To use anti-malware, perform these basic steps:
When you have completed these steps, review Configure malware scans and refine the anti-malware scan behavior.
![]() |
TipFor most anti-malware settings, you can either configure them for each individual
computer or in a policy that applies to multiple computers (for example, to all Windows
2008 Servers). To make management easier, configure the settings in the policy (not
individual computers) wherever possible. For more information, see Policies, inheritance, and overrides.
|
![]() |
TipCPU usage and RAM usage varies by your anti-malware configuration. To optimize anti-malware
performance on Deep Security Agent, see Performance tips for anti-malware.
|
For an overview of the anti-malware feature, see Protect against malware.
Turn on the anti-malware module
-
Go to Policies.
-
Double-click the policy for which you want to enable anti-malware.
-
Go to Anti-Malware > General.
-
From Anti-Malware State, select On.
-
Click Save.
Select the types of scans to perform
When anti-malware is turned on, Deep Security needs to know what type of scans it
should perform (see Types of malware scans).
-
Go to Policies.
-
Double-click the policy to configure.
-
Click Anti-Malware > General.
-
Enable or disable each type of scan:
-
To perform the scan using default settings, select Default.
-
To perform the scan using a malware scan configuration that you can customize, select a malware scan configuration.
-
To disable the scan, for the malware scan configuration select No Configuration.
-
-
Click Save.
![]() |
TipTrend Micro recommends that you configure Deep Security to perform weekly scheduled
scans on all protected servers. You can do this using Scheduled Tasks. (See Schedule Deep Security to perform tasks.)
|
Configure scan exclusions
To reduce scanning time and minimize the use of computing resources, you can configure
Deep Security malware scans to exclude specific folders, files, and file types from
all types of scans. You can also exclude process image files from real-time malware
scans that are run on Windows servers.
All of these exclusions are specified by selecting exclusion lists on the Exclusions tab of the Malware Scan Configuration editor. See Specify the files to scan.
![]() |
TipIf any performance-related issues are experienced when Deep Security anti-malware
protection is enabled, you can use exclusions to help troubleshoot these issues by
excluding specific folders or files from scanning.
|
Ensure that Deep Security can keep up to date on the latest threats
To remain effective against new viruses and exploits, Deep Security Agents need to
be able to download the latest software and security update packages from Trend Micro
or indirectly, from your own Relay. These packages contain threat definitions and
patterns. Relay-enabled agents, organized into relay groups (also managed and configured
by the Deep Security Manager) retrieve security updates from Trend Micro, and then
distribute them to other agents and appliances.
-
Go to Administration > System Settings > Updates.
-
Configure Deep Security's ability to retrieve security updates from Trend Micro. Make sure you have at least one relay-enabled agent, and it is assigned to the appropriate agents and appliances. To determine if a Deep Security Agent is a relay, next to a computer, click Preview.
-
Go to Administration > Scheduled Tasks.
-
Verify that there is a scheduled task to regularly download available updates for both security and software updates.