OfficeScan Agent Proxy Settings

The following table outlines the OfficeScan agent proxy settings available for connecting to internal and external servers.

Proxy Configuration

Description

Internal agents

Configure internal agent proxy settings for connections to the following servers:

  • OfficeScan server: The server computer hosts the OfficeScan server and the integrated Smart Protection Server. OfficeScan agents connect to the OfficeScan server to update components, obtain configuration settings, and send logs. OfficeScan agents connect to the integrated Smart Protection Server to send scan queries.

  • Smart Protection Servers: Smart Protection Servers include all standalone Smart Protection Servers and the integrated Smart Protection Server of other OfficeScan servers. OfficeScan agents connect to the servers to send scan and web reputation queries.

For more information, see Configuring Internal Agent Proxy Settings.

External agents

External OfficeScan agents use the proxy settings configured in Internet Explorer to connect to the Trend Micro Smart Protection Network.

For more information, see Configuring External Agent Proxy Settings.

Global Smart Protection Service

OfficeScan agents use the configured Smart Protection Service Proxy settings when querying Smart Protection sources for the following features:

  • Predictive Machine Learning

  • Behavior Monitoring

Note:

If the integrated Smart Protection Server is unavailable, OfficeScan agents connect to the Trend Micro Smart Protection Network when performing queries.

For more information, see Configuring Global Smart Protection Service Proxy Settings.

Agent user proxy privilege

You can grant agent users the privilege to configure proxy settings. OfficeScan agents use user-configured proxy settings only on the following instances:

  • When OfficeScan agents perform "Update Now".

  • When users disable, or the OfficeScan agent cannot detect, automatic proxy settings.

Warning:

Incorrect user-configured proxy settings can cause update problems. Exercise caution when allowing users to configure their own proxy settings.

For more information, see Granting Proxy Configuration Privileges.