64 Bit GSG splx30 Centos7 Rhel7 Suse12
64 Bit GSG splx30 Centos7 Rhel7 Suse12
the products described herein without notice. Before installing and using the software,
please review the readme files, release notes, and the latest version of the applicable user
documentation, which are available from the Trend Micro Web site at:
http://www.trendmicro.com/download
Trend Micro, the Trend Micro logo, InterScan VirusWall, MacroTrap, ServerProtect,
Control Manager, and TrendLabs are trademarks or registered trademarks of Trend
Micro, Incorporated. All other product or company names may be trademarks or
registered trademarks of their owners.
Copyright© 2015 Trend Micro Incorporated. All rights reserved.
Document Part No. SPEM36944/150423
Release Date: April 2015
Protected by U.S. Patent No. 5,951,698
The user documentation for Trend Micro™ ServerProtect™ for Linux is intended to
introduce the main features of the software and installation instructions for your
production environment. You should read through it prior to installing or using the
software.
Detailed information about how to use specific features within the software are available
in the online help file and the online Knowledge Base at Trend Micro’s Web site.
Trend Micro is always seeking to improve its documentation. Your feedback is always
welcome. Please evaluate this documentation on the following site:
http://www.trendmicro.com/download/documentation/rating.asp
Contents
Contents
Preface
Audience ........................................................................................................... P-2
ServerProtect Documentation ..................................................................... P-2
Document Conventions ................................................................................ P-3
Chapter 1: Pre-Installation
System Requirements ..................................................................................... 1-2
Information Needed to Install ServerProtect ............................................. 1-3
Chapter 2: Installation
ServerProtect Installer Options .................................................................... 2-2
Local Installation Procedure ......................................................................... 2-3
Running the ServerProtect Installation Program .................................. 2-3
Accepting the Trend Micro End User Agreement ............................... 2-4
Registering ServerProtect to Control Manager ..................................... 2-5
Activating ServerProtect During Installation ........................................ 2-7
Remote Installation ......................................................................................... 2-8
Extracting RemoteInstall From the ServerProtect Binary .................. 2-9
Using a Configuration File in Your Remote Deployment ................ 2-10
Running the RemoteInstall Tool ........................................................... 2-14
Kernel Hook Module ................................................................................... 2-16
Installing a Kernel Hook Module Package .......................................... 2-17
Verifying the Installation ............................................................................. 2-19
Uninstalling ServerProtect ........................................................................... 2-19
i
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
ii
Contents
Index
iii
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
iv
Preface
Preface
Welcome to the Trend Micro™ ServerProtect™ for Linux 3.0 (SPLX3.0) Getting
Started Guide. This guide contains basic information about the tasks you need to
perform to install the product and basic configuration. This preface discusses the
following topics:
• Audience on page 2
• ServerProtect Documentation on page 2
• Document Conventions on page 3
1
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
Audience
The Trend Micro™ ServerProtect™ for Linux 3.0 documentation assumes an
intermediate to advanced knowledge of Linux system administration, including:
• Installing and configuring Linux servers
• Installing software on Linux servers
• Network concepts (such as IP address, netmask, topology, LAN settings)
• Various network topologies
• Network devices and their administration
• Network configuration (such as the use of VLAN, SNMP, SMTP, etc.)
ServerProtect Documentation
The ServerProtect for Linux 3.0 documentation consists of the following:
• It also includes instructions on testing your installation using a harmless test virus.
• Online help—The purpose of online help is to provide “how to’s” for the main
product tasks, usage advice, and field-specific information such as valid parameter
ranges and optimal values. Online help is accessible from the ServerProtect
management console.
• Man pages—ServerProtect for Linux provides man pages for the splxmain,
splx, tmsplx.xml, RemoteInstall, and CMconfig.
• Readme file—The Readme file contains late-breaking product information that is
not found in the online or printed documentation. Topics include a description of
new features, installation tips, known issues, and release history.
• Knowledge Base— The Knowledge Base is an online database of problem-solving
and troubleshooting information. It provides the latest information about known
product issues. To access the Knowledge Base, open:
http://esupport.trendmicro.com/
Tip: Trend Micro recommends checking the corresponding link from the Update Center
(http://www.trendmicro.com/download) for updates to the product
documentation.
2
Preface
Document Conventions
To help you locate and interpret information easily, the documentation uses the
following conventions.
TABLE 1.
Convention Description
Configuration notes
Note:
Recommendations
Tip:
3
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
4
Chapter 1
Pre-Installation
This chapter guides you through the information gathering phase before installing
ServerProtect for Linux (SPLX) on your Linux server.
This chapter discusses the following topics:
• System Requirements on page 1-2
• Information Needed to Install ServerProtect on page 1-3
1-1
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
System Requirements
Servers on which you install ServerProtect must meet the following requirements.
Hardware
Processor
• Intel™ Pentium™ II or higher
• AMD Athlon™ or higher
Note: This version of ServerProtect supports Intel processors with Intel 64 architecture and
AMD processors with AMD64 technology. Intel Itanium architecture is not
supported.
Memory
• 512-MB or more (1-GB recommended for application/file servers)
Disk space
• 250-MB for the /opt directory
• 250-MB for the /tmp directory
Software
Supported Distributions and Kernels
• Red Hat Enterprise Linux 7 (x86_64):
• 3.10.0-123.el7.x86_64
• 3.10.0-123.1.2.el7.x86_64
• 3.10.0-123.4.2.el7.x86_64
• CentOS Linux 7 (x86_64):
• 3.10.0-123.el7.x86_64
• SUSE Linux Enterprise Server 12 (x86_64):
• 3.12.28-4.6.x86_64
For other kernels and distributions, refer to the following Web site for additional
information:
1-2
Pre-Installation
http://downloadcenter.trendmicro.com/index.php?clk=tbl&clkval=1
11®s=NABU&lang_loc=1
Supported X Window Graphical Desktop Environments
To use Quick Access console menus and command-line alternatives, install Konqueror
Desktop Environment (KDE) 3.3 or higher.
Note: The Quick Access console is available only when you are logged on as root.
Note: If you use Internet Explorer™ 7.0 or above, you must disable the pop-up window
blocker feature to display the Web console online help content.
1-3
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
Note: To register ServerProtect to the Control Manager server on your network, you need
Trend Micro Control Manager Server 6.0 or above.
Activation Code
During product registration, the Registration Key is exchanged for an Activation Code
(also known as a serial number) that “unlocks” the program. You can register and obtain
the Activation Code before installing by visiting Trend Micro’s online registration Web
site at:
https://olr.trendmicro.com/redirect/product_register.aspx
Note: Some resellers may have already registered ServerProtect for you and given you the
product serial number directly.
1-4
Chapter 2
Installation
This chapter guides you through the installation of ServerProtect on your Linux
server(s). This chapter discusses the following topics:
• ServerProtect Installer Options on page 2-2
• Local Installation Procedure on page 2-3
• Remote Installation on page 2-8
• Kernel Hook Module on page 2-16
• Verifying the Installation on page 2-19
2-1
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
2-2
Installation
Note: Before you install ServerProtect on your Linux computer, make sure the following
dependent packages are installed:
-glibc
-libgcc
-zlib
-bzip2
-libuuid
-compat-libstdc++ (Red Hat and CentOS only)
-nss-softokn-freebl (Red Hat and CentOS only)
-perl-Sys-Syslog (Red Hat and CentOS only)
2-3
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
./SProtectLinux-3.0.bin
This command extracts the required files to their proper locations.
The following procedure shows you how to disable Real-time Scan during installation.
To install ServerProtect with real-time scan disabled:
1. Use the -n option to start the installation. For example, type
./SProtectLinux-3.0.bin -n at the command line.
2. After the installation is complete, set the value of the RealtimeScan parameter to
0 in the tmsplx.xml configuration file.
3. Restart the ServerProtect service.
Note: If a message displays warning that the KHM does not support your Linux kernel,
build and install the KHM. After the KHM installation is complete, do NOT start or
restart the ServerProtect service. Then perform steps 2 and 3 as described above.
WARNING! If you use the -n option to install ServerProtect, you must manually con-
figure the ServerProtect service to run at system startup. You can do this
by typing “./add_splx_service” in the /opt/TrendMicro/SPro-
tectLinux/SPLX.util folder.
2-4
Installation
Press the [SPACE] bar to scroll to read the license. When you have finished reading, type
“yes” to accept the licensing terms. (If you do not type “yes,” installation cannot
continue.)
NOTICE: Trend Micro licenses its products in accordance with cer-
tain terms and conditions. By breaking the seal on the CD jacket
in the Software package or installing a serial number, registra-
tion key or activation code, You already accepted a Trend Micro
license agreement. A courtesy copy of a representative Trend Micro
License Agreement is included for reference below. The language
and terms of the actual Trend Micro license agreement that you
accepted may vary. By accepting the License Agreement below, or
using the Software, You confirm Your agreement to the terms and
conditions of the original Trend Micro license agreement you
accepted.
-----------------------[SNIP] -------------------------
2-5
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
prompts you to type your Activation Code. See Activating ServerProtect During
Installation on page 2-7 for further guidance on this process.
3. At the SPLX server name or IP address: prompt, type the name or IP
address of your ServerProtect server.
4. At the Do you wish to connect to Control Manager server using
HTTPS? (y/n) [n] prompt, type y to connect to Control Manager using
HHTPS; otherwise type n to use HTTP connection.
5. At the Control Manager server name or IP address: prompt, type
server name or the IP address of the Trend Micro Control Manager server that you
want to use to manage ServerProtect.
6. At the Control Manager server port: [80] prompt, type the port
number that you would like to use to access Control Manager or just press
[ENTER] to accept the default value of 80.
7. At the Do you access Control Manager through a proxy server?
(y/n) [n] prompt, type y if you do or just press [ENTER] to accept the default
choice of n. If you choose n, the installer asks you to specify the display name to
identify ServerProtect on the Control Manager Web console. If you do use a proxy
server to connect to Control Manager, see Proxy Server Information on page 2-7 for
further guidance on this process.
8. At the Please specify the name you would like to display on
the Control Manager console: [SPLX server name or IP
address] prompt, type the desired name. Control Manager will use this name to
identify your ServerProtect server on the Control Manager Web console.
9. At the Please specify a folder name for this product (for
example: /SPLX) [New entity]: prompt, type the folder path. The installer
displays a summary of the information you have entered and asks you to confirm
your choices.
10. At the Is the above information correct? (y/n) [n] prompt,
confirm or reject the displayed choices. If you type n (or just press [ENTER] to
accept the default choice of n), the installer prompts you to re-type all of the above
information, starting with the IP of your ServerProtect server. If you type y to
confirm all of the displayed information, the "Saving information to the
configuration file … done" message displays and ServerProtect asks if you would
like to type your Activation Code. See Activating ServerProtect During Installation on
page 2-7 for further guidance on this process.
2-6
Installation
2-7
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
https://olr.trendmicro.com/redirect/product_register.asp
x
b. Follow the steps described in Registering ServerProtect starting on page 3-8.
2. Next, the installer prompts you to activate ServerProtect. You can do so at this time
or skip this step and activate later. To skip this step, press Ctrl+D
To activate ServerProtect, type the Activation Code at the prompt and press
[ENTER].
See Registering ServerProtect on page 3-8 for instructions on registering the
ServerProtect if you did not register or activate during installation.
Remote Installation
Many ServerProtect customers install and administer ServerProtect in a centrally
managed, distributed environment. Trend Micro provides a remote installation tool
(RemoteInstall) for this reason.
RemoteInstall Features
RemoteInstall has the following features:
• Install ServerProtect on remote computers.
• Configuration file keeps account information of client computers.
• Deploy ServerProtect configuration data to target computers after product
installation.
• Deploy Kernel Hook Module (KHM) to target computers after product installation.
• Collect certain information about client environments, such as the running Linux
distribution and the Linux kernel number.
• Export configuration information to .CSV format so that in a subsequent
deployment RemoteInstall can re-use the list of computers to which the initial
deployment failed.
The following lists the steps in performing a remote installation:
1. Extracting RemoteInstall.
2. Editing a RemoteInstall configuration file.
3. Running RemoteInstall.
2-8
Installation
2-9
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
Key Description
2-10
Installation
2-11
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
Single Deploy
Under #single deploy in the Client assignment section of
RemoteInstall.conf are 13 configuration items that RemoteInstall must
be aware of in order to deploy successfully.
Line Description
2-12
Installation
Line Description
Group deploy
For group deployment, all of the lines are identical to those under #single
deploy except for the following.
Line Description
2-13
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
Tip: For ease of reference, Trend Micro suggests starting any group names with an easily
identifiable term, such as Sales, RD, and likewise for computer names, for example,
Server1, Server2, and so on.
2-14
Installation
Parameter Description
-h Show usage
2-15
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
Parameter Description
-v Show version
Note: When you upgrade the Linux kernel, you need to copy the KHM to the directory
where ServerProtect is installed.
2-16
Installation
Note: During installation, if you receive an error message that a dependent package must be
installed, install the required package before you continue.
Tip: Trend Micro strongly recommends that you verify the MD5 checksum to make
sure the files have been downloaded and extracted intact.
2-17
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
or
https://<host server>:14943
Make sure your Linux system port 14942 or 14943 is already open for ServerProtect
access.
2-18
Installation
Uninstalling ServerProtect
In order to remove ServerProtect, you must be logged on as root. In a terminal
window, type rpm -e SProtectLinux to stop the ServerProtect service and
remove the application.
2-19
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
2-20
Chapter 3
3-1
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
Note: The Web console automatically logs you out after 1200 seconds (or 20 minutes) of
inactivity. If this happens to you, type the password and click Logon to access the Web
console again. You can change the default timeout settings by changing the
SessionTimeout key in the Configuration group in the tmsplx.xml file (located
in the /opt/TrendMicro/SProtectLinux folder). Refer to the Administrator’s
Guide for more information.
A password is not required to access the application the first time you log on after
installing. Click Log on.
The Summary screen displays. This screen is the default view when the Web console
opens. If you have not registered and activated ServerProtect, the screen displays that
the product has not been activated yet.
3-2
Post Installation Configuration
Make selections from the left menu to navigate the user interface.
3-3
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
FIGURE 3-5. Logon screen with Mozilla browsers where Java Run-time
Environment (JRE) has not been installed
To enable the Java plug-in, go to the Mozilla plug-in directory and then create a
symbolic link to the Java plug-in. For example:
cd /usr/lib/mozilla/plugins
ln -s \
> /usr/java/j2re1.4.2/plugin/x86_64/ns610-gcc32\
> libjavaplugin_oji.so libjavaplugin.so
3-4
Post Installation Configuration
After the first logon, leave the Current password field blank and type the same
information in New password and Confirm password fields. However, you can
change your password at a later time on this screen. See Setting Up an Administrator
Password on page 3-4 for more information.
Note: When you first log on to the ServerProtect Web console after installation, the
password is blank. (There is no default password.)
For information on how to reset the password from the command line, see the
description of the -f option for the splxmain command in the Administrator’s Guide.
3-5
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
Tip: Trend Micro recommends that you update the virus and spyware pattern files and scan
engine immediately after installation. If you use a proxy server to access the Internet,
configure your proxy server settings first, before updating the scan engine and pattern
file.
3-6
Post Installation Configuration
2. Select Same as General to use the same proxy server setting you configure in the
General screen.
• Select Customize to configure the proxy settings.
• Select Use proxy server to access the Internet if you want to use a proxy
server for component update. Then continue to Step i.
Clear the Use proxy server to access the Internet check box if you do not
want to use a proxy server for component updates. For example if the update
server is located within your company network. Then skip to Step 3.
i. Select HTTP, SOCKS4, or SOCKS5 in the Proxy protocol field.
ii. In the Server name or IP address field, type the IP address or host name
of the proxy server.
iii. In the Port field, type the proxy server listening port number.
iv. If you are using an optional proxy authentication user ID and password,
type this information in the User name and Password fields.
3. Click Save.
3-7
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
Registering ServerProtect
Trend Micro provides all registered users with technical support, virus pattern
downloads, and program updates for a specified period (depending on the Activation
Code) after which you must purchase renewal maintenance to continue receiving these
services. Register ServerProtect to ensure that you are eligible to receive the latest
security updates and other product and maintenance services. You can register
ServerProtect during or after installation.
When you purchase ServerProtect, you will receive a Registration Key or serial number
(also referred to as an Activation Code) from Trend Micro or your reseller.
Note: Some resellers may have already registered ServerProtect for you and given you the
product Activation Code directly.
If you already have a ServerProtect Activation Code, follow the instructions in
Activating ServerProtect on page 3-9 to activate ServerProtect.
3-8
Post Installation Configuration
Activating ServerProtect
You can activate ServerProtect in one of the following ways:
• During the installation process
• Using the Product Registration screen in the Web console
• Type the following command in the
/opt/TrendMicro/SProtectLinux/SPLX.vsapiapp folder:
./splxmain -q
3-9
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
Trend Micro recommends that you activate ServerProtect during installation. Refer to
Activating ServerProtect on page 3-9 for more information.
To activate ServerProtect in the Product Registration screen:
1. On the ServerProtect Web console, select Administration > Product
Registration from the left menu.
2. Type the product Activation Code in the Activation Code field.
3. Click Register. ServerProtect activates.
To activate ServerProtect at the command prompt:
1. Navigate to the following directory:
/opt/TrendMicro/SProtectLinux/SPLX.vsapiapp
2. Issue the following command to activate ServerProtect:
./splxmain -q <Activation Code>
3-10
Post Installation Configuration
If you are given an Activation Code that enables all ServerProtect features for a trial
period, the Product Registration screen displays Trial in the Version field. The
following shows an example screen.
3-11
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
To upgrade ServerProtect to the full, licensed version, register and activate the product.
Use the Registration Key included in the ServerProtect package or purchase one from
your Trend Micro reseller to obtain an Activation Code (also known as a serial number)
from Trend Micro Online Registration as described in Registering ServerProtect starting on
page 3-8.
The following screen indicates that your ServerProtect is a full, licensed version.
3-12
Post Installation Configuration
Updating Components
Perform manual or scheduled virus pattern, spyware pattern and scan engine file
updates to ensure up-to-date virus/malware or spyware protection.
To update components:
1. Display the Manual Update (click Update > Manual Update) or Scheduled
Update screen (click Update > Scheduled Update).
2. Select the Component check box.
3. Click Save.
3-13
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
Configuring rsyslog
To allow ServerProtect to store debug log information on Linux server configure rsyslog
as follows:
1. Open /etc/rsyslog.conf and do the following:
a. Add the following lines to the file:
# this is for splx debug log
local3.* /var/log/splx_usr.log
b. For CentOS Linux 7 and Red Hat Enterprise Linux 7, search for #$ModLoad
imklog and delete the character # from the text.
c. Add the following lines to the file:
# this is for KHM debug log
3-14
Post Installation Configuration
3-15
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
3-16
Appendix A
A-1
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
Introduction
Kernel Hook Module (KHM) is a kernel module for ServerProtect and it supports the
real-time scan feature. You can use the same general procedure for building a kernel
module to build the KHM on your Linux system. Command line examples are provided
in this document.
The following is an overview of the process:
Step 1. Determine your Linux kernel version and architecture
Step 2. Prepare the kernel source
Step 3. Configure the kernel source
Step 4. Build the KHM
Step 5. Test the KHM
Step 6. Install the KHM
Step 7. Restart ServerProtect
Requirement
To build the KHM successfully, you need the following:
• root access to the Linux system
• GCC
• GNU Make
• the corresponding kernel source and configuration file for your running kernel
A-2
Building and Installing Kernel Hook Module
Installation
Step 1. Determine your Linux kernel version and architecture
Use the following command to determine the kernel version of your Linux system:
uname -r
This command returns a string (for example, “2.6.9-22.ELsmp”). In this document,
replace “<Kernel Version>” with this string.
Use the following command to determine the kernel architecture of your Linux system:
uname -m
This command returns a string (typically, “i686” or “x86_64”). In this document,
replace “<Arch>” with this string.
Note: You can also obtain the same information on the Summary screen in the
ServerProtect Web console.
A-3
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
Note: To check if you have already installed one of these packages, see #1 in
Troubleshooting for more information.
Type the following command to install the RPM package. The package you choose to
install depends on your running kernel version.
rpm -ivh <rpm package name>
Example:
If your running kernel version is “2.6.32-71.EL” and the kernel architecture is “i686”,
type the following:
rpm -ivh kernel-devel-2.6.32-71.EL.i686.rpm
If your running kernel version is “2.6.32-71.18.2.EL” and the kernel architecture is
“x86_64”, type the following:
rpm -ivh kernel-devel-2.6.32-71.18.2.EL.x86_64.rpm
In addition to using the command line, you can use one of the following methods to
install the packages:
• Linux desktop environment (for example in GNOME, click Application > System
Settings > Add/Remove Program).
• the up2date program
For SUSE Linux Enterprise Server 12:
Make sure you have installed the following RPM packages on your Linux system:
• kernel-source
• kernel-syms
Note: To check if you have already installed one of these packages, see troubleshooting
solution 1 in Building and Installing KHM on page B-2 for more information.
A-4
Building and Installing Kernel Hook Module
A-5
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
WARNING! Clear only the Compile the kernel with debug info option in the config-
uration UI. Do NOT change other options; otherwise you may encounter
kernel panic while using the KHM.
Note: If you experience problems using the “make menuconfig” command, the “ncurses”
package may not be installed in your Linux system. Do one of the following:
- Install the package: you can obtain the package from the Linux installation CD or
download it from your Linux vendor’s web site.
- Modify the .config file in the kernel source directory: change
CONFIG_DEBUG_INFO=y to CONFIG_DEBUG_INFO=n in the file.
After the configuration, type the following command to prepare the source for kernel
module compilation:
make modules_prepare
Note: For x86_64 architecture, if the build process is not successful, see #6 and #7 in
Troubleshooting for more information.
Go to the directory where the KHM source is located (the default location is
/opt/TrendMicro/SProtectLinux/SPLX.module/src/module).
Use the make command to generate a new KHM.
cd /opt/TrendMicro/SProtectLinux/SPLX.module/src/module
make
You can ignore the warning messages during the build process. If the build process is
successful, a KHM with the file name splxmod-<Kernel Version>.<Arch>.o will
be generated in the bin directory.
A-6
Building and Installing Kernel Hook Module
Note: Trend Micro recommends performing this KHM test before installing it to your
computer. This prevents you from installing a non-working KHM in your Linux
computer, causing the computer to hang after every system reboot.
Before you perform the KHM test, stop the ServerProtect services.
/etc/init.d/splx stop
Type the following command to perform a basic functional test for the KHM you have
just built. This test should take less than 5 seconds. If the test takes longer than 5
seconds, this indicates that your system has stopped responding.
make test
WARNING! This test script will only perform basic tests to ensure that the KHM MAY
work. A successful test result does NOT guarantee that the KHM can
work properly under all circumstances. During the KHM test, your sys-
tem may hang or you may experience a kernel panic. Trend Micro recom-
mends performing this operation on a test computer.
A-7
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
A-8
Appendix B
B-1
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
Troubleshooting
The following section provides tips for dealing with issues you may encounter when
using ServerProtect for Linux.
B-2
Troubleshooting and Contacting Technical Support
B-3
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
B-4
Troubleshooting and Contacting Technical Support
Default Password
ServerProtect does not have a default password. Trend Micro strongly advises you to set
one immediately after installation.
Debug Logs
Refer to the Administrator’s Guide for more information on debug logging.
ServerProtect provides the following debug options:
• Kernel debugging: debugs kernel-related actions
• User debugging: debugs user-related actions
• ControlManager debugging: debugs Trend Micro Control Manager-related
actions
B-5
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
B-6
Troubleshooting and Contacting Technical Support
About TrendLabs
TrendLabs is Trend Micro’s global infrastructure of antivirus research and product
support centers that provide up-to-the minute security information to Trend Micro
customers.
The “virus doctors” at TrendLabs monitor potential security risks around the world, to
ensure that Trend Micro products remain secure against emerging threats. The daily
culmination of these efforts are shared with customers through frequent virus pattern
file updates and scan engine refinements.
TrendLabs is staffed by a team of several hundred engineers and certified support
personnel that provide a wide range of product and technical support services.
Dedicated service centers and rapid-response teams are located in Tokyo, Manila, Taipei,
Munich, Paris, and Lake Forest, CA, to mitigate virus/malware outbreaks and provide
urgent support.
TrendLabs’ modern headquarters, in a major Metro Manila IT park, has earned ISO
9002 certification for its quality management procedures in 2000—one of the first
antivirus research and support facilities to be so accredited. Trend Micro believes
TrendLabs is the leading service and support team in the antivirus industry.
B-7
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
• Critical Patch—A critical patch is a hot fix focusing on critical issues that is
suitable for deployment to all customers. Windows critical patches include a Setup
program, while non-Windows patches commonly have a setup script.
• Patch—A patch is a group of hot fixes and security patches that solve multiple
program issues. Trend Micro makes patches available on a regular basis. Windows
patches include a Setup program, while non-Windows patches commonly have a
setup script.
• Service Pack—A service pack is a consolidation of hot fixes, patches, and feature
enhancements significant enough to be considered a product upgrade. Both
Windows and non-Windows service packs include a Setup program and setup
script.
Check the Trend Micro Knowledge Base to search for released hot fixes:
http://esupport.trendmicro.com
Consult the Trend Micro Web site regularly to download patches and service packs:
http://www.trendmicro.com/download
All releases include a readme file with the information needed to install, deploy, and
configure your product. Read the readme file carefully before installing the hot fix,
patch, or service pack file(s).
Known Issues
Known issues are features in your ServerProtect software that may temporarily require a
workaround. Known issues are typically documented in section 9 of the Readme
document you received with your product. Readme’s for Trend Micro products can also
be found in the Trend Micro Update Center:
http://www.trendmicro.com/download/
Known issues can be found in the technical support Knowledge Base:
http://esupport.trendmicro.com
Note: Trend Micro recommends that you always check the Readme text for information on
known issues that could affect installation or performance, as well as a description of
what’s new in a particular release, system requirements, and other tips.
B-8
Troubleshooting and Contacting Technical Support
B-9
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
B-10
Index
Index H
(EICAR) 3-13
A I
Accessing the Web console 2-17, 3-2 Installation 2-1
Activate the product 2-7 Verifying 2-19
Activating the product 3-10 Installation method 1-4
Activation Code 1-4, 3-8
Administrator password Local installation 2-3
Resetting 3-5 Remote 2-8
Setting 3-4 J
Audience P-2 Java plug-in warning 3-4
C Java plug-in, enable 3-4
Component update 3-13 Java Runtime Environment (JRE) 1-3
Configuration file 2-8 K
ConfigFilePath 2-10 Kernel Hook Module 2-16
group deploy 2-13 Extracting package 2-17
RemoteInstall tool directories and files 2-9 Installation 2-17
Control Manager
Kernel Hook Module (KHM) 2-16
Folder name 2-6
Knowledge Base P-2, B-6, B-8
Product display name 2-6
Known issues B-8
Proxy setting 2-6
URL for Knowledge Base describing B-8
Server IP address 2-6
URL for readme documents describing B-8
Server port 2-6
Konqueror Desktop Environment 1-3
D
L
Default password B-5 Logon
Document conventions P-3 screen 3-4
Documentation set P-2 Logon session control 3-2
E M
End user license agreement 2-4 Man pages P-2
European Institute of Computer Antivirus Research
IX-1
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
IX-2
Index
TrendLabs B-7
Troubleshooting B-2
U
Uninstallation 2-19
Update Center P-2
Upgrading to the full version 3-10
URLs
Knowledge Base containing known issues B-8
readme documents containing known issues
B-8
V
virus doctors B-7
W
Web console
password rejected B-5
X
xmldeployer 2-9
xmlvalidator 2-9
IX-3
Trend Micro™ ServerProtect™ for Linux 3.0 Getting Started Guide
IX-4