Guest

Cisco ProtectLink Security

TrendMicro ProtectLink FAQs

Document ID: 108946

Updated: Dec 12, 2008

   Print

Contents

Introduction
TREND MICRO PROTECTLINK: FREQUENTLY ASKED QUESTIONS
Related Information

Introduction


This article is one in a series to assist in the setup, troubleshooting, and maintenance of Cisco Small Business products (formerly Linksys Business Series).

Q. TREND MICRO PROTECTLINK: FREQUENTLY ASKED QUESTIONS

A.

1.�What is the PURPOSE of Trend Micro Web Protection?

The Trend Micro Web Protection is used to manage and protect employee Internet use by blocking access to non-work-related and malicious Web sites.

2.�What is Trend Micro InterScan Messaging Hosted Security (IMHS)?

Trend Micro InterScan Messaging Hosted Security is a hosted email security service that can benefit any size organization. We provide the hardware, software, and messaging expertise to cleanse your email of spam, viruses, worms, Trojans, and phishing (identity theft) attacks.

The cleaned mail stream is sent directly to your mail server for final delivery to your end users. To use this service you must manage and have administrative access to your own SMTP server.

Note: You would need to have the domain/IP information ready during the registration process.

3.�How do I obtain the ProtectLink Service?

You must first have a supported Linksys Router that works with this service. Next, you would need to follow the steps below:

Step 1:
Purchase a Registration key from a Linksys approved Retailer
Step 2:
You would be able to log into your router's interface with the Registration Key. Proceed to the Security Protection tab and you should see a link from there to sign up for the ProtectLink service

Note: Currently the ProtectLink service only applies for the RV042 but will soon include many of our Business Class Routers. Keep checking the Cisco website for firmware updates if you have a router not currently included on the list.

4.�How much does the Trend Micro service cost?

Trend Micro InterScan Messaging Hosted Security (IMHS) is sold in 5 seat and 25 seat increments on an annual payment plan. Please contact Sales or a Local/Online Retail for exact pricing.

5.�How long does the Trend Micro service initial setup take?

If you are just registering for the Trend Micro Web Protection service, it can take up to 24 hours to activate your account through TrendMicro. You should receive an email containing your account information and instructions on managing your account.

Once this feature is active, if you chose to sign up for the IMHS Service during registration, it can take up to another 24-48 hours to receive your account information and instructions on managing this service as well.

However, once your IMHS account is active it may take an additional 24 hours to update your MX record.

6.�My router is listed but I do see the Security Protection Tab within the Web user interface.

Go to www.cisco.com/support and upgrade to the latest firmware.

7.�I've already signed up for the Web Protection service but now I want to use the IMHS service as well. How do I add this?

In order to activate the IMHS Service after initial registration, please contact TrendMicro Support at imhs_support@trendmicro.com with your SMTP server domain/IP information.

8.�How do I begin using the IMHS service? Do I need to install, configure, or maintain anything?

A simple redirection of your Mail eXchange (MX) record is all that is needed to start the service.

This process can be activated either via the Initial TrendMicro Registration or through contacting imhs_support@trendmicro.com if you have already activated the Web Protection feature of the service.

Your email is processed by the Trend Micro InterScan Messaging Hosted Security to remove spam, viruses, worms, Trojans, and phishing attacks. The clean messages are then sent directly to your mail server.

9.�What level of Web Reputation should I select?

The higher the security level is, the more URLs that are known or suspected to be a Web threat will be blocked.

High: Blocks a greater number of Web threats but increases the risk of false positives.
Medium: Blocks most Web threats and does not create too many false positives. This is the RECOMMENDED setting.
Low: Blocks fewer Web threats but reduces the risk of false positives.

Related Information

Updated: Dec 12, 2008
Document ID: 108946