To remain effective at identifying new threats, your agents need periodic security updates.
By default, the relays provided as part of the Server & Workload Protection
service (the "Primary Tenant Relay Group") provide security updates to your agents.
You can also deploy your own relays that get security updates from the Primary
Tenant Relay Group and then distribute the updates to your agents. For details see
How relays
work.
You can:
Configure the security update source
The default configuration for security updates is adequate for most environments,
but you can change the settings to suit your needs:
Procedure
- Go to .
- Select an option for the Primary Security Update Source.By default, the primary source is Trend Micro Update Server, which is accessed via the Internet. Don't change the setting unless your support provider has instructed you to configure Other update source. Alternative update source URLs must include "http://" or "https://".
- Configure the Secondary Source for security updates. Usually, agents connect to a relay to obtain security updates
when Server & Workload Protection tells them to. But if your computers can't always connect with Server & Workload Protection or relays (such as during scheduled maintenance times) and enough Internet/WAN bandwidth is available, these options are useful:
- Allow Agents/Appliances to download security updates directly from Primary Security Update Source if Relays are not accessible
- Allow Agents/Appliances to download security updates when Server & Workload Protection is not accessible
Tip
If you protect laptops and portable computers, they might be located far from support services. To avoid risk of a potentially problematic security update while at a remote location, deselect these options. - Trend Micro sometimes updates an existing security rule to improve performance or fix a bug. By default, Automatically apply Rule Updates to Policies is selected.
What to do next
Initiate security updates
TipInstead of manually checking for updates, configure Server & Workload Protection
to automatically check for security updates via a scheduled task. See Schedule
Server & Workload Protection to perform
tasks.
|
You can manually initiate security updates at any time, regardless of scheduled tasks.
To get security updates on a single agent, go to Computers, select the agent, right-click, and then select
.
NoteDeep Security Agent version 20.0.0-179 and later for macOS supports rolling back a
security update. Agents for macOS earlier than version 20.0.0-179 do not support rolling back a security update.
|
Check your security update status
To view the status of your security updates, go to
.-
Trend Micro Update Server: Indicates whether or not relays can connect to Trend Micro ActiveUpdate to check for the latest security updates.
-
Server & Workload Protection: Indicates when the last successful check and download were performed.
-
Computers: Indicates if any computers are out-of-date compared to the pattern updates currently on the relays. To prompt all computers to get the latest pattern updates from their assigned relays, click Send Patterns to Computers.
View details about pattern updates
To view a list of the components in an Anti-Malware pattern update, go to Server & Workload Protection has an active relay.
. This page is displayed only when -
Component: The type of update component.
-
For Use By: The Server & Workload Protection product this component is intended for
-
Platform: The operating system for which the update is intended.
-
Current Version: The version of the component currently being distributed by the relays.
Tip
To check which security update component version is being used on a protected computer, go to Computers, double-click the computer, and then select Updates. -
Last Updated: When the current security update was downloaded from Trend Micro.
Revert, import, or view details about rule updates
To view a list of the most recent Intrusion Prevention, Integrity Monitoring, and
Log Inspection
Rules that have been downloaded into the Server & Workload Protection database, go to .
From there you can:
-
View details about a rule update: Select a rule update and click View. Details include a list of the update's specific rules.
Tip
To check which rule update version a relay is distributing, go to Computers, double-click the relay, and then select Security Updates. If Anti-Malware is enabled for that computer, it also displays the computer's pattern version. -
Roll back a rule update: If a recent rule update has caused problems, you can revert to a previous rule version. Select the rule update that you want to revert to and then click Rollback. Server & Workload Protection generates a preview change summary so that you can confirm results before finalizing.
Note
All policies affected by the reverted rules will be immediately updated on all computers using those policies. -
Reapply the current rule set: indicates that a rule update has been applied. To reapply that rule update to protected computers, right-click the rule update and click Reapply.
-
Import a rule update: Normally, rule updates are imported either manually or automatically (via scheduled task). However, if your deployment has no connectivity to the Trend Micro Update servers on the Internet (an "air-gapped" deployment), or if you are asked to do so by your support provider, you can click this button to manually upload and import a security update package.
-
Export a rule update: Normally, you should not need to export a rule update unless your support provider asks you.
-
Delete a rule update: Removes the selected rule update from the Server & Workload Protection database.
Security update packages must have a valid digital signature. If you try to view or
use an
invalid package (including old security updates that don't have a signature),
then Server & Workload Protection displays an error message. See
How Server & Workload Protection validates update
integrity.
Configure security updates
You can make the following configurations:
Enable automatic patches for rules
Trend Micro sometimes updates an existing Server & Workload Protection rule to improve performance or fix a bug. To automatically apply these patches, go
to and in the Send Policy Changes Immediately area, select Automatically send Policy changes to computers and set the drop-down to Yes. If the option is not selected, you must manually apply downloaded rule updates to
policies. Go to and click Automatically apply Rule Updates to Policies.
NoteBy default, changes to policies are automatically applied to computers.
|
Enable automatic Anti-Malware engine updates
By default, when you update Deep Security Agent, the Deep Security Anti-Malware engine
is updated together with it. If you do not update software often, then over time,
the Anti-Malware engine might become much older than the malware patterns it uses
(which should be frequently updated).
For better protection, you can configure agents to automatically keep the Anti-Malware
engine part of the software updated — an approach more similar to the security updates
that it uses.
Procedure
- Go to Computers or Policies.
- Double-click a computer or policy.
- Go to .
- For Automatically update anti-malware engine, select Yes .If this setting is disabled, then navigate toand confirm that the Is Latest section displays N/A.
What to do next
NoteRegardless of this setting, relays always receive the latest Anti-Malware engine updates.
This keeps the relay's local protection and engine update source for the same relay
group up to date. Therefore, you cannot enable or disable engine updates directly
on a relay.
|
Change the alert threshold for late security updates
If an update has been downloaded from Trend Micro and available for some time, but
computers are not updated yet, an alert occurs. For pattern updates, by default, the
limit is 1 hour.
If you want to change the time limit for the alert, go to
and configure Length of time an Update can be pending before raising an Alert.