul><ul><li>A botnet is a group of infected computers controlled by hacker </li></ul>
    21. 21. Review Question 1.3 <ul><li>Understand the motivation of today’s malware writers </li></ul><ul><li>What are the reasons people create malware today compared to for example 5 years ago? </li></ul>
    22. 22. Review Question 1.4 <ul><li>Describe the impact of malware in business terms </li></ul><ul><li>What malware variant has caused economic losses amounting to billions of dollars? Describe the outbreak in general terms. </li></ul>
    23. 23. Review Question 1.5 <ul><li>List the things on your PC network you should protect </li></ul><ul><li>Name three things a small business needs to protect. How would you assign a financial value to each one? Give a rough estimate in euros. </li></ul>
    24. 24. Review Question 1.6 <ul><li>List methods you can use to protect yourself against attacks. </li></ul><ul><li>What advice would you give to a non-technical friend or colleague who seems to be suffering from malware attacks? Make a list of actions he or she should carry out. What would be top of the list? </li></ul>
    25. 25. Review Question 1.7 <ul><li>Outline a policy for protecting a business network </li></ul><ul><li>What items need to be protected on a small business network? Think in both physical and abstract terms. </li></ul>
    26. 26. Review Question 1.8 <ul><li>List the features that a good anti-malware product should have </li></ul><ul><li>Imagine you are trying to convince a friend to use anti-malware software on his or her computer. What features would you explain? Outline the conversation you would have. </li></ul>
    27. 27. Review Answer 1.1 <ul><li>Describe different malware types and how they have evolved </li></ul><ul><li>What is the difference between a virus, a network virus and a worm? </li></ul><ul><li>A Virus is an autonomous piece of malicious code which infects boot sector or files but cannot spread itself to another computer. Spreads manually via floppy disks, later by email or web download. </li></ul><ul><li>A virus spreading over the network is not strictly a network virus. A Network Virus is a virus which replicates using network protocols such as TCP and HTTP. </li></ul><ul><li>Worm – An example of a a Network Virus. Spreads due to network vulnerabilities, like other Network Viruses it can be identified and blocked by a Firwall. </li></ul>
    28. 28. Review Answer 1.2 <ul><li>Describe an infection chain involving a botnet </li></ul><ul><li>What is the best description of a botnet? </li></ul><ul><li>d. A botnet is a group of infected computers controlled by hacker </li></ul>
    29. 29. Review Answer 1.3 <ul><li>Understand the motivation of today’s malware writers </li></ul><ul><li>Today’s malware writers are a criminal element motivated primarily by money. They steal account information and gain access to bank accounts and then take money from these accounts. They try to remain undetected. </li></ul><ul><li>In the past script-kiddies and other hackers were motivated by a desire to “show-off” their hacking skills. They wanted to make a big impact and embarrass prestigious organisations. </li></ul>
    30. 30. Review Answer 1.4 <ul><li>Describe the impact of malware in business terms </li></ul><ul><li>What malware variant has caused economic losses amounting to billions of dollars? Describe the outbreak in general terms </li></ul><ul><li>NetSky is an example of malware which in 2004 had already caused over 25 billion dollars of damage. </li></ul><ul><li>This worm spreads by sending out copies of itself as email attachment using its built-in SMTP engine. It gathers target recipients from certain files found on the affected machine, virtually turning the affected system into a propagation launch pad. Like most mass-mailing worm programs, this worm employs social engineering to get through that most critical barrier to propagation, which is getting the target recipient to open the infected email and execute the attachment. </li></ul><ul><li>Malware damages are calculated on the basis of helpdesk support costs, overtime payments, contingency outsourcing, loss of business, bandwidth clogging, productivity erosion, management time reallocation, cost of recovery and software upgrades. Intellectual Property Rights (IPR) violations and customer and supplier liability costs must also be counted </li></ul>http://www.publictechnology.net/content/698 http://threatinfo.trendmicro.com/vinfo/virusencyclo/default5.asp?VName= WORM_NETSKY.P&Vsect = T#email
    31. 31. Review Answer 1.5 <ul><li>List the things on your PC network you should protect </li></ul><ul><li>Examples of such assets include: </li></ul><ul><ul><li>Trade names, logos, or slogans. </li></ul></ul><ul><ul><li>Budgets, business plans, and marketing plans. </li></ul></ul><ul><ul><li>Customer lists or employee information. </li></ul></ul><ul><ul><li>Audio, visual, and documentary content. </li></ul></ul><ul><ul><li>Formulas, designs, or methods. </li></ul></ul><ul><ul><li>Research, and developmental or experimental work. </li></ul></ul><ul><ul><li>Software, databases, and data and source code. </li></ul></ul><ul><ul><li>All other material that can be copyrighted, patented, or trademarked. </li></ul></ul>http:// www.workz.com/content/view_content.html?section_id =531&content_id=5453
    32. 32. Review Answer 1.6 <ul><li>List methods you can use to protect yourself against attacks. </li></ul><ul><li>What advice would you give to a non-technical friend or colleague who seems to be suffering from malware attacks? Make a list of actions he or she should carry out. What would be top of the list? </li></ul><ul><li>Use anti-malware software </li></ul><ul><li>Turn on a firewall to prevent network viruses </li></ul><ul><li>Don’t open suspicious emails </li></ul><ul><li>Don’t provide banking information or credit card details to people requesting them in emails </li></ul>http://www.ixdownload.com/forums/security/834-how-spot-prevent-being-fooled-email-spam-malware-attacks.html
    33. 33. Review Answer 1.7 <ul><li>Outline a policy for protecting a business network </li></ul>A Policy is a formal, brief, and high-level statement or plan that embraces an organization’s general beliefs, goals, objectives, and acceptable procedures for a specified subject area. Policy attributes include the following: • Require compliance (mandatory) • Failure to comply results in disciplinary action • Focus on desired results, not on means of implementation • Further defined by standards and guidelines http://www.sans.org/reading_room/whitepapers/policyissues/developing-security-policies-protecting-corporate-assets_490 http://www.sans.org/security-resources/policies/Policy_Primer.pdf
    34. 34. Review Answer 1.8 <ul><li>List the features that a good anti-malware product should have </li></ul><ul><li>Support for XP, Vista, and 7 (32-bit and 64-bit). </li></ul><ul><li>Fast scanning. </li></ul><ul><li>Ability to perform full scans for all drives. </li></ul><ul><li>Database updates released daily. </li></ul><ul><li>Quarantine to hold threats and restore them at your convenience. </li></ul><ul><li>Exclude list for the scanner </li></ul><ul><li>A small list of extra utilities to help remove malware manually. </li></ul><ul><li>Works together with other anti-malware utilities. </li></ul><ul><li>Context menu integration to scan files on demand. </li></ul><ul><li>Low impact on normal performance of the PC </li></ul>http:// www.malwarebytes.org/mbam.php
    35. 35. Exercise <ul><li>Netstat –ano + taskmanager </li></ul><ul><li>Housecall </li></ul><ul><li>rubotted </li></ul>
    36. 36. Trend Micro Worry-Free Business Security Chapter 2 Product Overview
    37. 37. You will be able to <ul><li>State the benefits of WFBS </li></ul><ul><li>Explain how Worry Free provides protection against today's coordinated threats </li></ul><ul><li>Position the WFBS product within the Trend Micro product range </li></ul><ul><li>Describe the Client/Server architecture of WFBS </li></ul><ul><li>Describe the “Smart Protection Network” </li></ul><ul><li>Describe what’s in Worry Free up to and including version 6 Service Pack 3 </li></ul>
    38. 38. State the benefits of WFBS <ul><li>Worry-Free Security: </li></ul><ul><li>Automatic threat protection </li></ul><ul><li>Smart Protection Network in Cloud </li></ul><ul><li>All-in-one integrated defense </li></ul><ul><ul><li>Centralized Management </li></ul></ul><ul><li>Designed to suit small and medium-sized networks </li></ul><ul><li>Microsoft Windows Server and Client solution </li></ul>
    39. 39. State the benefits of WFBS <ul><li>Safer—Stops more threats from the web </li></ul><ul><ul><li>Blocks increasing web threats and spam before they reach the business </li></ul></ul><ul><ul><li>Web reputation and URL filtering keep employees safer and helps productivity by blocking risky or inappropriate websites </li></ul></ul><ul><li>Smarter—Scans faster, with more effective protection, </li></ul><ul><ul><li>and less impact on computers </li></ul></ul><ul><ul><li>Powered by the Trend Micro™ Smart Protection Network™, </li></ul></ul><ul><ul><li>provide more effective protection with no maintenance or configuration needed </li></ul></ul><ul><ul><li>Using file reputation, Smart Scan stores detection technologies centrally, resulting </li></ul></ul><ul><ul><li>in quicker updates and minimizing impact to PCs </li></ul></ul><ul><li>Simpler </li></ul>
    40. 40. Explain how Worry Free provides protection against today's coordinated threats
    41. 41. Describe the Client/Server architecture of WFBS
    42. 42. Next generation architecture Threat Protection Databases PAST Past Small Pattern DB Slowly Updating Patterns < 50 Per Day Patterns Threat Protection Databases TODAY Today Large Pattern DB Rapidly Updating Patterns > 50,000/day Some Dynamic Reputation Threat Protection Databases NEXT GENERATION Full Dynamic Reputation Next Generation Small Cache Plus Mobile Pattern DB Multi-Threat Correlation
    43. 43. Describe the “Smart Protection Network”
    44. 44. Trend Micro Smart Protection Network Threat Collection Partners <ul><li>ISPs </li></ul><ul><li>Routers </li></ul><ul><li>Etc. </li></ul>Endpoint Gateway SaaS/Managed Cloud Management Off Network Messaging EMAIL REPUTATION WEB REPUTATION FILE REPUTATION Threats
    45. 45. Smart Protection Network Correlation A compromised web site One click in a link. Fake news by email. TROJ_CHOST.E A fake video A lot can happen in a minute EMAIL REPUTATION WEB REPUTATION FILE REPUTATION
    46. 46. Smart Protection Network 06/17/11 Classification
    47. 47. Core Features of WFBS – Version 5.x onwards <ul><li>Client/Server Architecture </li></ul><ul><li>Manage Security and Security Policies from a Single Console </li></ul><ul><li>Maintain Updated Protection </li></ul><ul><li>Quarantine Infected Files </li></ul><ul><li>Control Network Outbreaks </li></ul><ul><li>Protect Email Messages </li></ul><ul><li>Control Security Settings Based on Location </li></ul><ul><li>Provide Behavior Monitoring </li></ul><ul><li>Web Reputation Technology </li></ul><ul><ul><li>Protect Clients from Malicious Websites </li></ul></ul><ul><li>Behavior Monitoring </li></ul>
    48. 48. Web Reputation Technology WEB REPUTATION
    49. 49. Behavior Monitoring
    50. 50. Other Features of WFBS – Version 5.x onwards <ul><li>Transaction Protector </li></ul><ul><li>Wireless Protection </li></ul><ul><li>Trend Protect </li></ul><ul><li>Instant Messaging Protection </li></ul><ul><li>Plug-in Manager </li></ul><ul><li>POP3 Antispam Protection </li></ul><ul><li>Worry Free Remote Manager 1.6 </li></ul>
    51. 51. Key Features of WFBS <ul><li>Security Server— </li></ul><ul><li>Location Awareness </li></ul><ul><li>Threat Status </li></ul><ul><li>Plug-in Manager </li></ul><ul><li>User Interface </li></ul><ul><li>Client/Server Security Agent— </li></ul><ul><li>URL Filtering </li></ul><ul><li>Behavior Monitoring </li></ul><ul><li>Web Reputation Services </li></ul><ul><li>Instant Messaging Content Filtering </li></ul><ul><li>Software Protection </li></ul><ul><li>POP3 Email Scanning </li></ul><ul><li>TrendSecure </li></ul><ul><li>USB Device Protection </li></ul><ul><li>Messaging Security Agent — </li></ul><ul><li>Email Reputation </li></ul>
    52. 52. Standard vs. Advanced Small and medium businesses with Microsoft desktops, laptops, file servers, and SMTP / Exchange Mail servers or Small Business Servers, who also want extra in-the-cloud protection from spam using IMHS WFBS Advanced Small and medium businesses with Microsoft desktops, laptops, and file servers WFBS Standard Protection Edition
    53. 53. WFBS Version 5 Onwards <ul><li>Previous version to Worry Free 5.x was </li></ul><ul><li>Client Server Messaging Security for SMB (CSM) 3.6 </li></ul><ul><ul><li>No longer supported except for customers wishing to upgrade </li></ul></ul>
    54. 54. Core Features of WFBS – Version 6.x onwards <ul><li>Smart Scanning </li></ul><ul><ul><li>Server-based scanning to relieve the burden on clients </li></ul></ul><ul><li>URL Web Content Filtering </li></ul><ul><ul><li>Blocks websites that may not be appropriate for the workplace </li></ul></ul><ul><li>Smart Protection Network Integration and Feedback </li></ul><ul><ul><li>Up-to-date protection against malware, disease vectors, spoof sites, and a variety of other threats </li></ul></ul><ul><li>Simpler and Easier Live Status </li></ul><ul><ul><li>The Security Dashboard is now even easier to use – with all information available at a glance </li></ul></ul><ul><li>Enhanced Virus Quarantine Tool </li></ul><ul><ul><li>This tool lets you back up quarantined files on client computers. The clients can view information and restore quarantined files if safe. </li></ul></ul><ul><li>Variable Scanning based on CPU Consumption </li></ul><ul><ul><li>You can now configure how WFBS handles scans during high-load times on the Security Server </li></ul></ul><ul><li>USB Device Threat Protection </li></ul><ul><ul><li>WFBS can now be configured to disable the Autorun feature when a USB device is inserted </li></ul></ul>
    55. 55. Worry-Free Small Business Solutions 06/17/11 Classification
    56. 56. Smart Scanning
    57. 57. URL Web Content Filtering
    58. 58. Smart Protection Network Integration and Feedback
    59. 59. Other Features of WFBS – Version 6.x onwards <ul><li>Security Settings Import/Export </li></ul><ul><li>USB Device Control </li></ul><ul><li>Streamlined Dashboard </li></ul><ul><li>Improved Quarantine Tool </li></ul><ul><li>Integrated Install for WFRM 2.1 </li></ul>
    60. 60. What’s new in Worry Free 6 Service Pack 3
    61. 61. Basic information Classification 06/17/11 <ul><ul><li>SP3 will be the last SP for WFBS 6.0 </li></ul></ul><ul><ul><li>Available on 30. July 2010 (English) </li></ul></ul><ul><ul><li>Available on 27. August 2010 (localized) </li></ul></ul><ul><ul><li>There again will be a full package and a stand alone SP package </li></ul></ul>
    62. 62. WFBS 6.0 SP3 Overview Classification 06/17/11 <ul><ul><li>Information in console for further program updates via Active Update </li></ul></ul><ul><ul><li>SMTP authentication for Notifications </li></ul></ul><ul><ul><li>UNC path exclusion for RealTime Scan </li></ul></ul><ul><ul><li>Tool to... </li></ul></ul><ul><ul><ul><li>... reset console password (requires local or domain admin rights) </li></ul></ul></ul><ul><ul><ul><li>... recreate IIS and DB </li></ul></ul></ul><ul><ul><ul><li>... check Connection </li></ul></ul></ul><ul><ul><li>Roaming Mode can be enabled for Client Packages (update every 2h) </li></ul></ul><ul><ul><li>There will be some important “How To” information in the console </li></ul></ul><ul><ul><li>Information during installation </li></ul></ul><ul><ul><li>Remote installation gives 4 different error messages </li></ul></ul><ul><ul><li>Possible to change the path for the temporary installation files </li></ul></ul><ul><ul><li>TMVS (Vulnerability Scan) will work now with 64 bit machines </li></ul></ul>
    63. 63. Upgrade information Classification 06/17/11
    64. 64. SEG Patch Release/Notification Plan Classification 06/17/11 Critical Patch 1 Quarterly Patch 3~4 months One year Critical Patch 2 Critical Patch 3 Accumulate Patch 1 (with internal HF) 3~4 months Quarterly Patch 2 Accumulate Patch 2 (with internal HF)
    65. 65. SMTP authentication Classification 06/17/11
    66. 66. UNC path for RealTime Scan exclusion Classification 06/17/11
    67. 67. Tool to reset console password Classification 06/17/11
    68. 68. IIS and DB recreate tool Classification 06/17/11
    69. 69. Connection test tool Classification 06/17/11
    70. 70. Roaming mode in Client Package Classification 06/17/11
    71. 71. How to information and FAQ Classification 06/17/11
    72. 72. Information during installation Classification 06/17/11
    73. 73. Error message during remote installation Classification 06/17/11 <ul><ul><li>Connection Error – Please check 3 rd party firewall </li></ul></ul><ul><ul><li>Remote Regisry service not started </li></ul></ul><ul><ul><li>UAC issue / use build in administrator (Windows Vista, 7, 2008 (R2)) </li></ul></ul><ul><ul><li>Simple file sharing (Windows XP) </li></ul></ul>
    74. 74. Temp file change Classification 06/17/11
    75. 75. Review Question 2.1 <ul><li>State the benefits of WFBS </li></ul><ul><li>What are the 3 basic benefits of WFBS? Give a simple sales pitch. </li></ul>
    76. 76. Review Question 2.2 Explain how Worry Free provides protection against today's coordinated threats <ul><li>Match the letters with the numbers </li></ul><ul><li>POP3 Mail Scan in Client/Server Security Agent and IMAP Mail Scan in Messaging Security Agent Protection for Messaging SecurityAgent for Microsoft™ Exchange Servers </li></ul><ul><li>Antivirus and Anti-spyware Scan Engines along with Pattern Files inClient/Server Security Agent and Messaging Security Agent </li></ul><ul><li>Firewall in Client/Server Security Agent </li></ul><ul><li>Web Reputation and TrendProtect in Client/Server Security Agent </li></ul><ul><li>Behavior Monitoring in Client/Server Security Agent </li></ul><ul><li>Transaction Protector in Client/Server Security Agent </li></ul><ul><li>IM Content Filtering in Client/Server Security Agent </li></ul><ul><li>Firewall in Client/Server Security Agent </li></ul>P ROTECTIO N A. Virus/Malware. Virus, Trojans, Worms, Backdoors, and Rootkits Spyware/Grayware. Spyware, Dialers, Hacking tools, Password cracking applications, Adware, Joke programs, and Keyloggers B. Virus/Malware and Spyware/Grayware transmitted through email messages and spam C. Network Worms/Viruses D. Intrusions E. Conceivably harmful Web sites/Phishing sites F. Malicious behaviour G. Fake access points H. Explicit/restricted content in IM applications T HREA T
    77. 77. Review Question 2.3 <ul><li>Position the WFBS product within the Trend Micro product range </li></ul><ul><li>What are the benefits of Worry Free Remote Manager? </li></ul>
    78. 78. Review Question 2.4 Describe the Client/Server architecture of WFBS <ul><li>Pick out the false statements: </li></ul><ul><li>In a typical configuration with WFBS 6 SP3 installed on all computers </li></ul><ul><ul><li>A sends pattern updates to B – G only </li></ul></ul><ul><ul><li>G has a Client Server Security Agent </li></ul></ul><ul><ul><li>B accesses the Client database on G using HTTP </li></ul></ul><ul><ul><li>G sends pattern updates to B – F </li></ul></ul><ul><ul><li>A accesses the Client database on A using HTTP </li></ul></ul><ul><ul><li>B - G access the Client database on A using HTTP </li></ul></ul><ul><ul><li>G has a Messaging Security Agent </li></ul></ul><ul><ul><li>A has a Client Server Security Agent </li></ul></ul>G A B C D E F Windows 2008 server Windows XP and Win 7 PCs Exchange Server
    79. 79. Review Question 2.5 <ul><li>Describe the “Smart Protection Network” </li></ul>What are two key benefits of the Smart Protection Network?
    80. 80. Review Question 2.6 <ul><li>Describe what’s in WFBS up to and including version 6 Service Pack 3 </li></ul>A Protects users when working on the Internet B Protects users when working wirelessly C Protects users when working out of the office D Protects users against viruses regardless of location E Protects users when chatting F Protects users when doing online banking 1 Web reputation 4 Wi Fi Advisor 7 Location Awareness 2 Behaviour Monitoring 3 IM Protection 6 Smart and Conventional Scan 5 Transaction Protect
    81. 81. Review Question 2.7 <ul><li>Describe what’s in WFBS up to and including version 6 Service Pack 3 </li></ul>What’s the difference between URL filtering and Web Reputation
    82. 82. Review Answers 2.1 <ul><li>What are the 3xS benefits of WFBS? </li></ul>Trend Micro Worry-Free Business Security Advanced (WFBS) protects small business users and assets from data theft, identity theft, risky Web sites, and spam. Powered by the Trend Micro™ Smart Protection Network, Worry-Free Business Security Advanced is: • Safer : Stops viruses, spyware, spam, and Web threats from reaching computers or servers. URL filtering blocks access to risky Web sites and helps improve user productivity. • Smarter : Fast scans and continuous updates prevent new threats, with minimal impact to users’ PCs. • Simpler : Easy to deploy and requiring zero administration, WFBS detects threats more effectively so that you can focus on business instead of security.
    83. 83. Review Answer 2.2 <ul><li>Explain how Worry Free provides protection against today's coordinated threats </li></ul>A 2 B 1 C 3 D 8 E 4 F 5 G 7
    84. 84. Review Answer 2.3 <ul><li>Position the WFBS product within the Trend Micro product range </li></ul><ul><li>What are the benefits of Worry Free Remote Manager? </li></ul><ul><li>Resellers now have the option to install a Worry-Free Remote Manager Agent that allows them to remotely manage a number of WFBS Security Server and HES installations on behalf of different customers. </li></ul>
    85. 85. Review Answer 2.4 <ul><li>Pick out the false statements: </li></ul><ul><li>In a typical configuration with WFBS 6 SP3 installed on all computers </li></ul><ul><ul><li>A sends pattern updates to B – G only F </li></ul></ul><ul><ul><li>G has a Client Server Security Agent T </li></ul></ul><ul><ul><li>B accesses the Client database on G using HTTP F </li></ul></ul><ul><ul><li>G sends pattern updates to B – F F </li></ul></ul><ul><ul><li>A accesses the Client database on A using HTTP T </li></ul></ul><ul><ul><li>B - G access the Client database on A using HTTP T </li></ul></ul><ul><ul><li>G has a Messaging Security Agent T </li></ul></ul><ul><ul><li>A has a Client Server Security Agent T </li></ul></ul>G A B C D E F Windows 2008 server Windows XP and Win 7 PCs Exchange Server
    86. 86. Review Answer 2.5 <ul><li>Describe the “Smart Protection Network” </li></ul>What are two key benefits of the Smart Protection Network? Stronger, Faster Protection. Lighter on Your System Resources. The Trend Micro Smart Protection Network lightens the demand on your system resources by leveraging cloud-based technology to block Web threats before they even reach you, providing stronger protection while reducing your reliance on time-consuming signature-downloads. Better Together Security. The Trend Micro Smart Protection Network is constantly updated and strengthened as more users access the network, providing &quot;better together&quot; security. http://emea.trendmicro.com/emea/technology/smart-protection-network/key-benefits/
    87. 87. Review Answers 2.6 <ul><li>Describe what’s in WFBS up to and including version 6 Service Pack 3 </li></ul>A Protects users when working on the Internet B Protects users when working wirelessly C Protects users when working out of the office D Protects users against viruses regardless of location E Protects users when chatting F Protects users when doing online banking 1 Web reputation 3 IM Protection 7 Location Awareness 2 Behaviour Monitoring 4 Wi Fi Advisor 6 Smart and Conventional Scan 5 Transaction Protect
    88. 88. Review Answer 2.7 <ul><li>Describe what’s in WFBS up to and including version 6 Service Pack 3 </li></ul>What’s the difference between URL filtering and Web Reputation URL Filtering WFBS 6.0’s URL Filtering feature lets administrators control access to websites based on their rating. Filter strength can be set to high, medium, low, or custom settings, and by business and leisure hours. Web Threat Protection Uses the latest Web Reputation technology to assess the security risk of all Web URL requests. Web Threat Protection stops malware real-time, at the source, before it can be downloaded from the Internet. Unique to Trend Micro. 5.1: Enhanced feedback loop mechanism for unknown Web threats, part of the Smart Protection Network.
    89. 89. Exercise <ul><li>Try the Trend Micro recommender – see if you can get it to recommend you use Worry Free: </li></ul><ul><li>http://recommender.trendmicro-europe.com / </li></ul>
    90. 90. Module Review
    91. 91. Thank You
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×