Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [TRENDX_SCAN_INI_SECTION]
- GlobalFileScanServerAddress=osce120-en-f.trx.trendmicro.com
- GlobalFileScanServerPort=443
- GlobalBhvrScanServerAddress=osce120-en-b.trx.trendmicro.com
- GlobalBhvrScanServerPort=443
- GlobalFileScanServerSSLVerifyPeer=1
- GlobalScanServerProxyUserName=
- GlobalFileScanServerProxyPassword=
- [TrendX_Settings]
- EnableTrendX=1
- EnableFile=1
- EnableProcess=1
- ActionForFile=0
- ActionForProcess=0
- [INI_HELP_FILE_SECTION]
- help_01=web00001.htm
- help_02=web00002.htm
- help_03=web00003.htm
- help_04=web00004.htm
- help_05=web00005.htm
- help_06=web00006.htm
- help_07=web00007.htm
- help_08=web00008.htm
- help_09=web00009.htm
- help_10=web00010.htm
- help_11=web00011.htm
- help_12=web00012.htm
- help_13=web00019.htm
- help_14=web00014.htm
- help_15=web00021.htm
- help_16=web00022.htm
- help_17=web00023.htm
- help_18=web00024.htm
- help_19=web00025.htm
- help_20=web00020.htm
- help_21=web00021.htm
- help_22=web00024.htm
- help_23=web00023.htm
- help_24=web00030.htm
- help_25=web00031.htm
- help_26=web00032.htm
- help_27=web00027.htm
- help_28=web00034.htm
- help_29=web00029.htm
- help_30=web00030.htm
- help_31=web00031.htm
- help_32=web00038.htm
- help_33=web00039.htm
- help_34=web00034.htm
- help_35=web00041.htm
- help_36=web00042.htm
- help_37=web00037.htm
- help_38=web00044.htm
- help_39=web00039.htm
- help_40=web00040.htm
- help_41=web00041.htm
- help_42=web00048.htm
- help_43=web00043.htm
- help_44=web00050.htm
- help_45=web00051.htm
- help_46=web00052.htm
- help_47=web00047.htm
- help_48=web00013.htm
- help_49=web00027.htm
- help_50=web00011.htm
- help_51=web00028.htm
- help_52=web00009.htm
- help_53=web00013.htm
- help_55=web00008.htm
- help_57=web00012.htm
- help_58=web00012.htm
- help_60=web00010.htm
- help_61=web00060.htm
- help_62=web00100.htm
- Virus_Encyclopedia_URL=http://www.trendmicro.com/vinfo/virusencyclo/default5.asp
- Spyware_Encyclopedia_URL=http://about-threats.trendmicro.com/Malware.aspx?language=us&name=$SPYWARE_NAME$
- Threat_Connect_Link_URL=
- Threat_Connect_Language=
- Threat_Connect_Country=
- [INI_DELAY_CLIENT_REQUEST_SECTION]
- Delay_Ptnfile_Update=10
- Delay_NT_Update=30
- Delay_Win32_Update=30
- Delay_Request_Cfg=0
- Delay_Request_Alert_Msg=0
- Delay_Request_INI=0
- [INI_ROLLBACK_SECTION]
- RollBack_Current_Ptnfile=
- RollBack_Previous_Ptnfile=
- RollBack_Previous_NT_Engine=9.900.1011
- RollBack_Previous_X64_Engine=9.900.1011
- RollBack_Previous_IA64_Engine=
- RollBack_Previous_NT_Engine_Temp=9.950.1006
- RollBack_Previous_X64_Engine_Temp=9.950.1006
- [INI_PROGRAM_VERSION_SECTION]
- Pattern_Last_Update=20171006073511
- PccNT_Version=12.0
- PccNT_BuildNum=1315
- PccNT_Last_Update=20170922013110
- Pccw16_Version=12.0
- Pccw16_Last_Update=20170922013110
- Engine31_Version=5.500
- Engine31_Last_Update=20170922013110
- Program_Version=12.0
- Program_Last_Update=20170922013110
- EngineNT_Version=9.950.1006
- EngineNT_Last_Update=20170922031246
- TSCPtn_Version=1540
- TSCPtn_Last_Update=20171006073556
- DCS_Spy_Ptn_Version=222
- DCS_Spy_Ptn_Last_Update=
- TSCEng_Version=7.5.1056
- TSCEng_Last_Update=20170922013110
- TSCEng_x64_Version=7.5.1056
- TSCEng_x64_Last_Update=
- SpyWarePtn_Version=0
- SpyWarePtn_Last_Update=20170922013110
- CFWPtn_Version=10337
- CFWPtn_Last_Update=20170922031518
- CFWEngNT_Version=5.82.1089
- CFWEngNT_Last_Update=20170922013110
- CFWEngNT_x64_Version=5.82.1089
- CFWEngNT_x64_Last_Update=
- CTAPrg_Version=2.1.103
- CTAPrg_Last_Update=20170922013110
- CTASupplicant=0
- Temp_Version=
- Temp_Last_Update=
- PccX64_Version=12.0
- PccX64_BuildNum=4345
- PccX64_Last_Update=
- PccIA64_Version=12.0
- PccIA64_Last_Update=
- EngineX64_Version=9.950.1006
- EngineX64_Last_Update=20170922031251
- EngineIA64_Version=8.952.1009
- EngineIA64_Last_Update=20170922013110
- SSAPI_Engine_Version=6.2.4014
- SSAPI_Engine_Last_Update=
- SSAPI_Engine_x64_Version=6.2.4014
- SSAPI_Engine_x64_Last_Update=
- SSAPI_Pattern_Version=1879
- SSAPI_Pattern_Last_Update=20171006073533
- SSAPI_VSAPI_Spy_Pattern_Version=187900
- SSAPI_VSAPI_Spy_Pattern_Last_Update=
- Rootkit_Common_Module_Version=5.50.1087
- Rootkit_Common_Module_Last_Update=
- AEGISBMDrv32Version=2.976.1159
- AEGISBMDrv32_Last_Update=
- AEGISBMSvc32Version=2.976.1162
- AEGISBMSvc32_Last_Update=
- AEGISBMDrv64Version=2.976.1159
- AEGISBMDrv64_Last_Update=
- AEGISBMSvc64Version=2.976.1162
- AEGISBMSvc64_Last_Update=
- AEGISPEPtnVersion=123700
- AEGISPEPtn_Last_Update=20170922031545
- AEGISBMCfgPtnVersion=123500
- AEGISBMCfgPtn_Last_Update=20170922031539
- AEGISWLPtnVersion=152600
- AEGISWLPtn_Last_Update=20171006073603
- AEGISTDPtnVersion=170500
- AEGISTDPtn_Last_Update=20171006073558
- AEGISTDPtn64Version=170564
- AEGISTDPtn64_Last_Update=20171006073601
- NCIE_CNP_Version=11015500
- NCIE_CNP_Last_Update=20171006073606
- NCIE_RR_Version=11030300
- NCIE_RR_Last_Update=20171006073608
- TMEBC32_Version=1.5.1023
- TMEBC32_Last_Update=
- TMEBC64_Version=1.5.1023
- TMEBC64_Last_Update=
- ATSE32_Version=9.861.1042
- ATSE32_Last_Update=
- ATSE64_Version=9.861.1042
- ATSE64_Last_Update=
- XHLDR32_Version=1.0.1052
- XHLDR32_Last_Update=
- XHLDR64_Version=1.0.1052
- XHLDR64_Last_Update=
- FALCON32_Version=1.0.1086
- FALCON32_Last_Update=20170922013659
- FALCON64_Version=1.0.1086
- FALCON64_Last_Update=20170922013659
- FALCONPtn_Version=102200
- FALCONPtn_Last_Update=
- ATSEPtn_Version=111100
- ATSEPtn_Last_Update=
- Trap_WhiteList_Version=144100
- Trap_WhiteList_Last_Update=20171006073519
- Trap_BlackList_Version=23500
- Trap_BlackList_Last_Update=20170922031219
- VSAPI_RegionalCPRVer=0.000.00
- VSAPI_RegionalCPRVer_Last_Update=
- VSAPI_CustomizedCPRVer=0.000.00
- VSAPI_CustomizedCPRVer_Last_Update=
- DCE_RegionalCPRVer=0
- DCE_RegionalCPRVer_Last_Update=
- DCE_CustomizedCPRVer=0
- DCE_CustomizedCPRVer_Last_Update=
- NonCrcPtnVersion=13.699.00
- Non_CRC_Pattern_Last_Update=20171006073344
- BFPtnVersion=10148.002.00
- BF_Pattern_Last_Update=
- CRCZPtnVersion=13636.006.00
- CRCZ_Pattern_Last_Update=
- BEPPtn_Version=751554
- BEPPtn_Last_Update=20170922031622
- SALPtn_Version=13801300
- SALPtn_Last_Update=20170922031632
- SMVPtnVersion=141700
- SMVPtn_Last_Update=20171006073523
- AEGISTMMSTPtnVersion=1200
- AEGISTMMSTPtn_Last_Update=20170922031555
- AEGISTMMSTPtn64Version=1264
- AEGISTMMSTPtn64_Last_Update=
- ELAMPtn32Version=17
- ELAMPtn32_Last_Update=20171006073526
- ELAMPtn64Version=17
- ELAMPtn64_Last_Update=20171006073528
- TMUMH_Pattern_Version=252048
- TMUMH_Pattern_Last_Update=20170922031604
- TMDRE_Pattern_Version=17002
- TMDRE_Pattern_Last_Update=
- TMMSEngWINCE_Version=7.460.1019
- TMMSEngSymb_Version=7.460.1003
- TMMSPtnWINCE_Version=1.108.00
- TMMSPtnSymb_Version=1.139.00
- TMMSPrgWINCE_Version=3.0.0.1133
- TMMSPrgSymb_Version=3.0.0.1133
- DLPLite_x86_Version=6.2.1061
- DLPLite_x64_Version=6.2.1061
- DLPLite_Common_x86_Version=6.2.1073
- DLPLite_Common_x64_Version=6.2.1073
- DLPLite_3rdParty_x86_Version=
- DLPLite_3rdParty_x64_Version=
- Update_URL=/OfficeScan/download/
- UpgradeFrom=
- Master_Program_URL=https://osce12-p.activeupdate.trendmicro.com/activeupdate
- Trend_AU_Master_Program_URL=https://osce12-p.activeupdate.trendmicro.com/activeupdate
- User_Specify_Master_Program_URL=http://
- Trend_AU_Master_Program_URL_Selected=1
- ServicePack_Version=1
- Pcc95_Version=12.0
- Pcc95_Last_Update=20170922013110
- Engine95_Last_Update=20170922013110
- IDSPtn_Last_Update=20170922013110
- IDSEng_Last_Update=20170922013110
- SSAPI_VSAPI_Spy_P=20171006073547
- AEGISTMMSTPtn64_Last_Updat=20170922031559
- [INI_SCHEDULED_UPDATE_SECTION]
- Scheduled_Update_Enable=1
- Scheduled_Update_Auto_Notify=1
- Scheduled_Update_Ptnfile=1
- Scheduled_Update_Program=5572373
- Scheduled_Update_Frequency=4
- Scheduled_Update_Hour=0
- Scheduled_Update_Minute=00
- Scheduled_Update_AmPm=AM
- Scheduled_Update_DayOfMonth=1
- Scheduled_Update_DayOfWeek=7
- Scheduled_Update_Start_Hourly=5
- Notification_Type=1
- Notification_Enable=1
- Reboot_Enable=1
- Retry_Enable=1
- Retry_Count=3
- Retry_Interval=10
- ForceUpdate_Flag=0
- Enable_Scan_Option=0
- Scan_Option=1
- [INI_MANUAL_UPDATE_SECTION]
- Notification_Type=1
- Reboot_Flag=0
- ForceUpdate_Flag=0
- From_TMCM=0
- [INI_ONDEMAND_NOTIFY_SECTION]
- Notification_Type=1
- [INI_OUTBREAK_ALERT_SECTION]
- Outbreak_Alert_VirusCount=100
- Outbreak_Alert_Hour=24
- Outbreak_Alert_Enable_SMTP=0
- Outbreak_Alert_SMTP_Server=
- Outbreak_Alert_SMTP_Port=25
- Outbreak_Alert_SMTP_Send_To=
- Outbreak_Alert_SMTP_Send_From=
- Outbreak_Alert_SMTP_Subject=Virus/Malware outbreak detected
- Outbreak_Alert_SMTP_Message=Number of viruses/malware: %CV\nNumber of endpoints: %CC\n
- Outbreak_Alert_SMTP_ShowScanType=0
- Outbreak_Message_Option=31
- Outbreak_Alert_Action_Length=95
- Outbreak_Alert_Enable_Pager=0
- Outbreak_Alert_Pager_Number=
- Outbreak_Alert_Pager_Port=2
- Outbreak_Alert_Pager_Message=
- Outbreak_Alert_Enable_NTEvent=0
- Outbreak_Alert_NTEvent_Message=Number of viruses/malware: %CV\nNumber of endpoints: %CC\n
- Outbreak_Alert_Enable_SNMP=0
- Outbreak_Alert_SNMP_Server=
- Outbreak_Alert_SNMP_Community=!CRYPTEX!F890CCF114B59720818F84F22EB06172
- Outbreak_Alert_SNMP_Message=Number of viruses/malware: %CV\nNumber of endpoints: %CC\n
- Outbreak_Alert_UniqueSource=1
- Outbreak_Alert_UniqueSource_Check=
- [INI_OUTBREAK_ALERT_SPYWARE_SECTION]
- Outbreak_Alert_VirusCount=100
- Outbreak_Alert_Hour=24
- Outbreak_Alert_Enable_SMTP=0
- Outbreak_Alert_SMTP_Subject=Spyware/Grayware outbreak detected
- Outbreak_Alert_SMTP_Message=Number of spyware/grayware: %CV\nNumber of endpoints: %CC\n
- Outbreak_Message_Option=31
- Outbreak_Alert_Action_Length=95
- Outbreak_Alert_Enable_Pager=0
- Outbreak_Alert_Pager_Number=
- Outbreak_Alert_Pager_Port=2
- Outbreak_Alert_Pager_Message=
- Outbreak_Alert_Enable_NTEvent=0
- Outbreak_Alert_NTEvent_Message=Number of spyware/grayware: %CV\nNumber of endpoints: %CC\n
- Outbreak_Alert_Enable_SNMP=0
- Outbreak_Alert_SNMP_Server=
- Outbreak_Alert_SNMP_Community=!CRYPTEX!F890CCF114B59720818F84F22EB06172
- Outbreak_Alert_SNMP_Message=Number of spyware/grayware: %CV\nNumber of endpoints: %CC\n
- Outbreak_Alert_UniqueSource=1
- Outbreak_Alert_UniqueSource_Check=
- Outbreak_Alert_SMTP_Port=25
- Outbreak_Alert_SMTP_Send_From=
- Outbreak_Alert_SMTP_Server=
- [INI_OUTBREAK_ALERT_CCCA_SECTION]
- Outbreak_Alert_VirusCount=100
- Outbreak_Alert_Hour=24
- Outbreak_Alert_Enable_SMTP=0
- Outbreak_Alert_SMTP_Subject=C&C callback outbreak detected
- Outbreak_Alert_SMTP_Message=Accumulated log count: %C in the last %T hour(s).\n
- Outbreak_Message_Option=255
- Outbreak_Alert_Action_Length=95
- Outbreak_Alert_Enable_Pager=0
- Outbreak_Alert_Pager_Number=
- Outbreak_Alert_Pager_Port=2
- Outbreak_Alert_Pager_Message=
- Outbreak_Alert_Enable_NTEvent=0
- Outbreak_Alert_NTEvent_Message=C&C callback outbreak detected\nAccumulated log count: %C in the last %T hour(s).
- Outbreak_Alert_Enable_SNMP=0
- Outbreak_Alert_SNMP_Server=
- Outbreak_Alert_SNMP_Community=!CRYPTEX!F890CCF114B59720818F84F22EB06172
- Outbreak_Alert_SNMP_Message=C&C callback outbreak detected\nAccumulated log count: %C in the last %T hour(s).\n
- Outbreak_Alert_UniqueSource=1
- Outbreak_Alert_SMTP_Port=25
- Outbreak_Alert_SMTP_Send_From=
- Outbreak_Alert_SMTP_Server=
- Outbreak_Alert_CCCA_Same_Computer=0
- Outbreak_Alert_CCCA_Type=0
- Outbreak_Alert_CCCA_Risk_Level=1
- Outbreak_Alert_CCCA_Action=0
- Outbreak_Alert_CCCA_Detections=10
- [INI_STANDARD_ALERT_SECTION]
- Std_Alert_Enable_SMTP=0
- Std_Alert_Enable_SMTP_RBA=0
- Std_Alert_SMTP_Server=
- Std_Alert_SMTP_Port=25
- Std_Alert_SMTP_Send_To=
- Std_Alert_SMTP_Send_From=
- Std_Alert_SMTP_Subject=Virus/Malware detected
- Std_Alert_SMTP_Message=Virus/Malware: %v\nEndpoint: %s\nDomain: %m\nFile: %p\nDate/Time: %y\nResult: %a\n
- Std_Alert_Enable_Pager=0
- Std_Alert_Pager_Number=
- Std_Alert_Pager_Port=2
- Std_Alert_Pager_Message=
- Std_Alert_Enable_NTEvent=0
- Std_Alert_NTEvent_Message=Virus/Malware: %v\nEndpoint: %s\nDomain: %m\nFile: %p\nDate/Time: %y\nResult: %a\n
- Std_Alert_Enable_SNMP=0
- Std_Alert_SNMP_Server=
- Std_Alert_SNMP_Community=!CRYPTEX!F890CCF114B59720818F84F22EB06172
- Std_Alert_SNMP_Message=Virus/Malware: %v\nEndpoint: %s\nDomain: %m\nFile: %p\nDate/Time: %y\nResult: %a\n
- [INI_STANDARD_ALERT_SPYWARE_SECTION]
- Std_Alert_Enable_SMTP=0
- Std_Alert_Enable_SMTP_RBA=0
- Std_Alert_SMTP_Send_To=
- Std_Alert_SMTP_Subject=Spyware/Grayware detected
- Std_Alert_SMTP_Message=Endpoint: %s\nDomain: %m\nDate/Time: %y\nSpyware/Grayware and Result: %T\n
- Std_Alert_Enable_Pager=0
- Std_Alert_Pager_Number=
- Std_Alert_Pager_Port=2
- Std_Alert_Pager_Message=
- Std_Alert_Enable_NTEvent=0
- Std_Alert_NTEvent_Message=Spyware/Grayware: %v\nEndpoint: %s\nDomain: %m\nDate/Time: %y\nResult: %a\n
- Std_Alert_Enable_SNMP=0
- Std_Alert_SNMP_Server=
- Std_Alert_SNMP_Community=!CRYPTEX!F890CCF114B59720818F84F22EB06172
- Std_Alert_SNMP_Message=Spyware/Grayware: %v\nEndpoint: %s\nDomain: %m\nDate/Time: %y\nResult: %a\n
- [INI_STANDARD_ALERT_DLP_SECTION]
- Std_Alert_Enable_SMTP=0
- Std_Alert_Enable_SMTP_RBA=0
- Std_Alert_SMTP_Send_To=
- Std_Alert_SMTP_Subject=Digital asset transmission detected
- Std_Alert_SMTP_Message=User: %USER%\nEndpoint: %COMPUTER%\nDomain: %DOMAIN%\nDate/Time: %DATETIME%\nChannel: %CHANNEL%\nTemplate: %TEMPLATE%\n
- Std_Alert_Enable_Pager=0
- Std_Alert_Pager_Number=
- Std_Alert_Pager_Port=2
- Std_Alert_Pager_Message=
- Std_Alert_Enable_NTEvent=0
- Std_Alert_NTEvent_Message=Digital asset transmission detected\nUser: %USER%\nEndpoint: %COMPUTER%\nDomain: %DOMAIN%\nDate/Time: %DATETIME%\nChannel: %CHANNEL%\nTemplate: %TEMPLATE%\n
- Std_Alert_Enable_SNMP=0
- Std_Alert_SNMP_Server=
- Std_Alert_SNMP_Community=!CRYPTEX!F890CCF114B59720818F84F22EB06172
- Std_Alert_SNMP_Message=Digital asset transmission detected\nUser: %USER%\nEndpoint: %COMPUTER%\nDomain: %DOMAIN%\nDate/Time: %DATETIME%\nChannel: %CHANNEL%\nTemplate: %TEMPLATE%\n
- Std_Alert_Act_Failed=1
- [INI_STANDARD_ALERT_CCCA_SECTION]
- Std_Alert_Enable_SMTP=0
- Std_Alert_Enable_SMTP_RBA=0
- Std_Alert_SMTP_Send_To=
- Std_Alert_SMTP_Subject=C&C callback detected
- Std_Alert_SMTP_Message=Compromised Host: %CLIENTCOMPUTER%\nIP Address: %IP%\nDomain: %DOMAIN%\nDate/Time: %DATETIME%\nCallback address: %CALLBACKADDRESS%\nC&C risk level: %CNCRISKLEVEL%\nC&C list source: %CNCLISTSOURCE%\nAction: %ACTION%\n
- Std_Alert_Enable_Pager=0
- Std_Alert_Pager_Number=
- Std_Alert_Pager_Port=2
- Std_Alert_Pager_Message=
- Std_Alert_Enable_NTEvent=0
- Std_Alert_NTEvent_Message=C&C callback detected\nCompromised Host: %CLIENTCOMPUTER%\nIP Address: %IP%\nDomain: %DOMAIN%\nDate/Time: %DATETIME%\nCallback address: %CALLBACKADDRESS%\nC&C risk level: %CNCRISKLEVEL%\nC&C list source: %CNCLISTSOURCE%\nAction: %ACTION%\n
- Std_Alert_Enable_SNMP=0
- Std_Alert_SNMP_Server=
- Std_Alert_SNMP_Community=!CRYPTEX!F890CCF114B59720818F84F22EB06172
- Std_Alert_SNMP_Message=C&C callback detected\nCompromised Host: %CLIENTCOMPUTER%\nIP Address: %IP%\nDomain: %DOMAIN%\nDate/Time: %DATETIME%\nCallback address: %CALLBACKADDRESS%\nC&C risk level: %CNCRISKLEVEL%\nC&C list source: %CNCLISTSOURCE%\nAction: %ACTION%\n
- Std_Alert_Act_Failed=1
- [INI_SCHEDULED_DELETE_LOG_SECTION]
- Scheduled_Delete_Enable=1
- Scheduled_Delete_Type=2
- Scheduled_Delete_Retain_Day=7
- Scheduled_Delete_Manual_Scan=0
- Scheduled_Delete_Scheduled_Scan=1
- Scheduled_Delete_Realtime_Scan=0
- Scheduled_Delete_ScanNow=0
- Scheduled_Delete_MailScan=0
- Scheduled_Delete_DCS=0
- Scheduled_Delete_System_Event=0
- Scheduled_Delete_Client_Update=0
- Scheduled_Delete_Server_Update=0
- Scheduled_Delete_IDS=0
- Scheduled_Delete_Frequency=2
- Scheduled_Delete_Hour=3
- Scheduled_Delete_Minute=0
- Scheduled_Delete_AmPm=AM
- Scheduled_Delete_DayOfMonth=1
- Scheduled_Delete_DayOfWeek=7
- Scheduled_Delete_Spyware_MS=0
- Scheduled_Delete_Spyware_RT=0
- Scheduled_Delete_Spyware_PS=1
- Scheduled_Delete_Spyware_SN=0
- Scheduled_Delete_PFW=1
- Scheduled_Delete_NV=0
- Scheduled_Delete_DCSR=0
- Scheduled_Delete_Spyware_Restore=1
- Scheduled_Delete_VST=0
- Scheduled_Delete_BOFP=1
- Scheduled_Delete_CV=1
- Scheduled_Delete_TMMS_Manual_Scan=1
- Scheduled_Delete_TMMS_Realtime_Scan=1
- Scheduled_Delete_TMMS_PFW=1
- Scheduled_Delete_TMMS_Client_Update=1
- Scheduled_Delete_WebSec=1
- Scheduled_Delete_DLP_CLC=1
- Scheduled_Delete_CCCA=1
- Scheduled_Delete_Network_Malware=1
- [INI_DELETE_LOG_SECTION]
- Manual_Delete_Type=1
- Manual_Delete_Retain_Day=14
- Manual_Delete_Manual_Scan=0
- Manual_Delete_Scheduled_Scan=1
- Manual_Delete_Realtime_Scan=0
- Manual_Delete_ScanNow=0
- Manual_Delete_MailScan=0
- Manual_Delete_DCS=0
- Manual_Delete_NV=0
- Manual_Delete_DCSR=0
- Manual_Delete_Spyware_MS=0
- Manual_Delete_Spyware_RT=0
- Manual_Delete_Spyware_PS=1
- Manual_Delete_Spyware_SN=0
- Manual_Delete_PFW=1
- Manual_Delete_BOFP=0
- Manual_Delete_VST=0
- Manual_Delete_DLP_CLC=1
- Manual_Delete_CCCA=1
- Manual_Delete_Network_Malware=1
- [INI_REESTABLISH_COMMUNICATION_SECTION]
- Scheduled_Reestablish_Enable=1
- Scheduled_Reestablish_Frequency=3
- Scheduled_Reestablish_Hour=10
- Scheduled_Reestablish_Minute=30
- Scheduled_Reestablish_AmPm=1
- Scheduled_Reestablish_DayOfWeek=7
- Scheduled_Reestablish_Every_Hour=1
- Scheduled_Reestablish_Every_Day=1
- [INI_APPLET_SECTION]
- URL=/officescan/cgi/
- Domain=Default
- Log_Applet_Display=20
- Log_Applet_code=TMLog.class
- Log_Applet_codebase=/officescan/html/applet/log/
- Log_Applet_Images=../image/
- Log_Applet_name=tmlog
- Log_Applet_Width=680
- Log_Applet_Height=470
- Tree_Applet_Root=OfficeScan
- TREE_Applet_code=TreeApp.class
- TREE_Applet_codebase=/officescan/html/applet/tree
- TREE_Applet_Images=../image/
- TREE_Applet_name=TreeApp
- TREE_Applet_Width=495
- TREE_Applet_Height=335
- Notify_Applet_code=NotifyApplet.class
- Notify_Applet_codebase=/officescan/html/applet/notify/
- Notify_Applet_Images=../image/
- Notify_Applet_name=NotifyApplet
- Notify_Applet_Width=495
- Notify_Applet_Height=270
- Arc_Applet_code=TMGraphArc.class
- Arc_Applet_codebase=/officescan/html/applet/graphArc/
- Arc_Applet_Images=../image/
- Arc_Applet_name=GraphArcApplet
- Arc_Applet_Width=100
- Arc_Applet_Height=100
- [INI_SERVER_SECTION]
- Language_Code=en
- Active_Update_Lang_ID=en
- Active_Update_PALM_Lang_ID=en
- Active_Update_PCC_Lang_ID=en
- Active_Update_EPOC_Lang_ID=en
- Active_Update_PCCW_Lang_ID=en
- Master_URL=/officescan/
- Master_Console_URL=/officescan/console/
- Encrypt_Notification_Msg=1
- MasterDirectory=\\OSCE-SVR\ofcscan
- Master_Pwd=
- Master_DomainName=OSCE-SVR.gttd.net
- Master_DomainPort=8080
- Master_EnableSSL=1
- Master_SSLPort=4343
- TimeOut=10
- UseProxy=0
- Proxy_IP=
- Proxy_Port=
- Proxy_Login=
- Proxy_Pwd=
- Trial=1
- Expired=30
- InstallDate=09-22-2017
- HTTP_Expired_Day=30
- SerialNumber=
- AlertMsgFile=alert.msg
- CFWAlertMsgFile=alertCfw.msg
- SetupType=1
- HTML_Refresh=300
- Reset_Refresh=15
- Client_Purge_Enable=1
- Client_Purge_Days=30
- VerifyConnectionThreadCount=16
- Event_Log_Flag=0
- Event_Log_Dir=
- Event_Log_Purge_Days=30
- Download_TimeOut=30
- Download_TimeOut_RA=15
- Download_Retry_Count=5
- Download_Retry_Interval=15
- Download_Session_Limit_Normal=100
- Download_Normal_Time=10-15
- Download_Session_Limit_NoBusy=250
- Download_NoBusy_Time=20-6
- Download_Session_Limit_PeekTime=25
- Download_Peek_Time=7-9,16-19
- Download_Session_Limit_Normal_Server=100
- Download_Session_Limit_NoBusy_Server=250
- Download_Session_Limit_PeekTime_Server=25
- Configuration_TimeOut=10
- Configuration_Retry_Count=5
- Configuration_Retry_Interval=15
- Configuration_Session_Limit_Normal=150
- Configuration_Normal_Time=10-15
- Configuration_Session_Limit_NoBusy=300
- Configuration_NoBusy_Time=20-6
- Configuration_Session_Limit_PeekTime=75
- Configuration_Peek_Time=7-9,16-19
- Configuration_Delay=1000
- Max_Event_Buffer=3000
- Max_Log_Buffer=3000
- Admin_Group=Administrators
- Pattern_Pending_Time=5000
- Pattern_Pending_ReTry=3
- Migrate_Client_Setting=1
- Service_Pending_Time=300000 // miliseconds, (5min) and over
- Cookie_Expire_Period=30
- Quarantine_Folder=
- Quarantine_Folder_Capacity=10240
- MaxUploadSize=5
- UnloadTools=DBBackup.exe;VerConn.exe
- WTC_Enable=1
- WTC_Hour=7
- WTC_Minute=5
- Update_Agent_Direct_Update=1
- Delete_Notify_Queue_State=0
- Command_Handler_Static_Thread_Number=10
- Command_Handler_Maxium_Thread_Number=20
- Master_Localhost=
- CheckDigitalSignatureForHotfix=1
- Migrate_Server_Setting=0
- OSPlatformID=2
- OSMajorVersion=6
- OSMinorVersion=3
- OSProductType=3
- InstallTime=01:31:10
- Master_ShortcutURLFileName=OfficeScan Web Console (HTML).rul
- Need_Send_PR_Info=0
- [INI_INTERNET_PROXY_SECTION]
- Use_Internet_Proxy=0
- Internet_Proxy_Pwd=!CRYPT!103BAAA02C9BEEA655F4F627A3B
- Internet_Proxy_Socks=0
- NoProxyCache=0
- [INI_CLIENT_SECTION]
- Client_LocalServer_SSL_Port=443
- Client_Use_HTTP=1
- Client_Allow_Uninstall=0
- Client_Allow_Unload=0
- Uninstall_Pwd=!CRYPTEX!BC358DBC9571F3B10F7C4B5B6D5780B8FE397FD5852E60EE318374D4FB2DAB70FAD7AEF58DF8EED9BBA40A8E6E93F016
- Unload_Pwd=
- UnloadProtect=1
- Client_LocalServer_Port=32032
- Filebase_Polling_Range=360
- Show_Window_On_Multiple_Instances=1
- ScanNetwork=0
- ShellExtension=0
- Client_Allow_Mobile=0
- ForceUpdate=0
- Interval=0
- Client_Allow_Schedule_Update=0
- Client_Allow_Update_Now=1
- Client_Allow_Update_From_TMAU=1
- Client_Allow_Update_From_OtherAU=0
- Check_IP_Change_Interval=180
- Client_Allow_Stop_Schedule_Scan=0
- InstallCTA=0
- RemoveCTA=0
- Client_Security=1
- ScheduleUpdateEnableDisable=1
- NoProgramUpgrade=0
- Enable_HIPS=1
- Enable_HIPS_Popup_alert=1
- RCS=0
- EnableVirEmailWarning=1
- AllowCfgNotification=0
- EnableScheduleScanWarning=0
- GCLCacheEnable=1
- GCLCacheRebuildDays=28
- OdscEnable=1
- OdscCriteriaDays=60
- OdscMaxExpiredDays=30
- SP_EnableFileProtection=1
- SP_EnableRegistryKeyProtection=1
- SP_EnableProcessProtection=1
- ECSP=1
- ClnAlertEnabled=1
- TrendxAlertEnabled=1
- NoEngineUpgrade=0
- [INI_VIRUSLOG_SECTION]
- ManualScan=1
- RealTimeScan=1
- ScheduledScan=1
- ScanNow=1
- Sort=1
- View=1
- StartMonth=1
- StartDate=1
- StartYear=1998
- EndMonth=1
- EndDate=1
- EndYear=1998
- LatestLog=
- LimitViewLog=100000
- ViewLogonName=0
- [INI_DBFILE_SECTION]
- DB_TYPE=1
- DB_PATH=E:\Program Files (x86)\Trend Micro\OfficeScan\PCCSRV\httpdb
- DB_IDLE_PERIOD=10
- DB_ENFORCE_DBFLUSH_PERIOD=7200
- DB_BACKUP_PRE_TASK=0
- DB_PACK_PERIOD=1440
- DB_EXCLUSIVE_OPEN=1
- DB_MEM_OPT_MAX=10240
- ENABLE_DB_SCHEDULED_PACK=1
- DB_SCHEDULED_PACK=3;0;1;0
- ENABLE_DB_STATUS_MONITOR_PACK=1
- DB_STATUS_MONITOR_PACK=3;0;3;0
- CIData=E:\Program Files (x86)\Trend Micro\OfficeScan\PCCSRV\httpdb\dBCIData.dbf
- CEData=E:\Program Files (x86)\Trend Micro\OfficeScan\PCCSRV\httpdb\dBCEData.dbf
- CXData=E:\Program Files (x86)\Trend Micro\OfficeScan\PCCSRV\httpdb\dbCXData.dbf
- NTData=E:\Program Files (x86)\Trend Micro\OfficeScan\PCCSRV\httpdb\dbNTData.dbf
- MSLog=E:\Program Files (x86)\Trend Micro\OfficeScan\PCCSRV\httpdb\dBMSLog.dbf
- PSLog=E:\Program Files (x86)\Trend Micro\OfficeScan\PCCSRV\httpdb\dBPSLog.dbf
- RTLog=E:\Program Files (x86)\Trend Micro\OfficeScan\PCCSRV\httpdb\dBRTLog.dbf
- SNLog=E:\Program Files (x86)\Trend Micro\OfficeScan\PCCSRV\httpdb\dBSNLog.dbf
- MSCfg=E:\Program Files (x86)\Trend Micro\OfficeScan\PCCSRV\httpdb\dBMSCfg.dbf
- RTCfg=E:\Program Files (x86)\Trend Micro\OfficeScan\PCCSRV\httpdb\dBRTCfg.dbf
- PSCfg=E:\Program Files (x86)\Trend Micro\OfficeScan\PCCSRV\httpdb\dBPSCfg.dbf
- SNCfg=E:\Program Files (x86)\Trend Micro\OfficeScan\PCCSRV\httpdb\dBSNCfg.dbf
- EFCfg=E:\Program Files (x86)\Trend Micro\OfficeScan\PCCSRV\httpdb\dBEFCfg.dbf
- TempDB=E:\Program Files (x86)\Trend Micro\OfficeScan\PCCSRV\httpdb\dbtemp.dbf
- VCLog=
- DB_PACK_ENABLE=0
- DB_PACK_CHECK_START_TIME=1
- DB_PACK_CHECK_SHIFT_TIME=3
- DB_PURGE_TMPFILE_ENABLE=0
- DB_PURGE_TMPFILE_ELAPSE_DAY=1
- ExcludeMoveDir=0
- DB_ENABLE_VERIFY_DATA=1
- DB_ENABLE_BLOCK_INCORRECT_DATA=1
- [Scan Now Configuration]
- Enable=1
- ScanMemory=1
- ScanBoot=1
- ScanCompressed=1
- OleExploitDetection=1
- OleLayer=3
- EnablePossibleVirusCustActInActiveAct=0
- PossibleVirusCustActInActiveAct=4
- SystemCleanForPossibleVirus=0
- CompressedLayer=2
- ScanAllFiles=0
- DefaultExtList="",.ACCDB,.ACE,.AMG,.ARJ,.BAT,.BIN,.BOO,.BOX,.BZ2,.CAB,.CDR,.CDT,.CHM,.CLA,.CLASS,.COM,.CPT,.CSC,.DLL,.DOC,.DOCM,.DOCX,.DOT,.DOTM,.DOTX,.DRV,.DVB,.DWG,.DWT,.EML,.EPOC,.EXE,.GMS,.GZ,.HLP,.HTA,.HTM,.HTML,.HTT,.INI,.JAR,.JPEG,.JPG,.JS,.JSE,.JTD,.JTT,.LNK,.LZH,.MDB,.MPD,.MPP,.MPT,.MSG,.MSI,.MSO,.MST,.NWS,.OBD,.OCX,.OFT,.OVL,.PDF,.PHP,.PIF,.PL,.PM,.POT,.POTM,.POTX,.PPAM,.PPS,.PPSM,.PPSX,.PPT,.PPTM,.PPTX,.PRC,.QPW,.RAR,.REG,.RTF,.SCR,.SHS,.SHW,.SIS,.SIT,.SWF,.SYS,.TAR,.VBE,.VBS,.VSD,.VSS,.VST,.VXD,.WMF,.WML,.WPD,.WPT,.WSF,.XLA,.XLAM,.XLS,.XLSB,.XLSM,.XLSX,.XLT,.XLTM,.XLTX,.XML,.Z,.ZIP
- ExtList=."",.ACCDB,.ACE,.AMG,.ARJ,.BAT,.BIN,.BOO,.BOX,.BZ2,.CAB,.CDR,.CDT,.CHM,.CLA,.CLASS,.COM,.CPT,.CSC,.DLL,.DOC,.DOCM,.DOCX,.DOT,.DOTM,.DOTX,.DRV,.DVB,.DWG,.DWT,.EML,.EPOC,.EXE,.GMS,.GZ,.HLP,.HTA,.HTM,.HTML,.HTT,.INI,.JAR,.JPEG,.JPG,.JS,.JSE,.JTD,.JTT,.LNK,.LZH,.MDB,.MPD,.MPP,.MPT,.MSG,.MSI,.MSO,.MST,.NWS,.OBD,.OCX,.OFT,.OVL,.PDF,.PHP,.PIF,.PL,.PM,.POT,.POTM,.POTX,.PPAM,.PPS,.PPSM,.PPSX,.PPT,.PPTM,.PPTX,.PRC,.QPW,.RAR,.REG,.RTF,.SCR,.SHS,.SHW,.SIS,.SIT,.SWF,.SYS,.TAR,.VBE,.VBS,.VSD,.VSS,.VST,.VXD,.WMF,.WML,.WPD,.WPT,.WSF,.XLA,.XLAM,.XLS,.XLSB,.XLSM,.XLSX,.XLT,.XLTM,.XLTX,.XML,.Z,.ZIP,.{*
- VirusFoundAction=5
- BkUpIfClean=1
- MoveDir=HTTP://OSCE-SVR.gttd.net
- CleanFailedAction=4
- CleanFailedMoveDir=HTTP://OSCE-SVR.gttd.net
- IntelliScan=1
- ActiveAction=1
- CustAction=Universe-5-4,Joke-4-2,Trojan-4-2,Virus-5-4,Test_Virus-1-1,Spyware-4-2,Generic-4-1,Other-5-4
- ScanSpyware=0
- EnableExclusion=1
- EnableUniAct=0
- ScanNetwork=0
- ScanSpeed=1
- IntelliTrap=0
- EnableAggressiveClean=0
- [Real Time Scan Configuration]
- Enable=1
- AllowCfg=0
- ScanBoot=1
- ScanShutDown=0
- ScanCompressed=1
- OleExploitDetection=1
- OleLayer=3
- EnablePossibleVirusCustActInActiveAct=0
- PossibleVirusCustActInActiveAct=4
- SystemCleanForPossibleVirus=0
- DispPossibleVirusFoundAlert=1
- CompressedLayer=2
- ScanAllFiles=0
- DefaultExtList="",.ACCDB,.ACE,.AMG,.ARJ,.BAT,.BIN,.BOO,.BOX,.BZ2,.CAB,.CDR,.CDT,.CHM,.CLA,.CLASS,.COM,.CPT,.CSC,.DLL,.DOC,.DOCM,.DOCX,.DOT,.DOTM,.DOTX,.DRV,.DVB,.DWG,.DWT,.EML,.EPOC,.EXE,.GMS,.GZ,.HLP,.HTA,.HTM,.HTML,.HTT,.INI,.JAR,.JPEG,.JPG,.JS,.JSE,.JTD,.JTT,.LNK,.LZH,.MDB,.MPD,.MPP,.MPT,.MSG,.MSI,.MSO,.MST,.NWS,.OBD,.OCX,.OFT,.OVL,.PDF,.PHP,.PIF,.PL,.PM,.POT,.POTM,.POTX,.PPAM,.PPS,.PPSM,.PPSX,.PPT,.PPTM,.PPTX,.PRC,.QPW,.RAR,.REG,.RTF,.SCR,.SHS,.SHW,.SIS,.SIT,.SWF,.SYS,.TAR,.VBE,.VBS,.VSD,.VSS,.VST,.VXD,.WMF,.WML,.WPD,.WPT,.WSF,.XLA,.XLAM,.XLS,.XLSB,.XLSM,.XLSX,.XLT,.XLTM,.XLTX,.XML,.Z,.ZIP
- ExtList=."",.ACCDB,.ACE,.AMG,.ARJ,.BAT,.BIN,.BOO,.BOX,.BZ2,.CAB,.CDR,.CDT,.CHM,.CLA,.CLASS,.COM,.CPT,.CSC,.DLL,.DOC,.DOCM,.DOCX,.DOT,.DOTM,.DOTX,.DRV,.DVB,.DWG,.DWT,.EML,.EPOC,.EXE,.GMS,.GZ,.HLP,.HTA,.HTM,.HTML,.HTT,.INI,.JAR,.JPEG,.JPG,.JS,.JSE,.JTD,.JTT,.LNK,.LZH,.MDB,.MPD,.MPP,.MPT,.MSG,.MSI,.MSO,.MST,.NWS,.OBD,.OCX,.OFT,.OVL,.PDF,.PHP,.PIF,.PL,.PM,.POT,.POTM,.POTX,.PPAM,.PPS,.PPSM,.PPSX,.PPT,.PPTM,.PPTX,.PRC,.QPW,.RAR,.REG,.RTF,.SCR,.SHS,.SHW,.SIS,.SIT,.SWF,.SYS,.TAR,.VBE,.VBS,.VSD,.VSS,.VST,.VXD,.WMF,.WML,.WPD,.WPT,.WSF,.XLA,.XLAM,.XLS,.XLSB,.XLSM,.XLSX,.XLT,.XLTM,.XLTX,.XML,.Z,.ZIP,.{*
- VirusFoundAction=5
- BkUpIfClean=1
- MoveDir=HTTP://OSCE-SVR.gttd.net
- CleanFailedAction=4
- CleanFailedMoveDir=HTTP://OSCE-SVR.gttd.net
- IntelliScan=1
- ActiveAction=1
- ScanIncoming=1
- ScanOutgoing=1
- RavageScanMemory=1
- CustAction=Universe-5-4,CVE_Exploit-1-1,Joke-4-2,Trojan-4-2,Virus-5-4,Test_Virus-1-1,Spyware-4-2,Generic-4-1,Other-5-4
- AtseCveExploitAction=0
- ScanSpyware=0
- EnableExclusion=1
- EnableUniAct=0
- ScanNetwork=0
- PopVirusFoundAlert=1
- IntelliTrap=1
- USBBootScan=0
- USBScanTouch=0
- EnableAggressiveClean=0
- [Manual Scan Configuration]
- Enable=1
- AllowCfg=0
- ScanMemory=1
- ScanBoot=1
- ScanCompressed=1
- OleExploitDetection=1
- OleLayer=3
- EnablePossibleVirusCustActInActiveAct=0
- PossibleVirusCustActInActiveAct=4
- SystemCleanForPossibleVirus=0
- CompressedLayer=2
- ScanAllFiles=0
- DefaultExtList="",.ACCDB,.ACE,.AMG,.ARJ,.BAT,.BIN,.BOO,.BOX,.BZ2,.CAB,.CDR,.CDT,.CHM,.CLA,.CLASS,.COM,.CPT,.CSC,.DLL,.DOC,.DOCM,.DOCX,.DOT,.DOTM,.DOTX,.DRV,.DVB,.DWG,.DWT,.EML,.EPOC,.EXE,.GMS,.GZ,.HLP,.HTA,.HTM,.HTML,.HTT,.INI,.JAR,.JPEG,.JPG,.JS,.JSE,.JTD,.JTT,.LNK,.LZH,.MDB,.MPD,.MPP,.MPT,.MSG,.MSI,.MSO,.MST,.NWS,.OBD,.OCX,.OFT,.OVL,.PDF,.PHP,.PIF,.PL,.PM,.POT,.POTM,.POTX,.PPAM,.PPS,.PPSM,.PPSX,.PPT,.PPTM,.PPTX,.PRC,.QPW,.RAR,.REG,.RTF,.SCR,.SHS,.SHW,.SIS,.SIT,.SWF,.SYS,.TAR,.VBE,.VBS,.VSD,.VSS,.VST,.VXD,.WMF,.WML,.WPD,.WPT,.WSF,.XLA,.XLAM,.XLS,.XLSB,.XLSM,.XLSX,.XLT,.XLTM,.XLTX,.XML,.Z,.ZIP
- ExtList=."",.ACCDB,.ACE,.AMG,.ARJ,.BAT,.BIN,.BOO,.BOX,.BZ2,.CAB,.CDR,.CDT,.CHM,.CLA,.CLASS,.COM,.CPT,.CSC,.DLL,.DOC,.DOCM,.DOCX,.DOT,.DOTM,.DOTX,.DRV,.DVB,.DWG,.DWT,.EML,.EPOC,.EXE,.GMS,.GZ,.HLP,.HTA,.HTM,.HTML,.HTT,.INI,.JAR,.JPEG,.JPG,.JS,.JSE,.JTD,.JTT,.LNK,.LZH,.MDB,.MPD,.MPP,.MPT,.MSG,.MSI,.MSO,.MST,.NWS,.OBD,.OCX,.OFT,.OVL,.PDF,.PHP,.PIF,.PL,.PM,.POT,.POTM,.POTX,.PPAM,.PPS,.PPSM,.PPSX,.PPT,.PPTM,.PPTX,.PRC,.QPW,.RAR,.REG,.RTF,.SCR,.SHS,.SHW,.SIS,.SIT,.SWF,.SYS,.TAR,.VBE,.VBS,.VSD,.VSS,.VST,.VXD,.WMF,.WML,.WPD,.WPT,.WSF,.XLA,.XLAM,.XLS,.XLSB,.XLSM,.XLSX,.XLT,.XLTM,.XLTX,.XML,.Z,.ZIP,.{*
- VirusFoundAction=5
- BkUpIfClean=1
- MoveDir=HTTP://OSCE-SVR.gttd.net
- CleanFailedAction=4
- CleanFailedMoveDir=HTTP://OSCE-SVR.gttd.net
- IntelliScan=1
- ActiveAction=1
- CustAction=Universe-5-4,Joke-4-2,Trojan-4-2,Virus-5-4,Test_Virus-1-1,Spyware-4-2,Generic-4-1,Other-5-4
- ScanHiddenFolder=1
- ScanSpyware=0
- EnableExclusion=1
- EnableUniAct=0
- ScanNetwork=0
- ScanSpeed=1
- IntelliTrap=0
- EnableAggressiveClean=1
- [Prescheduled Scan Configuration]
- Enable=0
- AllowCfg=0
- ScanMemory=1
- ScanBoot=1
- ScanCompressed=1
- OleExploitDetection=1
- OleLayer=3
- EnablePossibleVirusCustActInActiveAct=0
- PossibleVirusCustActInActiveAct=4
- SystemCleanForPossibleVirus=0
- DispPossibleVirusFoundAlert=1
- CompressedLayer=2
- ScanAllFiles=0
- DefaultExtList="",.ACCDB,.ACE,.AMG,.ARJ,.BAT,.BIN,.BOO,.BOX,.BZ2,.CAB,.CDR,.CDT,.CHM,.CLA,.CLASS,.COM,.CPT,.CSC,.DLL,.DOC,.DOCM,.DOCX,.DOT,.DOTM,.DOTX,.DRV,.DVB,.DWG,.DWT,.EML,.EPOC,.EXE,.GMS,.GZ,.HLP,.HTA,.HTM,.HTML,.HTT,.INI,.JAR,.JPEG,.JPG,.JS,.JSE,.JTD,.JTT,.LNK,.LZH,.MDB,.MPD,.MPP,.MPT,.MSG,.MSI,.MSO,.MST,.NWS,.OBD,.OCX,.OFT,.OVL,.PDF,.PHP,.PIF,.PL,.PM,.POT,.POTM,.POTX,.PPAM,.PPS,.PPSM,.PPSX,.PPT,.PPTM,.PPTX,.PRC,.QPW,.RAR,.REG,.RTF,.SCR,.SHS,.SHW,.SIS,.SIT,.SWF,.SYS,.TAR,.VBE,.VBS,.VSD,.VSS,.VST,.VXD,.WMF,.WML,.WPD,.WPT,.WSF,.XLA,.XLAM,.XLS,.XLSB,.XLSM,.XLSX,.XLT,.XLTM,.XLTX,.XML,.Z,.ZIP
- ExtList=."",.ACCDB,.ACE,.AMG,.ARJ,.BAT,.BIN,.BOO,.BOX,.BZ2,.CAB,.CDR,.CDT,.CHM,.CLA,.CLASS,.COM,.CPT,.CSC,.DLL,.DOC,.DOCM,.DOCX,.DOT,.DOTM,.DOTX,.DRV,.DVB,.DWG,.DWT,.EML,.EPOC,.EXE,.GMS,.GZ,.HLP,.HTA,.HTM,.HTML,.HTT,.INI,.JAR,.JPEG,.JPG,.JS,.JSE,.JTD,.JTT,.LNK,.LZH,.MDB,.MPD,.MPP,.MPT,.MSG,.MSI,.MSO,.MST,.NWS,.OBD,.OCX,.OFT,.OVL,.PDF,.PHP,.PIF,.PL,.PM,.POT,.POTM,.POTX,.PPAM,.PPS,.PPSM,.PPSX,.PPT,.PPTM,.PPTX,.PRC,.QPW,.RAR,.REG,.RTF,.SCR,.SHS,.SHW,.SIS,.SIT,.SWF,.SYS,.TAR,.VBE,.VBS,.VSD,.VSS,.VST,.VXD,.WMF,.WML,.WPD,.WPT,.WSF,.XLA,.XLAM,.XLS,.XLSB,.XLSM,.XLSX,.XLT,.XLTM,.XLTX,.XML,.Z,.ZIP,.{*
- Frequency=2
- Hour=12
- Minute=00
- AmPm=2
- DayOfMonth=1
- DayOfWeek=1
- VirusFoundAction=5
- BkUpIfClean=1
- MoveDir=HTTP://OSCE-SVR.gttd.net
- CleanFailedAction=4
- CleanFailedMoveDir=HTTP://OSCE-SVR.gttd.net
- PopupVirusAlert=0
- IntelliScan=1
- ActiveAction=1
- CustAction=Universe-5-4,Joke-4-2,Trojan-4-2,Virus-5-4,Test_Virus-1-1,Spyware-4-2,Generic-4-1,Other-5-4
- ScanSpyware=0
- EnableExclusion=1
- EnableUniAct=0
- PopVirusFoundAlert=1
- ScanNetwork=0
- ScanSpeed=1
- IntelliTrap=0
- EnableAggressiveClean=0
- [Spyware Real Time Scan Configuration]
- Enable=1
- AllowCfg=0
- ActionType=1
- PopSpywareFoundAlert=1
- [Spyware Scan Now Configuration]
- Enable=1
- AllowCfg=0
- ScanType=1
- ActionType=1
- PopSpywareFoundAlert=0
- EnableSpyExclusion=1
- ExcludeFileExtList=MP3;
- [Spyware Manual Scan Configuration]
- Enable=1
- AllowCfg=0
- ScanType=1
- ActionType=1
- EnableSpyExclusion=1
- ExcludeFileExtList=MP3;
- [Spyware Prescheduled Scan Configuration]
- Enable=0
- AllowCfg=0
- ScanType=1
- ActionType=1
- Frequency=1
- Hour=1
- Minute=0
- AmPm=1
- DayOfMonth=1
- DayOfWeek=1
- PopSpywareFoundAlert=1
- EnableSpyExclusion=1
- ExcludeFileExtList=MP3;
- [Exclusion File Configuration]
- AllowCfg=0
- Exclude1=
- Exclude20=
- [INI_CLIENT_SETUP_SECTION]
- SupportMultiLang=0
- ForceRefresh=0
- BypassServerChecking=0
- NT_MENU_FOLDER=Trend Micro OfficeScan Agent
- NT_TMLISTEN_SERVICE=OfficeScan NT Listener
- NT_REAL_TIME_SERVICE=OfficeScan NT RealTime Scan
- NT_CCSF_SERVICE=OfficeScan Common Client Solution Framework
- NT_PFW_SERVICE=OfficeScan NT Firewall
- NT_TMPROXY_SERVICE=OfficeScan NT Proxy Service
- NT_MENU_MAIN_ITEM=
- NT_MENU_IOMONITOR_ITEM=OfficeScan Agent
- NT_MENU_UNINSTALL_ITEM=Uninstall OfficeScan Agent
- NT_MENU_README_ITEM=OfficeScan Agent Readme
- NT_UNINSTALL_DISPLAY_NAME=Trend Micro OfficeScan Agent
- OLD_NT_MENU_FOLDER=Trend Micro OfficeScan WinNT;Trend OfficeScan WinNT;Trend Micro OfficeScan Client
- OLD_NT_MENU_MAIN_ITEM=OfficeScanNT
- OLD_NT_MENU_IOMONITOR_ITEM=OfficeScan Client
- OLD_NT_MENU_UNINSTALL_ITEM=Uninstall OfficeScan Client
- OLD_NT_MENU_README_ITEM=OfficeScan Client Readme
- NT_UNINSTALL_KEY_NAME=OfficeScanNT
- NT_RUN_KEY=OfficeScanNT Monitor
- NT_TMLISTEN_SERVICE_FILENAME=tmlisten.exe
- NT_REAL_TIME_SERVICE_FILENAME=ntrtscan.exe
- NT_CCSF_SERVICE_FILENAME=CCSF\tmccsf.exe
- NT_PFW_SERVICE_FILENAME=OfcPfwSvc.exe
- NT_TMPROXY_SERVICE_FILENAME=TmProxy.exe
- NT_MENU_MAIN_ITEM_FILENAME=pccnt.exe
- NT_MENU_IOMONITOR_ITEM_FILENAME=Pccntmon.exe
- NT_MENU_UNINSTALL_ITEM_FILENAME=ntrmv.exe
- NT_MENU_README_ITEM_FILENAME=Readme.txt
- NT_UNINSTALL_FILENAME=ntrmv.exe
- NT_SHELL_EXTENSION_FILENAME=tmdshell.dll
- NT_RUN_KEY_FILE_NAME=pccntmon.exe
- NOTIFY_INSTALL_MAIL_SUBJECT=Please click the following URL to install OfficeScan agent
- InstallShieldComplete=1
- SupportLangPack=
- [INI_CLIENT_DEFAULT_INSTALLPATH_SECTION]
- WinNT_InstallPath=E:\Program Files\Trend Micro\OfficeScan Client
- [SAMPLE_SUBMISSION]
- EnableSampleSubmission=0
- [SPSRelay]
- SPSRelayEnable=0
- SPSRelayCount=1
- [Global Setting]
- ASE=0
- UAHttpPort=31113
- AllowWin2KAgentRegister=0
- EnabledEngineAUUpdateOnWin2KAgent=0
- EnabledIPProtocols=3
- PreferredIPProtocols=4
- IPv6Available=1
- BackupPreferredIPProtocols=4
- WSCReportChanged=0
- EnableStealthMode=-1
- EnableRTSHealthCheck=0
- EnableRTScanMsiInstall=1
- RTSHealthCheckFrequencyInMin=15
- TryAgainByRenaming=0
- TscBackupFileNumber=1000
- MaxDacExceptionCount=100
- WSLIMIT_L=10000000
- WSLIMIT_R=10000000
- WSLIMIT_M=5000000
- WSPERIOD_L=30000
- WSPERIOD_R=30000
- WSPERIOD_M=30000
- BkFileKeepDay=7
- EnableGenericClean=1
- LogCookie=0
- EnableAssessment=0
- AssessmentUntil=1508454000
- CookieScanner=0
- CompressedFileCount=10
- OnDemandScanCompressedFileCount=100
- PatternTooOldPopupMessage=Pattern file is too old, update now
- PatternTooOldDays=5
- DiskReserved=60
- ScheduleUpdateStartWeekday=7
- ScheduleUpdateStartHour=0
- ScheduleUpdateStartMin=0
- ScheduleUpdateCompletePeriod=240
- ScheduleUpdateInterval=1440
- ScheduleUpdateEnableDisable=0
- ScheduleCheckGlobalSetting=0
- ScheduledUpdateEnableUpdateConfigurationsOnlyOncePerDay=0
- NetworkScanOnOff=0
- ShellExtensionOnOff=0
- SplashScreenOnOff=1
- RebootNotifyOnOff=1
- PopupVirusFoundOnOff=1
- ZipCleanOnOff=1
- PatternTooOldWarningOnOff=0
- FqdnFirstOnOff=0
- OleLayer=3
- MaximumExtractFileSize=2
- OnDemandScanMaximumExtractFileSize=30
- MailScanPageOnOff=0
- ToolPageOnOff=0
- Pop3TrapOnOff=1
- OutlookScanOnOff=1
- WirelessProtectionOnOff=1
- CheckPointSecureClientOnOff=1
- ProxySettingOnOff=1
- ScheduleCleanInterval=120
- AuCacheOnOff=0
- SendVirusLogForcibly=1
- PurgeStandAloneHLog=0
- RunPop3Trap=0
- RunOutlookScan=1
- RunWirelessProtection=1
- InstPOP3Scan=1
- InstOutlookScan=1
- InstWireless=1
- DomainType=0
- Scheduled_Reestablish_Minutely=10
- GlobalLargeCompressedFileScanSetting=1
- ExcludeDatabaseFolder=1
- EnableVirusLogThrottle=1
- VLogThrottleCnt=20
- RedundantVirusPeriod=60
- LocalAUCacheOnOff=1
- LocalAUCacheSize=5
- UADuplicateOption=0
- PingServerCheckDefault=1
- PingServerCheckMode=0
- RefHostsChkTimeout=3
- PingServerScheduleInterval=3600
- ReferenceHosts=
- RefHostsChkMode=1
- UADuplicationOptValue=64
- AutoProxyDetection=0
- UseProxyAutoConfigScript=0
- ProxyAutoConfigScript=
- UrlFilterAlertEnabled=1
- DisableTSCAtStart=0
- ExcludeExchangeStore=1
- EnableSSAPI5Update=0
- SP_RestartService=1
- SP_RestartServiceAfter=60
- SP_RetryCount=2
- SP_ResetFailureCount=3600
- SP_EnableFileProtection=1
- SP_EnableRegistryKeyProtection=1
- SP_EnableProcessProtection=1
- ECSP=1
- GlobalHeartbeat=0
- CensusServerUrl=osce12-en.census.trendmicro.com
- CensusServerPort=80
- CensusQueryToken=!CRYPT!3135298FBE6D1B9E26D47E9847411C1C998F9EF6E1F6155FFF51B666C7C
- FlowDiagnosis=0
- EnableProcessDeferScan=0
- EnableAegisActivityMonitor=1
- EnableDceVsapiFileScan=0
- ResetScanExceptionFrequency=300
- HeartbeatClearClients=0
- EnableAEGIS=1
- SendLogPeriod=3600
- BMAskTimeOut=30
- BMTimeOutAction=0
- SendBMLogPeriod=3600
- BMEnableNFC=0
- BMPopupLowRiskMsg=1
- BMAutoBlockInterval=180
- EnableBatteryLifeCheck=1
- EnableNVTrustList=0
- EnableResumeScan=1
- LaunchScheduleScanWhenBoot=0
- MaxDelayCount=1
- MaxDelayDuration=3600
- MiniBatteryLife=20
- PFWLogReportInterval=14400
- ScanWarningTime=600
- Update_Agent_Direct_Update=1
- PFWNFCTimeout=30
- RmvPFWifDisabled=-1
- EnableOPPFromRoot=0
- AllowEditLogMaintenanceSetting=1
- MinDuplicateVirusAlertInterval=0
- DisableSIDName=0
- CheckNicInfoPeriod=120000
- DontDropUnknowTCP=-1
- AllowClnUpdNonPatternFromTMAU=1
- Client_RetryInterval_Of_Send_VirusLog=30
- DisableGetNSCGatewayAddr=0
- OfcPfwServiceRetry=600
- EnableAutoMountPointDetection=1
- CheckMountPointInterval=300
- IDSDisableLandAtack=0
- EnableProcessScanWhenScan=1
- EnableProcessScanForStartUp_Enforcement=2
- EnableProcessScanWhenScan_Enforcement=2
- ProxyPort=6999
- DisableL4Ordering=0
- PccNTMonInitSleep=0
- UseWhiteList=1
- UseMapping=1
- SkipScheduleScanIconAnimation=0
- URLFilterExclusionExtensions=mpg,mpeg,mp3,wav,wave,avi,asf,asx,mov,mp4,mid,midi,ram,cab,class,ocx,crl
- DisableHalfDuplex=0
- HotfixProgramFailLogTry=3
- RmvTmTDI=0
- RmvEagleEyeTDI=0
- IDSDisableNVWICMP=0
- TmfilterDisableCtProcCheck=-1
- DisableAVResetBtn=0
- DisableASResetBtn=0
- USBScanConfirm=0
- tmevtmgr_CallStubFlags=1
- ScanZeroAttributeFile=0
- RmSysEventAPIItem=0
- LaunchBelowUsage=20
- LaunchMustContinueBelow=15
- LaunchCheckUsageFrequency=2
- LaunchCheckTimeout=180
- DelayCheckFile=1
- DelayLoadAEGIS=0
- DelayLoadFirewall=1
- DelayLoadDlp=1
- ShowPccntPlugInManagerButton=1
- ShowPccntGotoMenu=1
- ShowPccntLanguageButton=0
- ShowPccntSettingMenu=1
- ShowPccntHelpMenu=1
- ShowPccntAboutMenu=0
- ShowPccntLogViewTab=1
- ShowPccntHelpButton=1
- PurgeLogAegisBmCpm=0
- ShowUpdateNowProxyPage=1
- AddIeProxySettingToRegistry=0
- EnablePopupMailVirusAlertMessage=1
- EnableFirewallAlert=1
- EnablePopupAegisCcfrAlertMessage=1
- EnablePopupDlpClcAlertMessage=1
- EnablePopupScheduleScanWarning=1
- EnablePopupOppAlertMessage=1
- EnablePopupTdiMessage=1
- EnablePopupUrlFilteringAlertMessage=1
- EnablePopupAskRebootForNscDriver=1
- ShowSystemTrayIcon=1
- ShowPccntMonVersionInfo=1
- ShowPccntMonSwitchMobileMode=1
- ShowPccntMonScheduleUpdateOnOff=1
- ShowPccntMonSwitchFirewall=1
- ShowPccntMonDelayScheduleScan=1
- ShowPccntMonAddonService=1
- ShowPccntMonExit=1
- PurgeLogAegisCpm=0
- CheckAegisKeyToShowDeviceControlTab=0
- EnablePopupAskRebootForDlpDriver=1
- CheckPtnTooOldByLastUpdTime=0
- EnablePFWBasedOnRuleFile=0
- EnableApplySettingFromServerBmAlert=1
- EnableApplySettingFromServerDacAlert=1
- ShowPccntMonRealtimeMonitor=0
- ShowServerVersionWithSpName=1
- EnableRegisterDomainInIniFile=0
- ShowPccntPFWTabReadOnly=1
- ShowComponentVersionVASPattern=0
- ServerDataSGNF=0
- ShowServerSideClientFileVersion=1
- IniCount=1
- Ini1.Description=Ignore ini_xml.zip downloading (1:ignore ini_xml.zip, 0:download ini_xml.zip)
- Ini1.Key=!CRYPT!41E356EE9586223E2F66739FF0461B1AB5E381861815C72275316C148B545CE93F336461110
- Ini1.Value=1
- DumpEnableExceptionHelper=1
- DumpMinimumFreeSpaceInMB=1024
- DumpMaximumFiles=4
- DumpEnableFullDump=1
- TmtdiAttachUDP=-1
- Feature=65535
- NoSleepInScheduleScan=0
- NoSleepInManualScan=0
- NoSleepInRemoteScan=0
- SvrNTAHSendLogPeriod=60
- SvrNTAHLogKeepDay=180
- CheckServerByHTTP=0
- IDSDisableSynFlood=-1
- IntensiveScanThreshold=0
- EnableTMEBC=1
- MsiSignCheckExclusionList=VS80sp1-KB949009-X86-INTL.msp|
- UploadForensicDataEnable=1
- UploadForensicDataSizeLimitInMb=10
- ForensicDataKeepDays=180
- ForensicDataDelayUploadFrequenceInMinutes=5
- DlpUserJustificationItem0=This is part of an established business process.
- DlpUserJustificationItem1=My manager approved the data transfer.
- DlpUserJustificationItem2=The data in this file is not confidential.
- DlpUserJustificationItem3=
- EnableCentralWhitelist=1
- HideNonThreatAlertsBehindFullScreen=1
- CCCASendLogPeriod=0
- NCIERecord=0
- NCIERecordTarget=1
- AutoDelayScanForFullScreen=1
- MaxAutoDelayScanCount=6
- RealTimeScanSkippingFilePopupNotification=0
- EnableOPPMutexLog=0
- TmListenCheckLogInterval=60
- ClientUIDisplayMode=0
- EdgeSrvRegistered=1
- EdgeSrvLocation=EDGE-PROXY-SVR.gttd.net
- EdgeSrvPort=443
- IsSMB=0
- ServerID=841f8e3b-a582-4bf3-a32d-250b2e341c72
- EnableWMIQuery=0
- RefHostsEnable=0
- CitrixUPMReg=HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Citrix User Profile Manager
- [INI_SERVICE_MODEL_SECTION]
- ServiceModel=!CRYPTEX!6D1BCB648CB20E65DF74CA1BB5A60C5B
- UpdateFlag=!CRYPTEX!7BE5884A0BC95D72D83748748D91FF6B
- LogFlag=!CRYPTEX!FB139980A6A0C4852C5B70FA265AF853
- ViewFlag=!CRYPTEX!59714F34938DA03DB0DED0988A72DAED
- CfgFlag=!CRYPTEX!1DFD78872226BA9907325985D0B03B98
- EnablePFW=1
- PfwAC=1
- EnableHIPS=0
- HipsAC=0
- EnableTMMSENC=0
- TmmsEncAC=0
- ShowWRSInformation=0
- AC_TYPE=0
- AC_SERVICE=!CRYPTEX!072FAF5A436F81607D4F580CE702E6C5
- [INI_MAJOR_VIRUS_TYPE_SECTION]
- Count=8
- 1st_Act_001=4
- 2nd_Act_001=2
- Name_001=Joke
- 1st_Act_002=4
- 2nd_Act_002=2
- Name_002=Trojan
- 1st_Act_003=5
- 2nd_Act_003=4
- Name_003=Virus
- 1st_Act_004=1
- 2nd_Act_004=1
- Name_004=Test_Virus
- 1st_Act_005=4
- 2nd_Act_005=2
- Name_005=Spyware
- 1st_Act_006=4
- 2nd_Act_006=1
- Name_006=Packer
- 1st_Act_007=25
- 2nd_Act_007=1
- Name_007=Generic
- 1st_Act_008=5
- 2nd_Act_008=4
- Name_008=Other
- [URL_FILTER_INI_SECTION]
- URLFilterEnableTmProxyDNSInOffice=0
- URLFilterEnableTmProxyDNSOutOffice=0
- URLFilterEnableTMUFEDNSInOffice=0
- URLFilterEnableTMUFEDNSOutOffice=0
- URLFilterRS=http://osce12-0-en.url.trendmicro.com
- URLFilterThresholdHigh=80
- URLFilterThresholdMedium=65
- URLFilterThresholdLow=50
- URLFilterRedirectPortList=
- URLFilterServerAWSLMaxCount=50
- URLFilterClientAWSLMaxCount=50
- URLFilterCfgFlag_InOffice=155
- URLFilterQueryMode_InOffice=0
- URLFilterRatingLevel_InOffice=1
- URLFilterAWSLCount_InOffice=15
- URLFilterAWSL_InOffice000=!CRYPT!41E87AFD5AAD9779014CE1AE49C00F138E0CB93545453DCDDF83C8E0F1EE98FFF7D7750550D
- URLFilterAWSL_InOffice001=!CRYPT!41DD78F192075635D6872CD47D531E566CC19BC569F507FBC5493AC27F94753A9D5725C1D18
- URLFilterAWSL_InOffice002=!CRYPT!5270C2F3CD5087D5B951FC1750683AE8575C4AE786A43466A1C7AB3E33E4C60A239BC150BF22C340D3C3248425D
- URLFilterAWSL_InOffice003=!CRYPT!62AC032B6FF834E2B3D33E6E9FB9ADD53BE41D18CAB41FB88A359A3E797990F9D17A7B1E82A40391E678734D334DC7BF2C01D396235
- URLFilterAWSL_InOffice004=!CRYPT!5264F6D6220F18A37784C49DA5B067C3586DBCE3B500A67870874AF92915E07C7EE3C8E0F1EE98FFF7D7D0A0615
- URLFilterAWSL_InOffice005=!CRYPT!4203C2A3E8BBB541D88ABBFE53FB57E1E8076C48FA692E3613111E2A109CAEA06745B346166
- URLFilterAWSL_InOffice006=!CRYPT!41B3754C1F0D0F49A7124B36E97785F82ECA218B71CCC2A7EDDAEC429DC2829011748262D24
- URLFilterAWSL_InOffice007=!CRYPT!52254B4D811E72724724C49DA5B067C35860F718246FB36ABD6CF0635ACC89D64192900C4203B55A09E06787D70
- URLFilterAWSL_InOffice008=!CRYPT!527A0303ADF865F9D099B1F790E12C135C0EE4D7F641338B359FB32E52897ABA608832A86F329286624284B4D5E
- URLFilterAWSL_InOffice009=!CRYPT!5246B83E3D9F49CFA041C78434D8E66DF2851215B87168561A367C3E3148CE9D14E44A0C79F5BBAAA0C71520E01
- URLFilterAWSL_InOffice010=!CRYPT!523A863760E524DDEDD2DF8F126E76BD424E7E57BC9B506363A299611E52BA46CC4AEC429DC282901174C202422
- URLFilterAWSL_InOffice011=!CRYPT!52269A5457F4E56DD90EFC97064B3C2273EA6D4EFC3ABB6DEF44CB04ECB863252252900C4203B55A09E5E472E63
- URLFilterAWSL_InOffice012=!CRYPT!41D69A5457F4E56DD90EFC97064B3C2273EA6D4EFC3ABB6DEF4F897FD55FF32EDB17B7F1E5B
- URLFilterAWSL_InOffice013=!CRYPT!523B4907EA9B3324BD58E102C82CDF0F7ABE45218454E90F1D46A941D7F3548AAA425CDCE386F223CFF3C392332
- URLFilterAWSL_InOffice014=!CRYPT!41EB4907EA9B3324BD58E102C82CDF0F7ABE45218454E90F1D423A9C0AA312FAF20080A1708
- URLFilterAWSL_InOffice015=
- URLFilterAWSL_InOffice016=
- URLFilterAWSL_InOffice017=
- URLFilterAWSL_InOffice018=
- URLFilterAWSL_InOffice019=
- URLFilterAWSL_InOffice020=
- URLFilterAWSL_InOffice021=
- URLFilterAWSL_InOffice022=
- URLFilterAWSL_InOffice023=
- URLFilterAWSL_InOffice024=
- URLFilterAWSL_InOffice025=
- URLFilterAWSL_InOffice026=
- URLFilterAWSL_InOffice027=
- URLFilterAWSL_InOffice028=
- URLFilterAWSL_InOffice029=
- URLFilterAWSL_InOffice030=
- URLFilterAWSL_InOffice031=
- URLFilterAWSL_InOffice032=
- URLFilterAWSL_InOffice033=
- URLFilterAWSL_InOffice034=
- URLFilterAWSL_InOffice035=
- URLFilterAWSL_InOffice036=
- URLFilterAWSL_InOffice037=
- URLFilterAWSL_InOffice038=
- URLFilterAWSL_InOffice039=
- URLFilterAWSL_InOffice040=
- URLFilterAWSL_InOffice041=
- URLFilterAWSL_InOffice042=
- URLFilterAWSL_InOffice043=
- URLFilterAWSL_InOffice044=
- URLFilterAWSL_InOffice045=
- URLFilterAWSL_InOffice046=
- URLFilterAWSL_InOffice047=
- URLFilterAWSL_InOffice048=
- URLFilterAWSL_InOffice049=
- URLFilterCfgFlag_OutOffice=153
- URLFilterRatingLevel_OutOffice=2
- URLFilterAWSLCount_OutOffice=15
- URLFilterAWSL_OutOffice000=!CRYPT!41E87AFD5AAD9779014CE1AE49C00F138E0CB93545453DCDDF83C8E0F1EE98FFF7D7750550D
- URLFilterAWSL_OutOffice001=!CRYPT!41DD78F192075635D6872CD47D531E566CC19BC569F507FBC5493AC27F94753A9D5725C1D18
- URLFilterAWSL_OutOffice002=!CRYPT!5270C2F3CD5087D5B951FC1750683AE8575C4AE786A43466A1C7AB3E33E4C60A239BC150BF22C340D3C3248425D
- URLFilterAWSL_OutOffice003=!CRYPT!62AC032B6FF834E2B3D33E6E9FB9ADD53BE41D18CAB41FB88A359A3E797990F9D17A7B1E82A40391E678734D334DC7BF2C01D396235
- URLFilterAWSL_OutOffice004=!CRYPT!5264F6D6220F18A37784C49DA5B067C3586DBCE3B500A67870874AF92915E07C7EE3C8E0F1EE98FFF7D7D0A0615
- URLFilterAWSL_OutOffice005=!CRYPT!4203C2A3E8BBB541D88ABBFE53FB57E1E8076C48FA692E3613111E2A109CAEA06745B346166
- URLFilterAWSL_OutOffice006=!CRYPT!41B3754C1F0D0F49A7124B36E97785F82ECA218B71CCC2A7EDDAEC429DC2829011748262D24
- URLFilterAWSL_OutOffice007=!CRYPT!52254B4D811E72724724C49DA5B067C35860F718246FB36ABD6CF0635ACC89D64192900C4203B55A09E06787D70
- URLFilterAWSL_OutOffice008=!CRYPT!527A0303ADF865F9D099B1F790E12C135C0EE4D7F641338B359FB32E52897ABA608832A86F329286624284B4D5E
- URLFilterAWSL_OutOffice009=!CRYPT!5246B83E3D9F49CFA041C78434D8E66DF2851215B87168561A367C3E3148CE9D14E44A0C79F5BBAAA0C71520E01
- URLFilterAWSL_OutOffice010=!CRYPT!523A863760E524DDEDD2DF8F126E76BD424E7E57BC9B506363A299611E52BA46CC4AEC429DC282901174C202422
- URLFilterAWSL_OutOffice011=!CRYPT!52269A5457F4E56DD90EFC97064B3C2273EA6D4EFC3ABB6DEF44CB04ECB863252252900C4203B55A09E5E472E63
- URLFilterAWSL_OutOffice012=!CRYPT!41D69A5457F4E56DD90EFC97064B3C2273EA6D4EFC3ABB6DEF4F897FD55FF32EDB17B7F1E5B
- URLFilterAWSL_OutOffice013=!CRYPT!523B4907EA9B3324BD58E102C82CDF0F7ABE45218454E90F1D46A941D7F3548AAA425CDCE386F223CFF3C392332
- URLFilterAWSL_OutOffice014=!CRYPT!41EB4907EA9B3324BD58E102C82CDF0F7ABE45218454E90F1D423A9C0AA312FAF20080A1708
- URLFilterAWSL_OutOffice015=
- URLFilterAWSL_OutOffice016=
- URLFilterAWSL_OutOffice017=
- URLFilterAWSL_OutOffice018=
- URLFilterAWSL_OutOffice019=
- URLFilterAWSL_OutOffice020=
- URLFilterAWSL_OutOffice021=
- URLFilterAWSL_OutOffice022=
- URLFilterAWSL_OutOffice023=
- URLFilterAWSL_OutOffice024=
- URLFilterAWSL_OutOffice025=
- URLFilterAWSL_OutOffice026=
- URLFilterAWSL_OutOffice027=
- URLFilterAWSL_OutOffice028=
- URLFilterAWSL_OutOffice029=
- URLFilterAWSL_OutOffice030=
- URLFilterAWSL_OutOffice031=
- URLFilterAWSL_OutOffice032=
- URLFilterAWSL_OutOffice033=
- URLFilterAWSL_OutOffice034=
- URLFilterAWSL_OutOffice035=
- URLFilterAWSL_OutOffice036=
- URLFilterAWSL_OutOffice037=
- URLFilterAWSL_OutOffice038=
- URLFilterAWSL_OutOffice039=
- URLFilterAWSL_OutOffice040=
- URLFilterAWSL_OutOffice041=
- URLFilterAWSL_OutOffice042=
- URLFilterAWSL_OutOffice043=
- URLFilterAWSL_OutOffice044=
- URLFilterAWSL_OutOffice045=
- URLFilterAWSL_OutOffice046=
- URLFilterAWSL_OutOffice047=
- URLFilterAWSL_OutOffice048=
- URLFilterAWSL_OutOffice049=
- URLFilterProxyAccount=
- URLFilterProxyPassword=
- [LOCATION_AWARENESS_INI_SECTION]
- LocationAwarenessProfile_Count=0
- LocationCriteriaType=0
- [ICRC_SCAN_INI_SECTION]
- DefaultClientScanType=1
- DiagnosticDataCollectionIntervalMin=60
- ScheduledScanServiceSearchIntervalMin=3
- CheckScanServerStatusTimeoutMillisec=2000
- MaxSuspiciousFileRecordSize=5000
- QueryErrorGraceDurationSec=600
- QueryTotalErrorGraceFrequency=5
- QueryNetworkTimeoutGraceFrequency=5
- QueryServerErrorGraceFrequency=5
- QueryNetworkErrorGraceFrequency=5
- GlobalScanServerAddress=https://osce12.icrc.trendmicro.com/tmcss
- GlobalScanServerSSLVerifyPeer=1
- GlobalScanServerProxyUserName=
- GlobalScanServerProxyPassword=
- GlobalWCSServerUrl=http://osce12-0-en.url.trendmicro.com
- DelaySendCriteria=1
- DelaySendCriteriaUBound=10
- DelaySendDdcInterval=60
- DelaySendMode=1
- [Scan Now Configuration Ex]
- ExcludedFolder=
- ExcludedFile=
- ExcludedExt=
- ExcludeTrendProduct=1
- [Real Time Scan Configuration Ex]
- ExcludedFolder=
- ExcludedFile=
- ExcludedExt=
- ExcludeTrendProduct=1
- [Manual Scan Configuration Ex]
- ExcludedFolder=
- ExcludedFile=
- ExcludedExt=
- ExcludeTrendProduct=1
- [Prescheduled Scan Configuration Ex]
- ExcludedFolder=
- ExcludedFile=
- ExcludedExt=
- ExcludeTrendProduct=1
- [PFW]
- AllowControlPFW=0
- DisplayPFWTab=1
- EnablePFW=1
- EnableIDS=0
- EnablePFWAlert=0
- EnableNetVirusLogReport=1
- ReportInterval=3600000
- LogKeepDay=7
- PFWAlertEnable=0
- PFWSMTPEnable=0
- PFWIDSExceed=100
- PFWPFWExceed=100
- PFWNVExceed=100
- PFWIDSPFWNVWithin=3
- SMTPServer=
- SMTPPort=25
- SMTPTo=
- SMTPFrom=
- SMTPSubject=Firewall violation outbreak detected
- SMTPMessage=Log type exceeded: %A\nAccumulated log count: %C in the last %T hour(s).
- PFWAlertIDS=Intrusion Detection
- PFWAlertPFW=Enterprise Agent Firewall Rule
- PFWAlertNV=Network Virus
- PFWSystemEventLog=Log type exceeded: %A. Accumulated log count: %C in the last %T hour(s).
- AllowSendPFWLog=0
- EnableInstallFWAfterReboot=1
- [PFW Log Query Condition]
- PFWLogQueryRetainSecond=604800
- PFWLogQueryFrom=0
- PFWLogQueryTo=2147483647
- PFWLogQueryTarget=ROOT 00000000-0000-0000-0000-000000000000
- [DDC]
- EnableDDC=0
- DDCMaxDelay=1800
- DDCPickupFolderCapacity=10
- [AEGIS]
- EnableBM=0
- EnableTD=1
- AllowCfgBM=0
- SendBMLog=1
- BMPopupAlert=1
- NFCServer=osce12-en.grid-gfr.trendmicro.com
- NFCPort=80
- EnableMeerkatDetection=1
- EnableMeerkatAssessMode=0
- EnableTDC=1
- EnableADC=1
- EnableDRE=1
- EnableUMH=1
- EnableSRP=0
- EnableUMHExploit=0
- [AEGIS_BMPolicy]
- Count=12
- PolicyId0=001
- Action0=1003
- Enable0=1
- PolicyId1=002
- Action1=1003
- Enable1=1
- PolicyId2=003
- Action2=1003
- Enable2=1
- PolicyId3=004
- Action3=1003
- Enable3=1
- PolicyId4=005
- Action4=1003
- Enable4=1
- PolicyId5=006
- Action5=1003
- Enable5=1
- PolicyId6=007
- Action6=1003
- Enable6=1
- PolicyId7=008
- Action7=1003
- Enable7=1
- PolicyId8=009
- Action8=1003
- Enable8=1
- PolicyId9=010
- Action9=1003
- Enable9=1
- PolicyId10=011
- Action10=1003
- Enable10=1
- PolicyId11=013
- Action11=1003
- Enable11=1
- [AEGIS_Exception]
- Count=0
- [AEGIS_DACPolicy]
- Count=4
- Enable=1
- PopAlert=1
- PolicyId0=D001
- Action0=0
- Enable0=1
- PolicyId1=D002
- Action1=0
- Enable1=1
- PolicyId2=D003
- Action2=0
- Enable2=1
- PolicyId3=D004
- Action3=0
- Enable3=1
- CountOut=4
- EnableOut=1
- PopAlertOut=1
- PolicyIdOut0=D001
- ActionOut0=0
- EnableOut0=1
- PolicyIdOut1=D002
- ActionOut1=0
- EnableOut1=1
- PolicyIdOut2=D003
- ActionOut2=0
- EnableOut2=1
- PolicyIdOut3=D004
- ActionOut3=0
- EnableOut3=1
- [DAC_EXECUTABLE_LIST]
- Count=0
- CountOut=0
- [DAC_APPROVED_LIST]
- Count=0
- CountOut=0
- [Smart Schedule Scan]
- AllowSmartSleep=1
- LowUsagePercent=20
- LowSleepTime=6
- LowMustBelowFor=6
- MedUsagePercent=50
- MedSleepTime=3
- MedMustBelowFor=3
- HighUsagePercent=100
- HighSleepTime=0
- HighMustBelowFor=0
- [SPN_FEEDBACK_SECTION]
- SPNFeedbackEnabled=1
- SPNFileFeedbackEnabled=1
- SPNIndustryID=0
- SPNFeedbackInterval=300
- SPNFeedbackEntryNum=10
- SPNFeedbackBandWidthLimit=32
- SPNFeedbackCert=oscex.cert
- SPNFeedbackAUID=461
- SPNFeedbackServerDE=osce120-de.fbs25.trendmicro.com
- SPNFeedbackServerEN=osce120-en.fbs25.trendmicro.com
- SPNFeedbackServerSP=osce120-es.fbs25.trendmicro.com
- SPNFeedbackServerFR=osce120-fr.fbs25.trendmicro.com
- SPNFeedbackServerJP=osce120-jp.fbs25.trendmicro.com
- SPNFeedbackServerKR=osce120-ko.fbs25.trendmicro.com
- SPNFeedbackServerRU=osce120-ru.fbs25.trendmicro.com
- SPNFeedbackServerSC=osce120-sc.fbs25.trendmicro.com
- SPNFeedbackServerTC=osce120-tc.fbs25.trendmicro.com
- SPNFeedbackServerIT=osce120-it.fbs25.trendmicro.com
- SPNFeedbackServerPL=osce120-pl.fbs25.trendmicro.com
- [PostponedFileList]
- FileCount=55
- WRFileStartAt=26
- FileName1=ncfg.exe
- FileName2=tm_cfw.cat
- FileName3=TM_CFW.inf
- FileName4=TM_CFW.sys
- FileName5=TM_CFWMP.inf
- FileName6=tmCfwApi.dll
- FileName7=TmPfw.ini
- FileName8=tmHash.dll
- FileName9=TmPfw.exe
- FileName10=TmPfw.exe.manifest
- FileName11=TmPfwApi.dll
- FileName12=TmPfwCtl.dll
- FileName13=TmPfwRul.dll
- FileName14=tmwfpapi.dll
- FileName15=TmPfwLog.dll
- FileName16=tmlwf.cat
- FileName17=tmlwf.inf
- FileName18=TMLWF.sys
- FileName19=tmlwfins.exe
- FileName20=tmwfp.cat
- FileName21=tmwfp.inf
- FileName22=TMWFP.sys
- FileName23=tmwfpins.exe
- FileName24=DIFxAPI.dll
- FileName25=TmFpHcEx.exe
- FileName26=TmpeUrlF.dll
- FileName27=TmpeVS.dll
- FileName28=TmphHttp.dll
- FileName29=TmphPop3.dll
- FileName30=TmProxy.dll
- FileName31=TmProxy.exe
- FileName32=TmProxy.exe.manifest
- FileName33=TmpxCfg.dll
- FileName34=TmpxHash.dll
- FileName35=TmpxHelp.dll
- FileName36=TmsmHttp.dll
- FileName37=TmsmMail.dll
- FileName38=tmtdi.dll
- FileName39=TmExtIns.exe
- FileName40=TmIEPlg.dll
- FileName41=TmExtIns32.exe
- FileName42=TmIEPlg32.dll
- FileName43=TmPlgAdp.dll
- FileName44=chrome.manifest
- FileName45=install.rdf
- FileName46=TmFFExt.dll
- FileName47=ITmFFExt.xpt
- FileName48=TmProxy32.dll
- FileName49=TmFFExt2Initializer.js
- FileName50=TmFFExt2.dll
- FileName51=TmFFExt2Accessor.jsm
- FileName52=TmOsprey.dll
- FileName53=TmOsprey32.dll
- FileName54=TmopIEPlg.dll
- FileName55=TmopIEPlg32.dll
- [ServiceSwitch]
- EnableAntiMalwareOnDesktop=1
- EnableAntiMalwareOnServer=1
- EnableWROnDesktop=1
- EnableWROnServer=1
- EnableAEGISOnDesktop=1
- EnableAEGISOnServer=0
- EnableFWOnDesktop=1
- EnableFWOnServer=0
- EnableDLPOnDesktop=1
- EnableDLPOnServer=0
- EnableNCIEOnDesktop=0
- EnableNCIEOnServer=0
- EnableCCSFOnDesktop=1
- EnableCCSFOnServer=0
- [INI_UNREACHABLE_NETWORK_SETTING_SECTION]
- HeartbeatFrequency=10
- ClientHeartbeatTimeout=20
- PollingFrequency=60
- UnreachableNetworkScopeCount=0
- UnreachableNetworkScopeMaxCount=1024
- UnreachableNetworkScopeIPV6Length0000=0
- [Debug Log Setting]
- DebugFlags=0
- DebugLogFolder=C:\OSCE_DEBUG
- CCSFDebugLogFolder=C:\OSCE_DEBUG
- ReserveHardDiskSpacePercentage=15
- ReserveHardDiskSpaceSize=5120
- MaxLogCount=10
- [INI_AEGIS_MODULE_AC_CODE]
- AcCodeTmufe=TREOSCE11\0TRE\0
- [OEM_SETTING]
- SETUPEXTNUM=0
- [INI_ANTIBODY_SECTION]
- InstallAsGuest=0
- GuestDuration=60
- LicenseAgreed=0
- [CAV_INI_SESSION]
- CAV_ENABLE=0
- CAV_SESSION_EXCEED=100
- CAV_SESSION_WITHIN=3
- CAV_SMTP_ENABLE=0
- CAV_ALERT_SMTP_SERVER=
- CAV_ALERT_SMTP_PORT=25
- CAV_ALERT_SMTP_SEND_TO=
- CAV_ALERT_SMTP_SEND_FROM=
- CAV_ALERT_SMTP_SUBJECT=Shared folder session outbreak detected
- CAV_ALERT_SMTP_MESSAGE=Shared folder sessions: %S in the last %M minutes \nDetail:\n%T
- CAV_SYSTEM_EVENT_LOG=Shared folder sessions: %S in the last %M minutes
- CAV_ALERT_SMTP_SOURCE=Source
- CAV_ALERT_SMTP_DEST=Destination
- CAV_ALERT_SMTP_DATE_TIME=Date/Time
- [INI_SQLOUTAGE_SECTION]
- SQLOUTAGE_ALERT_SMTP_SEND_TO=
- SQLOUTAGE_ALERT_SMTP_SUBJECT=SQL Server Instance [%x] on the server %s is unavailable.
- SQLOUTAGE_ALERT_SMTP_MESSAGE=SQL Server Instance [%x] on the server %s is unavailable.\nThe OfficeScan server on %s has been stopped due to the unavailable SQL Server database.\nRestart the SQL Server database service as soon as possible to recover the OfficeScan server services.\n\n
- [INI_REGISTRATION_SECTION]
- FName=
- LName=
- EMail=
- CompanyName=
- Title=
- CompanyAddr=
- City=
- State=
- ZIP=
- Country=
- WPhone=
- WFax=
- SerialNumber=
- Copyright_URL=www.antivirus.com
- [NCIE Settings]
- EnableCNP=0
- EnableRR=0
- EnableUserDefine=1
- EnableGC=0
- ActionForCNP=2
- ActionForRR=2
- ActionForUserDefine=2
- ActionForDDA=2
- [INI_CLIENT_INSTALLPATH_SECTION]
- WinNT_InstallPath=E:\Program Files\Trend Micro\OfficeScan Client
- [ICRC setting section]
- ICRC pattern directory=E:\Program Files\Trend Micro\OfficeScan Client\iCRC\Pattern
- ICRC temporary directory=E:\Program Files\Trend Micro\OfficeScan Client\iCRC\Tmp
- [SPSRelayProfile0]
- ServerAddr=OSCE-SVR.gttd.net
- HttpPort=8080
- HttpsPort=4343
- UseProxy=0
- ProxyType=0
- SSLVerifyPeer=0
- ProxyUserName=
- ProxyPassword=!CRYPT!103BAAA02C9BEEA655F4F627A3B
- [CCCA]
- APIKey=!CRYPTEX!5897D31458CBB32EF6ED0435FD9C02CF3F0DFB68B2D9E1711B53867CFEFF710188B83068D120AA734ED298E045C1ABDB
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement