Enforcement Environment

Security Enforcement Environment

Follow the steps in this topic to set up the security enforcement environment:

  1. If you are new to Threat Mitigator, perform a fresh installation of Threat Mitigator. Refer to Chapter 2 of the Administrator’s Guide for installation instructions and notes.

  2. If you have installed Threat Mitigator previously and have deployed Threat Management Agents to endpoints, upgrade Threat Mitigator and Threat Management Agents. Refer to Chapter 2 of the Administrator’s Guide for upgrade instructions and notes.

  3. Set up an enforcement device. For details, see Setting Up an Enforcement Device.

  4. Register an enforcement device to Threat Mitigator. For details, see Registering an Enforcement Device to Threat Mitigator.

  5. After registration, Threat Management Agent is automatically deployed to endpoints. For details, see Agent Deployment.

  6. Configure security enforcement settings and exceptions. For details, see Enforcement Settings and Enforcement Exceptions.

Setting Up an Enforcement Device

Information about enforcement devices compatible with Threat Mitigator can be obtained from your Trend Micro representative. For information on setting up the enforcement device, refer to the documentation included in the device.

Verify the number of Threat Management Agents the enforcement device and Threat Mitigator can manage. For example, if you want Threat Mitigator to manage 5,000 agents and a device supports a maximum of 1,000 agents, you will need to set up 5 devices and then register all of them to Threat Mitigator.

Registering an Enforcement Device to Threat Mitigator

Register a device to Threat Mitigator from the product console of the enforcement device. Refer to the documentation included in the device for the registration procedure.

When Threat Mitigator detects that registration has been successfully carried out, it displays a notification on the Threat Management screen so you can start configuring security enforcement settings.

Agent Deployment

After registration has been completed, Threat Management Agent and the enforcement agent can be deployed to endpoints that have the following resources:

Agent system requirements

Resource

Requirements

Operating system

32-bit versions of the following operating systems:

  • Windows XP (Home and Professional Editions) with Service Pack 2 or 3

  • Windows Vista™ (Enterprise, Business, and Ultimate Editions) with Service Pack 1

Processor

At least 133 MHz Intel™ Pentium™ (or equivalent)

Memory

512MB minimum, 1GB recommended

Available hard disk space

670MB minimum

The deployment proceeds as follows:

Important deployment notes:

See also: