Registering to Control Manager Parent topic

Administrators can manage ScanMail using the Trend Micro Control Manager management console.
Refer to the Trend Micro Control Manager Administrator's Guide for more information about managing products in Control Manager.

Procedure

  1. Click AdministrationControl Manager Settings.
    The Control Manager Settings screen displays.
  2. Under Connection Settings, type the name of the ScanMail server in the Entity display name field.
  3. Under Control Manager Server Settings specify the following:
    1. Type the Control Manager server IP address or host name in the Server FQDN or IP address field.
    2. If you have Control Manager security set to medium (HTTPS and HTTP communication is allowed between Control Manager and the MCP agent of managed products), select Connect through HTTPS.
    3. If the network requires authentication, type the user name and password for the IIS server in the Username and Password fields.
  4. Under MCP Proxy Settings, configure the following:
    1. If you want to use a proxy server for communication with the Control Manager, select Use a proxy server for communication with the Control Manager server.
    2. Type the port number that the MCP agent uses to communicate with Control Manager.
    3. Select the proxy protocol.
    4. Type the proxy server IP address or host name in the Server FQDN or IP address field.
    5. If you have Control Manager security set to medium (HTTPS and HTTP communication is allowed between Control Manager and the MCP agent of managed products), select Connect through HTTPS.
    6. If the proxy server requires authentication, type the user ID and password for the proxy server in the User ID and Password fields.
  5. Under Two Way Communication Port Forwarding, if using a NAT device, select Enable two-way communication port forwarding and type the NAT device's IP address and port number in IP address and port number.
  6. Under Spam Logs, select Send spam logs to Control Manager, if you want to send spam logs to Control Manager.
    Note
    Note
    All other filter logs will be uploaded by default once Control Manager is registered.
  7. Under Suspicious Objects, configure the following:
    1. Select Enable Suspicious Objects List, if you want ScanMail to leverage the suspicious objects list from the Control Manager. ScanMail synchronizes the consolidated suspicious objects list (including the Virtual Analyzer and User-defined objects) to apply to Security Risk Scan.
    2. Select Enable Suspicious Objects Detection Notification, to receive notifications about suspicious objects detections. The details of Security Risk Scan detection follow its notification settings.
    ScanMail leverages the Smart Protection Network to detect suspicious objects in URLs. The scanning and decision processes for the suspicious objects in files follows the following priority:
    User defined Suspicious Object > Pattern based local scan > Virtual Analyzer reported Suspicious Object.
    The action mapping in ScanMail for the Control Manager settings is defined in the following table.

    Action mapping table for suspicious objects

    Type
    Control Manager Action Setting
    ScanMail Action
    File suspicious objects
    Log
    Pass
    Block
    Replace with text/file
    Quarantine
    Quarantine entire message (Real-time scan)
    Quarantine message part (Manual/Schedule scan)
    Note
    Note
    Refer to Connected Threat Defense Primer document from the Trend Micro Control Manager documentation set for more information on Suspicious Objects and Suspicious Objects Lists.