How does IM Security populate the Server Management list? Parent topic

IM Security populates the Server Management list by:
  • Querying the Global Catalog (GC) or local cache GC for the available Lync/Skype for Business Servers in a forest
  • Using the currently logged on user account to connect the servers in a forest
  • Checking the user account's permission to access remote servers
    If the user account is allowed to access a remote server, IM Security then verifies whether the WMI namespaceroot\TrendMicro\IMSecurity exists on that server. If the namespace exists, IM Security concludes that the remote server has Lync/Skype for Business Server and IM Security installed.
If all of the above conditions are satisfied, IM Security includes the server in the Server Management list.