Smart_Protection

Smart Protection Technology

Trend Micro smart protection technology is a next-generation, in-the-cloud protection solution providing File and Web Reputation Services. By leveraging the Web Reputation Service, Threat Discovery Appliance can obtain reputation data for websites that users are attempting to access. Threat Discovery Appliance logs URLs that smart protection technology verifies to be fraudulent or known sources of threats and then uploads the logs to TMSP for report generation.

Reputation services are delivered through smart protection sources, namely, Trend Micro Smart Protection Network and Smart Protection Server. These two sources provide the same reputation services and can be leveraged individually or in combination. The following table provides a comparison between these sources.

Smart protection sources

Basis of Comparison

Trend Micro Smart Protection Network

Smart Protection Server

Purpose

A globally scaled, Internet-based infrastructure that provides File and Web Reputation Services to Trend Micro products that leverage smart protection technology

Provides the same File and Web Reputation Services offered by Smart Protection Network but is intended to localize these services to the corporate network to optimize efficiency

Administration

Trend Micro hosts and maintains this service.

Trend Micro product administrators install and manage this server.

Connection protocol

HTTPS

HTTP

Usage

Use if you do not plan to install Smart Protection Server.

To configure Smart Protection Network as source, see Web Reputation.

Use as primary source and the Smart Protection Network as an alternative source.

For guidelines in setting up Smart Protection Server and configuring it as source, see Setting Up Smart Protection Server.

Setting Up Smart Protection Server

Perform the following tasks to set up a Smart Protection Server:

  1. Install Smart Protection Server on a VMware ESX/ESXi server.

  2. Installation reminders and recommendations:

  3. Configure Smart Protection Server settings from the Threat Discovery Appliance console. For details, see Web Reputation, starting in step 3.

See also: