Configuring Threat Management Services Settings

Services > Threat Management Services

Register Threat Mitigator to Threat Management Services to respond to threats in a timely manner and receive up-to-date information about the latest and emerging threats.

Before registering Threat Mitigator to Threat Management Services, ensure that you have obtained the required information for registration. Contact your Trend Micro representative or support provider to obtain the registration information, which includes:

Configure proxy settings if a proxy server is used to connect to Threat Management Services.

To configure Threat Management Services settings:

  1. Click Services on the main menu. The drop-down menu displays.

  2. Click Threat Management Services from the drop-down menu. The Threat Management Services Settings screen displays.

  3. Select the Send Threat Mitigator data and logs to Trend Micro through Threat Management Services option.

  4. Type the server name or IP address of the server to which to send logs.

  5. Select the protocol. You can select either SSH or SSL.

  6. Select the frequency of log transmissions.

  7. Type the server name or IP address of the server to which to send status information.

  8. Specify the upload or download bandwidth.

  9. Type the user name and password you used to log on to Threat Management Services.

  10. Type the email address you used to register to Threat Management Services.

  11. To check whether Threat Mitigator can connect to Threat Management Services based on the settings you specified, click Test Connection.

  12. Click Save if the test connection was successful.

See also: