Trend Micro, Inc.

June 2015

Trend Micro™ Control Manager™

Version 6.0 Service Pack 3

This readme file is current as of the date above. However, all customers are advised to check Trend Micro's website for documentation updates at

Trend Micro always seeks to improve its documentation. Your feedback is always welcome. Please evaluate this documentation on the following site:


  1. About Trend Micro Control Manager
  2. What's New
  3. Document Set
  4. System Requirements
  5. Installation
  6. Post-installation Configuration
  7. Known Issues
  8. Release History
  9. Contact Information
  10. About Trend Micro
  11. License Agreement


1. About Trend Micro Control Manager

Trend Micro Control Manager is a central management console that manages Trend Micro products and services at the gateway, mail server, file server, and corporate desktop levels. Administrators can use the policy management feature to configure and deploy product settings to managed products and endpoints. The Control Manager web-based management console provides a single monitoring point for antivirus and content security products and services throughout the network.

Control Manager enables system administrators to monitor and report on activities such as infections, security violations, or virus/malware entry points. System administrators can download and deploy update components throughout the network, helping ensure that protection is consistent and up to date. Example update components include virus pattern files, scan engines, and anti-spam rules. Control Manager allows both manual and pre-scheduled updates. Control Manager allows the configuration and administration of products as groups or as individuals for added flexibility.

1.1. Overview of this Release

The highlight of this release is Connected Threat Defense and the Trend Micro products that support this strategy, particularly:

Connected Threat Defense also supports the preview release of Deep Discovery Endpoint Sensor, which facilitates impact assessment, one of the key components of Connected Threat Defense.

This release also includes all critical patches and hot fixes released previously, along with several enhancements.

For more information, go to:


1.2. Who Should Install this Release

Install this service pack if you are currently running any official build of Control Manager 6.0 or later.

Back to top


2. What's New

2.1. New Features and Enhancements

For a list of new features and enhancements in this release, go to:


2.2. Resolved Known Issues

For information regarding hot fix solutions available in this service pack, go to:


3. Document Set

In addition to this readme, the documentation set includes:

View and download the documentation set at:

Back to top

4. System Requirements

Refer to the Control Manager 6.0 SP3 System Requirements document for more information. This document lists the requirements to successfully install both version 6.0 and this service pack.

Back to top

5. Installation/Uninstallation

Be sure to install or upgrade to Control Manager 6.0 (or later) before installing this service pack.

Download the installation packages for version 6.0 and this service pack at:


5.1. Installing/Upgrading to Control Manager 6.0

See the Installation Guide for Control Manager 6.0 for installation and upgrade instructions.


5.2. Installing this Service Pack

  1. Copy the installation package to the Control Manager server folder.
  2. Launch the installation package.
  3. Accept the license agreement and then click Install.
  4. If a prompt message displays, read the pre-installation information carefully and follow instructions, if any.
  5. Click OK.

    A message prompts you that installation was successful.


5.3. Uninstallation

  1. Get the service pack backup path information from the registry key:

    \HKEY_Local_Machine\Software\TrendMicro\TVCS\HOTFIX\B2900\Backup Dir

  2. Open the backup folder.

    For example:

    C:\Program files\Trend Micro\Control Manager\HotFix\Bxxxx-B2900

  3. Double-click Uninstall.bat.

    A dialog appears.

  4. Click Remove to uninstall the service pack.

    A message prompts you that rollback was successful.

Back to top

6. Post-installation Configuration

After successfully installing this service pack, Control Manager automatically synchronizes with your Active Directory OU, Computer and User objects.

Synchronization time depends on system specifications, the number of managed endpoints, and the size of objects in Active Directory. Check the status of synchronization and other post-installation tasks on top of the Dashboard on the management console.

After the synchronization, the list of endpoints and users on the management console's User/Endpoint view is updated.

Back to top

7. Known Issues

7.1. Sample CSV file

If the Internet Explorer setting Do not save encrypted pages to disk is enabled on the computer used to access the Control Manager management console, the sample CSV file used for importing user-defined suspicious objects cannot be downloaded.



7.2. Suspicious object synchronization

If Control Manager is set to use HTTP for all communications (configured during installation), Deep Discovery Inspector, OfficeScan, and Smart Protection Server cannot synchronize suspicious objects with Control Manager.

7.3. Impact assessment on IOC files

If impact assessment on an IOC file is in progress, the number of endpoints indicated in two places in the Control Manager management console may not be consistent. This issue automatically resolves after impact assessment is complete.

A. Indicators of Compromise (IOCs) screen > At Risk column


B. At Risk Endpoints screen (opens after clicking a value in the At Risk column)


7.4. Chart icons in the Security Threats screen not printed

If a browser's background colors and images printing option is disabled and administrators click the print button in the Security Threats (User) or Security Threats (Endpoint) screen, the icons in the chart do not display in the printed report.



7.5. Child servers

Control Manager child servers cannot register to their parent through HTTPS if the parent runs Windows Server 2003.

7.6. Cascading management

All the new features in this service pack do not support cascading management.

7.7. Links to managed products

The Control Manager management console includes links to managed product items. These items do not display if administrators access the Control Manager management console using certain Internet Explorer versions.

Internet Explorer Version Control Manager Link Actual Item Displayed Notes


"View" link to Deep Discovery Analyzer 5.1 analysis report

(See screenshot below)

Deep Discovery Analyzer logon screen A message prompt notifies administrators that the browser version is unsupported.

8.0 or 9.0

"View" link to Deep Discovery Inspector 3.8 analysis report

(See screenshot below)

Deep Discovery Inspector logon screen A message prompt notifies administrators that the browser version is unsupported.


Host name link to Deep Discovery Endpoint Sensor 1.5 mindmap

(See screenshot below)

Deep Discovery Endpoint Sensor logon screen A message prompt notifies users that the browser version has no native SVG support and thus requires a plug-in to render SVG.

"View" link


Host name link


7.8. Managed product issues

Managed Product Details
OfficeScan 11 SP1

Cannot detect user-defined suspicious files (defined in Control Manager) during routine scans

Does not report suspicious IP addresses that are C&C callback addresses. As a result, C&C callback information is not available in the following:

  • C&C related widgets
    • C&C Callback Events (legacy)
    • Unique Compromised Hosts Over Time (legacy)
    • Hosts with C&C Callback Attempts (legacy)
    • Critical Threats widget (new in this service pack)
  • Virtual Analyzer Suspicious Objects screen (at-risk endpoints affected by a suspicious IP address)

Incorrectly reports suspicious URLs as blocked when the action configured in Control Manager and deployed to the product is "Log"

Deep Discovery Endpoint Sensor 1.5

No single sign-on support

Has an issue if there are several Deep Discovery Endpoint Sensor servers registered to Control Manager and the first registered server is removed

If there are several servers registered to Control Manager, removing the first registered server from the Managed Servers screen causes failure in obtaining the status of of the other servers' investigation tasks.

To resolve this issue, register a Deep Discovery Endpoint Sensor server to Control Manager.

Deep Discovery Inspector 3.8

Can only send suspicious objects analyzed by the product's internal Virtual Analyzer

Cannot detect suspicious URLs accessed through HTTPS and FTP

Detects only high-risk suspicious objects
Cannot apply scan actions defined in Control Manager


Back to top

8. Release History

8.1. Files Included in this Release

For a list of files included in this release, go to:


Back to top

9. Contact Information

A license to the Trend Micro software usually includes the right to product updates, pattern file updates, and basic technical support for one (1) year from the date of purchase only. After the first year, Maintenance must be renewed on an annual basis at Trend Micro's then-current Maintenance fees.

You can contact Trend Micro via fax, phone, and email, or visit us at

Evaluation copies of Trend Micro products can be downloaded from our Web site.

Global Mailing Address/Telephone numbers

For global contact information in the Asia/Pacific region, Australia and New Zealand, Europe, Latin America, and Canada, refer to

The Trend Micro 'About Us' screen displays. Click the appropriate link in the 'Contact Us' section of the screen.

Note: This information is subject to change without notice.

Back to top

10. About Trend Micro

Trend Micro Incorporated, a global leader in Internet content security and threat management, aims to create a world safe for the exchange of digital information for businesses and consumers. A pioneer in server-based antivirus with over 20 years experience, we deliver top-ranked security that fits our customers' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the Trend Micro™ Smart Protection Network™ infrastructure, our industry-leading cloud-computing security technology and products stop threats where they emerge, on the Internet, and are supported by 1,000+ threat intelligence experts around the globe. For additional information, visit

Copyright 2015, Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, Control Manager, ScanMail, Deep Security, InterScan, Data Loss Prevention, OfficeScan, ServerProtect, PortalProtect, and Smart Protection Network are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.

Back to top

11. License Agreement

Information about your license agreement with Trend Micro can be viewed at

Third-party licensing agreements can be viewed by:

Back to top