Configuring a Scheduled Vulnerability Scan

  1. To run a vulnerability scan on the OfficeScan server computer, navigate to <Server installation folder>\PCCSRV\Admin\Utility\TMVS and double-click TMVS.exe. The Trend Micro Vulnerability Scanner console appears. To run vulnerability scan on another endpoint running Windows Server 2003, Server 2008, Vista, 7, 8, 8.1, 10, or Server 2012/2016:
    1. On the OfficeScan server computer, go to <Server installation folder>\PCCSRV\Admin\Utility.
    2. Copy the TMVS folder to the other endpoint.
    3. On the other endpoint, open the TMVS folder and then double-click TMVS.exe.

      The Trend Micro Vulnerability Scanner console appears.

    Note:

    You cannot launch the tool from Terminal Server.

  2. Go to the Scheduled Scan section.
  3. Click Add/Edit.

    The Scheduled Scan screen appears.

  4. Type a name for the scheduled vulnerability scan.
  5. Type the IP address range of the endpoints you want to check.
    1. Type an IPv4 address range.
      Note:

      Vulnerability Scanner can only query an IPv4 address range if it runs on a pure IPv4 or dual-stack host machine. Vulnerability Scanner only supports a class B IP address range, for example, 168.212.1.1 to 168.212.254.254.

    2. For an IPv6 address range, type the IPv6 prefix and length.
      Note:

      Vulnerability Scanner can only query an IPv6 address range if it runs on a pure IPv6 or dual-stack host machine.

  6. Specify the start time for the Schedule using the 24-hour clock format and then select how often the scan will run. Choose from daily, weekly, or monthly.
  7. Select which set of vulnerability scan settings to use.
    1. Select Use current settings if you have configured and want to use manual vulnerability scan settings.

      For details about manual vulnerability scan settings, see Running a Manual Vulnerability Scan.

    2. If you did not specify manual vulnerability scan settings or if you want to use another set of settings, select Modify settings and then click Settings.

      The Settings screen appears.

    3. Configure the following settings:

      Ping settings

      Vulnerability Scan can "ping" the IP addresses specified in the previous step to check if they are currently in use. If a target host machine is using an IP address, Vulnerability Scanner can determine the host machine's operating system.

      For details, see Ping Settings.

      Method for retrieving computer descriptions

      For host machines that respond to the "ping" command, Vulnerability Scanner can retrieve additional information about the host machines.

      For details, see Method for Retrieving Endpoint Descriptions.

      Product query

      Vulnerability Scanner can check for the presence of security software on the target host machines.

      For details, see Product Query.

      OfficeScan server settings

      Configure these settings if you want Vulnerability Scanner to automatically install OfficeScan agent to unprotected host machines. These settings identify the parent server and the administrative credentials used by the OfficeScan agent to log on to the host machines.

      For details, see OfficeScan Server Settings.

      Note:

      Certain conditions may prevent the installation of the OfficeScan agent to the target host machines.

      For details, see Guidelines When Installing the OfficeScan Agent Using Vulnerability Scanner.

      Notifications

      Vulnerability Scanner can send the vulnerability scan results to OfficeScan administrators. It can also display notifications on unprotected host machines.

      For details, see Notifications.

      Save results

      In addition to sending the vulnerability scan results to administrators, Vulnerability Scan can also save the results to a .csv file.

      For details, see Vulnerability Scan Results.

  8. Click OK.

    The Scheduled Scan screen closes. The scheduled vulnerability scan you created appears under the Scheduled Scan section. If you enabled notifications, Vulnerability Scanner sends you the scheduled vulnerability scan results.

  9. To execute the scheduled vulnerability scan immediately, click Run Now.

    The vulnerability scan results appear in the Results table under the Scheduled Scan tab.

    Note:

    MAC address information does not display in the Results table if the endpoint runs Windows Server 2008 or Windows Server 2012.

  10. To save the results to a comma-separated value (CSV) file, click Export, locate the folder where you want to save the file, type the file name, and click Save.