Deep Discovery Email
Inspector
requires connection to a management network. After deployment,
administrators can perform configuration tasks from any computer on the management
network.
Connection to a custom network is recommended
to simulate malware behavior when connecting to the Internet. For best results, Trend Micro recommends an Internet
connection without proxy settings, proxy authentication, and connection
restrictions.
The networks must be independent of each other so that malicious objects in the custom
network do not affect entities in the management network.