Control Manager 6.0
> Managing Managed Products
Online Help Center Home
Home
What’s New in This Version
Control Manager Documentation
Document Conventions
Introducing Trend Micro Control Manager
Control Manager Standard and Advanced
Introducing Control Manager Features
Understanding Trend Micro Management Communication Protocol
Reduced Network Loading and Package Size
NAT and Firewall Traversal Support
HTTPS Support
One-Way Communication
Two-Way Communication
Single Sign-on (SSO) Support
Control Manager Architecture
Trend Micro Smart Protection Network
Email Reputation
File Reputation Services
Web Reputation Services
Smart Feedback
Getting Started with Control Manager
Using the Management Console
Main Menu
Drop-Down Menu
Working Area
Help Menu
Understanding the Function-Locking Mechanism
Accessing the Management Console
Accessing the Web Console Locally from the Control Manager Server
Accessing the Console Remotely
Changing Access to the Management Console
Assigning HTTPS Access to the Control Manager Web Console
Configuring Web Console Settings
Configuring Command Time-out Settings
Logging Off from the Management Console
Configuring User Access
Understanding User Access
Root Account Information
Understanding User Roles
About Adding User Roles
Adding a User Role
About Editing User Roles
Editing a User Role
Understanding User Accounts
Setting Access Rights
About Adding/Importing User Accounts
Adding/Importing a User Account
About Editing User Accounts
Editing a User Account
Disabling a User Account
Deleting a User Account
Understanding My Account
Understanding User Groups
Adding a User Group
Editing a User Group
Deleting a User Group
Product Directory Basics
Understanding the Product Directory
Grouping Managed Products Using Directory Management
Product Directory Structure Recommendations
Default Folders for the Product Directory
Accessing the Product Directory
Understanding Cascading Management
Downloading and Deploying Components
Downloading and Deploying New Components
Manually Downloading Components
Understanding Scheduled Download Exceptions
Configuring Scheduled Download Exceptions
Configuring Scheduled Downloads
Configuring Scheduled Download Schedule and Frequency
Configuring Scheduled Download Settings
Configuring Scheduled Download Automatic Deployment Settings
Understanding Deployment Plans
Creating Deployment Plans
Modifying a Deployment Plan
Duplicating a Deployment Plan
Removing a Deployment Plan
Configuring Proxy Settings
Configuring Update/Deployment Settings
Enabling HTTPS Download
Enabling UNC Download
Setting "Log on as batch job" Policy
Working with the Dashboard and Widgets
Using the Dashboard
User Accounts and the Dashboard
Understanding Tabs
Default Tabs
Summary Tab
DLP Incident Investigation Tab
Data Loss Prevention Tab
Compliance Tab
Threat Detection Tab
Smart Protection Network Tab
Adding Tabs
Configuring Tab Settings
Understanding Widgets
Widget Settings
Configuring Active Directory and Endpoint Protection Verification Widget Settings
Endpoint Encryption Connection Settings
Using Widgets
Detailed Widget Information
Widget List
Configuring Widgets
Editing Widgets
Adding Widgets
Configuring Smart Protection Network Settings
Configuring Deep Security Management Server Connection Settings
Using Command Tracking
Understanding Command Tracking
Understanding Command Details
Managed Products or Services Involved
Details for Individual Products or Services
Querying and Viewing Commands
Using Notifications
Understanding Event Center
Alert Events
Update Alert Events
Unusual Alert Events
Security Violation Events
Data Loss Prevention Events
Customizing Notification Messages
Enabling or Disabling Notifications
Understanding Notification Methods
Configuring Notification Method Settings
Configuring Notification Recipients and Testing Notification Delivery
Configuring Alert Settings
Configuring Virus Outbreak Alert Settings
Configuring Special Virus Alert Settings
Configuring Special Spyware/Grayware Alert Settings
Configuring Network Virus Alert Settings
Configuring Potential Vulnerability Attack Detected Settings
Configuring C&C Callback Alert Settings
Configuring C&C Callback Outbreak Alert Settings
Configuring Data Loss Prevention Settings
Configuring Significant Incident Increase Settings
Configuring Scheduled Incident Summary Settings
Configuring Incident Details Updated Settings
Working with Logs
Using Logs
Understanding Control Manager Generated Logs
Understanding Managed Product Logs
Understanding Log Aggregation
Configuring Log Aggregation Settings
Querying Log Data
Understanding Data Views
Product Information
Security Threat Information
Data Protection Information
Data View Terminology
Understanding Ad Hoc Queries
Performing an Ad Hoc Query
Working with Saved and Shared Ad Hoc Queries
Editing Saved Ad Hoc Queries
Sharing Saved Ad Hoc Queries
Working With Shared Ad Hoc Queries
Deleting Logs
Configuring Automatic Log Deletion Settings
Working with Reports
Understanding Reports
Understanding Control Manager Report Templates
Understanding Control Manager 5 Templates
Understanding Control Manager 3 Templates
Adding Control Manager 5 Report Templates
Understanding One-time Reports
Adding One-time Reports
Understanding Scheduled Reports
Adding Scheduled Reports
Enabling/Disabling Scheduled Reports
Viewing Generated Reports
Viewing One-Time Reports
Viewing Scheduled Reports
Configuring Report Maintenance
Understanding My Reports
MCP and Control Manager Agents
Understanding Agents
Understanding Communicators
Understanding Connection Status Icons
Understanding Control Manager Security Levels
Using the Agent Communication Schedule
Understanding the Agent/Communicator Heartbeat
MCP Heartbeat
Using the Schedule Bar
Determining the Right Heartbeat Setting
Configuring Agent Communication Schedules
Setting an Agent Communication Schedule for a Managed Product
Modifying the Default Agent Communication Schedule
Configuring the Agent Communicator Heartbeat
Stopping and Restarting Control Manager Services
Modifying the Control Manager External Communication Port
Changing the External Communication Port on the Control Manager Server
Modifying the Security Level for TMI Agents
Modifying the Communicator Heartbeat Protocol
Verifying the Communication Method Between MCP and Control Manager
Verifying Control Manager Uses Two-way Communication
Verifying Control Manager Uses Two-way Communication from the Web Console
Understanding Control Manager Agent Remote Installation
Managing Managed Products
Manually Deploying Components Using the Product Directory
Viewing Status Summaries for Managed Products
Accessing Through the Dashboard
Accessing Through the Product Directory
Configuring Managed Products
Issuing Tasks to Managed Products
Querying and Viewing Managed Product Logs
About Recovering Managed Products Removed From the Product Directory
Recovering Managed Products Removed From the Product Directory
Changing Control Manager 2.x Agent Connection Re-Verification Frequency
Searching for Managed Products, Product Directory Folders, or Computers
Searching for a Folder or Managed Product
Performing an Advanced Search
Refreshing the Product Directory
Understanding the Directory Management Screen
Using the Directory Management Screen Options
Using the Directory Management Screen
Accessing the Directory Management Screen
Creating Folders
Renaming Folders or Managed Products
Moving Folders or Managed Products
Deleting User-Defined Folders
Activating Control Manager and Managed Products
Activating and Registering Managed Products
Understanding License Management
Activating Managed Products
Renewing Managed Product Licenses
Renewing Managed Product Licenses from the License Management Screen
Renewing Managed Product Licenses from the Product Directory
About Activating Control Manager
Understanding License Information
Activating Control Manager
Renewing Maintenance for Control Manager or Managed Service
Renewing Maintenance Using Check Status Online
Renewing Maintenance by Manually Entering an Updated Activation Code
Managing Child Servers
Understanding Parent-Child Communication
Registering or Unregistering Child Servers
Registering a Child Server
Checking the Status in the Control Manager Web Console
Unregistering a Child Server
Accessing the Cascading Folder
Viewing Child Server Status Summaries
Configuring Log Upload Settings
Enabling or Disabling Child Server Connection
Issuing Tasks to Child Servers
Viewing Child Server Reports
Refreshing the Product Directory
Renaming a Child Server
Removing Child Servers Accidentally Removed from the Cascading Manager
Policy Management
Understanding Policy Management
Understanding Policy Types
Assigning Endpoints to Filtered Policies
Understanding the Policy List
Creating a Policy
Changing Setting Permissions
Copying Policy Settings
Editing a Policy
Deleting a Policy
Reordering the Policy List
Understanding the Managed Server List
Adding a Server
Editing a Server
Configuring the Proxy Settings
Updating the Policy Templates
Understanding Data Loss Prevention
Data Identifier Types
Expressions
Predefined Expressions
Viewing Settings for Predefined Expressions
Customized Expressions
Criteria for Customized Expression
Creating a Customized Expression
Importing Customized Expressions
File Attributes
Creating a File Attribute List
Importing a File Attribute List
Keywords
Predefined Keyword Lists
How Keyword Lists Work
Customized Keyword Lists
Customized Keyword List Criteria
Creating a Keyword List
Importing a Keyword List
Data Loss Prevention Templates
Predefined DLP Templates
Customized DLP Templates
Condition Statements and Logical Operators
Creating a Template
Importing Templates
Investigating Data Loss Prevention Incidents
Administrator Tasks
Setting Up Manager Information in Active Directory Users
Understanding DLP User Roles
Creating DLP Auditing Logs
DLP Incident Review Process
Understanding the Incident Information List
Reviewing Incident Details
Administering the Database
Understanding the Control Manager Database
Understanding the db_ControlManager Tables
Backing Up db_ControlManager Using osql
Restoring Backup db_ControlManager Using osql
Backing Up db_ControlManager Using SQL Server Management Studio
Restoring Backup db_ControlManager Using SQL Server Management Studio
Shrinking db_ControlManager_log.ldf Using SQL Server Management Studio
Shrinking the db_ControlManager_log.ldf File Size on Windows Server 2008/2005 SP 3
Shrinking the db_ControlManager_log.ldf File Size on Windows Server 2005
Shrinking db_ControlManager.mdf and db_ControlManager.ldf Using SQL Commands
Using Trend Micro Services
Understanding Trend Micro Services
Understanding Enterprise Protection Strategy
Highlighting the Value of EPS
Understanding Outbreak Prevention Services
Benefits of Outbreak Prevention Services
Activating Outbreak Prevention Services
Viewing Outbreak Prevention Services Status
Preventing Virus Outbreaks and Understanding Outbreak Prevention Mode
Understanding Outbreak Prevention Policies
Accessing the Outbreak Prevention Services Settings Screen
Updating Outbreak Prevention Policies
Updating Outbreak Prevention Policies Manually
Configuring Automatic Updates for Outbreak Prevention Policies
Starting Outbreak Prevention Mode
Editing an Outbreak Prevention Policy
Setting Automatic Outbreak Prevention Mode
Configuring Outbreak Prevention Mode Download Settings
Stopping Outbreak Prevention Mode
Viewing Outbreak Prevention Mode History
Using Outbreak Prevention Mode
Step 1: Identifying the Source of the Outbreak
Step 2: Evaluating Existing Policies
Step 3: Starting Outbreak Prevention Mode
Step 4: Follow-Up Procedures
Using Control Manager Tools
Using Agent Migration Tool (AgentMigrateTool.exe)
Using the Control Manager MIB File
Using the NVW Enforcer SNMPv2 MIB File
Using the DBConfig Tool
Getting Support
Before Contacting Technical Support
Contacting Technical Support
Resolve Issues Faster
TrendLabs
Other Useful Resources
Control Manager System Checklists
Server Address Checklist
Ports Checklist
Control Manager 2.x Agent Installation Checklist
Control Manager Conventions
Core Process and Configuration Files
Communication and Listening Ports
Control Manager Product Version Comparison
Data Views
Data Views: Product Information
License Information
Product License Status
Product License Information Summary
Detailed Product License Information
Managed Product Information
Product Distribution Summary
Product Status Information
ServerProtect and OfficeScan Server/Domain Status Summary
Product Event Information
Component Information
Engine Status
Pattern/Rule Status
Product Component Deployment
Engine Status Summary
Pattern/Rule Status Summary
Control Manager Information
User Access Information
Control Manager Event Information
Command Tracking Information
Detailed Command Tracking Information
Data View: Security Threat Information
Virus/Malware Information
Overall Virus/Malware Summary
Overall Virus/Malware Type Summary
Virus/Malware Source Summary
Virus/Malware Endpoint Summary
Web Violation Detection Over Time Summary
Virus/Malware Action/Result Summary
Detailed Virus/Malware Information
Detailed Endpoint Virus/Malware Information
Web Virus/Malware Information
Email Virus/Malware Information
Network Virus/Malware Information
Spyware/Grayware Information
Overall Spyware/Grayware Summary
Spyware/Grayware Source Summary
Endpoint Spyware/Grayware Summary
Spyware/Grayware Detection Over Time Summary
Spyware/Grayware Action/Result Summary
Detailed Spyware/Grayware Information
Detailed Endpoint Spyware/Grayware
Web Spyware/Grayware
Email Spyware/Grayware
Network Spyware/Grayware
Content Violation Information
Content Violation Policy Summary
Content Violation Sender Summary
Content Violation Detection Over Time Summary
Content Violation Action/Result Summary
Detailed Content Violation Information
Spam Violation Information
Spam Recipient Summary
Spam Detection Over Time Summary
Detailed Spam Information
Spam Connection Information
Policy/Rule Violation Information
Detailed Firewall Violation Information
Security Threat Endpoint Analysis Information
Detailed Endpoint Security Compliance Information
Detailed Application Activity
Web Violation/Reputation Information
Overall Web Violation Summary
Web Violation Endpoint Summary
Web Violation URL Summary
Web Violation Filter/Blocking Type Summary
Web Violation Detection Over Time Summary
Web Violation Detection Summary
Detailed Web Violation Information
Detailed Web Reputation Information
Suspicious Threat Information
Overall Suspicious Threat Summary
Suspicious Source Summary
Suspicious Riskiest Endpoints Summary
Suspicious Riskiest Recipient Summary
Suspicious Sender Summary
Suspicious Threat Protocol Detection Summary
Suspicious Threat Detection Over Time Summary
Detailed Suspicious Threat Information
Overall Threat Information
Network Security Threat Analysis Information
Network Protection Boundary Information
Security Threat Entry Analysis Information
Security Threat Source Analysis Information
Security Threat Endpoint Analysis Information
C&C Callback Information
Data View: Data Protection Information
Data Loss Prevention Information
DLP Incident Information
DLP Template Match Information
IPv6 Support in Control Manager
Control Manager Server Requirements
IPv6 Server Limitations
Configuring IPv6 Addresses
Screens That Display IP Addresses
Checking Policy Status
Policy Status
Templates for Policy Management
Deep Discovery Inspector Product Settings
Adding Monitored Network Groups
Adding Registered Services
Configuring Virtual Analyzer Settings
IMSVA Product Settings
IMSVA Rules
Adding IMSVA Rules
Step 1: Set Rule Name
Step 2: Select Recipients and Senders
Configuring Exceptions
Using the Asterisk Wildcard
Step 3: Select Templates
Step 4: Select Actions
Modifying Existing IMSVA Rules
Deleting IMSVA Rules
OfficeScan Client Settings
Enabling or Disabling the Client Services from the Web Console
Configuring Malware Behavior Blocking, Event Monitoring, and the Exception List
Event Monitoring
Managing Access to External Devices
Permissions for Storage Devices
Configuring Advanced Permissions
Advanced Permissions for Storage Devices
Specifying a Digital Signature Provider
Specifying a Program Path and Name
Configuring an Approved List of USB Devices
Device List Tool
Running the Device List Tool
Configuring a Manual Scan
Files to Scan
Scan Settings
CPU Usage
Scan Exclusions
Wildcard Exceptions
Scan Exclusion List (Directories)
Scan Exclusion List (Files)
Scan Exclusion List (File Extensions)
Apply Scan Exclusion Settings to All Scan Types
Virus/Malware Scan Actions
Use ActiveAction
Use the Same Action for all Virus/Malware Types
Use a Specific Action for Each Virus/Malware Type
Back Up Files Before Cleaning
Quarantine Directory
Damage Cleanup Services
Spyware/Grayware Scan Actions
Configuring Client Privileges and Other Settings
OfficeScan Client Roaming Privilege
Scan Type Privileges
Scheduled Scan Privileges and Other Settings
Granting Scheduled Scan Privileges and Displaying the Privilege Notification
Postpone Scheduled Scan
Skip and Stop Scheduled Scan
Scheduled Scan Privilege Notification
Firewall Privileges
Behavior Monitoring Privileges
Mail Scan Privileges and Other Settings
Granting Mail Scan Privileges and Enabling POP3 Mail Scan
SecureClient Support Installation
Proxy Configuration Privileges for Clients
Update Privileges and Other Settings for OfficeScan Clients
Perform "Update Now"
Enable Scheduled Update
Clients Download Updates From the Trend Micro ActiveUpdate Server
Clients Can Update Components but not Upgrade the Client Program or Deploy Hot Fixes
The OfficeScan Client Uninstallation Program
Granting the OfficeScan Client Uninstallation Privilege
OfficeScan Client Unloading
Granting the Client Unloading Privilege
Web Threat Notifications for Client Users
Client Self-protection
Protect OfficeScan Client Services
Protect Files in the OfficeScan Client Installation Folder
Protect OfficeScan Client Registry Keys
Protect OfficeScan Client Processes
Cache Settings for Scans
Digital Signature Cache
On-demand Scan Cache
OfficeScan Client Security
OfficeScan Client Console Access Restriction
Security Risk Notifications for OfficeScan Client Users
Configuring Real-time Scan Settings
User Activity on Files
Files to Scan
Scan Settings
Scan Exclusions
Wildcard Exceptions
Scan Exclusion List (Directories)
Scan Exclusion List (Files)
Scan Exclusion List (File Extensions)
Apply Scan Exclusion Settings to All Scan Types
Virus/Malware Scan Actions
Use ActiveAction
Use the Same Action for all Virus/Malware Types
Use a Specific Action for Each Virus/Malware Type
Display a Notification Message When Virus/Malware is Detected
Display a Notification Message When Probable Virus/Malware is Detected
Back Up Files Before Cleaning
Quarantine Directory
Damage Cleanup Services
Spyware/Grayware Scan Actions
Display a Notification Message When Spyware/Grayware is Detected
Managing the Spyware/Grayware Approved List
Scan Methods
Configuring Scan Now Settings
Files to Scan
Scan Settings
CPU Usage
Scan Exclusions
Wildcard Exceptions
Scan Exclusion List (Directories)
Scan Exclusion List (Files)
Scan Exclusion List (File Extensions)
Apply Scan Exclusion Settings to All Scan Types
Virus/Malware Scan Actions
Use ActiveAction
Use the Same Action for all Virus/Malware Types
Use a Specific Action for Each Virus/Malware Type
Back Up Files Before Cleaning
Quarantine Directory
Damage Cleanup Services
Spyware/Grayware Scan Actions
Configuring a Scheduled Scan
Schedule
Files to Scan
Scan Settings
CPU Usage
Scan Exclusions
Wildcard Exceptions
Scan Exclusion List (Directories)
Scan Exclusion List (Files)
Scan Exclusion List (File Extensions)
Apply Scan Exclusion Settings to All Scan Types
Virus/Malware Scan Actions
Use ActiveAction
Use the Same Action for all Virus/Malware Types
Use a Specific Action for Each Virus/Malware Type
Display a Notification Message When Virus/Malware is Detected
Display a Notification Message When Probable Virus/Malware is Detected
Back Up Files Before Cleaning
Quarantine Directory
Damage Cleanup Services
Spyware/Grayware Scan Actions
Display a Notification Message When Spyware/Grayware is Detected
Assigning an OfficeScan Client as an Update Agent
Configuring a Web Reputation Policy
OfficeScan DLP Settings
Creating a Data Loss Prevention Policy
Creating Data Loss Prevention Rules
Transmission Scope and Targets for Network Channels
Network Channels
Email Clients
System and Application Channels
Device List Tool
Running the Device List Tool
Data Loss Prevention Actions
Data Loss Prevention Exceptions
Defining Non-monitored and Monitored Targets
Decompression Rules
ScanMail for Microsoft Exchange Product Settings
Configuring a Data Loss Prevention Policy
Selecting Accounts
Configuring DLP Targets
Configuring DLP Actions
Configuring DLP Notifications
Enabling a DLP Policy
Trend Micro Security for Mac Product Settings
Configuring Cache Settings for Scans
Cache Settings for Scans
Configuring Manual Scan Settings
Scan Settings
CPU Usage
Scan Actions
Scan Action Options and Additional Settings
Terminology
Configuring Real-time Scan Settings
User Activity on Files
Scan Settings
Scan Actions
Scan Action Options and Additional Settings
Terminology
Configuring Scan Exclusion Lists
Scan Exclusions
Configuring Scheduled Scan Settings
Schedule
Scan Target
IntelliScan
Scan Settings
CPU Usage
Scan Actions
Scan Action Options and Additional Settings
Terminology
Configuring Agent Update Settings
Agent Updates
Launching Agent Update from the Agent Management Screen
Launching Agent Update from the Summary Screen
Pure IPv6 Agent Limitations
Server Update
Configuring Web Reputation Settings
Trend Micro Smart Protection
Web Reputation
Configuring the Approved URL List
Pure IPv6 Agent Limitations
Managing Managed Products
This
section
presents material administrators need when managing the
Control Manager
network.
Manually Deploying Components Using the Product Directory
Viewing Status Summaries for Managed Products
Configuring Managed Products
Understanding the Directory Management Screen