Incident statistics ...................................................... 37
Functions .............................................................. 37
Congure .................................................................. 38
Scanner settings .................................................... 38
Network conguration ............................................. 42
Join Endpoint Manager Realm ................................. 45
Block and Exclude settings ..................................... 46
Message handling .................................................. 48
Logging options ..................................................... 52
Blocking ................................................................ 52
Remote access ...................................................... 53
System time........................................................... 53
Change administrator password ............................... 54
Change license key ................................................ 54
Setup Wizard ......................................................... 54
Install and Update .................................................... 55
Settings ................................................................. 55
Critical updates ...................................................... 56
Support Center ......................................................... 58
Starting and stopping .............................................. 59
Troubleshooting .................................................. 60
Appendix A:
Accessing the Command Line Interface
console ................................................................. 63
Appendix B:
Using the Network Protection console .............. 64
Understanding the screen output ............................. 64
Console commands .................................................. 66
Command line conguration ..................................... 69
Conguration commands ........................................ 69
Cluster commands and parameters .......................... 71
Using port mirror mode ........................................... 73
URL blocking ......................................................... 74
Protocol/scan-related commands ............................. 74
Appendix C:
Using Network Protection in port mirror mode 77
Conguring ............................................................... 77
Nonoperative functions ............................................. 78
System requirements ................................................. 4
Obtaining Norman Network Protection ....................... 4
About this guide .......................................................... 4
Help and support ........................................................ 4
Introduction ............................................................ 5
Network virus protection ............................................. 5
The Norman approach .............................................. 5
Norman Network Protection versus proxy ................... 6
What is Norman Network Protection? ......................... 6
Implementation .......................................................... 7
Home or small ofce network ..................................... 7
Business network ..................................................... 7
Functionality ............................................................... 8
Installation ............................................................ 10
Prerequisites ............................................................ 10
Conguration ............................................................ 10
Completing the web-based Setup Wizard ................. 15
Setup wizard ............................................................. 17
Administration and conguration ...................... 25
Log in ........................................................................ 25
Home ........................................................................ 25
Navigating the user interface ................................... 26
Status ....................................................................... 26
Version and uptime ................................................. 27
Malware scans ....................................................... 27
Network Interface Cards ......................................... 27
Protocol ................................................................ 27
Restart Network Protection ...................................... 28
System monitor ........................................................ 28
System information ................................................. 28
Network information................................................ 29
Incident logs ............................................................. 29
Detailed view ......................................................... 30
Download log le .................................................... 31
Show Sandbox log ................................................. 32
Blocked URLs ........................................................... 33
Blocked URLs default expiration time ....................... 33
Detailed view ......................................................... 33
Custom URL block .................................................... 34
Trafc Statistics ........................................................ 35
Functions .............................................................. 35
Table of Contents
Copyright © 1990-2011 Norman ASA iii
Norman Network Protection
Administrator Guide