Control Manager

Trend Micro Control Manager

Trend Micro Control Manager is a software management solution that gives you the ability to control antivirus and content security programs from a central location, regardless of the program's physical location or platform. This application can simplify the administration of a corporate antivirus and content security policy.

For information on the Control Manager versions compatible with Threat Mitigator, see Integration with Trend Micro Products and Services.

Refer to the Trend Micro Control Manager Administrator’s Guide for more information about managing products using Control Manager.

Control Manager Components

Control Manager components lists the components that make up Control Manager.

Control Manager components

Component

Description

Control Manager server

The computer upon which the Control Manager application is installed. This server hosts the web-based Control Manager product console

Management Communication Protocol (MCP) Agent

An application installed along with Threat Mitigator that allows Control Manager to manage the product. The agent receives commands from the Control Manager server, and then applies them to Threat Mitigator. It also collects logs from the product, and sends them to Control Manager. The Control Manager agent does not communicate with the Control Manager server directly. Instead, it interfaces with a component called the Communicator.

Communicator

The communications backbone of the Control Manager system; it is part of the Trend Micro Management Infrastructure. Commands from the Control Manager server to Threat Mitigator, and status reports from Threat Mitigator to the Control Manager server all pass through this component.

Entity

A representation of a managed product (such as Threat Mitigator) on the Control Manager console’s directory tree. The directory tree includes all managed entities.

You can use the Control Manager Settings screen on the Threat Mitigator console to perform the following:

Control Manager Integration in this Release

The following features and capabilities are available when managing Threat Mitigator servers from Control Manager:

  1. Under Connection Settings, type the name that identifies Threat Mitigator in the Control Manager Product Directory.

  2. Under Control Manager Server Settings:

    1. Type the Control Manager server IP address or host name.

    2. Type the port number that the MCP agent uses to communicate with Control Manager.

    3. If the Control Manager security is set to medium (Trend Micro allows HTTPS and HTTP communication between Control Manager and the MCP agent of managed products) or high (Trend Micro only allows HTTPS communication between Control Manager and the MCP agent of managed products), select Connect using HTTPS.

    4. If your network requires authentication, type the user name and password for your IIS server in the Username and Password fields.

  3. If you want Threat Mitigator to connect to Control Manager through a proxy server:

    1. Select Use a proxy server to communicate with the Control Manager server.

    2. Select the proxy protocol.

    3. Type the server name or IP address and the port number.

    4. If your proxy server needs authentication, type the user name and password in the fields provided.

  4. If you use a NAT device, select Enable two-way communication port forwarding and type the NAT device’s IP address and port number in Port forwarding IP address and Port forwarding port number. Threat Mitigator uses the Port forwarding IP address and Port forwarding port number for two-way communication with Control Manager.

  5. To check whether Threat Mitigator can connect to the Control Manager server based on the settings you specified, click Test Connection.

  6. Click Register if connection was successfully established.

  1. Open the Control Manager management console.

  2. To open the Control Manager console, on any computer on the network, open a web browser and type the following:

    https://<Control Manager server name>/Webapp/login.html

    Where <Control Manager server name> is the IP address or host name of the Control Manager server

  3. In Main Menu, click Products.

  4. Locate Threat Mitigator in the Product Directory. You can use Directory Management to move Threat Mitigator to the correct location in the Product Directory.

  1. Under Connection Status, do the following:

  2. If you change any of the settings after registration, click Update Settings to notify the Control Manager server of the changes.

  3. If you want another Control Manager server to manage Threat Mitigator, click Unregister and then register Threat Mitigator to the other server.

See also: