Beruflich Dokumente
Kultur Dokumente
Administrator Guide
r8.1
This documentation and any related computer software help programs (hereinafter referred to as the
“Documentation”) is for the end user’s informational purposes only and is subject to change or withdrawal by CA at
any time.
This Documentation may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in
part, without the prior written consent of CA. This Documentation is confidential and proprietary information of CA
and protected by the copyright laws of the United States and international treaties.
Notwithstanding the foregoing, licensed users may print a reasonable number of copies of the Documentation for
their own internal use, and may make one copy of the related software as reasonably required for back-up and
disaster recovery purposes, provided that all CA copyright notices and legends are affixed to each reproduced copy.
Only authorized employees, consultants, or agents of the user who are bound by the provisions of the license for
the product are permitted to have access to such copies.
The right to print copies of the Documentation and to make a copy of the related software is limited to the period
during which the applicable license for the product remains in full force and effect. Should the license terminate for
any reason, it shall be the user’s responsibility to certify in writing to CA that all copies and partial copies of the
Documentation have been returned to CA or destroyed.
EXCEPT AS OTHERWISE STATED IN THE APPLICABLE LICENSE AGREEMENT, TO THE EXTENT PERMITTED BY
APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING
WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE
OR NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO THE END USER OR ANY THIRD PARTY FOR ANY
LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THIS DOCUMENTATION, INCLUDING WITHOUT
LIMITATION, LOST PROFITS, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY
ADVISED OF SUCH LOSS OR DAMAGE.
The use of any product referenced in the Documentation is governed by the end user’s applicable license
agreement.
Provided with “Restricted Rights.” Use, duplication or disclosure by the United States Government is subject to the
restrictions set forth in FAR Sections 12.212, 52.227-14, and 52.227-19(c)(1) - (2) and DFARS Section 252.227-
7014(b)(3), as applicable, or their successors.
All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.
Contents v
Chapter 5: Managing Policies 29
Policy Enforcement ........................................................................... 29
Policy Locking ................................................................................ 30
Policy Precedence............................................................................. 30
eTrust Antivirus Policy Types .................................................................. 31
Realtime Policy ........................................................................... 32
Scheduled Jobs Policy ..................................................................... 34
Legacy Signature Distribution Policy........................................................ 36
Send for Analysis Policy ................................................................... 37
Email Policies ............................................................................. 38
Common Policy Types ......................................................................... 41
Alert Subtabs ............................................................................. 42
Phone Home Policy........................................................................ 43
Content Update Policy ..................................................................... 44
Using the Policy Management Tab ............................................................. 45
Creating Policies .......................................................................... 46
Assigning Policies ......................................................................... 46
Viewing Assigned Policies .................................................................. 46
Viewing Scheduled Job Policy Logs ......................................................... 47
vi Administrator Guide
Chapter 8: Generating and Viewing Reports 61
Reports ...................................................................................... 61
Discovery Statistics Reports ............................................................... 62
Managed Machine Reports ................................................................. 63
Scheduled Job Reports .................................................................... 64
Top 10 Reports ........................................................................... 64
Mail Option Reports ....................................................................... 65
Categorized Reports .......................................................................... 66
Generate Reports ............................................................................. 67
Using the Reports Tab ........................................................................ 68
Contents vii
Manage the Scanner Remotely ............................................................. 94
Managing the Filer ............................................................................ 94
Enable and Disable Virus Scanning ......................................................... 94
Specify File Extensions to Scan Using vscan ................................................ 95
Specifying Shares to Scan Using CIFS ...................................................... 96
Index 193
2. Enter the following URL in the address bar, and click Go:
https://[servername]:6688/AdminGUI/
The server name is the name or the IP address of the computer hosting
the ITM Server. To use an unencrypted HTTP connection, use port 6689
instead. We do not recommend this method.
Note: The first time you open the Threat Management Console, you may
see a Security Alert Dialog. Click View Certificate, then click Install
Certificate and follow the wizard to avoid seeing this dialog in the future.
3. Enter your user name and password. If a domain is required to log in,
enter the domain name, a back-slash (\), and then the user name.
Note: If the login attempt fails and returns a Windows error code, use the
net helpmsg error_code command to display information about the login
failure.
The Threat Management Console appears and displays the Dashboard tab.
10 Administrator Guide
Open the Console from the ITM Server Machine
(Linux, Solaris) Follow the procedure for opening the console using a web
browser.
Note: The first time you open the Threat Management Console, you may
see a Security Alert Dialog. Click View Certificate, then click Install
Certificate and follow the wizard to avoid seeing this dialog in the future.
2. Enter your user name and password. If a domain is required to log in,
enter the domain name, a back-slash (\), and then the user name.
Note: If the login attempt fails and returns a Windows error code, use the
net helpmsg error_code command to display information about the login
failure.
The Threat Management Console appears and displays the Dashboard tab.
Policy Management Provides access to all options and settings for creating,
managing, and assigning threat management policies.
User Management Lets you grant users access to the Threat Management
Console and assign the permissions.
Check this website frequently to find out about new and emerging threats.
12 Administrator Guide
Getting Help
Getting Help
Click the help button at any time to get complete descriptions of the options
for the currently active tab or subtab. All help topics contain links to related
information that will assist you in performing tasks on a tab or subtab.
The help button, displayed below, is located in the upper right corner of the
console:
Note: You can view detailed license information on the Licensing tab.
Product and ITM Server information
View eTrust Threat Management products administrator contact
information
In addition you can use the dashboard to perform the following tasks:
Restart the ITM Server
Edit eTrust Threat Management products administrator contact information
Top 10 Detections
The ITM Server collects and collates the logs of computers that are running the
eTrust ITM Agent and displays the Top 10 detection information on the
Dashboard tab. This provides a quick review of the most common detections
on your network. For detailed information on these detections, and other
detailed reports, use the Reports tab.
You must configure Alert Forwarding from the client machines to the ITM
Server to populate the Top 10 lists. For step-by-step instructions, see
"Populate the Top 10 Lists" in the Threat Management Console online help.
Product Information
The Product Information area displays the operating system version of the
system hosting the ITM Server, the eTrust Threat Management products
version information, the date and time of the last discovery, and the date and
time the ITM Server started running.
You can restart the ITM Server at any time by clicking the Restart button.
License Information
The License Information area shows the current state of licensing. Click the
Licensing tab for more information.
To restart the ITM Server, click the Dashboard tab, then click the Restart
button located in the Product Information area.
16 Administrator Guide
Chapter 3: Working With the
Organization Tree
This section contains the following topics:
Organization Tree
The Organization tree is a hierarchical representation of your network. You use
the tree to apply policies to groups of computers that require the same
protection settings.
Using the Organization tab, you create an Organization tree with containers,
called branches. These branches are typically organized to mirror the physical
locations of computers on your network. The organization of the tree is
completely flexible and is often organized to segment computers into
categories by department, function, type of user, or any other arrangement
that suits your business needs.
After creating your Organization tree, you then create and assign policies to
the tree and its branches. If a policy is placed at the top of the tree, then all of
the computers inherit the policy. As policies are placed on various branches of
the tree, only the machines within that branch inherit those policies.
Managing Branches
The features of the Organization tab provide you with complete flexibility in
managing the branches and sub-branches of your Organization tree. From this
tab you can view a list of computers in each branch, create new branches,
rename branches, and delete branches. In addition, you can assign and
remove policies from specific branches, view a list of users that have
permissions to manage a branch, and assign policy proxy computers to a
branch. A policy proxy computer shares the load of distributing policies to the
computers in a branch or sub-branch, so that policy can be rapidly distributed
throughout the network, and the ITM Server is not responsible for the delivery
of policy to each individual computer.
Use the Organization Details subtab, located at the bottom of the Discovery
tab, to add a computer to a branch in your Organization tree. Once you click
the Assign button you will be prompted to enter a username and password.
The username and password you enter must have operating system
administrative privileges on the client computer that you want to add to the
branch.
Note: You can also use the Client tab to add a computer to a branch. For more
information, see Working with Clients (see page 49).
The Organization tab provides the Clients and Properties subtabs, which you
use to perform these tasks.
18 Administrator Guide
Using the Organization Tab
Creating Branches
Use the Add button on the Organization tab to create the branches and sub-
branches you will use to organize the computers on your network into logical
groupings for policy management purposes. Your organization tree can contain
as many branches and sub-branches as necessary. Once defined, you can
easily add computers to each branch and sub-branch.
You can also use this tab to rename a branch by clicking Edit, refresh the
Organization tree by clicking Refresh, and delete branches or sub-branches by
clicking Delete.
Using the Client subtab you can view a list of computers that reside in the
selected branch. The subtab displays the following information for each
computer:
Name of client computer
Version of the eTrust Antivirus application and engine
Version of signature files
The subtab provides at-a-glance information for each computer. However, for
detailed information you can click the computer name and view the detailed
information that appears in the pop-up dialog for that computer.
The Properties tab lets you assign or remove policies and schedule scan jobs,
view the Threat Management Console users that are permitted to manage the
branch, and add or remove policy proxy servers. With a branch of the
Organization tree selected, you can perform any of these tasks by selecting
the appropriate item from the drop-down list. Detailed procedures for
performing these tasks are provided in the Threat Management Console online
help.
Note: If you have multiple ITM Servers on your network, the Organization tree
under each ITM Server must be managed separately. To preserve policy
management integrity, you cannot apply a policy from one ITM Server to a
computer that is managed by another ITM Server.
20 Administrator Guide
Using the Organization Tab
From the Properties subtab you can designate one or more policy proxy
servers. The policy proxy server improves network efficiency by sharing the
workload of policy distribution with the ITM Server.
When the ITM Server distributes policies, it goes down the list of computers in
the Organization tree. When it finds a policy proxy server it enlists the help of
that computer to distribute policies. Since the proxy distributes the policies to
the other computers in its branch, the ITM Server can skip the rest of the
computers in that branch and find the next proxy server. It then passes the
policies to that proxy, and so on through the network.
For example, if a branch has ten computers, and one computer is designated
as the proxy server, the ITM Server sends the information once—to that one
proxy server. The proxy then passes the information to the nine remaining
computers in its branch. This minimizes the number of times that the ITM
Server has to send the commands, thereby improving the performance of the
ITM Server and the network in general, and reducing the amount of time
necessary to distribute policies throughout the network.
Note: The role of the policy proxy server is distinct from the role of the
signature redistribution server. The policy proxy server is used to distribute
policy settings throughout the network. The signature redistribution server
makes the signature update files available to other computers. Further, the
policy proxy server should not be confused with an Internet proxy server.
To assign a proxy server from the Properties subtab, select Proxy from the
drop-down list and complete the Please Select Proxy dialog.
The policy proxy server distributes updates on behalf of the ITM Server to the
computers in its branch and any subordinate sub-branches. However, if the
sub-branch contains its own policy proxy server, the first proxy server detects
this and enlists the help of the subordinate proxy server to distribute updates
to computers in its sub-branch and any other subordinate sub-branches.
The override option specifies what should happen if a policy proxy server for a
given branch is currently unavailable and there are policies that must be
distributed. By setting the override option, the proxy server located above the
disabled proxy in the Organization tree assumes the responsibility of
distributing the updates to the computers ordinarily served by the proxy that
is unavailable. If you do not specify this option and the policy proxy server is
unavailable, the policy updates are not distributed to the computers normally
served by that proxy server, until it becomes available again.
22 Administrator Guide
Chapter 4: Discovering Subnets
This section contains the following topics:
Discovering Subnets 23
Using the Discovery Tab
When you first click the Discovery tab, no subnets are listed in the Networks
area, unless you are using the Threat Management Console on the computer
that hosts the ITM Server. If so, the subnet of the ITM Server is automatically
displayed.
The Discovery tab provides several subtabs and buttons for performing subnet
management tasks. For example, the Subnet Information and Discovery
Configuration subtabs let you specify new subnets and modify the options of
previously discovered subnets.
24 Administrator Guide
Specifying Subnet Information
The IP address that you specify depends on the type of discovery, or polling
method you specify on the Discovery Configuration subtab. If you choose the
Free Election or Sweep Poll method, you can enter the IP address of any
computer on the subnet. If you choose the Biased Election or Specified
Election method, you must specify the IP address of the computer that you
want to respond to the ITM Server. The computer must be running an eTrust
Threat Management product.
You may choose to verify the IP address using the Test button. You may also
choose to change the default Organization for the discovered computers, by
specifying a new organization in the Organization area of the subtab.
Note: If another ITM Server has already discovered the specified subnet, the
IP Address of the conflicting ITM Server is displayed. You should contact the
administrator of this ITM Server to avoid the possibility of conflicting policies
for this subnet.
Once you have discovered a subnet, you do not need to specify these options
again. The Repeat Every option automatically retrieves your subnet definition
information and uses it to re-discover the subnet and refresh client
information.
Discovering Subnets 25
Viewing Discovered Computers
Note: You can also use the Client tab to add a computer to a branch. For more
information, see Working with Clients (see page 49).
Modifying Subnets
The Discovery tab allows you modify a single subnet, or a modify all
discovered subnets. To modify a single subnet, you select the subnet in the
Networks area. When you select the subnet, the specified options for that
subnet appear in the subtabs to the right. Edit the options as needed, and click
the Apply button to save the modifications. To modify all previously discovered
subnets, click Edit All, modify the options as needed, and click the Apply
button to save the modifications.
26 Administrator Guide
Deleting Subnets
Deleting Subnets
You can also use the Delete and Delete All buttons on the Discovery tab to
delete a single subnet or to delete all subnets. The Threat Management
Console prompts you to verify the deletion. Use these buttons carefully, as you
cannot undo the deletion of a subnet. If you accidentally delete a subnet, you
must re-enter the subnet definition and configuration information to discover
the subnet again.
Discovering Subnets 27
Chapter 5: Managing Policies
This section contains the following topics:
Policy Enforcement
A policy contains the settings that you want to apply to multiple computers to
safeguard them against malicious programs or code. As an authorized
administrator, you can create and enforce policy settings and assign them to
branches in your Organization tree to ensure that all computers are equally
protected.
Policies that you apply to a branch always take precedence over settings that
an end user may have applied to his or her computer locally. If a user changes
an assigned policy setting, the ITM Server detects the change and
automatically returns the settings to those defined by the administrator,
thereby enforcing the policy.
When the ITM Server discovers a new subnet, or refreshes its database of
existing subnets, it receives information on all policies for each client, along
with the product version, signature information, and operating system
information, such as the computer name, IP address, OS version and MAC
address. The ITM Server updates its database and examines the information.
If it finds that a policy setting on the client computer does not match the
policy setting assigned to the branch the computer resides in, it flags the
discrepancy and resets the policy.
Note: You can prevent end-users from changing policy settings on their local
computers by locking the policy. The following section describes policy locking.
Managing Policies 29
Policy Locking
Policy Locking
When you create or modify a policy, you can choose the Lock Settings option
on the Policy subtab. This setting prevents end users from changing policy
settings on their local computers. During the discovery process, the ITM
Server pushes the locked policy to the computers that reside in within the
branch.
If you do not use the Lock Settings option, the ITM Server will continue to
distribute policies to the computers in the branch where the policy is assigned;
however, the end user can change those policy settings on their local
computer. Should the end user changes the settings, the ITM Server will
automatically reset the policy settings during the next subnet discovery or
refresh; however, there will be period of time when the client computer's
policies are not the same as those defined for it in the Threat Management
database.
Note: The ITM Server refreshes its database based on the interval that you
specify in the Repeat Every option on the Discovery Configuration subtab.
Policy Precedence
A policy's precedence can be either inherited or specified.
Inherited
Specified
When the ITM Server performs a discovery, it looks at the lowest level branch
in your Organization tree (a branch that does not have another branch
beneath it). It then checks the policies that are applied to that branch. If a
policy is applied to the branch, it is kept, and not changed by a policy that
would otherwise be inherited from the branch above it. The discovery process
then continues up the Organization tree to the next branch level. If no policy is
applied at the next branch level, the ITM Server uses the policy applied at the
branch level above, and so on.
30 Administrator Guide
eTrust Antivirus Policy Types
Realtime
Scans a file before they it is accessed to ensure the file is not infected.
Scheduled Jobs
The following sections contain additional information for each policy type. For
policy procedures, see the Threat Management Console online help.
Managing Policies 31
eTrust Antivirus Policy Types
Realtime Policy
Realtime Protection automatically scans a file each time you access, execute,
or modify it. You can specify when the scan occurs on the file as follows.
Scans outgoing files and files that you close and store on your computer.
For example, an incoming file might be one that you copy from another
computer or save from an e-mail attachment. Since the scan is performed
after the file is written to disk, the incoming scan is a queued process and
will not prevent a malicious file from being saved to disk, but will
report/cure the infection after the fact.
Note: Archived files are only scanned as incoming files. For example, if
you use Winzip to open an archived file, the contents of the zip file will not
be scanned. However, if you create a new archive file or save an archive
file on your computer, Realtime Protection scans the contents of the
archive.
32 Administrator Guide
eTrust Antivirus Policy Types
Note: Remember, the settings you choose for the Realtime Monitor settings
apply only to the realtime scan.
You create Realtime policies by selecting Realtime from the Type drop-down
list on the Policy Management tab. When you select this option, several
subtabs appear on the right side of the Policy Management page. The following
subtabs allow you to specify the scan options for this policy:
Policy
Specifies a descriptive name for the policy and lets you lock the policy.
Scan
Lets you specify the scanning options for Realtime Protection, such as the
scanning direction, the thoroughness of the scan, and the action to
perform if an infection is detected.
Selection
Lets you specify the scanning engine to use during the scan, the file
extensions to scan, and whether to scan compressed files.
Filters
Lets you specify the processes and directories to exclude from scanning
and block all access to specified files.
Advanced
Manages settings for protected areas and advanced protection options for
different types of drive devices. For example, on Windows systems, you
can specify protected drive types for monitoring, while on Linux and
Solaris, these options would not be applicable, as all drive types are
always protected.
Quarantine
For complete option descriptions for each of these tabs, see the Threat
Management Console online help.
Managing Policies 33
eTrust Antivirus Policy Types
When setting schedule scan options, the CPU utilization correlates to CPU
resource availability. For example, you might select Low for scans scheduled to
take place during normal work hours when CPU resources are likely required
for other work related tasks and should not be consumed by scanning
activities. For scans scheduled during evenings and weekends, when resource
requirements are normally lower, the Normal or High CPU setting would be
more appropriate. This option applies to Windows only.
Note: The same options are available in the eTrust Threat Management Agent
interface.
34 Administrator Guide
eTrust Antivirus Policy Types
You create Scheduled Job policies by selecting Scheduled Jobs from the Type
drop-down list on the Policy Management tab. When you select this option,
several subtabs appear on the right side of the Policy Management page. The
following subtabs allow you to specify the scan options for this policy:
Policy
Scan
Lets you specify the scanning options for the scheduled scan, such as the
scanning direction, the thoroughness of the scan, and the action to
perform on detected infections.
Selection
Lets you specify the file extensions to scan, and whether to scan
compressed files or files migrated to external storage.
Schedule
Specify the time, date, and interval for the scan. On Windows systems,
lets you specify the CPU usage level.
Directories
Exclude Directories
Logs
Lets you view the summary information and detailed logs for scheduled
scans.
For complete option descriptions for each of these tabs, see the Threat
Management Console online help.
Managing Policies 35
eTrust Antivirus Policy Types
Policy
Specifies a descriptive name for the policy and lets you lock the policy.
Schedule
Enable scheduled updates and specifies the date, time, and frequency of
the updates. Also lets you start an immediate download of updates.
Incoming
Outgoing
For complete option descriptions for each of these tabs, see the Threat
Management Console online help.
36 Administrator Guide
eTrust Antivirus Policy Types
The Send for Analysis policy enables you to specify detailed contact
information to be included with the information sent from your company
whenever a virus is submitted to CA for further analysis. After you create a
Send for Analysis policy, you may want to place it on the Organization tree
root folder, as it is typically the same for all computers.
You may also choose to change the default location for submitting an infected
file to specify an internal address in your organization. For example, multiple
infections of the same type can strike a large organization. By sending every
problem file to an internal administrator, you can monitor the occurrence of
infections and if you have already received a solution from CA, there may be
no need to pass the infected file any further.
Policy
Specifies a descriptive name for the policy and lets you lock the policy.
For complete option descriptions for each of these tabs, see the Threat
Management Console online help.
Managing Policies 37
eTrust Antivirus Policy Types
Email Policies
Email policies specify how eTrust Antivirus protects your Lotus Notes or
Microsoft Exchange email server. These policies apply to Windows only.
The Notes Option integrates with eTrust Antivirus to scan for infections in
documents and email file attachments. Infected Lotus Notes attachments can
be automatically detected. This option also notifies the users through the host
messaging system whenever an infection is found.
Before you install the Notes Option, review the Readme file to verify that you
have the required software and hardware. You must also ensure that your
Lotus Notes Domino account has its user rights configured properly.
The Exchange Option integrates with eTrust Antivirus to scan for infections in
documents attached to email messages and folders. Use this option, to
automatically cure infected Microsoft Exchange attachments. The Exchange
Option scans all mail passing through the server.
The Exchange Option runs on the server where the Microsoft Exchange Server
resides. It can detect, cure, or block infected email attachments and prevent
them from spreading throughout your enterprise.
Before you install the Exchange Option, review the Readme file to verify that
you have the required software and hardware. You must also ensure that your
Microsoft Exchange account has its user rights configured properly and meet
the Exchange Full Administrator requirement.
38 Administrator Guide
eTrust Antivirus Policy Types
You create Lotus Notes email policies by selecting Lotus Notes Email Policies
from the Type drop-down list on the Policy Management tab. When you select
this option, several subtabs appear on the right side of the Policy Management
page. The following subtabs allow you to specify the scan options for this
policy:
Policy
Specifies a descriptive name for the policy and lets you lock the policy.
Scan
Lets you specify the scan engine, scanning direction, the thoroughness of
the scan, and the action to perform on detected infections.
Selection
Notification
For complete option descriptions for each of these tabs, see the Threat
Management Console online help.
Managing Policies 39
eTrust Antivirus Policy Types
Policy
Specifies a descriptive name for the policy and lets you lock the policy.
Scan
Lets you specify the scan engine, scanning direction, the thoroughness of
the scan, and the action to perform on detected infections.
Selection
Notification
Options
Specifies special scanning options and a timeout value for scanning your
Microsoft Exchange server.
Misc
For complete option descriptions for each of these tabs, see the Threat
Management Console online help.
40 Administrator Guide
Common Policy Types
Alert Forwarding
Content Update
Specifies how and when you want to download program updates and
signature files.
Phone Home
The following sections contain additional information for each policy. For policy
procedures, see the Threat Management Console online help.
Managing Policies 41
Common Policy Types
Alert Subtabs
The Alert Forwarding policy allows you to create customized Alerts for multiple
computers. Alert policies can help cut down on message traffic and minimize
the dissemination of notifications that are not critical. Alert policies may differ
for client computers and servers, depending on your organization's needs.
Policy
Specifies a descriptive name for the policy and lets you lock the policy.
Alert
Alert Filter
For complete option descriptions for each of these tabs, see the Threat
Management Console online help.
42 Administrator Guide
Common Policy Types
You can configure a Phone Home policy from the Threat Management Console
or specify the settings in the installation control file, inoc6.icf. The Phone
Home settings tell the client which ITM Server to report into, as well as the
reporting frequency.
Each time the client phones home, the ITM Server identifies the client and
updates its database with the client information, such as the host name and
the polling and broadcasting port numbers. It also checks the client's policies
and licensing. If any policy settings have been changed on the client computer
so that they conflict with the policies defined on the ITM Server, the values are
automatically reset on the client computer.
To use this feature, you do not need to know in which subnet a client resides.
If the subnet for a client does not already exist on the server, upon phoning
home, it is automatically added.
Policy
Specifies a descriptive name for the policy and lets you lock the policy.
Schedule
Specifies when and how often a computer will phone home to a specified
ITM Server. You can set up the client computer to report to the server on a
regular basis.
Additional
For complete option descriptions for each of these tabs, see the Threat
Management Console online help.
Managing Policies 43
Common Policy Types
The Threat Management Console lets you create a content update policy that
automatically downloads both product updates and signature files. The
download method for gathering the updates is HTTP.
Note: If your license expires you will be unable to download updated signature
files.
Policy
Specifies a descriptive name for the policy and lets you lock the policy.
Update Scheduler
Schedules the date, time, interval, and frequency updates occur.
Components
Lets you choose the product components and signatures you want to
update.
Download Settings
Redistribution Components
Note: Before a computer can act as a redistribution server, you must first
install the Redistribution Server option from the product media onto that
computer.
Legacy Components
Redistribution Server
Specifies the port and delay time to use when making the components
available to other computers.
For complete option descriptions for each of these tabs, see the Threat
Management Console online help.
44 Administrator Guide
Using the Policy Management Tab
When you invoke Download Now, each redistribution server must already have
the latest updates. In addition, the holding time must be set to a value that
makes the updates available in a timely manner.
You can organize machines that act as redistribution servers into a single
branch, which allows you to apply policies and settings to the redistribution
servers as a group. Using this approach, you can ensure that all redistribution
servers have the latest updates before client machines contact them for the
updates.
Policy
Specifies a descriptive name for the policy and lets you lock the policy.
Specifies the policy settings for each type of policy. The subtabs displayed
change based on the type of policy you want to create.
Managing Policies 45
Using the Policy Management Tab
Creating Policies
The policy options you specify from the Threat Management Console can be
applied to any computers in the branches of your Organization tree. In
addition, you can control whether the end user can change the options.
To access these policy options, select eTrust Antivirus from as the Application
drop-down list, and then the option you want from the Type drop-down list.
Subtabs appear on the right side of the tab for each policy type.
After you specify policy settings, the policy instance appears in the Policies list
area. When you select the policy instance, the settings for that policy appear
in the subtab on the right side of the tab. With the settings displayed, you
have the option to edit the settings.
Assigning Policies
After you create a policy instance, you can apply the policy to a branch in the
Organization tree. To assign policy, select it from the Policies list area and click
Assign in the Assigned To area. In the Assign Branch dialog, select a branch
and click the right arrow. Repeat this process to assign the policy to more than
one branch. When all the branches appear in the right column of the Assign
branch dialog, click Assign Branches.
When you apply a policy to a branch, the policy applies to all the sub-branches
in that branch, and to all the computers in the branch.
Note: You can also assign policies using the Organization tab.
To see where a policy instance is applied, highlight the policy name in the
Policies list area. The branches to which this policy is applied will appear in the
Assign To area. You can remove a policy from a branch by selecting the branch
name in the Assigned To list, and clicking Remove.
If the policy is applied at the branch level, the branch name is listed. If the
policy is applied to a sub-branch, but not to the parent branch, the path of the
sub-branch is listed, in the form of branch/sub-branch.
46 Administrator Guide
Using the Policy Management Tab
When you select Scheduled Jobs from the policy type drop-down list, the Log
subtab appears in the lower portion of the Policy Management tab. Using this
subtab, you can view log result statistics for scheduled jobs.
For each scheduled job dispatch time, a log entry will be created for every
time the job ran. The log entry shows summary statistics on the number of
computers on which the job was run, along with success and error count
statistics. To get more detailed information for what transpired on a given
computer, click the log for each computer on which the job was run. Statistics
for scans on each computer include the total number of files scanned, the total
number of infections found, and the number of files cured.
Managing Policies 47
Chapter 6: Working with Clients
This section contains the following topics:
If you have the need to define a permanent, special policy for a given
computer (one that the ITM Server will not reset), you can use the following
process to maintain policy control over that computer:
Create a special branch or sub-branch in the Organization
Place the computer(s) into the branch or sub-branch
Create the special policy
Assign the policy to the branch or sub-branch
The Client tab also lets you view the properties and logs for a specific
computer, and allows you to start, restart, or stop services.
Properties
Lets you view information about a specific computer, assign policies to the
computer, and start, stop, or restart services.
Logs
For complete option descriptions for each of these tabs, see the Threat
Management Console online help.
You can use the Client tab to assign a computer to a branch by clicking Assign,
which is located on the Properties subtab. When you click Assign, the
Organization dialog appears and allows you to drill down to the branch or sub-
branch of the tree where you want to add the computer.
Use the Properties subtab to apply policies to a specific computer. With the
computer displayed on the Properties subtab, click the Assign button for the
policy type you want to assign. A dialog appears listing all of the current
policies for that type. You can select a policy from the list and click OK. For
more information, see Managing Individual Computers (see page 49).
50 Administrator Guide
Using the Clients Tab
Managing Services
The Services Control area on the Properties subtab provides a convenient way
to access the eTrust ITM services running on the client computer. It is similar
to the Windows NT Services feature and can be used for managing background
processes on the Windows 9x operating system or for managing daemons
under Linux, Solaris, and Mac OS X.
After finding a computer on the Client tab, click the Properties subtab to view,
start, and stop services.
The following services can be managed from the Services Control area:
Provides the host service for the eTrust Threat Management Agent.
Handles communication between the Java GUI layer and the native
function interfaces. On Windows, this agent is InoWeb.exe.
Note: On Linux, Solaris, and Mac OS X, the agent names do not use the .EXE
extension.
Viewing Logs
Use the Logs subtab to view the logs for a specific computer. You can locate
the computer whose logs you want to view by entering the name of the
computer in the Node Name field and clicking Find. Once the client is found,
click the Logs subtab and select the type of log you want to view from the
drop-down list. You can view the following types of logs:
Contains scanning logs initiated through the Windows only Shell Scanner
dialog. The Shell Scanner is available from the Scan for Viruses option of
the right-click pop-up menu in Windows Explorer.
Shows a list of logs that contain the results of the scan jobs that have run
on the local computer. This includes both scan initiated locally and
scheduled scans pushed by the Threat Management Console. For each job,
there is a scan log that contains the results for each time that the job has
run, listed by the date and time. If a job only runs one time, you have one
result log. If the job runs periodically, there is a unique result log for each
scan job.
General Events
Displays logging information of general events for each day. You can also
see operating system error codes here. This category displays the
following types of messages:
Critical Message
Warning Message
Informational Message
Distribution Events
52 Administrator Guide
Using the Clients Tab
Displays actions that occur during the content update and distribution
process. This includes details about connecting to a distribution source,
starting and stopping a download, and information about whether the
content has been downloaded successfully.
On Windows systems, the system metrics features let you collect information
about antivirus activity to analyze the impact of this activity across your
enterprise. The collection methods and features are as follows:
Command line utility for login scripts or schedulers
Monitoring realtime statistics with the Performance Monitor
Purging collected records
All log information is stored in a file format that can be accessed by standard
database tools, using the ODBC (Open Database Connectivity) standards.
Performance Monitor
Through the standard Windows NT, Windows 2000, and Windows Server 2003
Performance Monitor application, PERFMON, you can monitor realtime antivirus
activity.
The Performance Monitor, using counters, can monitor the following realtime
information:
Boot Virus Infections
Cure Errors
Cured Boot Virus Infections
Cured Files
Deleted Files
Found Virus
Infected Files
Moved Files
Renamed Files
Scan Error
Scanned computer
Scanned Files
Scanned Files in Archives
For more information about monitoring activity, see the appropriate Windows
Performance Monitor documentation.
Purging Logs
For each client computer, you can choose to save all logs or, delete all logs
older than the specified number of days. You can access these options from
the Client tab. You must first locate the client machine by entering its name in
the Node Name field and clicking the Find button. Then you can scroll down to
the Purge Log Options area, and specify the appropriate options.
54 Administrator Guide
Chapter 7: Managing User Access
This section contains the following topics:
Note: While these authorized administrators have special rights within the
Threat Management Console, they do not acquire any special rights to the
operating system or other applications.
When adding a user and granting permissions to use the Threat Management
Console, you can use any valid operating system account on the computer
hosting the ITM Server. These accounts will retain their existing operating
system permissions.
Installer account
The account that installs the ITM Server also has full access to the Threat
Management Console. This is the root user in Linux and Solaris systems,
and a user with administrative privilege on Mac OS X.
If the account used to install the ITM Server is different from the operating
system administrator account, you will see the installer account appear in
the list of user accounts on the User Management tab.
Note: Linux and Solaris systems do not use a separate account to install
eTrust ITM. The root user installs the product
Authorized administrator
An account that is granted access and permissions to the Threat
Management Console by another account with full access, such as the
operating system administrator. Authorized administrator accounts do not
have any special permission on the operating system where the ITM
Server resides. However, they can be granted different levels of
permissions within the Threat Management Console; from full access to all
features of the Threat Management Console, to read-only access. You can
set permission levels based upon the needs of your enterprise. .
56 Administrator Guide
User Access to the Threat Management Console
When a user attempts to log onto the ITM Server, the server examines its own
internal security table to determine if the user is valid and what permissions
he or she has.
Guest Accounts
You can create a guest account on the ITM Server for other users to sign onto
the ITM Server and use the Threat Management Console. For example, on
Windows NT or Windows 2000, you can copy the Guest account and rename it
ITMAdmin on the computer where the ITM Server resides. Then use the User
Management tab to set access permissions to grant Full Control to this new
account. Users who then log onto the ITM Server with this account are granted
full control of the Threat Management Console and its features, but have very
limited access to the Windows operating system on which the ITM Server is
running.
Note: The account you use as a model for a guest account will retain any
operating system permissions that it already has.
This method of using a guest account lets you provide access to the Threat
Management Console as needed, without the need to create a separate
account for each remote administrator who wants to access the ITM Server.
You may also create different types of generic accounts with different levels of
access, and make them available to administrators as needed.
Types of Access
Access rights apply to the Organization tree, policy, and subnet management.
The following table lists the types of access and the associated permissions:
58 Administrator Guide
Types of Access
After access rights are applied for a user, these rights have the following
characteristics:
User
Identifies the user with access to the selected branch, including the
domain the user is in.
Rights
Indicates the access rights that the user has for that branch.
Reason
Inherited indicates that the user rights applied to the branch have
been inherited from user rights applied at a higher level in the
hierarchy, such as the root of the Organization tree.
Specified indicates that the user rights applied to the branch have
been applied to this particular level of the hierarchy, such as the root
of the Organization tree.
The following table shows how different access rights can be assigned to
different accounts:
Authorized
Branch Administrator User 1 User 2
All the accounts in the example have access to the Organization tree. The
authorized administrator has full control. This account can manage all the
branches in the tree and can set policy for all the computers in the branches.
User 1 has change access, and User 2 only has read access. These rights
would apply to the policy and subnet management, as well.
The User Management tab lists current users in the Current Users area, and
provides options for adding new users in the Add user area. In addition, you
can delete existing users from the Current Users area by selecting a user and
clicking Delete. To modify an existing user, select the checkbox next to the
user's name, and click Edit.
Note: You can also view user permissions on the Organization tab by selecting
Permissions from the drop-down list.
60 Administrator Guide
Chapter 8: Generating and Viewing
Reports
This section contains the following topics:
Reports
The Reports tab provides access to a wide variety of reports. From this tab you
can generate and view reports for discovery statistics, managed machines,
scheduled jobs, Top 10 threats, categorized reports, and mail option reports.
Many reports provide color graphs, augmented by summary and detailed
information, as well. You can also view domain reports for computers in your
network that are grouped into domains that were discovered by the ITM
Server, whether they are running eTrust Threat Management products or not.
The ITM Server generates the reports based on the information collected from
each client computer. You determine the start date for the reports, and how
often they are generated by using the Report Scheduler options located on the
Report tab.
The Discovery Statistics reports provide statistical information from the ITM
Server for all discovered computers, as well as those that have expired.
Expired computers are those that missed being discovered beyond the number
specified in Max Missed Discoveries option on the Discovery tab. You can view
these reports by clicking the Machine Information Report folder, which
contains the following reports:
Deployment
Displays the load on the downloads sources assigned for content update
download in the top three preferences. The report shows the number of
computers that have each server listed as a primary or a secondary
distribution source.
Displays the distribution load on a per policy basis. The report shows the
number of computers that have each policy listed.
Signatures
Displays the number of computers that have the virus and pest scanning
engines installed. It includes the engine name, number of computers with
the engine installed, as well as the counts for each signature or DAT file
version detected in the subnets.
Signature Exception
Displays the current version of the signature or DAT file versions for this
ITM Server, and using this information as a benchmark, shows up to three
out-dated signature versions detected for each engine on discovered
computers. Note that the most recent, not the oldest, outdated version is
shown.
Displays the details of all computers with any of the three outdated
signature versions detected in the Signature Exception report. The
computer's name, IP address, and MAC address is shown, as well as the
ITM Server and branch to which the computer belongs.
62 Administrator Guide
Reports
Domain Summary
Displays information about the computers that do not have eTrust Threat
Management products installed, with details including associated computer
name and domain name.
The Scheduled Job reports displays summary information about the scheduled
virus and pest scanning jobs. The report contains the following information:
Machine Name
Report Time
The time that the scan job reports back to the ITM Server as completed.
Error
Files Scanned
Files Cured
Top 10 Reports
The Top 10 reports display the most widely detected threats on your network,
grouped into various time-frames. The time frame is calculated based on the
local time zone where ITM Server is located.
You can also view this information by computers and users. The following
reports are available:
Displays a top-ten virus summary and a list of all viruses detected grouped
into time-frames.
Displays user most often infected by viruses and pests, grouped into time-
frames.
64 Administrator Guide
Reports
The following reports are available for Lotus Notes and MS Exchange mail
servers on Windows machines:
Displays detailed information for every email server that has reported
viruses in emails.
Shows detailed information for every email user that has reported a virus
or pest.
Categorized Reports
These reports are broken down into categories by subnet, branch, user,
computer, and by the action taken on the threat. The following reports are
available:
Virus report displays detailed information for each virus detected. Pest
report displays detailed information for each pest detected on Windows
machines. You can get specific information about a particular virus or pest
by clicking the virus or pest name.
By Subnet
By Branch
By User
By Computer
By Action
Note: When you view pest reports, such as the Per Pest Report, the
number of pest detections may appear as an alarmingly high number. This
is because a pest is typically made up of many different items (several
files, several key registries, etc.) and the total number of detected items
for each pest is reflected in the report.
66 Administrator Guide
Generate Reports
Generate Reports
To view reports on the Reports tab you must forward alert notifications from
client computers to the ITM Server. The following steps describe the
configuration process for collecting this data and generating reports:
3. Create an Alert Forwarding policies for all client computers using the Policy
Management tab:
a. On the Alert tab, click Forward to client name and enter the name of
the ITM Server.
b. On the Alert Filter tab select Custom Notification and select the
Malware Detection Report.
c. Select additional service modules for the specific alerts you want
reported.
e. Assign the policy to all branches of the Organization tree, except for
the ITM Server. You will configure a separate policy the server.
4. Create an Alert Forwarding policy for the ITM Server that forwards alerts
to itself:
a. On the Alert tab, click Forward to client name and enter the name of
the ITM Server.
b. On the Alert Filter tab select Custom Notification and select the
Malware Detection Report.
c. Select additional service modules for the specific alerts you want
reported.
5. Click the Reports tab and Report Scheduler to schedule the generation of
report.
Note: You can use the eAVreprt.exe utility located in the eTrustITM
directory to refresh report data and generate reports prior to the next
regularly scheduled report.
When you first access the Report tab, you see the Application and Domain
Report Frequency options on the right side of the page. You can use these
options to schedule the generation and frequency of your reports.
The Reports tree that appears on the left side of this window helps you to
quickly browse through the available reports to select the report you want to
view. When you select a report, it appears on the right side of the page. Use
the Details and Graph subtabs at the top of the page to go from the report
data to the report graph. If you want to return to the Application and Domain
Report Frequency options, simply click the Report Scheduler link at the top of
the Reports tree.
Note: If you are unable to view report graphs, check the active content
setting in your web browser. For more information, see Enable Active Content
in Internet Explorer.
68 Administrator Guide
Chapter 9: Managing Licenses
For information on how licensing concepts and implementation, see the
Licensing section in Chapter 1, "Planning Your Implementation, in the eTrust
Antivirus Implementation Guide.
Managing Licenses 69
Using the Licensing Tab
When you install the ITM Server, the install wizard prompts you for your
license and registration information. If you did not enter the information
during installation, then a 30-day evaluation copy of the software was installed
on your system. When you access the Licensing tab, the License Status will
say "Unregistered, in trial period" and display the number of days left in the
trial period. All other fields will remain empty until you enter your company's
license information.
To enter your information after installation, use the Activate a Key button. This
allows you to enter your 25-character license key and your company
registration information. If you are installing the eTrust ITM Suite, you must
enter a key for both eTrust Antivirus and eTrust PestPatrol. Before entering
this information, verify that you have an active Internet connection, as the
information will be uploaded to CA.
If you need to move your license to another computer, use the Import License
File button, which lets you browse to and select the license file. The default
location of the license file is {Installation
Directory\CA\SharedComponents\SubscriptionLicense\license.xml. The eTrust
Threat Management Agent interface also provides the Import License File
option, so that mobile clients that have the software installed can import the
license information from the ITM Server directly.
Note: You do not need to enter the license key for each client computer.
Instead, the license status will be automatically deployed to client machines
during client installation.
70 Administrator Guide
Checking Product Usage
You can use this graph to check product and license usage. You can also get
summary information about licensing on the Dashboard tab.
Managing Licenses 71
Chapter 10: Using the Alert Manager
This chapter describes the use of the Alert Manager component. Alert runs on
Windows NT, Windows XP, Windows 2000, and Windows 2003 systems. This
chapter also describes the use of the Local Alert Manager settings on Linux,
Solaris, and Mac OS X systems.
Alert Manager
The Alert Manager is a centralized management component that sends alerts
generated by the client computers and servers running eTrust Threat
Management products to other destinations. The Alert Manager receives alerts
based on the Alert Forwarding policies that you deploy. The following graphics
shows the Alert Manager interface:
74 Administrator Guide
Local Alert Manager for Linux, Solaris, and Mac OS X Systems
Use the script InoSetAlert to specify the name of the script (using an
absolute path) that you want to run when an alert is generated. You must also
use absolute paths when referencing any files in the script itself, unless the
code is explicit about changing to a particular directory.
InoSetAlert /home/myfiles/myscript
The script must be executable. If it is not, use the chmod command to change
the file mode. For example:
chmod +x /home/myfiles/myscript
InoSetAlert -delete
Under Mac OS X, you can also indicate an alert script to be run in the eTrust
Antivirus Preference Options panel that can be run from System Preferences
panel.
2. Code number for the event. For example, the code number for a virus
detection by Realtime Protection is 26.
Additional integration can be achieved with eTrust Audit and eTrust Security
Command Center using the Product Integration Kits (PIKs), which are included
with eTrust Security Command Center. For more information about integrating
with eTrust Audit or eTrust Security Command Center, see the appropriate
product’s documentation.
76 Administrator Guide
Appendix A: Using the Command Line
Scanner Inocmd32
Command line scanners are provided for most of the platforms supported by
eTrust Antivirus.
Note: On eTrust Antivirus 7.0 or 7.1 for NetWare, use the ETRUSTAV console
application to perform scanning. For more information, see Using the
ETRUSTAV Console Program (see page 99).
Specify at least one file or directory to scan. On Windows systems, you can
specify a drive to scan.
Examples:
This command invokes the INOCMD32 Command Line Scanner to scan the
drive and directory c:\temp, sets the file action ACT to Cure, sets the special
cure action SCA to Move File if Cure Fails, and sends the scan results to a file
named myscan.txt.
MOD mod
Secure
Use the Secure mode as the standard method for scanning files
completely.
Reviewer
If you suspect you have an infection that is not being detected by the
Secure mode, you can use the Reviewer mode.
Default: Secure
ACT action
Infected file action. Specify what to do with an infected file. Use one of the
following action options:
Cure
Rename
Delete
Delete an infected file.
Move
Move an infected file from its current directory to the Move folder.
EXE
Scan specified files only. The list of file extensions indicated by the
Specified Extensions Only option for regular files in the interface
determines which files are scanned.
EXC
Exclude files from scanning. The list of file extensions indicated by the All
Except the Specified Extensions option for regular files in the GUI
determines which files are excluded from the scan.
78 Administrator Guide
Scanner Options for Inocmd32
ARC
ARF
NEX
NOR
NOS
No subdirectory traverse. Use this option to exclude from the scan the
subdirectories in the specified directory.
FIL:pattern
Only scan files that match pattern. Use shell wildcard patterns to select
files to scan.
Example: The pattern *.doc will scan only files with a .doc extension.
SCA action
Special Cure Action. Use this option when the ACT action is set to Cure.
Use one of the following SCA actions.
CB - Copy Before
A copy of the original file is made, and the copy is moved to the Move
folder before the cure is attempted.
MCA action
RA - Remove All
RI - Remove Infected.
Only the macros that contain infected code are removed from the
infected file.
SPM mode
Special Mode. Use this option to run a scan with one of the following
modes:
SFI
SMF
Scan migrated files on Windows and NetWare systems. Use this option to
scan files that have been migrated to external storage. With this option in
effect, files that have been backed up are restored to the local drive and
scanned. If this option is not in effect, and there is an entry in a directory
for a file that has been backed up and moved off the local drive, the file is
not scanned.
SRF
Skip regular file scanning of archives. If you use this option, compressed
files are not scanned.
BOO
Windows system boot sector scan. The default setting is to Report Only.
Use the ACT option to set this option to cure boot sector infections.
MEM
LIS:file
Use this option when you run a scan and send the scan result list to a
specified file.
APP:file
Append scan report to file. Use this option when you run a scan and
append the scan result list to an existing specified file.
SYS
On Windows systems, enable system cure. Use this option to invoke the
system cure facility for any infected file(s) that are found and which have a
system cure associated with them. Please refer to the virus encyclopedia
on the Computer Associates web site for current information about viruses
and associated system cures. Note that in some cases, you must reboot
your computer for a system cure to take effect.
80 Administrator Guide
Scanner Options for Inocmd32
VER
COU
Activates the file counter. Use this option to return a message after 1000
files have been scanned. The message is repeated each time 1000 files are
scanned.
COU:number
Activates the file counter and sets it to the value indicated. Use this option
to return a message after the indicated number of files has been scanned.
The message is repeated after the indicated number of files has been
scanned.
SIG
SIG:dir
HEL or ?
Use the Repository Import/Export program (TRIX) to invoke the import script
that is provided with eTrust Antivirus. This creates an Antivirus class.
You can access the TRIX program from the Start menu, Unicenter, NSM,
WorldView program group. Choose Repository Import/Export to launch the
TRIX interface. Then, use TRIX to open the script file, TRIX0.TNG, and import
it into the repository. This import script file is located in the directory where
eTrust Antivirus is installed.
You must know the name of the repository to which you wish to connect, and
use a valid User ID and Password to sign on to the repository.
TRIX can also be invoked by entering the following at the command prompt.
trix
For more information about TRIX, refer to the Unicenter NSM documentation.
After completing the import to the repository, use the InoUpTNG utility to
create the antivirus Business Process View and populate it with a display of the
computers in your antivirus network.
The Unicenter NSM network must have been discovered and a computer must
already exist in the Unicenter NSM repository before you run InoUpTNG. The
subnet discovery for the ITM Server must also have been completed. Based on
the computer information in the ITM Server database, InoUpTNG searches the
Unicenter NSM repository for matching computer objects.
84 Administrator Guide
Managing Antivirus Options in WorldView
Configure Realtime
Use Configure Realtime to set the Realtime Monitor options for the
selected machine. This displays the same options that are available for
managing the Realtime Monitor on a local machine.
For more information about using the realtime monitor options, see Using
the Realtime Monitor.
Configure Distribution
Use Configure Distribution to set Signature Update options for the selected
machine. This displays the same option that is available for managing
signature updates on a local machine.
Schedule Job
Use Schedule Job to set Schedule Scan Job options. This displays the
Remote Scan View, which provides access to the same option that is
available for managing scheduled scan jobs on a local machine. You can
create a new scheduled scan job or modify an existing job. For more
information, see Remote Scan View (see page 87).
Display Logs
Use Display Logs to view and manage log information for the selected
machine. This displays the same view and option that is available from the
Log Viewer on a local machine.
For more information about using the Log Viewer, see Viewing and
Managing Logs.
Configure Contact
Use Configure Contact to set the Contact Information options for the
selected machine. This displays the same option that is available for
managing the contact information options on a local machine.
This is available for legacy machines only. Use Display Summary to display
summary information for a selected machine that is running a 4.x version
of the eTrust Antivirus.
86 Administrator Guide
Remote Scan View
These options enable you to set scanning options for the selected computer in
the same way that a user sets the options on a local computer. To view and
modify options on a computer, you must have a valid user ID and password
for the Admin Server that manages the computer.
Note: When you select a legacy computer and right-click on it, you can select
legacy options to manage that computer. These options display the dialogs for
the older versions of the product. To manage options on a computer, you need
a valid user ID and password on that computer.
These options are available from the Options menu, and the toolbar buttons.
You can also access these options by right-clicking on a job in the list on the
left. In addition, when you highlight a job in the list on the left, you can right-
click anywhere in the summary on the right to display the available options.
The Remote Scan View displays the selected computer on the left side of the
window. You can expand the computer to display jobs that are scheduled to
run on the computer, if any.
When you highlight a job in the list on the left side of the window, summary
information about the job is displayed on the right. This displays the properties
used for the job.
For more information about using the schedule scan job options, see Using the
Scheduled Scanner.
Managing NetApp 89
Managing the Scanner
The installation wizard let you configure one filer with a scanner. To add
another filer to a scanner (register a filer with a scanner), follow these steps:
2. In the left pane, expand Console Root, eTrust Antivirus NetApp Scanner.
90 Administrator Guide
Managing the Scanner
3. Select AV Machines.
5. Enter the name of the filer or click the browse button to locate and select
the filer.
Managing NetApp 91
Managing the Scanner
To view scanner statistics, click the Statistics tab on the Properties dialog.
For more information, see the eTrust Antivirus NetApp Filer Scanner online
help.
The installation process creates the following registry values and sets these
values to the location of the eTrust Antivirus Quarantine directory.
HKLM = HKEY_LOCAL_MACHINE.
HKLM\SOFTWARE\ComputerAssociates\eTrustITM\CurrentVersion\NetApp Scanner
CopyDir
MoveDir
92 Administrator Guide
Managing the Scanner
On the Cure Action Options dialog, if you specify Quarantine, then the scanner
moves infected files from the filer to the eTrust Antivirus Quarantine directory
on the local machine (usually Program Files\CA\eTrustITM\Quarantine). You
can change this setting.
To move infected files to the filer instead of the scanner, use Regedit to
manually change the registry configuration values on the scanner machine.
The new values override the Quarantine directory of the Realtime Monitor.
Directories must not have a trailing backslash and can point to local drives or
mapped drives, or be specified as universal naming convention (UNC) paths.
Example:
HKLM\SOFTWARE\ComputerAssociates\eTrustITM\CurrentVersion\NetApp Scanner\MoveDir=\\f760\vol1\move
Once you specify a custom Quarantine directory, you cannot use the eTrust
Antivirus interface to manage its files. Instead, you must use the RestMove
command line utility. It is in the installation directory of the scanner machine
and has these characteristics:
Displays original file names and their infections
Supports standard DOS wildcards: * and ?
To display information about all files in the custom Quarantine directory, enter
the following command:
RestMove \\f760\vol1\move\*.* -i
Result:
\\f760\vol1\move\31ed8c4e-b930-45f0-8c1e-35e1d3570cd6
Original file name: \\F760\VSCAN_ADMIN$\vol\vol1\sabra01\eicar2.com
Infection name: EICAR test file
Detected by engine 23.61.00, signature 23.61.50 on 6/16/2003, 1:06:11 PM
To restore the files to their original location, enter the RestMove command and
do not use the -i switch.
You can provide single paths for both the MoveDir and the CopyDir because
the values are stored in single registry keys. Therefore, a scanner serving
multiple filers can store moved and copied files in different locations.
Managing NetApp 93
Managing the Filer
The scanner adds an entry to the Realtime Scanner log whenever it receives a
file request for a file with a virus. The scanner also sends a message to the
filer’s system console that notifies the filer administrator of the virus infection.
To view the Realtime Scanner log, go to the Logs tab of the eTrust Threat
Management Agent.
Note: Be careful when choosing settings, because the software applies the
settings to both the eTrust Antivirus engine and the scanner running on
the machine, and some of the realtime settings do not fit with both.
vscan on [-f][on|off]
Note: Turning on virus scanning when no clients are available to scan files
causes the CIFS clients not to be able to access filer files.
94 Administrator Guide
Managing the Filer
A default list of file extensions is available when you enable vscan. Up to 255
file extensions can exist in the file extensions list.
Note: The extension list on the filer processes before the extension list on the
scanner machine that you establish through realtime scanner configuration.
For example, if *.vbs is not configured on the filer for scanning, VBS-files do
not pass to the scanner. Therefore, even if VBS files are configured for
scanning on the scanner, they do not reach the scanner for processing. Also, if
an extension is in the extension list on the filer but not specified in the
realtime scanner configuration, the filer passes the corresponding files to the
scanner, but the scanner ignores these scan requests.
To control which files to scan, there are commands you can use to change the
default list of file extensions.
To display the default list of file extensions for the filer to scan, enter the
following command:
vscan extensions
To add to the default include list of file extensions for the filer to scan, enter
the following command:
To add to the default exclude list of file extensions for the filer to scan, enter
the following command:
vscan extensions exclude add ext[,ext...]
Example:
To replace the default include list of file extensions with a new list, enter the
following command:
To replace the default exclude list of file extensions with a new list, enter the
following command:
vscan extensions exclude set ext[,ext...]
Managing NetApp 95
Managing the Filer
To remove file types from the default include list of file extensions, enter the
following command:
To remove file types from the default exclude list of file extensions, enter the
following command:
vscan extensions exclude remove ext[,ext...]
To reset the file extensions list to the default include and exclude lists, enter
the following commands as appropriate:
The default state of a share has virus scanning turned on. You can turn virus
scanning off for files in a share. Reasons to do this may include: the users are
restricted to trusted users, the files are restricted to read-only mode, or speed
of access is more important than safety.
To turn virus scanning off for files in a specified share, enter the following
command:
where share_name is the name of the share for which you want to turn off
virus scanning.
96 Administrator Guide
Managing the Filer
You can turn virus scanning off in a share for users who open files for read-
only access to increase the speed of file access. The default state of a share
has virus scanning turned on.
To turn virus scanning off for read-only access to files in a specified share,
enter the following command:
where share_name is the name of the share for which you want to turn off
virus scanning.
where share_name is the name of the share for which you want to turn on
virus scanning.
You can create a share with virus scanning turned off. The default state of a
share has virus scanning turned on.
To add a share that has virus scanning turned off, enter the following
command:
where share_name is the name of the share that you want to create with virus
scanning turned off and path specifies where you want the share created.
Data ONTAP creates the share with virus scanning turned off.
Managing NetApp 97
Appendix D: Using the ETRUSTAV
Console Program on Netware
After installing eTrust Antivirus for NetWare on a NetWare server, use the
ETRUSTAV console program to take advantage of its features. The ETRUSTAV
program invokes a menu from which you can control many eTrust Antivirus
operations on the server. From the NetWare command line, entering
ETRUSTAV starts the program. To start all the eTrust Antivirus services at the
same time as starting ETRUSTAV, you must instead enter ETRUSTAV
AUTOSTART.
Note: The default options for the ETRUSTAV program are set by the
inoc6_nw.icf file during installation.
Starts an individual eTrust Antivirus service. If there are any services not
already running, a pop-up menu appears from which you can select the
service to start.
Stops and unloads an individual eTrust Antivirus service. If there are any
services currently running, a pop-up menu appears from which you can
select the service to stop.
Configure Realtime
Lets you configure settings for real-time scanning on the Netware server.
Lets you configure settings for local scans run on the Netware server.
Opens a pop-up menu from which you can specify a full pathname to scan.
Displays the status of any scheduled scan job that is currently running.
Information displayed is refreshed every second as the job progresses.
Displays the status of realtime scanning from the time the Realtime
Monitor was started. Information displayed is refreshed every second.
Displays the current scan engine and signature versions for the eTrust
Antivirus engines installed on the server.
Advanced
Configure Realtime
This option opens a pop-up menu from which you can modify Realtime
Scanning Settings. From the Realtime Settings pop-up menu, you can view or
modify Scanning options, Selection options, Filters, and Advanced options.
The following list describes the Scanning options for the Realtime Scanner:
Direction of Scan
Disabled
Scans files when they are accessed for reading or executing and when
they are written to a volume.
Outgoing Files
Scans files only when they are accessed for reading or executing.
Safety level
Secure
Reviewer
Use if you suspect you have an infection that Secure mode is not
detecting.
Scanning engine
Inoculate IT
Vet
The Vet engine
Heuristic Scanner
Specify whether to use the Heuristic Scanner to scan for unknown viruses:
No
Yes
File Action
Cure
Delete
Move
Move an infected file from its current directory to the Move folder.
Rename
Report Only
Cure Options
If Cure Fails. Specify the cure fail option when File Action is set to Cure:
Move File
Move an infected file from its current directory to the Move folder if a
cure fails.
No Action
Rename File
Remove only the macros that contain infected code from the infected
file.
Make a copy of the original file and put it in the Move folder before
attempting the cure.
No
Yes
The following list describes the Selection options for the Realtime Scanner:
Specify whether to scan files that have been migrated to external storage:
Yes
No
All Extensions
Scan all files except the files that have extensions specified in the
Available Extensions list. The Available Extensions list is specified with
the Edit Extensions List option.
Scan only the files that have extensions specified in the Available
Extensions list. The Available Extensions list is specified with the Edit
Extensions List option.
Note: You can view or modify the list only when the All Except the
Specified Extensions or Specified Extensions Only selections are made
from the Scan Files With Extensions option.
Delete key
Yes
No
F5 key
You can use the F5 key to mark extensions for deletion from the list
with the Delete key.
Insert key
Yes
Note: Options for the type of archive file scanning and compressed file
types are specified with the Compressed File and Archive types to
support options.
No
Note: Options for the type of archive file scanning and compressed file
types are specified with Compressed File Options and Archive types to
support.
Note: You can view or modify the types of archived files only when the
Scan Compressed Files option is set to Yes.
Note: You can view or modify the types of archived files only when the
Scan Compressed Files option is set to Yes.
In the Compressed File Options List, specify the type of archived files for
scanning. You can select Yes to include the file type or No to exclude the
archived file type.
The following list describes the Filters options for the Realtime Scanner:
Exclude Threads
Exclude Directories
Pre-Scan Block
Exempt
Exempt specified files from the pre-scan block. Exempted files will be
scanned by realtime, even if the file extension is on the blocked extension
List.
The following list describes the Advanced options for the Realtime Scanner:
Pop-ups Enabled
Pop-up Limit
The Configure Local Scanner option opens a pop-up menu from which you can
modify Local Scanner Settings. From the Local Scanner Settings pop-up menu,
you can view or modify Scanning Options or Selection Options.
The following list describes the Scanning options for the Local Scanner:
Safety level
Secure
Reviewer
Use if you suspect you have an infection that Secure mode is not
detecting.
Scanning engine
Inoculate IT
Vet
Heuristic Scanner
Specify whether to use the Heuristic Scanner to scan for unknown viruses:
No
Yes
File Action
Cure
Delete
Move
Move an infected file from its current directory to the Move folder.
Rename
Report Only
Cure Options
If Cure Fails. Specify the cure fail option when File Action is set to Cure:
Move File
Move an infected file from its current directory to the Move folder if a
cure fails.
No Action
Rename File
Remove only the macros that contain infected code from the infected
file.
The following list describes the Selection options for the Local Scanner:
Specify whether to scan files that have been migrated to external storage:
Yes
No
All Extensions
Scan all files except the files that have extensions specified in the
Available Extensions list. The Available Extensions list is specified with
the Edit Extensions List option.
Scan only the files that have extensions specified in the Available
Extensions list. The Available Extensions list is specified with the Edit
Extensions List option.
Note: You can view or modify the list only when the All Except the
Specified Extensions or Specified Extensions Only selections are made
from the Scan Files With Extensions option.
Delete key
Yes
No
F5 key
You can use the F5 key to mark extensions for deletion from the list
with the Delete key.
Insert key
Yes
No
Note: You can view or modify the types of archived files only when the
Scan Compressed Files option is set to Yes.
Note: You can view or modify the types of archived files only when the
Scan Compressed Files option is set to Yes.
In the Compressed File Options List, specify the type of archived files for
scanning. You can select Yes to include the file type or No to exclude the
archived file type.
Advanced Options
The Set discovery ports option lets you display and specify the current port
numbers that the discovery process uses for listening to broadcast
messages.
1. In the pop-up field, select the Enter key to display the current port
numbers that the discovery process uses for listening to broadcast
messages.
2. Enter POLL and specify a port value to set the port number on which
the eTrust Antivirus client listens for polls from the Admin Server.
3. Enter SUBNET and specify a port value to set the port number that
eTrust Antivirus clients use to communicate within a subnet.
Enter BOTH and specify a port value to use the same value for the port
number on which the eTrust Antivirus clients listen for polls from the
Admin Server and the port number that eTrust Antivirus clients use to
communicate in a subnet.
Restores an infected file from the Move directory to its original location.
After the command is entered, follow the onscreen instructions.
The Set approved Admin Server(s) option let you display and specify the
current set of approved eTrust Antivirus Admin Servers.
1. In the IP address field pop-up, select the Enter key to display the
current set of approved eTrust Admin Servers.
Note: eTrust Antivirus environment variables are only used inside eTrust
Antivirus. They have no effect on other programs running on your server.
Messages
Error 2
Reason:
Action:
Error 3
Reason:
Action:
Error 5
Access denied
Reason:
Action:
Error 120
Reason:
Action:
Reason:
Action:
Error 1331
Reason:
Action:
Error 1717
Unknown interface
Reason:
A request was made after the RPC service was started, but the RPC service
was not fully initialized.
Action:
Error 1722
Reason:
Action:
Configure the firewall to allow a connection between the client and the server.
Error 1723
Reason:
The proxy is busy handling other requests, and it cannot accept new requests.
Action:
Error 1726
Reason:
Action:
Error 1789
Reason:
A domain account was used to log in to the Threat Management Console, but
the workstation was not a member of that domain, or the account was not
valid.
Action:
Ensure the workstation and the account are on the correct domain before
logging into the Threat Management Console, or ensure that the account is
valid.
Acknowledgements 119
Apache Tomcat
Apache Tomcat
Licenses
These licenses help us achieve our goal of providing reliable and long-lived
software products through collaborative open source software development. In
all cases, contributors retain full rights to use their original contributions for
any other purpose outside of Apache while providing the ASF and its projects
the right to distribute and build upon their work within Apache.
Licensing of Distributions
The 2.0 version of the Apache License was approved by the ASF in 2004. The
goals of this license revision have been to reduce the number of frequently
asked questions, to allow the license to be reusable without modification by
any project (including non-ASF projects), to allow the license to be included by
reference instead of listed in every file, to clarify the license on submission of
contributions, to require a patent license on contributions that necessarily
infringe the contributor's own patents, and to move comments regarding
Apache and other inherited attribution notices to a location outside the license
terms (the NOTICE file).
All packages produced by the ASF are implicitly licensed under the Apache
License, Version 2.0, unless otherwise explicitly stated. More developer
documentation on how to apply the Apache License to your work can be found
in Applying the Apache License, Version 2.0.
http://www.apache.org/licenses/LICENSE-1.1
The 1.1 version of the Apache License was approved by the ASF in 2000. The
primary change from the 1.0 license is in the 'advertising clause' (section 3 of
the 1.0 license); derived products are no longer required to include attribution
in their advertising materials, but only in their documentation.
Individual packages licensed under the 1.1 version may use different wording
due to varying requirements for attribution or mark identification, but the
binding terms were all the same.
http://www.apache.org/licenses/LICENSE-1.0
This is the original Apache License which applies only to older versions of
Apache packages (such as version 1.2 of the Web server).
The ASF desires that all contributors of ideas, code, or documentation to the
Apache projects complete, sign, and submit (via snailmail or fax) a Individual
Contributor License Agreement (CLA) [PDF form]. The purpose of this
agreement is to clearly define the terms under which intellectual property has
been contributed to the ASF and thereby allow us to defend the project should
there be a legal dispute regarding the software at some future time. A signed
CLA is required to be on file before an individual is given commit rights to an
ASF project.
Note: If you choose to send this document via fax, rather than via traditional
postal mail, then be absolutely sure that you have sent it correctly. Often
faxes are received back-to-front, blank, or totally illegible.
Software Grants
Acknowledgements 121
CURL
CURL
COPYRIGHT AND PERMISSION NOTICE
Permission to use, copy, modify, and distribute this software for any purpose
with or without fee is hereby granted, provided that the above copyright
Except as contained in this notice, the name of a copyright holder shall not be
used in advertising or otherwise to promote the sale, use or other dealings in
this Software without prior written authorization of the copyright holder.
gSOAP
gSOAP is distributed under:
The gSOAP public open source license (which is based on the Mozilla public
license 1.1). See the section below further details.
GPL (GNU Public License). Some parts of gSOAP are strictly distributed
under the GPL (see below). Most parts are distributed under the gSOAP
license and GPL. For those parts, you can choose the gSOAP license or GPL
based on your needs.
The gSOAP public license allows for commercial use of gSOAP. It allows
products to be built on top and distributed under any license (including
commercial). Products developed with gSOAP should include a notice of
copyright and a disclaimer of warranty in the product's documentation (License
Exhibit B). Please refer to the README files and/or header information in
source code files for the appropriate licensing specific to that part of the souce
code.
The parts of the code that are strictly distributed under the GPL (i.e. the code
that is distributed under GPL only) cannot always be used for commercial
purposes. These parts are:
The wsdl2h WSDL parser source code and the code generated by it.
The examples included in the gSOAP distribution package, including the
Web server and UDDI applications.
A license for commercial use is available (this license replaces the GPL
restrictions). Please refer to the license details at Genivia Inc licensing and
support for further details.
URL http://www.genivia.com/Products/gsoap/GeniviaGSoapLicense.pdf
Content
Rationale: This source code license for commercial use shall replace the gSOAP
public license and GPL license for Customer's use of the Software, thereby
rendering the terms and conditions imposed by the gSOAP public license and
GPL license on Customer inactive during the term of this commercial license as
set forth in this Agreement. This license covers the entire gSOAP source
distribution, including, but not limited to, the runtime library, compiler, WSDL
importer, example applications, and documentation.
Acknowledgements 123
gSOAP
__________________________________ ("Customer").
1. DEFINITIONS.
"Updates" means any patches, bug fixes, upgrades, and new versions of the
Software made generally available by Genivia during the term of this
Agreement.
"Executable Object Code" means the computer programming code in any other
form than Source Code that is not readily perceivable by humans and suitable
for machine execution without the intervening steps of interpretation or
compilation.
"Run-Time Module" means the Executable Object Code derived from compiling
the Software to be incorporated into a Target Application as inseparably
embedded code.
3. RESTRICTIONS.
Customer shall reproduce and include any and all copyright notices and
proprietary rights legends, as such notices and legends appear in the original
Software, on any copy of the Software, or portion thereof, with the exception
of the gSOAP public license and GPL license notices.
The Software shall be handled, used and stored, solely at the Authorized Site
identified in Exhibit A. The Software may be used from a single machine, a set
of machines, or a network file server, but there shall be no access to the
Software from any external network not located at the Authorized Site.
4. OWNERSHIP.
Acknowledgements 125
gSOAP
Genivia represents and warrants to Customer that Genivia has all rights in the
Software necessary to grant the rights and license granted to Customer in this
Agreement. Without limiting the foregoing, Genivia represents and warrants
that Genivia acquires an assignment of all intellectual property rights in and to
all portions of the Software delivered to Customer under this Agreement,
including any Modifications made by GPL or gSOAP Public License licensees.
Customer acknowledges that this Agreement does not grant to Customer any
Intellectual Property Rights in or to the Software other than the limited rights
with respect to the Software as set forth in Section 2. Customer hereby agrees
to assign to Genivia all Intellectual Property Rights it may have or obtain in
and to the Modifications that Customer makes to the Software.
If Customer has or obtains any rights to the foregoing that cannot be assigned
to Genivia, Customer unconditionally and irrevocably waives the enforcement
of such rights, and if such rights cannot be waived, Customer hereby grants to
Genivia an exclusive, irrevocable, perpetual, worldwide, fully paid and royalty-
free license, with rights to sublicense through one or more levels of
sublicensees, to reproduce, create derivative works of, distribute, publicly
perform, publicly display, make, use, sell and import such Modifications and
other intellectual property noted above by all means now known or later
developed. All rights in and to the Software not expressly granted to Customer
in this Agreement are expressly reserved for Genivia and its licensors.
Immediately following the Effective Date, Genivia grants Customer the right to
download the Software from the Approved Software Download Site specified in
Exhibit A, and install the Software at the Authorized Site and use the Software
as set forth in Section 2 subject to the restrictions listed in Section 3.
Notwithstanding any terms or other agreements posted on the Approved
Software Download Site, this Agreement shall be the sole and exclusive
agreement governing Customer's use of the Software.
Customer shall pay to Genivia the Software license fee set forth in Exhibit A.
License fees will be invoiced with shipment of this License Agreement.
Payment of all amounts invoiced shall be due sixty (60) days after receipt of
the invoice.
All payments and amounts shall be paid without deduction, set-off or counter
claim, free and clear of any restrictions or conditions, and without deduction
for any taxes, levies, imposts, duties, fees, deductions, withholdings or other
governmental charges. If any deduction is required to be made by law,
Customer shall pay in the manner and at the same time such additional
amounts as will result in receipt by Genivia of such amount as would have
been received by Genivia had no such amount been required to be deducted.
If Customer is claiming sales or use tax exemption, a certified Tax Exempt
Certificate must be attached to this Agreement or applicable purchase order
submitted by Customer.
This Agreement shall commence upon the Effective Date and is granted in
perpetuity, but may be terminated without notice in the following
circumstances: if you breach any term of this agreement, unless such breach
is curable and is cured by Customer within thirty (30) days after notice of such
breach is provided by Genivia; if you become the subject of insolvency
proceedings; if you, being a firm or partnership, are dissolved; or if you
destroy the Software for any reason. Upon termination, you or your
representative shall destroy any remaining copies of the Software or otherwise
return or dispose of such material. Termination pursuant to this clause shall
not affect any rights or remedies, which Genivia may have otherwise under
this license or at law.
7. LIMITED WARRANTY.
Genivia warrants that the Software, installation scripts, and future Updates will
be provided to Customer. Customer assumes full responsibility for: (i) the
selection, download, and installation of the Software from the Approved
Software Download Site specified in Exhibit A; (ii) the proper use of the
Software; (iii) verifying the results obtained from the use of the Software; and
(iv) taking appropriate measures to prevent loss of data. Genivia does not
warrant that the operation of the Software will meet Customer’s requirements
or that Customer will be able to achieve any particular results from use or
modification of the Software or that the Software will operate free from error.
Acknowledgements 127
gSOAP
8. INFRINGEMENT INDEMNITY.
Genivia will defend at its expense any suit brought against Customer and will
pay all damages finally awarded in such suit insofar as such suit is based on a
claim that the Software as provided to Customer infringes a previously issued
patent or copyright, provided that Genivia is notified promptly of such claim
and is given full and complete authority (including settlement authority
consistent with the other terms and conditions of this Agreement), information
and assistance by Customer for such defense. In the event that the Software
is held in any such suit to infringe such a right and its use is enjoined, or if in
the opinion of Genivia the Software is likely to become the subject of such a
claim, Genivia at its own election and expense will either (i) procure for
Customer the right to continue using the Software or (ii) modify or replace the
Software so that it becomes non-infringing while giving substantially
equivalent performance. In the event that (i) or (ii) above are not, in Genivia’s
sole determination, obtainable using reasonable commercial efforts, then
Genivia may terminate this Agreement and refund amount Customer paid
Genivia under this Agreement for the Software which is the subject of such
claim. The indemnification obligation shall not apply to infringement actions or
claims to the extent that such actions or claims are caused solely by: (i)
modifications made to the Software by a party other than Genivia; and (ii) the
combination of the Software with items not supplied or approved by Genivia.
9. GENERAL.
Neither party shall be liable hereunder by reason of any failure or delay in the
performance of its obligations hereunder (except for the payment of money)
on account of strikes, shortages, riots, insurrection, fires, flood, storm,
explosions, acts of God, war, governmental action, labor conditions,
earthquakes, material shortages or any other cause which is beyond the
reasonable control of such party.
All Software and technical information delivered under this Agreement are
subject to U.S. export control laws and may be subject to export or import
regulations in other countries. Customer agrees to strictly comply with all such
laws and regulations.
Acknowledgements 129
gSOAP
EXHIBIT A
Original Source Code files suitable for compilation into Run-Time Modules for
integration into a Target Application:
dom.h
dom++.h
dom.c
dom++.cpp
dom.cpp
soapdoc2.pdf
soapdoc2.html
stdsoap2.h
stdsoap2.c
stdsoap2.cpp
stl.h
stldeque.h
stllist.h
stlvector.h
stlset.h
samples/* (all example files included in the package under 'samples')
uddi2/* (all of the UDDI v2 support files included in the package under 'uddi2')
WS/* (all of the files included included in the package under 'WS' )
Updates to any of the Original Source Code files listed above and distributed
by Genivia are also covered under this Agreement.
Original Source Code files of the Software with development functionality not
suitable for compilation and integration into Target Applications:
src/error2.c
src/error2.h
src/init2.c
src/soapcpp2.c
src/soapcpp2.h
src/soapcpp2_lex.l
src/soapcpp2_yacc.y
src/symbol2.c
wsdl/dime.h
wsdl/gwsdl.h
wsdl/http.h
wsdl/imports.h
wsdl/includes.h
wsdl/mime.h
wsdl/schema.cpp
wsdl/schema.h
wsdl/service.cpp
wsdl/service.h
wsdl/soap.cpp
wsdl/soap.h
wsdl/typemap.dat
wsdl/types.cpp
wsdl/types.h
wsdl/wsdl.cpp
wsdl/wsdl.h
wsdl/wsdl2h.cpp
The source codes above are part of the software development toolkit. The
development toolkit generates source code that is suitable for compilation and
integration into the Target Application as set forth by Sections 2 and 3.
http://sourceforge.net/projects/gsoap2
Application.
______________________________________________________________
_________
GENIVIA
Title: President
Date: __________
Acknowledgements 131
gSOAP
CUSTOMER __________
By: __________
Title: __________
Date: __________
This form must be completed, signed, and returned by email, mail, or fax to
the following
Email: sales@genivia.com
Jan 1, 2004, revised June 27, Aug 1, Aug 14, Oct 19, 2004; Mar 31, 2005,
May 10, 2005.
The gSOAP Public License 1.3 is based on MPL1.1 (Mozilla Public License 1.1).
The license allows for commercial use of gSOAP. It also allows products to be
built on top and distributed under any license (including commercial). Products
developed with gSOAP should include a notice of copyright and a disclaimer of
warranty in the product's documentation (License Exhibit B).
gSOAP source code modifications that are distributed part of an open source
product should be submitted back to us for quality control. Please note that
modifications to the gSOAP runtime source codes are not required to build
applications so this requirement should not prohibit (commercial) product
development in any way.
Copyright (C) 2000-2003 Robert A. van Engelen, Genivia inc. All Rights
Reserved.
USE RESTRICTIONS
You may not: (i) transfer rights to gSOAP or claim authorship; or (ii) remove
any product identification, copyright, proprietary notices or labels from gSOAP.
WARRANTY
Acknowledgements 133
gSOAP
Acknowledgements 135
IBM Developer Kit for Linux
"Program" is the following, including the original and all whole or partial
copies: 1) machine-readable instructions and data, 2) components, 3) audio-
visual content (such as images, text, recordings, or pictures), 4) related
licensed materials, and 5) license use documents or keys, and documentation.
"You" and "Your" refer either to an individual person or to a single legal entity.
agreement prevail.
1. Entitlement
License
IBM grants You a nonexclusive license to use the Program when You lawfully
acquire it.
You may 1) use the Program up to the level of use specified in the PoE and 2)
make and install copies, including a backup copy, to support such use. The
terms of this license apply to each copy You make. You will reproduce all
copyright notices and all other legends of ownership on each copy, or partial
copy, of the Program.
If You acquire the Program as a program upgrade, after You install the
upgrade You may not use the Program from which You upgraded or transfer it
to another party.
You will ensure that anyone who uses the Program (accessed either locally or
remotely) does so only for Your authorized use and complies with the terms of
this Agreement.
You may not 1) use, copy, modify, or distribute the Program except as
provided in this Agreement; 2) reverse assemble, reverse compile, or
otherwise translate the Program except as specifically permitted by law
without the possibility of contractual waiver; or 3) sublicense, rent, or lease
the Program.
IBM may terminate Your license if You fail to comply with the terms of this
Agreement. If IBM does so, You must destroy all copies of the Program and its
PoE.
Money-back Guarantee
If for any reason You are dissatisfied with the Program and You are the
original licensee, You may obtain a refund of the amount You paid for it, if
within 30 days of Your invoice date You return the Program and its PoE to the
party from whom You obtained it. If You downloaded the Program, You may
contact the party from whom You acquired it for instructions on how to obtain
the refund.
Program Transfer
You may transfer a Program and all of Your license rights and obligations to
another party only if that party agrees to the terms of this Agreement. When
Acknowledgements 137
IBM Developer Kit for Linux
You transfer the Program, You must also transfer a copy of this Agreement,
including the Program's PoE. After the transfer, You may not use the Program.
2. Charges
One-time charges are based on the level of use acquired which is specified in
the PoE. IBM does not give credits or refunds for charges already due or paid,
except as specified elsewhere in this Agreement.
If You wish to increase the level of use, notify IBM or the party from whom
You acquired it and pay any applicable charges.
If any authority imposes a duty, tax, levy or fee, excluding those based on
IBM's net income, upon the Program, then You agree to pay the amount
specified or supply exemption documentation. You are responsible for any
personal property taxes for the Program from the date that You acquire it.
3. No Warranty
The exclusion also applies to any of IBM's Program developers and suppliers.
IBM does not provide technical support, unless IBM specifies otherwise.
4. Limitation of Liability
5. General
3. You agree to comply with all applicable export and import laws and
regulations.
4. You agree to allow IBM to store and use Your contact information,
including names, phone numbers, and e-mail addresses, anywhere they do
business. Such information will be processed and used in connection with our
business relationship, and may be provided to contractors, Business Partners,
and assignees of IBM for uses consistent with their collective business
activities, including communicating with You (for example, for processing
orders, for promotions, and for market research).
5. Neither You nor IBM will bring a legal action under this Agreement
more than two years after the cause of action arose unless otherwise provided
by local law without the possibility of contractual waiver or limitation.
7. This Agreement will not create any right or cause of action for any
third party, nor will IBM be responsible for any third party claims against You
except, as permitted by the Limitation of Liability section above, for bodily
injury (including death) or damage to real or tangible personal property for
which IBM is legally liable.
Acknowledgements 139
IBM Developer Kit for Linux
Governing Law
Both You and IBM consent to the application of the laws of the country in
which You acquired the Program license to govern, interpret, and enforce all of
Your and IBM's rights, duties, and obligations arising from, or relating in any
manner to, the subject matter of this Agreement, without regard to conflict of
law principles.
Jurisdiction
All of our rights, duties, and obligations are subject to the courts of the
country in which You acquired the Program license.
AMERICAS
Any litigation arising from this Agreement will be settled exclusively by the
Ordinary Commercial Court of the city of Buenos Aires.
Any litigation arising from this Agreement will be settled exclusively by the
court of Rio de Janeiro, RJ.
7. This Agreement will not create any right or cause of action for any third
party, nor will IBM be responsible for any third party claims against You except
as permitted by the Limitation of Liability section above for bodily injury
(including death) or physical harm to real or tangible personal property caused
by IBM's negligence for which IBM is legally liable."
Governing Law, Jurisdiction, and Arbitration (Section 6): The phrase "the laws
of the country in which You acquired the Program license" in the Governing
Law subsection is replaced by the following:
PERU: Limitation of Liability (Section 4): The following is added at the end of
this section:
In accordance with Article 1328 of the Peruvian Civil Code, the limitations and
exclusions specified in this section will not apply to damages caused by IBM's
willful misconduct ("dolo") or gross negligence ("culpa inexcusable").
Governing Law, Jurisdiction, and Arbitration (Section 6): The phrase "the laws
of the country in which You acquired the Program license" in the Governing
Law subsection is replaced by the following:
ASIA PACIFIC
Although IBM specifies that there are no warranties, You may have certain
rights under the Trade Practices Act 1974 or other legislation and are only
limited to the extent permitted by the applicable legislation.
Governing Law, Jurisdiction, and Arbitration (Section 6): The phrase "the laws
of the country in which You acquired the Program license" in the Governing
Law subsection is replaced by the following:
the laws of the State or Territory in which You acquired the Program license
Acknowledgements 141
IBM Developer Kit for Linux
Arbitration
The number of arbitrators shall be three, with each side to the dispute being
entitled to appoint one arbitrator. The two arbitrators appointed by the parties
shall appoint a third arbitrator who shall act as chairman of the proceedings.
Vacancies in the post of chairman shall be filled by the president of the SIAC.
Other vacancies shall be filled by the respective nominating party. Proceedings
shall continue from the stage they were at when the vacancy occurred.
HONG KONG S.A.R. and MACAU S.A.R. of China: Governing Law, Jurisdiction,
and Arbitration (Section 6): The phrase "the laws of the country in which You
acquired the Program license" in the Governing Law subsection is replaced by
the following:
INDIA: Limitation of Liability (Section 4): The following replaces the terms of
items 1 and 2 of the first paragraph:
1) liability for bodily injury (including death) or damage to real property and
tangible personal property will be limited to that caused by IBM's negligence;
and 2) as to any other actual damage arising in any situation involving
nonperformance by IBM pursuant to, or in any way related to the subject of
this Agreement, IBM's liability will be limited to the charge paid by You for the
individual Program that is the subject of the claim.
If no suit or other legal action is brought, within three years after the cause of
action arose, in respect of any claim that either party may have against the
other, the rights of the concerned party in respect of such claim will be
forfeited and the other party will stand released from its obligations in respect
of such claim.
Arbitration
The number of arbitrators shall be three, with each side to the dispute being
entitled to appoint one arbitrator. The two arbitrators appointed by the parties
shall appoint a third arbitrator who shall act as chairman of the proceedings.
Vacancies in the post of chairman shall be filled by the president of the Bar
Council of India. Other vacancies shall be filled by the respective nominating
party. Proceedings shall continue from the stage they were at when the
vacancy occurred.
Although IBM specifies that there are no warranties, You may have certain
rights under the Consumer Guarantees Act 1993 or other legislation which
cannot be excluded or limited. The Consumer Guarantees Act 1993 will not
apply in respect of any goods which IBM provides, if You require the goods for
the purposes of a business as defined in that Act.
Where Programs are not acquired for the purposes of a business as defined in
Acknowledgements 143
IBM Developer Kit for Linux
the Consumer Guarantees Act 1993, the limitations in this Section are subject
to the limitations in that Act.
All banking charges incurred in the People's Republic of China will be borne by
You and those incurred outside the People's Republic of China will be borne by
IBM.
Governing Law, Jurisdiction, and Arbitration (Section 6): The phrase "the laws
of the country in which You acquired the Program license" in the Governing
Law subsection is replaced by the following:
the laws of the State of New York, United States of America (except when local
law requires otherwise)
Arbitration
The number of arbitrators shall be three, with each side to the dispute being
entitled to appoint one arbitrator. The two arbitrators appointed by the parties
shall appoint a third arbitrator who shall act as chairman of the proceedings.
Vacancies in the post of chairman shall be filled by the president of the
Philippine Dispute Resolution Center, Inc. Other vacancies shall be filled by the
respective nominating party. Proceedings shall continue from the stage they
were at when the vacancy occurred.
No Warranty (Section 3): In the European Union, the following is added at the
beginning of this section:
In the European Union, consumers have legal rights under applicable national
legislation governing the sale of consumer goods. Such rights are not affected
by the provisions of this Section 3.
1. IBM's liability for any damages and losses that may arise as a consequence
of the fulfillment of its obligations under or in connection with this agreement
or due to any other cause related to this agreement is limited to the
compensation of only those damages and losses proved and actually arising as
an immediate and direct consequence of the non-fulfillment of such obligations
(if IBM is at fault) or of such cause, for a maximum amount equal to the
charges You paid for the Program.
The above limitation shall not apply to damages for bodily injuries (including
death) and damages to real property and tangible personal property for which
IBM is legally liable.
3. The limitation and exclusion of liability herein agreed applies not only to the
activities performed by IBM but also to the activities performed by its suppliers
and Program developers, and represents the maximum amount for which IBM
Acknowledgements 145
IBM Developer Kit for Linux
1. IBM's liability for any damages and losses that may arise as a consequence
of the fulfillment of its obligations under or in connection with this agreement
is limited to the compensation of only those damages and losses proved and
actually arising as an immediate and direct consequence of the non-fulfillment
of such obligations (if IBM is at fault), for a maximum amount equal to the
charges You paid for the Program that has caused the damages.
The above limitation shall not apply to damages for bodily injuries (including
death) and damages to real property and tangible personal property for which
IBM is legally liable.
3. The limitation and exclusion of liability herein agreed applies not only to the
activities performed by IBM but also to the activities performed by its suppliers
and Program developers, and represents the maximum amount for which IBM
as well as its suppliers and Program developers, are collectively responsible.
Governing Law
The phrase "the laws of the country in which You acquired the Program
license" is replaced by:
1) "the laws of Austria" in Albania, Armenia, Azerbeijan, Belarus, Bosnia-
Herzegovina, Bulgaria, Croatia, Georgia, Hungary, Kazakhstan, Kyrgyzstan,
FYR Macedonia, Moldavia, Poland, Romania, Russia, Slovakia, Slovenia,
Tajikistan, Turkmenistan, Ukraine, Uzbekistan, and FR Yugoslavia;
2) "the laws of France" in Algeria, Benin, Burkina Faso, Cameroon, Cape
Verde, Central African Republic, Chad, Comoros, Congo Republic, Djibouti,
Democratic Republic of Congo, Equatorial Guinea, French Guiana, French
Polynesia, Gabon, Gambia, Guinea, Guinea-Bissau, Ivory Coast, Lebanon,
Madagascar, Mali, Mauritania, Mauritius, Mayotte, Morocco, New Caledonia,
Niger, Reunion, Senegal, Seychelles, Togo, Tunisia, Vanuatu, and Wallis &
Futuna;
3) "the laws of Finland" in Estonia, Latvia, and Lithuania;
Jurisdiction
1) In Austria the choice of jurisdiction for all disputes arising out of this
Agreement and relating thereto, including its existence, will be the competent
court of law in Vienna, Austria (Inner-City);
2) in Angola, Bahrain, Botswana, Burundi, Egypt, Eritrea, Ethiopia, Ghana,
Jordan, Kenya, Kuwait, Liberia, Malawi, Malta, Mozambique, Nigeria, Oman,
Pakistan, Qatar, Rwanda, Sao Tome, Saudi Arabia, Sierra Leone, Somalia,
Tanzania, Uganda, United Arab Emirates, West Bank/Gaza, Yemen, Zambia,
and Zimbabwe all disputes arising out of this Agreement or related to its
execution, including summary proceedings, will be submitted to the exclusive
jurisdiction of the English courts;
3) in Belgium and Luxembourg, all disputes arising out of this Agreement or
related to its interpretation or its execution, the law, and the courts of the
capital city, of the country of Your registered office and/or commercial site
location only are competent;
4) in France, Algeria, Benin, Burkina Faso, Cameroon, Cape Verde, Central
African Republic, Chad, Comoros, Congo Republic, Djibouti, Democratic
Republic of Congo, Equatorial Guinea, French Guiana, French Polynesia,
Gabon, Gambia, Guinea, Guinea-Bissau, Ivory Coast, Lebanon, Madagascar,
Mali, Mauritania, Mauritius, Mayotte, Morocco, New Caledonia, Niger, Reunion,
Senegal, Seychelles, Togo, Tunisia, Vanuatu, and Wallis & Futuna all disputes
arising out of this Agreement or related to its violation or execution, including
summary proceedings, will be settled exclusively by the Commercial Court of
Paris;
5) in Russia, all disputes arising out of or in relation to the interpretation, the
violation, the termination, the nullity of the execution of this Agreement shall
be settled by Arbitration Court of Moscow;
6) in South Africa, Namibia, Lesotho and Swaziland, both of us agree to submit
all disputes relating to this Agreement to the jurisdiction of the High Court in
Johannesburg;
7) in Turkey all disputes arising out of or in connection with this Agreement
shall be resolved by the Istanbul Central (Sultanahmet) Courts and Execution
Directorates of Istanbul, the Republic of Turkey;
8) in each of the following specified countries, any legal claim arising out of
this Agreement will be brought before, and settled exclusively by, the
competent court of a) Athens for Greece, b) Tel Aviv-Jaffa for Israel, c) Milan
for Italy, d) Lisbon for Portugal, and e) Madrid for Spain; and
9) in the United Kingdom, both of us agree to submit all disputes relating to
this Agreement to the jurisdiction of the English courts.
Acknowledgements 147
IBM Developer Kit for Linux
Arbitration
In Estonia, Latvia and Lithuania all disputes arising in connection with this
Agreement will be finally settled in arbitration that will be held in Helsinki,
Finland in accordance with the arbitration laws of Finland then in effect. Each
party will appoint one arbitrator. The arbitrators will then jointly appoint the
chairman. If arbitrators cannot agree on the chairman, then the Central
Chamber of Commerce in Helsinki will appoint the chairman.
AUSTRIA: No Warranty (Section 3): The terms of this section are completely
replaced by the following:
The following limited warranty applies if You have paid a charge to obtain the
Program:
The warranty period is twelve months from the date of delivery. The limitation
period for consumers in action for breach of warranty is the statutory period as
a minimum.
The warranty for an IBM Program covers the functionality of the Program for
its normal use and the Program's conformity to its specifications.
IBM warrants that when the Program is used in the specified operating
environment it will conform to its specifications. IBM does not warrant
uninterrupted or error-free operation of the Program or that IBM will correct all
Program defects. You are responsible for the results obtained from the use of
the Program.
If the Program does not function as warranted during the warranty period and
the problem cannot be resolved with information available. You may return the
Program to the party from whom You acquired it and receive a refund in the
amount You paid. If You downloaded the Program, You may contact the party
from whom You acquired it to obtain the refund.
For purposes of this clause, contact information will also include information
about You as a legal entity, for example revenue data and other transactional
information.
The limitations and exclusions specified in this Section will not apply to
damages caused by IBM intentionally or by gross negligence.
Any claims resulting from this Agreement are subject to a statute of limitation
of three years, except as stated in Section 3 (No Warranty) of this Agreement.
HUNGARY: Limitation of Liability (Section 4): The following is added at the end
of this section:
The limitation and exclusion specified herein shall not apply to liability for a
breach of contract damaging life, physical well-being, or health that has been
caused intentionally, by gross negligence, or by a criminal act.
The parties accept the limitations of liability as valid provisions and state that
the Section 314.(2) of the Hungarian Civil Code applies as the acquisition price
as well as other advantages arising out of the present Agreement balance this
limitation of liability.
Limitation of Liability (Section 4): The following replaces the terms of this
Acknowledgements 149
IBM Developer Kit for Linux
For the purposes of this section, a "Default" means any act, statement,
omission, or negligence on the part of IBM in connection with, or in relation to,
the subject matter of an Agreement in respect of which IBM is legally liable to
You whether in contract or tort. A number of Defaults which together result in,
or contribute to, substantially the same loss or damage will be treated as one
Default occurring on the date of occurrence of the last such Default.
1. IBM will accept unlimited liability for (a) death or personal injury caused by
the negligence of IBM, and (b) subject always to the Items for Which IBM is
Not Liable below, for physical damage to Your tangible property resulting from
the negligence of IBM.
2. Except as provided in item 1 above, IBM's entire liability for actual damages
for any one Default will not in any event exceed the greater of 1) EUR
125,000, or 2) 125% of the amount You paid for the Program directly relating
to the Default. These limits also apply to any of IBM's suppliers and Program
developers. They state the maximum for which IBM and such suppliers and
Program developers are collectively responsible.
IBM and Customer (hereinafter, individually, "Party") shall comply with all the
obligations of the applicable provisions of law and/or regulation on personal
data protection. Each of the Parties will indemnify and keep the other Party
harmless from any damage, claim, cost or expense incurred by the latter,
directly and or indirectly, as a consequence of an infringement of the other
Party of the mentioned provisions of law and/or regulations.
The limitations apply to the extent they are not prohibited under §§ 373-386
of the Slovak Commercial Code.
General (Section 5): The terms of item 5 are replaced with the following:
For purposes of this clause, contact information will also include information
about You as a legal entity, for example revenue data and other transactional
information.
UNITED KINGDOM: No Warranty (Section 3): The following replaces the first
sentence in the first paragraph of this section:
Limitation of Liability (Section 4): The following replaces the terms of this
section in its entirety:
For the purposes of this section, a "Default" means any act, statement,
omission, or negligence on the part of IBM in connection with, or in relation to,
the subject matter of an Agreement in respect of which IBM is legally liable to
You, whether in contract or tort. A number of Defaults which together result
in, or contribute to, substantially the same loss or damage will be treated as
one Default.
b. any breach of its obligations implied by Section 12 of the Sale of Goods Act
1979 or Section 2 of the Supply of Goods and Services Act 1982, or any
statutory modification or re-enactment of either such Section; and
c. subject always to the Items for Which IBM is Not Liable below, for physical
Acknowledgements 151
IBM Developer Kit for Linux
2. IBM's entire liability for actual damages for any one Default will not in any
event, except as provided in item 1 above, exceed the greater of 1) £75,000,
or 2) 125% of the amount You paid for the Program directly relating to the
Default. These limits also apply to IBM's suppliers and Program developers.
They state the maximum for which IBM and such suppliers and Program
developers are collectively responsible.
Z125-5589-03 (11/2002)
LICENSE INFORMATION
The Programs listed below are licensed under the following terms and
conditions in addition to those of the International License Agreement for Non-
Warranted Programs.
EXPLANATIONS OF TERMS:
announcement letter.
Program-unique Terms
1. GENERAL
To the extent of any conflict between the terms of the International License
Agreement for Non-Warranted Programs and this License Information, the
terms of this License Information shall prevail.
The Program consists of binary code that executes on the operating system(s)
specified in Readme files that accompany the Program.
a) You shall not modify, delete, suppress, or obscure any copyright, trademark
or other legal notice (whether from IBM or any third party) which may be
displayed by or included within the Program.
c) You recognize IBM's and Sun Microsystems, Inc.'s ownership and title to
their respective trademarks and of any goodwill attaching thereto, including
goodwill resulting from use. You will not use or attempt to register any
trademark which is confusingly similar to such IBM or Sun trademarks.
3. PROOF OF ENTITLEMENT
D/N: L-ADAN-5YWF2Z
P/N: L-ADAN-5YWF2Z
Acknowledgements 153
ICU
ICU
COPYRIGHT AND PERMISSION NOTICE
Except as contained in this notice, the name of a copyright holder shall not be
used in advertising or otherwise to promote the sale, use or other dealings in
this Software without prior written authorization of the copyright holder.
Jakarta
Licenses
These licenses help us achieve our goal of providing reliable and long-lived
software products through collaborative open source software development. In
all cases, contributors retain full rights to use their original contributions for
any other purpose outside of Apache while providing the ASF and its projects
the right to distribute and build upon their work within Apache.
Licensing of Distributions
The 2.0 version of the Apache License was approved by the ASF in 2004. The
goals of this license revision have been to reduce the number of frequently
asked questions, to allow the license to be reusable without modification by
any project (including non-ASF projects), to allow the license to be included by
reference instead of listed in every file, to clarify the license on submission of
contributions, to require a patent license on contributions that necessarily
infringe the contributor's own patents, and to move comments regarding
Apache and other inherited attribution notices to a location outside the license
terms (the NOTICE file).
All packages produced by the ASF are implicitly licensed under the Apache
License, Version 2.0, unless otherwise explicitly stated. More developer
documentation on how to apply the Apache License to your work can be found
in Applying the Apache License, Version 2.0.
Acknowledgements 155
Jakarta
http://www.apache.org/licenses/LICENSE-1.1
The 1.1 version of the Apache License was approved by the ASF in 2000. The
primary change from the 1.0 license is in the 'advertising clause' (section 3 of
the 1.0 license); derived products are no longer required to include attribution
in their advertising materials, but only in their documentation.
Individual packages licensed under the 1.1 version may use different wording
due to varying requirements for attribution or mark identification, but the
binding terms were all the same.
http://www.apache.org/licenses/LICENSE-1.0
This is the original Apache License which applies only to older versions of
Apache packages (such as version 1.2 of the Web server).
The ASF desires that all contributors of ideas, code, or documentation to the
Apache projects complete, sign, and submit (via snailmail or fax) a Individual
Contributor License Agreement (CLA) [PDF form]. The purpose of this
agreement is to clearly define the terms under which intellectual property has
been contributed to the ASF and thereby allow us to defend the project should
there be a legal dispute regarding the software at some future time. A signed
CLA is required to be on file before an individual is given commit rights to an
ASF project.
Note: If you choose to send this document via fax, rather than via traditional
postal mail, then be absolutely sure that you have sent it correctly. Often
faxes are received back-to-front, blank, or totally illegible.
Software Grants
Open SSL
LICENSE ISSUES
==============
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the
OpenSSL License and the original SSLeay license apply to the toolkit. See
below for the actual license texts. Actually both licenses are BSD-style Open
Source licenses. In case of any license issues related to OpenSSL please
contact openssl-core@openssl.org.
OpenSSL License
---------------
/*
================================================
====================
* "This product includes software developed by the OpenSSL Project for use
in the OpenSSL Toolkit. (http://www.openssl.org/)"
Acknowledgements 157
Open SSL
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used
to endorse or promote products derived from this software without prior
written permission. For written permission, please contact openssl-
core@openssl.org.
* 5. Products derived from this software may not be called "OpenSSL" nor
may "OpenSSL" appear in their names without prior written permission of the
OpenSSL Project.
* "This product includes software developed by the OpenSSL Project for use
in the OpenSSL Toolkit (http://www.openssl.org/)"
*
================================================
====================
*/
-----------------------
* This library is free for commercial and non-commercial use as long as the
following conditions are aheared to. The following conditions apply to all code
found in this distribution, be it the RC4, RSA,
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
included with this distribution is covered by the same copyright terms except
that the holder is Tim Hudson (tjh@cryptsoft.com).
* Copyright remains Eric Young's, and as such any Copyright notices in the
code are not to be removed.
* 1. Redistributions of source code must retain the copyright notice, this list
of conditions and the following disclaimer.
Acknowledgements 159
Open SSL
* The word 'cryptographic' can be left out if the rouines from the library
being used are not cryptographic related :-).
* 4. If you include any Windows specific code (or a derivative thereof) from
the apps directory (application code) you must include an acknowledgement:
* The licence and distribution terms for any publically available version or
derivative of this code cannot be changed. i.e. this code cannot simply be
copied and put under another distribution licence
*/
PCRE
PCRE LICENCE
------------
* Redistributions of source code must retain the above copyright notice, this
list of conditions and the following disclaimer.
* Neither the name of the University of Cambridge nor the names of its
contributors may be used to endorse or promote products derived from this
software without specific prior written permission.
Acknowledgements 161
PCRE
End
Struts
Licenses
These licenses help us achieve our goal of providing reliable and long-lived
software products through collaborative open source software development. In
all cases, contributors retain full rights to use their original contributions for
any other purpose outside of Apache while providing the ASF and its projects
the right to distribute and build upon their work within Apache.
Licensing of Distributions
The 2.0 version of the Apache License was approved by the ASF in 2004. The
goals of this license revision have been to reduce the number of frequently
asked questions, to allow the license to be reusable without modification by
any project (including non-ASF projects), to allow the license to be included by
reference instead of listed in every file, to clarify the license on submission of
contributions, to require a patent license on contributions that necessarily
infringe the contributor's own patents, and to move comments regarding
Apache and other inherited attribution notices to a location outside the license
terms (the NOTICE file).
All packages produced by the ASF are implicitly licensed under the Apache
License, Version 2.0, unless otherwise explicitly stated. More developer
documentation on how to apply the Apache License to your work can be found
in Applying the Apache License, Version 2.0.
Acknowledgements 163
Struts
http://www.apache.org/licenses/LICENSE-1.1
The 1.1 version of the Apache License was approved by the ASF in 2000. The
primary change from the 1.0 license is in the 'advertising clause' (section 3 of
the 1.0 license); derived products are no longer required to include attribution
in their advertising materials, but only in their documentation.
Individual packages licensed under the 1.1 version may use different wording
due to varying requirements for attribution or mark identification, but the
binding terms were all the same.
http://www.apache.org/licenses/LICENSE-1.0
This is the original Apache License which applies only to older versions of
Apache packages (such as version 1.2 of the Web server).
The ASF desires that all contributors of ideas, code, or documentation to the
Apache projects complete, sign, and submit (via snailmail or fax) a Individual
Contributor License Agreement (CLA) [PDF form]. The purpose of this
agreement is to clearly define the terms under which intellectual property has
been contributed to the ASF and thereby allow us to defend the project should
there be a legal dispute regarding the software at some future time. A signed
CLA is required to be on file before an individual is given commit rights to an
ASF project.
Note: If you choose to send this document via fax, rather than via traditional
postal mail, then be absolutely sure that you have sent it correctly. Often
faxes are received back-to-front, blank, or totally illegible.
Software Grants
Sun JDK
Sun Microsystems, Inc.
Acknowledgements 165
Sun JDK
4.LIMITED WARRANTY. Sun warrants to you that for a period of ninety (90)
days from the date of purchase, as evidenced by a copy of the receipt, the
media on which Software is furnished (if any) will be free of defects in
materials and workmanship under normal use. Except for the foregoing,
Software is provided "AS IS". Your exclusive remedy and Sun's entire liability
under this limited warranty will be at Sun's option to replace Software media
or refund the fee paid for Software. Any implied warranties on the Software
are limited to 90 days. Some states do not allow limitations on duration of an
implied warranty, so the above may not apply to you. This limited warranty
gives you specific legal rights. You may have others, which vary from state to
state.
Acknowledgements 167
Sun JDK
These Supplemental License Terms add to or modify the terms of the Binary
Code License Agreement. Capitalized terms not defined in these Supplemental
Terms shall have the same meanings ascribed to them in the Binary Code
License Agreement . These Supplemental Terms shall supersede any
inconsistent or conflicting terms in the Binary Code License Agreement, or in
any license contained within the Software.
A.Software Internal Use and Development License Grant. Subject to the terms
and conditions of this Agreement, including, but not limited to the Java
Technology Restrictions of these Supplemental Terms, Sun grants you a non-
exclusive, non-transferable, limited license without fees to reproduce internally
and use internally the Software complete and unmodified (unless otherwise
specified in the applicable README file) for the purpose of designing,
developing, and testing your Programs.
Acknowledgements 169
Sun JDK
D.Java Technology Restrictions. You may not modify the Java Platform
Interface ("JPI", identified as classes contained within the "java" package or
any subpackages of the "java" package), by creating additional classes within
the JPI or otherwise causing the addition to or modification of the classes in
the JPI. In the event that you create an additional class and associated API(s)
which (i) extends the functionality of the Java platform, and (ii) is exposed to
third party software developers for the purpose of developing additional
software which invokes such additional API, you must promptly publish
broadly an accurate specification for such API for free use by all developers.
You may not create, or authorize your licensees to create, additional classes,
interfaces, or subpackages that are in any way identified as "java", "javax",
"sun" or similar convention as specified by Sun in any naming convention
designation.
F.Source Code. Software may contain source code that, unless expressly
licensed for other purposes, is provided solely for reference purposes pursuant
to the terms of this Agreement. Source code may not be redistributed unless
expressly provided for in this Agreement.
Acknowledgements 171
Sun JDK
G.Third Party Code. Additional copyright notices and license terms applicable
to portions of the Software are set forth in the
THIRDPARTYLICENSEREADME.txt file. In addition to any terms and conditions
of any third party opensource/freeware license identified in the
THIRDPARTYLICENSEREADME.txt file, the disclaimer of warranty and
limitation of liability provisions in paragraphs 5 and 6 of the Binary Code
License Agreement shall apply to all Software in this distribution.
For inquiries please contact: Sun Microsystems, Inc., 4150 Network Circle,
Santa Clara, California 95054, U.S.A.
(LFI#141496/Form ID#011801)
1. Redistributions of source code must retain the above copyright notice, this
list of conditions and the following disclaimer.
B) The following software may be included in this product: DES and 3xDES ;
Use of any of this software is governed by the terms of the license below:
Acknowledgements 173
Sun JDK
1. Redistributions of source code must retain the above copyright notice, this
list of conditions and the following disclaimer.
Crimson v1.1.1 ; Use of any of this software is governed by the terms of the
license below:
/*
* 1. Redistributions of source code must retain the above copyright notice, this
list of conditions and the following disclaimer.
* 5. Products derived from this software may not be called "Apache", nor may
"Apache" appear in their name, without prior written permission of the Apache
Software Foundation.
*
================================================
====================
*/
D) The following software may be included in this product: Xalan J2; Use of
any of this software is governed by the terms of the license below:
/*
Acknowledgements 175
Sun JDK
* 1. Redistributions of source code must retain the above copyright notice, this
list of conditions and the following disclaimer.
* 4. The names "Xalan" and "Apache Software Foundation" must not be used
to endorse or promote products derived from this software without prior
written permission. For written permission, please contact
apache@apache.org.
* 5. Products derived from this software may not be called "Apache", nor may
"Apache" appear in their name, without prior written permission of the Apache
Software Foundation.
*
================================================
====================
*/
E) The following software may be included in this product: NSIS 1.0j; Use of
any of this software is governed by the terms of the license below:
1. The origin of this software must not be misrepresented; you must not claim
that you wrote the original software. If you use this software in a product, an
acknowledgment in the product documentation would be appreciated but is not
required.
2. Altered source versions must be plainly marked as such, and must not be
misrepresented as being the original software.
3. This notice may not be removed or altered from any source distribution.
Justin Frankel justin@nullsoft.com"
Acknowledgements 177
Sun JRE 1.5
4. LIMITED WARRANTY. Sun warrants to you that for a period of ninety (90)
days from the date of purchase, as evidenced by a copy of the receipt, the
media on which Software is furnished (if any) will be free of defects in
materials and workmanship under normal use. Except for the foregoing,
Software is provided "AS IS". Your exclusive remedy and Sun's entire liability
under this limited warranty will be at Sun's option to replace Software media
or refund the fee paid for Software. Any implied warranties on the Software
are limited to 90 days. Some states do not allow limitations on duration of an
implied warranty, so the above may not apply to you. This limited warranty
gives you specific legal rights. You may have others, which vary from state to
state.
Acknowledgements 179
Sun JRE 1.5
11. GOVERNING LAW. Any action related to this Agreement will be governed
by California law and controlling U.S. federal law. No choice of law rules of
any jurisdiction will apply.
13. INTEGRATION. This Agreement is the entire agreement between you and
Sun relating to its subject matter. It supersedes all prior or contemporaneous
oral or written communications, proposals, representations and warranties and
prevails over any conflicting or additional terms of any quote, order,
acknowledgment, or other communication between the parties relating to its
subject matter during the term of this Agreement. No modification of this
Agreement will be binding, unless in writing and signed by an authorized
representative of each party.
These Supplemental License Terms add to or modify the terms of the Binary
Code License Agreement. Capitalized terms not defined in these Supplemental
Terms shall have the same meanings ascribed to them in the Binary Code
License Agreement . These Supplemental Terms shall supersede any
inconsistent or conflicting terms in the Binary Code License Agreement, or in
any license contained within the Software.
A. Software Internal Use and Development License Grant. Subject to the terms
and conditions of this Agreement and restrictions and exceptions set forth in
the Software "README" file, including, but not limited to the Java Technology
Restrictions of these Supplemental Terms, Sun grants you a non-exclusive,
non-transferable, limited license without fees to reproduce internally and use
internally the Software complete and unmodified for the purpose of designing,
developing, and testing your Programs.
C. Java Technology Restrictions. You may not create, modify, or change the
behavior of, or authorize your licensees to create, modify, or change the
behavior of, classes, interfaces, or subpackages that are in any way identified
as "java", "javax", "sun" or similar convention as specified by Sun in any
naming convention designation.
D. Source Code. Software may contain source code that, unless expressly
licensed for other purposes, is provided solely for reference purposes pursuant
to the terms of this Agreement. Source code may not be redistributed unless
expressly provided for in this Agreement.
E. Third Party Code. Additional copyright notices and license terms applicable
to portions of the Software are set forth in the
THIRDPARTYLICENSEREADME.txt file. In addition to any terms and conditions
of any third party opensource/freeware license identified in the
THIRDPARTYLICENSEREADME.txt file, the disclaimer of warranty and limitation
of liability provisions in paragraphs 5 and 6 of the Binary Code License
Agreement shall apply to all Software in this distribution.
For inquiries please contact: Sun Microsystems, Inc., 4150 Network Circle,
Santa Clara, California 95054, U.S.A.
(LFI#141623/Form ID#011801)
Acknowledgements 181
Sun JRE
Sun JRE
Copyright 1994-2005 Sun Microsystems, Inc. All Rights Reserved.
Neither the name of Sun Microsystems, Inc. or the names of contributors may
be used to endorse or promote products derived from this software without
specific prior written permission.
This software is provided "AS IS," without a warranty of any kind. ALL
EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES,
INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE HEREBY EXCLUDED.
SUN MICROSYSTEMS, INC. ("SUN") AND ITS LICENSORS SHALL NOT BE
LIABLE FOR ANY DAMAGES SUFFERED BY LICENSEE AS A RESULT OF USING,
MODIFYING OR DISTRIBUTING THIS SOFTWARE OR ITS DERIVATIVES. IN NO
EVENT WILL SUN OR ITS LICENSORS BE LIABLE FOR ANY LOST REVENUE,
PROFIT OR DATA, OR FOR DIRECT, INDIRECT, SPECIAL, CONSEQUENTIAL,
INCIDENTAL OR PUNITIVE DAMAGES, HOWEVER CAUSED AND REGARDLESS
OF THE THEORY OF LIABILITY, ARISING OUT OF THE USE OF OR INABILITY
TO USE THIS SOFTWARE, EVEN IF SUN HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.
You acknowledge that this software is not designed, licensed or intended for
use in the design, construction, operation or maintenance of any nuclear
facility.
XERCES
The Apache Software License, Version 2.0
Apache License
http://www.apache.org/licenses/
1. Definitions.
"License" shall mean the terms and conditions for use, reproduction, and
distribution as defined by Sections 1 through 9 of this document.
"Legal Entity" shall mean the union of the acting entity and all other
entities that control, are controlled by, or are under common control with that
entity. For the purposes of this definition, "control" means (i) the power, direct
or indirect, to cause the direction or management of such entity, whether by
contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the
outstanding shares, or (iii) beneficial ownership of such entity.
"Source" form shall mean the preferred form for making modifications,
including but not limited to software source code, documentation source, and
configuration files.
Acknowledgements 183
XERCES
3. Grant of Patent License. Subject to the terms and conditions of this License,
each Contributor hereby grants to You a perpetual, worldwide, non-exclusive,
no-charge, royalty-free, irrevocable (except as stated in this section) patent
license to make, have made, use, offer to sell, sell, import, and otherwise
transfer the Work, where such license applies only to those patent claims
licensable by such Contributor that are necessarily infringed by their
Contribution(s) alone or by combination of their Contribution(s) with the Work
to which such Contribution(s) was submitted. If You institute patent litigation
against any entity (including a cross-claim or counterclaim in a lawsuit)
alleging that the Work or a Contribution incorporated within the Work
constitutes direct or contributory patent infringement, then any patent licenses
granted to You under this License for that Work shall terminate as of the date
such litigation is filed.
(a) You must give any other recipients of the Work or Derivative Works a
copy of this License; and
(b) You must cause any modified files to carry prominent notices stating
that You changed the files; and
(c) You must retain, in the Source form of any Derivative Works that You
distribute, all copyright, patent, trademark, and attribution notices from the
Source form of the Work, excluding those notices that do not pertain to any
part of the Derivative Works; and
(d) If the Work includes a "NOTICE" text file as part of its distribution,
then any Derivative Works that You distribute must include a readable copy of
the attribution notices contained within such NOTICE file, excluding those
notices that do not pertain to any part of the Derivative Works, in at least one
of the following places: within a NOTICE text file distributed as part of the
Derivative Works; within the Source form or documentation, if provided along
with the Derivative Works; or, within a display generated by the Derivative
Works, if and wherever such third-party notices normally appear. The contents
of the NOTICE file are for informational purposes only and do not modify the
License. You may add Your own attribution notices within Derivative Works
that You distribute, alongside or as an addendum to the NOTICE text from the
Work, provided that such additional attribution notices cannot be construed as
modifying the License.
You may add Your own copyright statement to Your modifications and may
provide additional or different license terms and conditions for use,
reproduction, or distribution of Your modifications, or for any such Derivative
Works as a whole, provided Your use, reproduction, and distribution of the
Work otherwise complies with the conditions stated in this License.
6. Trademarks. This License does not grant permission to use the trade
names, trademarks, service marks, or product names of the Licensor, except
as required for reasonable and customary use in describing the origin of the
Work and reproducing the content of the NOTICE file.
Acknowledgements 185
XERCES
To apply the Apache License to your work, attach the following boilerplate
notice, with the fields enclosed by brackets "[]" replaced with your own
identifying information. (Don't include the brackets!) The text should be
enclosed in the appropriate comment syntax for the file format. We also
recommend that a file or class name and description of purpose be included on
the same "printed page" as the copyright notice for easier identification within
third-party archives.
Licensed under the Apache License, Version 2.0 (the "License"); you may not
use this file except in compliance with the License.
See the License for the specific language governing permissions and
limitations under the License.
Acknowledgements 187
XMLSEC
XMLSEC
The Apache Software License, Version 2.0
Apache License
http://www.apache.org/licenses/
1. Definitions.
"License" shall mean the terms and conditions for use, reproduction, and
distribution as defined by Sections 1 through 9 of this document.
"Legal Entity" shall mean the union of the acting entity and all other
entities that control, are controlled by, or are under common control with that
entity. For the purposes of this definition, "control" means (i) the power, direct
or indirect, to cause the direction or management of such entity, whether by
contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the
outstanding shares, or (iii) beneficial ownership of such entity.
"Source" form shall mean the preferred form for making modifications,
including but not limited to software source code, documentation source, and
configuration files.
3. Grant of Patent License. Subject to the terms and conditions of this License,
each Contributor hereby grants to You a perpetual, worldwide, non-exclusive,
no-charge, royalty-free, irrevocable (except as stated in this section) patent
license to make, have made, use, offer to sell, sell, import, and otherwise
transfer the Work, where such license applies only to those patent claims
licensable by such Contributor that are necessarily infringed by their
Contribution(s) alone or by combination of their Contribution(s) with the Work
to which such Contribution(s) was submitted. If You institute patent litigation
against any entity (including a cross-claim or counterclaim in a lawsuit)
alleging that the Work or a Contribution incorporated within the Work
constitutes direct or contributory patent infringement, then any patent licenses
granted to You under this License for that Work shall terminate as of the date
such litigation is filed.
Acknowledgements 189
XMLSEC
(a) You must give any other recipients of the Work or Derivative Works a
copy of this License; and
(b) You must cause any modified files to carry prominent notices stating
that You changed the files; and
(c) You must retain, in the Source form of any Derivative Works that You
distribute, all copyright, patent, trademark, and attribution notices from the
Source form of the Work, excluding those notices that do not pertain to any
part of the Derivative Works; and
(d) If the Work includes a "NOTICE" text file as part of its distribution,
then any Derivative Works that You distribute must include a readable copy of
the attribution notices contained within such NOTICE file, excluding those
notices that do not pertain to any part of the Derivative Works, in at least one
of the following places: within a NOTICE text file distributed as part of the
Derivative Works; within the Source form or documentation, if provided along
with the Derivative Works; or, within a display generated by the Derivative
Works, if and wherever such third-party notices normally appear. The contents
of the NOTICE file are for informational purposes only and do not modify the
License. You may add Your own attribution notices within Derivative Works
that You distribute, alongside or as an addendum to the NOTICE text from the
Work, provided that such additional attribution notices cannot be construed as
modifying the License.
You may add Your own copyright statement to Your modifications and may
provide additional or different license terms and conditions for use,
reproduction, or distribution of Your modifications, or for any such Derivative
Works as a whole, provided Your use, reproduction, and distribution of the
Work otherwise complies with the conditions stated in this License.
6. Trademarks. This License does not grant permission to use the trade
names, trademarks, service marks, or product names of the Licensor, except
as required for reasonable and customary use in describing the origin of the
Work and reproducing the content of the NOTICE file.
To apply the Apache License to your work, attach the following boilerplate
notice, with the fields enclosed by brackets "[]" replaced with your own
identifying information. (Don't include the brackets!) The text should be
enclosed in the appropriate comment syntax for the file format. We also
recommend that a file or class name and description of purpose be included on
the same "printed page" as the copyright notice for easier identification within
third-party archives.
Licensed under the Apache License, Version 2.0 (the "License"); you may not
use this file except in compliance with the License.
Acknowledgements 191
zlib
See the License for the specific language governing permissions and
limitations under the License.
zlib
/* zlib.h -- interface of the 'zlib' general purpose compression library version
1.2.2, October 3rd, 2004
Permission is granted to anyone to use this software for any purpose, including
commercial applications, and to alter it and redistribute it freely, subject to the
following restrictions:
1. The origin of this software must not be misrepresented; you must not claim
that you wrote the original software. If you use this software in a product, an
acknowledgment in the product documentation would be appreciated but is not
required.
2. Altered source versions must be plainly marked as such, and must not be
misrepresented as being the original software.
3. This notice may not be removed or altered from any source distribution.
jloup@gzip.org madler@alumni.caltech.edu
The data format used by the zlib library is described by RFCs (Request for
Comments) 1950 to 1952 in the files http://www.ietf.org/rfc/rfc1950.txt (zlib
format), rfc1951.txt (deflate format) and rfc1952.txt (gzip format)
E P
email policies • 38 PERFMON • 54
ETRUSTAV console • 99 Performance Monitor • 54
policies
G email • 38
enforcement of • 29
guest account on admin server • 57
legacy signature distribution • 36
I locking settings • 30
precedence • 30
ICF files scheduled jobs • 34
granting administrator rights at installation scheduled scanner • 34
time • 57 send for analysis • 37
inherited user rights • 59 proxy server
INOC6.ICF configuration • 21
administrator rights at installation • 57 considerations • 22
Index 193
override option • 21 W
R web access to ITM Server • 11
web browsers
remote management
using to access eTrust Antivirus • 11
Threat Management Console • 55
windows
reports
administrator view • 55
reports tab • 61
WorldView • 86
rights
administrator • 57
running Alert Manager • 74
S
scan settings
using the command line scanner Inocmd32
• 77
scheduled jobs
viewing logs for multiple machines • 47
security
administrator view • 55
service manager • 51
specified user rights • 59
subnets
discovering • 23
system metrics information • 53
T
Threat Management Console
access • 55
configuration settings • 29
e-mail policies • 38
Organization tree • 17
viewing logs • 47
window • 55
U
Unicenter Network and Systems Management
(integration with) • 83
UNIX/Linux
access permissions • 56
alert notification • 75
approved server • 57
InoSetApproved • 57
managing daemons • 51
notification facility • 75
root user • 56
user rights
characteristics • 59