Getting Started...

After installing Trend Micro Threat Mitigator, perform a number of tasks to ensure that everything is set up and working properly.

  1. Activate Threat Mitigator.

  2. Enable Threat Management Services.

  3. Configure Mitigation Settings:

  1. Add Mitigation Exceptions.

  2. Configure Email Notifications.

  1. Configure System Time Settings.

  2. Deploy Agents to Endpoints.

  3. Configure Data Sources:

  1. Enable Virus Log Monitoring.

  2. Register Threat Discovery Appliance.

  1. Set up a Smart Scan Server.

  2. Change the password.

  3. Configure Logs:

  1. Configure SysLog Server Settings.

  2. Configure Log Maintenance.

  1. Perform Updates:

  1. Configure the update source.

  2. Manually update the components.

  3. Configure the automatic updates.