Threat Management Services
Threat Management Services is a security portal through which Trend Micro security experts can receive threat information from registered products, and then issue targeted security solutions and reports to the products. Register Threat Mitigator to Threat Management Services to respond to threats in a timely manner and receive up-to-date information about the latest and emerging threats.
Threat Management Services works with Threat Mitigator by:
Analyzing threats that have not been eliminated completely
Deploying solutions to infected endpoints through Threat Mitigator to eliminate the threats
Providing incident reports detailing malicious behaviors and the chain of events that led to endpoint infections. Reports also contain Trend Micro recommended actions.
Threat Mitigator sends heartbeat messages to Threat Management Services periodically. A heartbeat message informs Threat Management Services that Threat Mitigator is up and running and can therefore initiate threat mitigation tasks.
Before registering Threat Mitigator to Threat Management Services, ensure that you have obtained the required information for registration. Contact your Trend Micro representative or support provider to obtain the registration information, which includes:
Name or IP address of the server hosting the services
Server authentication credentials
Configure proxy settings if a proxy server is used to connect to Threat Management Services. For details, see Proxy Settings.
To register Threat Mitigator to Threat Management Services:
Services > Threat Management Services
Select Send Threat Mitigator data and logs to Trend Micro through Threat Management Services.
Type the server name or IP address of the server to which to send logs.
Select the protocol. You can select either SSH or SSL.
Select the frequency of log transmissions.
Type the server name or IP address of the server to which to send status information.
Specify the upload or download bandwidth.
Type the user name and password you used to log on to Threat Management Services.
Type the email address you used to register to Threat Management Services.
To check whether Threat Mitigator can connect to Threat Management Services based on the settings you specified, click Test Connection.
Click Save if the test connection was successful.
See also: