Views:
Deep Discovery Email Inspector requires connection to a management network. After deployment, administrators can perform configuration tasks from any computer on the management network.
Connection to a custom network is recommended to simulate malware behavior when connecting to the Internet. For best results, Trend Micro recommends an Internet connection without proxy settings, proxy authentication, and connection restrictions.
The networks must be independent of each other so that malicious objects in the custom network do not affect entities in the management network.
Typically, the management network is the organization’s Intranet, while the custom network is an environment isolated from the Intranet, such as a test network with Internet connection.