Getting Started...
After installing Trend Micro Threat Mitigator, perform a number of tasks
to ensure that everything is set up and working properly.
Activate
Threat Mitigator.
Enable
Threat Management Services.
Configure Mitigation Settings:
Add
Mitigation Exceptions.
Configure
Email Notifications.
Configure
System Time Settings.
Deploy
Agents to Endpoints.
Configure Data Sources:
Enable
Virus Log Monitoring.
Register
Threat Discovery Appliance.
Set
up a Smart Scan Server.
Change
the password.
Configure Logs:
Configure
SysLog Server Settings.
Configure
Log Maintenance.
Perform Updates:
Configure
the update source.
Manually
update the components.
Configure
the automatic updates.