Views:

Last Updated: 1/22/2020 12:11:38 AM

Name

Type

Description

Length

policy.application_control.application_control_enabled

integer

Enable Application Control

1 = true; 0 = false

policy.application_control.enable_alert_msg

integer

Enable alert messages

1 = true; 0 = false

policy.application_control.app_pattern_timestamp

integer

The timestamp of the latest pattern update

policy.application_control.category[].allow_mode

integer

Block all the APPs in the APP list(Always 0)

policy.application_control.category[].id

integer

ID of the Application Control category

policy.application_control.category[].block_new_apps

integer

Block new applications added to the specified category

1 = block; 0=pass

policy.application_control.category[].apps[]

integer

ID of the APP

policy.application_control.block[].note

String

Note of the folder to be blocked

policy.application_control.block[].folder

String

Folder blocked by Application Control

policy.approvals.approved[].id

integer

Application or file ID in the Spyware/Grayware Approved List

e.g., 11679

policy.approvals.approved[].name

string

Application or file name in the Spyware/Grayware Approved List

e.g., ADW_AADB

policy.approved_blocked_url.approved.urls[]

string

URL to be added to the Approved URL List

e.g., "http://www.trendmicro.com/*"

policy.approved_blocked_url.blocked.blocked_urls[]

string

URL to be added to the Blocked URL List

e.g., "http://www.blocked.com/*"

policy.approved_blocked_url.enabled

integer

Customize Approved/Blocked URLs permission for this group (Windows)

1 = true; 0 = false

policy.behavior_monitoring.approved_list[]

string

Application to be added to the Approved Program List (not monitored by Behavior Monitoring)

e.g., "C:\Program Files\MSN Messenger\MSVS.exe"

policy.behavior_monitoring.bhvs.behaviors[].action

integer

Configured action for a triggered Event Monitoring event

0 = Always allow, 1 = Ask when necessary, 2 = Always block

policy.behavior_monitoring.bhvs.behaviors[].enabled

integer

Enabled status of an Event Monitoring event

1 = true; 0 = false

policy.behavior_monitoring.bhvs.behaviors[].event

integer

Event Monitoring event ID

1=New Startup Program 2=Hosts File Modification 3=Program Library Injection 4=New Internet Explorer Plugin 5=Internet Explorer Setting Modification 6=Shell Modification 7=New Service 8=Security Policy Modification 9=Firewall Policy Modification 10=System File Modification 11=Duplicated System File 14=System Process Notification 16=Suspicious Behavior

policy.behavior_monitoring.bhvs.behaviors[].msg.description

string

Description of the Event Monitoring event

e.g., Many malicious programs...

policy.behavior_monitoring.bhvs.behaviors[].msg.event

integer

Event Monitoring eventID

Refer to policy.behavior_monitoring.bhvs.behaviors[].event

policy.behavior_monitoring.bhvs.behaviors[].msg.name

string

Event Monitoring event name

e.g., Duplicated System File

policy.behavior_monitoring.bhvs.behaviors[].msg.popup_templ

string

The popup message for the Event Monitoring event

e.g., $PIMAGE$ ($PID$) is attempting...

policy.behavior_monitoring.bhvs.behaviors[].risk

integer

Risk level

0: High; 1: Medium; 2: Low

policy.behavior_monitoring.block_list[]

string

Application to be added to the Blocked Program List (never allowed to execute)

e.g., "C:\Program Files\MSN Messenger\MSVS.exe"

policy.behavior_monitoring.enable_adc

integer

Enable document protection against unauthorized encryption or modification (Ransomware Protection)

1 = true; 0 = false

policy.behavior_monitoring.enable_dre

integer

Automatically back up and restore files modified by suspicious programs(Ransomware Protection)

1 = true; 0 = false

policy.behavior_monitoring.enable_exploit_shield

integer

Terminate programs that exhibit abnormal behavior associated with exploit attacks

1 = true; 0 = false

policy.behavior_monitoring.enable_intuit

integer

Enable Intuit QuickBooks protection

1 = true; 0 = false

policy.behavior_monitoring.enable_pem

integer

Enable Event Monitoring

1 = true; 0 = false

policy.behavior_monitoring.enable_srp

integer

Enable blocking of processes commonly associated with ransomware(Ransomware Protection)

1 = true; 0 = false

policy.behavior_monitoring.enable_umh

integer

Enable program inspection to detect and block compromised executable files(Ransomware Protection)

1 = true; 0 = false

policy.behavior_monitoring.enabled

integer

Enable Behavior Monitoring (Windows)

1 = true; 0 = false

policy.behavior_monitoring.enable_alert_msg

integer

Enable alert messages

1 = true; 0 = false

policy.behavior_monitoring.locale

string

Locale

e.g., en-us

policy.behavior_monitoring.td.enable_td

integer

Enable Malware Behavior Blocking for known and potential threats

1 = true; 0 = false

policy.behavior_monitoring.td.td_mode

integer

Types of threats that Malware Behavior Monitoring can detect

0 = Known threats, 1 = Known and potential threats

policy.client_privileges.additional_service.bm.enable_bm_on_desktops

integer

Enable Behavior Monitoring on desktops

1 = true; 0 = false

policy.client_privileges.additional_service.bm.enable_bm_on_servers

integer

Enable Behavior Monitoring on servers

1 = true; 0 = false

policy.client_privileges.additional_service.bm.enable_dlp_on_desktops

integer

Enable Data Loss Prevention on desktops

1 = true; 0 = false

policy.client_privileges.additional_service.bm.enable_dlp_on_servers

integer

Enable Data Loss Prevention on servers

1 = true; 0 = false

policy.client_privileges.behavior_monitoring.display_tab

integer

Display the Behavior Monitoring tab on Security Agents and allow users to customize the lists

1 = true; 0 = false

policy.client_privileges.client_security.degree

integer

Select High or Normal security level for Security Agents (High: Restrict access privileges to Client/Server Security Agent files and registries, Normal: Retain normal access privileges to Client/Server Security Agentfiles and registries)

1 = High, 0 = Normal

policy.client_privileges.firewall.display_tab

integer

Display the Firewall setting in the drop-down list of the Security Protection tab on Security Agents

1 = true; 0 = false

policy.client_privileges.firewall.enable_switching

integer

Allow users to enable/disable the firewall

1 = true; 0 = false

policy.client_privileges.mail_scan.allow_configure

integer

Allow usersto configure real-time scan for POP3 mail

1 = true; 0 = false

policy.client_privileges.scan_settings.allow_enable_scheduled_scan

integer

Allow users to enable/disable Scheduled Scan

1 = true; 0 = false

policy.client_privileges.scan_settings.allow_postpone_scheduled_scan

integer

Allow users to postponse Scheduled Scan

e.g., 0

policy.client_privileges.scan_settings.allow_stop_scheduled_scan

integer

Allow usersto skip and stop Scheduled Scan

1 = true; 0 = false

policy.client_privileges.scan_settings.display_manual_scan_tab

integer

Allow usersto modify Manual Scan settings

1 = true; 0 = false

policy.client_privileges.scan_settings.display_realtime_scan_tab

integer

Allow usersto modify Real-time Scan settings

1 = true; 0 = false

policy.client_privileges.scan_settings.display_scheduled_scan_tab

intege

For internal use only

policy.client_privileges.scan_settings.enable_scheduled_scan_warning

integer

For internal use only

policy.client_privileges.update_settings.disable_upgrade

integer

Allow usersto disable regular Security Agent upgrade and hotfix deployment

1 = true; 0 = false

policy.client_privileges.url_filtering.continue_browsing

integer

Allow usersto continue browsing to a restricted URL until the computer is restarted

1 = true; 0 = false

policy.client_privileges.wtp.allow_edit_approved_url_list

integer

Grant usersthe privilege to edit the Approved URL List

1 = true; 0 = false

policy.client_privileges.wtp.continue_browsing

integer

Allow usersto continue browsing to a malicious URL until the computer is restarted

1 = true; 0 = false

policy.client_privileges.agent_alerts.display_tab

integer

Allow windows client to configure agent alerts

1 = true; 0 = false

policy.device_control.dac_item[].action

integer

policy.device_control.dac_item is a list forfivesettings: whether to allow or block the AutoRun function {"action": 2, "enabled": 0, "event": 5} = Block the autorun function on USB storage devices, {"action": 0, "enabled": 0, "event": 5} = Otherwise; Select the permissions for USB devices. {"action": 0, "enabled": 0, "event": 1} = Full access, {"action": 2, "enabled": 0, "event": 1} = List device content only, {"action": 4, "enabled": 0, "event": 1} = Read, {"action": 5, "enabled": 0, "event": 1} = Modify, {"action": 6, "enabled": 0, "event": 1} = Read and Execute" Select the permissions for CD/DVD. {"action": 0, "enabled": 0, "event": 2} = Full access, {"action": 2, "enabled": 0, "event": 2} = List device content only, {"action": 4, "enabled": 0, "event": 2} = Read, {"action": 5, "enabled": 0, "event": 2} = Modify, {"action": 6, "enabled": 0, "event": 2} = Read and Execute", {"action": 10000, "enabled": 0, "event": 2} = Block Select the permissions for Floppy Disk. {"action": 0, "enabled": 0, "event": 3} = Full access, {"action": 2, "enabled": 0, "event": 3} = List device content only, {"action": 4, "enabled": 0, "event": 3} = Read, {"action": 5, "enabled": 0, "event": 3} = Modify, {"action": 6, "enabled": 0, "event": 3} = Read and Execute", {"action": 10000, "enabled": 0, "event": 3} = Block Select the permissions for Network Driver. {"action": 0, "enabled": 0, "event": 4} = Full access, {"action": 2, "enabled": 0, "event": 4} = List device content only, {"action": 4, "enabled": 0, "event": 4} = Read, {"action": 5, "enabled": 0, "event": 4} = Modify, {"action": 6, "enabled": 0, "event": 4} = Read and Execute", {"action": 10000, "enabled": 0, "event": 4} = Block

DEPRECATED

policy.device_control.dac_item[].enabled

integer

As above

DEPRECATED

policy.device_control.dac_item[].event

integer

As above

DEPRECATED

policy.device_control.usb_operation

integer

Allowed usb devices operation: 0: Full access, 2 : List device content only , 4: Read, 5: Modify, 6: Read and Execute

policy.device_control.enable_alert_msg

integer

Display alerts on devices

1 = true; 0 = false

policy.device_control.exception_list[].item

string

Add a program to the exception list

e.g., "C:\ex1.exe"

policy.device_control.exception_list[].type

integer

As above

policy.device_control.dc_rules.usb_autorun

string

Device control rule for USB autorun

"allow" or "block"

policy.device_control.dc_rules.usb_storage

string

Device control rule for USB storage

"allow" or "modify" or "read_execute" or "read" or "list_device_content_only" or "block"

policy.device_control.dc_rules.cd_dvd

string

Device control rule for CD/DVD

"allow" or "modify" or "read_execute" or "read" or "list_device_content_only" or "block"

policy.device_control.dc_rules.network_drives

string

Device control rule for network drives

"allow" or "modify" or "read_execute" or "read" or "list_device_content_only"

policy.device_control.dc_rules.mobile_device_storage

string

Device control rule for mobile storage

"allow" or "read" or "block"

policy.device_control.dc_rules.print_screen_key

string

Device control rule for print screen key

"allow" or "block"

policy.device_control.dc_rules.infrared_devices

string

Device control rule for infrared devices

"allow" or "block"

policy.device_control.dc_rules.modems

string

Device control rule for modems

"allow" or "block"

policy.device_control.dc_rules.ieee_1394_interface

string

Device control rule for IEEE 1394 interface

"allow" or "block"

policy.device_control.dc_rules.com_lpt_ports

string

Device control rule for COM and LPT ports

"allow" or "block"

policy.device_control.dc_rules.wireless_nics

string

Device control rule for wireless NICs

"allow" or "block"

policy.device_control.dc_rules.bluetooth_adapters

string

Device control rule for bluetooth adaptors

"allow" or "block"

policy.device_control.dc_rules.imaging_devices

string

Device control rule for imaging devices

"allow" or "block"

policy.dlp.enabled

integer

Enable Data Loss Prevention (Windows)

1 = true; 0 = false

policy.dlp.enable_alert_msg

Integer

Enable alert messages

1 = true; 0 = false

policy.dlp.exception.compressed_file_scanning.compressed_layers

integer

Except when compressed layers of a compressed file is over limit

1-20 (default 10)

policy.dlp.exception.compressed_file_scanning.decompressed_file_size

integer

Except when the file size of a decompressed file is over limit

1-512 (default 128) [MB]

policy.dlp.exception.compressed_file_scanning.scan_file_number

integer

Except when the file number of a compressed file is over limit

1-5000 (default 2000)

policy.dlp.exception.non_monitored_channel[].note

String

Note of the exception channel

HTTP, HTTPS, FTP, and SMB

policy.dlp.exception.non_monitored_channel[].targets

String

Target of the exception channel

policy.dlp.exception.non_monitored_channel[].port

String

Port of the exception channel

IP, Hostname or FQDN

policy.dlp.non_monitored_email_domain[].note

String

Note of the email exception channel

policy.dlp.non_monitored_email_domain[].domain

String

Domain of the email exception channel

policy.dlp.exception.non_monitored_email_domain[].using_ms_server

Integer

Use Microsoft Exchange Server

1 = true; 0=false

policy.dlp.exception.non_monitored_removable_storage_device[].model

String

The model of the removable storage

Info would be displayed in Device List Tool

policy.dlp.exception.non_monitored_removable_storage_device[].vendor

String

The vendor of the removable storage

Info would be displayed in Device List Tool

policy.dlp.exception.non_monitored_removable_storage_device[].searial_id

String

The serial id of the removable storage

Info would be displayed in Device List Tool

policy.dlp.rules.description

String

Description of the rule

256

policy.dlp.rules.enabled

Integer

Enable the rule

1 = true; 0 = false

policy.dlp.rules.rule_name

String

Rule name

64

policy.dlp.rules.only_enable_outside_lan

Integer

Monitors data transmitted to any target outside the Local Area Network (LAN)

1 = true; 0 = false

policy.dlp.rules.action

Integer

Log and take the specified action after detecting sensitive data transmitted through a selected channel

1 = block; 0=pass

policy.dlp.rules.default_templates.template_id

String

ID of the template

UUID

policy.dlp.rules.channel.enable_ptop

Integer

Data Loss Prevention monitors peer-to-peer applications

1 = true; 0 = false

policy.dlp.rules.channel.enable_http

Integer

Data Loss Prevention monitors HTTP

1 = true; 0 = false

policy.dlp.rules.channel.enable_smb

Integer

Data Loss Prevention monitors SMB

1 = true; 0 = false

policy.dlp.rules.channel.enable_pgp_encryption

Integer

Data Loss Prevention monitors GPG encryption

1 = true; 0 = false

policy.dlp.rules.channel.enable_webmail

Integer

Data Loss Prevention monitors Web mail

1 = true; 0 = false

policy.dlp.rules.channel.enable_printer

Integer

Data Loss Prevention monitors printer

1 = true; 0 = false

policy.dlp.rules.channel.enable_https

Integer

Data Loss Prevention monitors HTTPS

1 = true; 0 = false

policy.dlp.rules.channel.enable_ftp

Integer

Data Loss Prevention monitors FTP

1 = true; 0 = false

policy.dlp.rules.channel.enable_cd_dvd

Integer

Data Loss Prevention monitors CD/DVD

1 = true; 0 = false

policy.dlp.rules.channel.enable_email_clients

Integer

Data Loss Prevention monitors E-mail client

1 = true; 0 = false

policy.dlp.rules.channel.enable_windows_clipboard

Integer

Data Loss Prevention monitors Windows clipboard

1 = true; 0 = false

policy.dlp.rules.channel.enable_removable_storage

Integer

Data Loss Prevention monitors removeable storage

1 = true; 0 = false

policy.dlp.rules.channel.enable_active_sync

Integer

Data Loss Prevention monitors Synchronization software

1 = true; 0 = false

policy.dlp.rules.channel.enable_im_app

Integer

Data Loss Prevention monitors IM applications

1 = true; 0 = false

policy.dlp.rules.channel.enable_cloud_storage_service

Integer

Data Loss Prevention monitors Cloud storage services

1 = true; 0 = false

policy.firewall.enable_alert_msg

integer

Enable alert message

1 = true; 0 = false

policy.firewall.enable_ids

integer

Enable Intrusion Detection System

1 = true; 0 = false

policy.firewall.enabled

integer

Enable firewall (Windows)

1 = true; 0 = false

policy.firewall.exceptions[].allow

integer

policy.firewall.exceptions is a list of firewall exceptions in order. allow is firewall exception action

1 = Allow, 0 = Block

policy.firewall.exceptions[].inbound

integer

Inbound traffic

1 = true; 0 = false

policy.firewall.exceptions[].ip_selection.ip_range.from

string

Start of IP range

policy.firewall.exceptions[].ip_selection.ip_range.to

string

End of IP range

policy.firewall.exceptions[].ip_selection.method

integer

Method of identifying clients

1 = All IP addresses, 2 = Single IP, 3 = IP range

policy.firewall.exceptions[].ip_selection.single_ip

string

The IP address of a particular client applied for the exception

policy.firewall.exceptions[].name

string

Firewall exception name.

A unique name for the exception.

policy.firewall.exceptions[].outbound

integer

Outbound traffic

1 = true; 0 = false

policy.firewall.exceptions[].port_selection.method

integer

Method of identifying clients

1 = All ports, 2 = Range, 3 = Specified ports

policy.firewall.exceptions[].port_selection.port_range.from

integer

Start of port range

policy.firewall.exceptions[].port_selection.port_range.to

integer

End of port range

policy.firewall.exceptions[].port_selection.specific_ports[]

integer

Specified port

e.g., 80

policy.firewall.exceptions[].protocol

integer

Traffic protocol

0 = All, 1 = TCP/UDP, 2 = TCP, 3 = UDP, 4 = ICMP

policy.firewall.level

integer

Firewall security level

1 = High, 2 = Medium, 3 = Low

policy.firewall.mode

integer

Firewall mode

0 = Simple mode, 1 = Advanced mode

policy.machine_learning.action_for_file

integer

Decide the action when a file is detected

0 = quarantine; 1 = log only

policy.machine_learning.action_for_process

integer

Decide the action when a process is detected

0 = terminate; 1 = log only

policy.machine_learning.file_enabled

integer

Enable file detection

1 = enabled; 0 = disabled

policy.machine_learning.machine_learning_enabled

integer

Enable machine learning

1 = enabled; 0 = disabled

policy.machine_learning.process_enabled

integer

Enable process detection

1 = enabled; 0 = disabled

policy.machine_learning.enable_alert_msg

integer

Enable alert messages

1 = enabled; 0 = disabled

policy.mail_scan.enable_realtime_scan

integer

Scan POP3 messages

1 = true; 0 = false

policy.mail_scan.enable_toolbar

integer

For internal use only

e.g., 0

policy.manual_scan.settings.action.action_info[].first_action

integer

Action for threat

For Virus Detections: 0 = Pass, 1 = Rename, 2 = Quarantine, 3 = Clean, 4 = Delete; For Spyware/Grayware Detections: 0 = Deny Access, 3 = Clean

policy.manual_scan.settings.action.action_info[].second_action

integer

Action for uncleanable threat

0 = Pass, 1 = Rename, 2 = Quarantine, 4 = Delete

policy.manual_scan.settings.action.action_info[].threat

integer

Type of thread

For Virus Detections: 0 = Joke, 1 = Worm/Trojans, 2 = Virus, 3 = Test virus, 4 = Packer, 5 = Probable virus/malware, , 99 = Other threats, 100 = Perform the same action for all detected threats, 6: Spyware/Grayware Detections

policy.manual_scan.settings.action.backup_before_clean

integer

Backup detected file before cleaning

1 = true; 0 = false

policy.manual_scan.settings.action.scan_speed

integer

The period of time WFBS-SVC waits between scanning each file affects CPU usage. (High: scan files one after another without pausing, Medium: pause between file scans if CPU consumption is higher than 50%, and do not pause if 50% or lower, Low: pause between file scans if CPU consumption is higher than 20%, and do not pause if 20% or lower)"

0 = High, 1= Medium, 2 = Low

policy.manual_scan.settings.action.virus_detection_method

integer

Method for virus detections

0 = ActiveAction, 1 = Perform the same action for all detected threats, 2 = Customized action for the following detected threats

policy.manual_scan.settings.target.advanced.scan_boot

integer

Scan boot area

1 = true; 0 = false

policy.manual_scan.settings.target.advanced.scan_bottrap

integer

Enable IntelliTrap (for antivirus)

1 = true; 0 = false

policy.manual_scan.settings.target.compress_layer_limit

integer

The number of layers of compressed files to scan

policy.manual_scan.settings.target.exclusion.default_extensions

string

A list for selecting the extension to exclude from the scan

e.g., '"",ACCDB,ACE'

policy.manual_scan.settings.target.exclusion.enabled

integer

Enable Exclusions

1 = true; 0 = false

policy.manual_scan.settings.target.exclusion.exclude_extensions[]

string

File extension to exclude from the scan

e.g., "JPG"

policy.manual_scan.settings.target.exclusion.exclude_files[]

string

File to exclude from the scan

e.g., "c:\\temp\\excldir\\ExcludeDoc.hlp"

policy.manual_scan.settings.target.exclusion.exclude_folders[]

string

Directory to exclude from the scan

e.g., "c:\\temp\\ExcludeDir"

policy.manual_scan.settings.target.exclusion.exclude_trend_product

integer

Exclude the directories where Trend Micro products are installed

1 = true; 0 = false

policy.manual_scan.settings.target.method

integer

Method of identifying files to scan

0 = All scannable files, 1 = IntelliScan, 2 = Scan files with the extensions defined in policy.manual_scan.settings.target.scan_extension_list

policy.manual_scan.settings.target.scan_compressed

integer

Scan compressed files (for antivirus)

1 = true; 0 = false

policy.manual_scan.settings.target.scan_extension_list[]

string

file extension should be scanned

e.g., "EXE"

policy.manual_scan.settings.target.scan_network_folder

integer

Scan mapped drives and shared folders on the network (for antivirus)

1 = true; 0 = false

policy.realtime_scan.enabled

integer

Wether to enable real-time Antivirus/Anti-spyware (Windows)

1 = true; 0 = false

policy.realtime_scan.settings.action.action_info[].first_action

integer

Action for threat

For Virus Detections: 0 = Pass, 1 = Rename, 2 = Quarantine, 3 = Clean, 4 = Delete; For Spyware/Grayware Detections: 0 = Deny Access, 3 = Clean

policy.realtime_scan.settings.action.action_info[].second_action

integer

Action for uncleanable threat

0 = Pass, 1 = Rename, 2 = Quarantine, 4 = Delete

policy.realtime_scan.settings.action.action_info[].threat

integer

Type of thread

For Virus Detections: 0 = Joke, 1 = Worm/Trojans, 2 = Virus, 3 = Test virus, 4 = Packer, 5 = Probable virus/malware, , 99 = Other threats, 100 = Perform the same action for all detected threats, 6: Spyware/Grayware Detections

policy.realtime_scan.settings.action.backup_before_clean

integer

Backup detected file before cleaning

1 = true; 0 = false

policy.realtime_scan.settings.action.display_spyware_alert_msg

integer

Display an alert message on the device when a spyware is detected

1 = true; 0 = false

policy.realtime_scan.settings.action.display_virus_alert_msg

integer

Display an alert message on the device when a virus is detected

1 = true; 0 = false

policy.realtime_scan.settings.action.virus_detection_method

integer

Method for virus detections

0 = ActiveAction, 1 = Perform the same action for all detected threats, 2 = Customized action for the following detected threats

policy.realtime_scan.settings.target.advanced.enable_memory_scan

integer

Quarantine malware variants detected in memory

1 = true; 0 = false

policy.realtime_scan.settings.target.advanced.scan_bottrap

integer

Enable IntelliTrap (for antivirus)

1 = true; 0 = false

policy.realtime_scan.settings.target.advanced.scan_floppy

integer

Scan floppy drive system shutdown (for antivirus)

1 = true; 0 = false

policy.realtime_scan.settings.target.compress_layer_limit

integer

The number of layers of compressed files to scan

policy.realtime_scan.settings.target.condition

integer

Condition of identifying files to scan

0 = Scan files being created, modified, or retrieved, 1= Scan files being retrieved, 3 = Scan files being created or modified

policy.realtime_scan.settings.target.exclusion.default_extensions

string

A list for selecting the extension to exclude from the scan

e.g., '",ACCDB,ACE'

policy.realtime_scan.settings.target.exclusion.enabled

integer

Enable Exclusions

1 = true; 0 = false

policy.realtime_scan.settings.target.exclusion.exclude_extensions[]

string

file extension to exclude from the scan

e.g., "JPG"

policy.realtime_scan.settings.target.exclusion.exclude_files[]

string

File to exclude from the scan

e.g., "c:\\temp\\excldir\\ExcludeDoc.hlp"

policy.realtime_scan.settings.target.exclusion.exclude_folders[]

string

Directory to exclude from the scan

e.g., "c:\\temp\\ExcludeDir"

policy.realtime_scan.settings.target.exclusion.exclude_trend_product

integer

Exclude the directories where Trend Micro products are installed

1 = true; 0 = false

policy.realtime_scan.settings.target.method

integer

Method of identifying files to scan

0 = All scannable files, 1 = IntelliScan, 2 = Scan files with the extensions defined in policy.realtime_scan.settings.target.scan_extension_list

policy.realtime_scan.settings.target.scan_compressed

integer

Scan compressed files (for antivirus)

1 = true; 0 = false

policy.realtime_scan.settings.target.scan_extension_list[]

string

File extension to scan

e.g., "EXE"

policy.realtime_scan.settings.target.scan_network_folder

integer

Scan mapped drives and shared folders on the network (for antivirus)

1 = true; 0 = false

policy.scan_mode.mode

integer

Scan method (Windows)

0 = Smart Scan, 1 = Conventional Scan

policy.schedule.daily_hour

integer

The hour of the day Scheduled Scan runs

1 to 24

policy.schedule.daily_min

integer

The minute of the hour Scheduled Scan runs

0 to 60

policy.schedule.enabled

integer

Enable Scheduled Scan

1 = true; 0 = false

policy.schedule.frequency

integer

Frequency of scheduled Scan

1 = Monthly, 2 = Weekly, 3 = Daily

policy.schedule.monthly_data

integer

The day of the week Scheduled Scan runs

1 to 31

policy.schedule.weekly_data

integer

The day of the month Scheduled Scan runs

0 = Sun, 1 = Mon, 2 = Tue, 3 =Wed, 4 = Thu, 5 = Fri, 6 = Sat

policy.scheduled_scan.settings.action.action_info[].first_action

integer

Action for threat

For Virus Detections: 0 = Pass, 1 = Rename, 2 = Quarantine, 3 = Clean, 4 = Delete; For Spyware/Grayware Detections: 0 = Deny Access, 3 = Clean

policy.scheduled_scan.settings.action.action_info[].second_action

integer

Action for uncleanable threat

0 = Pass, 1 = Rename, 2 = Quarantine, 4 = Delete

policy.scheduled_scan.settings.action.action_info[].threat

integer

Type of thread

For Virus Detections: 0 = Joke, 1 = Worm/Trojans, 2 = Virus, 3 = Test virus, 4 = Packer, 5 = Probable virus/malware, , 99 = Other threats, 100 = Perform the same action for all detected threats, 6: Spyware/Grayware Detections

policy.scheduled_scan.settings.action.backup_before_clean

integer

Backup detected file before cleaning

1 = true; 0 = false

policy.scheduled_scan.settings.action.display_spyware_alert_msg

integer

Display an alert message on the device when a spyware is detected

1 = true; 0 = false

policy.scheduled_scan.settings.action.display_virus_alert_msg

integer

Display an alert message on the device when a virus is detected

1 = true; 0 = false

policy.scheduled_scan.settings.action.scan_speed

integer

The period of time WFBS-SVC waits between scanning each file affects CPU usage. (High: scan files one after another without pausing, Medium: pause between file scans if CPU consumption is higher than 50%, and do not pause if 50% or lower, Low: pause between file scans if CPU consumption is higher than 20%, and do not pause if 20% or lower)"

0 = High, 1= Medium, 2 = Low

policy.scheduled_scan.settings.action.virus_detection_method

integer

Method for virus detections

0 = ActiveAction, 1 = Perform the same action for all detected threats, 2 = Customized action for the following detected threats

policy.scheduled_scan.settings.target.advanced.scan_boot

integer

Scan boot area

1 = true; 0 = false

policy.scheduled_scan.settings.target.advanced.scan_bottrap

integer

Enable IntelliTrap (for antivirus)

1 = true; 0 = false

policy.scheduled_scan.settings.target.compress_layer_limit

integer

The number of layers of compressed files to scan

policy.scheduled_scan.settings.target.exclusion.default_extensions

string

A list for selecting the extension to exclude from the scan

e.g., '",ACCDB,ACE"'

policy.scheduled_scan.settings.target.exclusion.enabled

integer

Enable Exclusions

1 = true; 0 = false

policy.scheduled_scan.settings.target.exclusion.exclude_extensions[]

string

File extension to exclude from the scan

e.g., "JPG"

policy.scheduled_scan.settings.target.exclusion.exclude_files[]

string

File to exclude from the scan

e.g., "c:\\temp\\excldir\\ExcludeDoc.hlp"

policy.scheduled_scan.settings.target.exclusion.exclude_folders[]

string

Directory to exclude from the scan

e.g., "c:\\temp\\ExcludeDir"

policy.scheduled_scan.settings.target.exclusion.exclude_trend_product

integer

Exclude the directories where Trend Micro products are installed

1 = true; 0 = false

policy.scheduled_scan.settings.target.method

integer

Method of identifying files to scan

0 = All scannable files, 1 = IntelliScan, 2 = Scan files with the extensions defined in policy.scheduled_scan.settings.target.scan_extension_list

policy.scheduled_scan.settings.target.scan_compressed

integer

Scan compressed files (for antivirus)

1 = true; 0 = false

policy.scheduled_scan.settings.target.scan_extension_list[]

string

File extension to scan

e.g., "EXE"

policy.ts_toolbar.enable_keystroke_encryption

integer

For internal use

policy.ts_toolbar.enable_page_rating

integer

For internal use

policy.ts_toolbar.enable_wifi_advisor

integer

For internal use

policy.url_filtering.business_hours_2.time_slots[]

integer

Alternative way to specify the business hours

policy.url_filtering.business_hours_2.type

integer

Alternative way to specify the business hours

0 = all day, 1 = week day, 2 = from 9:00 to 18:00 every week day, 3 = specified

policy.url_filtering.enabled

integer

Enable URL Filtering (Windows)

1 = true; 0 = false

policy.url_filtering.filter_rules.categories[].rules[].enable_business_hour

integer

Enable filter rule in business hours

1 = true; 0 = false

policy.url_filtering.filter_rules.categories[].rules[].enable_leisure_hour

integer

Enable filter rule in leisure hours

1 = true; 0 = false

policy.url_filtering.filter_rules.categories[].rules[].rule_id

integer

Filter rule of the sepcified URL category

- Adult category: 1= Adult/Mature Content, 3 = Pornography, 4 = Sex Education, 5 = Intimate Apparel/Swimsuit, 6 = Nudity, 8 = Alcohol Tobacco, 9 = Illegal/Questionable, 10 = Tasteless, 11 = Gambling, 14 = Violence/Hate/Racism, 15 = Weapons, 16 = Abortion, 25 = Illegal Drugs, 26 = Marijuana; - Business category: 21 = Business/Economy, 31 = Financial Services, 32 = Brokerages/Trading, 45 = Job Search/Careers, 58 = Shopping, 59 = Auctions, 60 = Real Estate; - Communications and Search category: 24 = Internet Telephony, 39 = Proxy Avoidance and Anonymizers, 40 = Search Engines/Portals, 41 = Internet Infrastructure, 42 = Blogs/Web Communications, 50 = Social Networking, 51 = Chat/Instant Messaging, 52 = Email, 53 = Newsgroups, 89 = Web Hosting; - General category: 17 = Dynamic DNS, 27 = Education, 34 = Government/Legal, 35 = Military, 36 = Politics, 37 = Health, 38 = Computers/Internet, 46 = News/Media, 48 = Translators/Cached Pages, 49 = Reference, 67 = Vehicles, 90 = Unrated, 96 = Miscellaneous; - Internet Security category: 28 = Insecure IoT, 73 = Potentially Malicious Software, 74 = Spyware, 75 = Phishing, 76 = Spam, 77 = Adware, 78 = Malware Accomplice, 79 = Disease Vector, 82 = Coin Miners, 86 = Made for AdSense, 88 = Web Advertisement, 91 = C&C Server, 92 = Malicious Domain, 93 = New Domain, 94 = Scam; 95 = Ransomware; - Lifestyle category: 18 = Recreation/Hobbies, 19 = Arts, 20 = Entertainment, 22 = Cult/Occult, 29 = Cultural Institutions, 30 = Activist Groups, 33 = Games, 44 = Alternative Journals, 47 = Personals/Dating, 54 = Religion, 55 = Personal Sites, 61 = Society/Lifestyle, 63 = Gun Clubs/Hunting, 64 = Restaurants/Food, 65 = Sports, 66 = Travel, 68 = Humor, 87 = For Kids; - Network Bandwidth category: 23 = Internet Radio and TV, 43 = Photo Searches, 56 = Sharing Services, 57 = Peer-to-Peer, 69 = Streaming Media/MP3, 70 = Ringtones/Mobile Phone Downloads, 71 = Software Downloads, 72 = Pay to Surf

policy.url_filtering.filter_rules.categories[].uc_type

integer

URL category

1 = Adult, 2 = Business, 3 = Communications and Search, 4= General, 5 = Internet Security, 6 = Lifestyle, 7 = Network Bandwidth

policy.url_filtering.level

integer

filter Strength of URL Filtering

1 = High, 2 = Medium, 3 = Low, 4 = Custom

policy.url_filtering.enable_http2_alert_msg

integer

Enable alert messages for http2 alerts (default ON)

1 = true; 0 = false

policy.url_filtering.enable_alert_msg

integer

Enable alert messages

1 = true; 0 = false

policy.wtp.enable_bes

integer

Block pages containing malicious script

1 = true; 0 = false

policy.wtp.enabled

integer

Enable Web Reputation (Windows)

1 = true; 0 = false

policy.wtp.enable_http2_alert_msg

integer

Enable alert messages for http2 alerts (default ON)

1 = true; 0 = false

policy.wtp.enable_alert_msg

integer

Enable alert messages

1 = true; 0 = false

policy.wtp.level

integer

Security level of Web Reputation

1 = Low, 2 = Medium, 3 = High

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None

None