Control Manager 7.0 > Introduction
        • Online Help Center Home

        • Preface
          • Documentation
          • Audience
          • Document Conventions
          • Terminology
        • Introduction
          • Introducing Control Manager
            • About Control Manager
            • What's New in Control Manager 7.0
            • Key Features and Benefits
            • Control Manager Architecture
            • Smart Protection Network Participation
        • Getting Started
          • The Web Console
            • About the Web Console
              • Web Console Requirements
            • Assigning HTTPS Access to the Control Manager Web Console
            • Accessing the Web Console
            • Configuring Web Console Settings
            • Configuring Smart Protection Network Settings
          • The Dashboard
            • About the Dashboard
            • Tabs and Widgets
              • Working with Tabs
              • Working with Widgets
            • The Operation Center
              • Compliance Indicators
              • Critical Threats
              • Resolved Events
              • Operation Center Chart
              • Operation Center Details Pane
            • Summary Tab
              • Critical Threats Widget
              • Users with Threats Widget
              • Endpoints with Threats Widget
              • Control Manager Top Threats Widget
              • Product Component Status Widget
              • Product Connection Status Widget
              • Ransomware Prevention Widget
            • DLP Incident Investigation Tab
              • DLP Incident Trends by User Widget
              • DLP Incidents by Severity and Status Widget
              • DLP Incidents by User Widget
            • Data Loss Prevention Tab
              • DLP Incidents by Channel Widget
              • DLP Template Matches Widget
              • Top DLP Incident Sources Widget
              • DLP Violated Policy Widget
            • Compliance Tab
              • Product Application Compliance Widget
              • Product Component Status Widget
              • Product Connection Status Widget
              • Agent Connection Status Widget
            • Threat Detection Tab
              • Control Manager Top Threats Widget
              • Control Manager Threat Statistics Widget
              • Threat Detection Results Widget
              • Policy Violation Detections Widget
              • C&C Callback Events Widget
          • Account Management
            • User Accounts
              • Root Account
              • Adding a User Account
                • Managed Product Access Control
              • Editing a User Account
              • Enabling or Disabling Two-Factor Authentication
              • Viewing or Editing User Account Information
            • User Roles
              • Default User Roles
              • Adding a User Role
              • Editing a User Role
          • License Management
            • Control Manager Activation and License Information
              • Activating Control Manager
              • Viewing and Renewing Control Manager License Information
            • Managed Product Activation and Registration
              • License Management Details
              • Activating Managed Products
              • Renewing Managed Product Licenses
          • Active Directory and Compliance Settings
            • Active Directory Integration
              • Configuring Active Directory Connection Settings
              • Troubleshooting Active Directory Synchronization
            • Compliance Indicators
              • Configuring the Antivirus Pattern Compliance Indicators
              • Configuring the Data Loss Prevention Compliance Indicator
            • Endpoint and User Grouping
              • Sites
                • Creating a Custom Site
                • Merging Sites
              • Reporting Lines
                • Creating a Custom Reporting Line
                • Merging Reporting Lines
          • User/Endpoint Directory
            • User/Endpoint Directory
            • User Details
              • Security Threats for Users
              • Policy Status
              • Contact Information
                • Synchronizing Contact Information with Active Directory
            • Endpoint Details
              • Endpoint - [name] Information
              • Security Threats on Endpoints
              • Policy Status
              • Notes for Endpoints
              • General Information for Endpoints
            • Active Directory Details
            • Affected Users
              • General Information for Security Threats
              • Assessing Impact on Affected Users
                • Retro Scan in Deep Discovery Inspector
            • Using the Advanced Search
              • Advanced Search Categories
            • Custom Tags and Filters
              • Custom Tags
                • Creating a Custom Tag
                • Assigning Custom Tags to Users/Endpoints
              • Filters
                • Default Endpoint Filters
                • Creating a Custom Filter
              • User or Endpoint Importance
        • Managed Product Integration
          • Managed Product Registration
            • Managed Product Registration Methods
            • Server Registration
              • Managed Server Details
              • Adding a Managed Server
              • Editing a Managed Server
              • Deleting a Managed Server
              • Configuring Proxy Settings for Managed Products
              • Configuring Cloud Service Settings
            • Managed Product Communication
              • Modifying the Default Agent Communication Schedule
              • Configuring Agent Communication Schedules
              • Configuring Managed Product Heartbeat Intervals
              • Stopping and Restarting Control Manager Services
          • Security Agent Installation
            • Downloading Security Agent Installation Packages
            • OfficeScan Agent Installations
              • Fresh Installations on Windows Endpoint Platforms
              • Fresh Installations on Windows Embedded System Platforms
              • Fresh Installations on Windows Server Platforms
              • Update Agents
            • OfficeScan SaaS Agent System Requirements
              • Fresh Installations on Windows Endpoint Platforms
                • Windows 7 (32-bit / 64-bit) Requirements
                • Windows 8 / 8.1 (32-bit / 64-bit) Requirements
                • Windows 10 (32-bit / 64-bit) Requirements
              • Fresh Installations on Windows Server Platforms
                • Windows Server 2008 (32-bit) Platforms
                • Windows Server 2008 (64-bit) Platforms
                • Windows MultiPoint Server 2010 (64-bit) Platform
                • Windows MultiPoint Server 2011 (64-bit) Platform
                • Windows Server 2012 (64-bit) Platforms
                • Windows Server 2016 (64-bit) Platforms
            • Trend Micro Security (for Mac) Agent Installation
              • Agent Installation Requirements
              • Agent Installation Methods and Setup Files
              • Agent Post-installation
              • Agent Uninstallation
            • Trend Micro Security (for Mac) SaaS Agent Installation
              • Trend Micro Security (for Mac) SaaS Agent System Requirements
              • Trend Micro Security (for Mac) SaaS Agent Installation Methods
              • Trend Micro Security (for Mac) SaaS Agent Post-installation
          • Product Directory
            • Product Directory
              • Managed Product Icons
              • Connection Status Icons
            • Viewing Managed Product Status Summaries
            • Performing an Advanced Search of the Product Directory
            • Executing Managed Product Tasks
            • Configuring Managed Product Settings
            • Querying Logs from the Product Directory
            • Directory Management
              • Using Directory Management
              • Recovering Managed Products
          • Policy Management
            • Policy Management
              • Creating a New Policy
                • Filtering by Criteria
                  • Assigning Endpoints to Filtered Policies
                • Specifying Policy Targets
                • Working with Parent Policy Settings
              • Copying Policy Settings
              • Inheriting Policy Settings
              • Modifying a Policy
              • Importing and Exporting Policies
              • Deleting a Policy
              • Changing the Policy Owner
              • Understanding the Policy List
              • Reordering the Policy List
              • Updating the Policy Templates
            • Data Loss Prevention
              • Data Identifier Types
                • Expressions
                  • Predefined Expressions
                    • Viewing Settings for Predefined Expressions
                  • Customized Expressions
                    • Criteria for Customized Expressions
                    • Creating a Customized Expression
                    • Importing Customized Expressions
                • File Attributes
                  • Creating a File Attribute List
                  • Importing a File Attribute List
                • Keywords
                  • Predefined Keyword Lists
                  • How Keyword Lists Work
                    • Number of Keywords Condition
                    • Distance Condition
                  • Customized Keyword Lists
                    • Customized Keyword List Criteria
                    • Creating a Keyword List
                    • Importing a Keyword List
              • Data Loss Prevention Templates
                • Predefined DLP Templates
                • Customized DLP Templates
                  • Condition Statements and Logical Operators
                  • Creating a Template
                  • Importing Templates
            • Policy Status
          • Component Updates
            • Component Updates
              • Component List
              • Update Source
              • Deployment Plan
                • Adding a Deployment Schedule
            • Configuring Scheduled Update Settings
            • Configuring Manual Update Settings
            • Configuring Proxy Settings for Component and License Updates
          • Command Tracking
            • Command Tracking
            • Querying and Viewing Commands
              • Command Details
            • Configuring Command Time-out Settings
        • Security Monitoring
          • Logs
            • Log Queries
            • Working with Log Queries
              • Log Query Data Views
            • Configuring Log Aggregation
            • Deleting Logs
          • Notifications
            • Event Notifications
            • Notification Method Settings
              • Configuring SMTP Server Settings
              • Configuring SNMP Trap Settings
              • Configuring Syslog Settings
              • Configuring Trigger Application Settings
            • Contact Groups
              • Adding Contact Groups
              • Editing Contact Groups
            • Advanced Threat Activity Events
              • Watchlisted Recipients at Risk
              • C&C Callback Alert
              • C&C Callback Outbreak Alert
              • Correlated Incident Detections
              • Email Messages with Advanced Threats
              • High Risk Virtual Analyzer Detections
              • High Risk Host Detections
              • Known Targeted Attack Behavior
              • Potential Document Exploit Detections
              • Rootkit or Hacking Tool Detections
              • SHA-1 Deny List Detections
              • Worm or File Infector Propagation Detections
            • Content Policy Violation Events
              • Email Policy Violation
              • Web Access Security Violation
            • Data Loss Prevention Events
              • Incident Details Updated
              • Scheduled Incident Summary
              • Significant Incident Increase
              • Significant Incident Increase by Channel
              • Significant Incident Increase by Sender
              • Significant Incident Increase by User
              • Significant Template Match Increase
            • Known Threat Activity Events
              • Network Virus Alert
              • Special Spyware/Grayware Alert
              • Special Virus Alert
              • Spyware/Grayware Found - Action Successful
              • Spyware/Grayware Found - Further Action Required
              • Virus Found - First Action Successful
              • Virus Found - First Action Unsuccessful and Second Action Unavailable
              • Virus Found - First and Second Actions Unsuccessful
              • Virus Found - Second Action Successful
              • Virus Outbreak Alert
            • Network Access Control Events
              • Network VirusWall Policy Violations
              • Potential Vulnerability Attacks
            • Unusual Product Behavior Events
              • Managed Product Unreachable
              • Product Service Started
              • Product Service Stopped
              • Real-time Scan Disabled
              • Real-time Scan Enabled
            • Updates
              • Antispam Rule Update Successful
              • Antispam Rule Update Unsuccessful
              • Pattern File/Cleanup Template Update Successful
              • Pattern File/Cleanup Template Update Unsuccessful
              • Scan Engine Update Successful
              • Scan Engine Update Unsuccessful
          • Reports
            • Reports Overview
            • Custom Templates
              • Adding or Editing Custom Templates
                • Configuring the Static Text Report Element
                • Configuring the Bar Chart Report Element
                • Configuring the Line Chart Report Element
                • Configuring the Pie Chart Report Element
                • Configuring the Dynamic Table Report Element
                • Configuring the Grid Table Report Element
            • One-time Reports
              • Creating One-time Reports
              • Viewing One-Time Reports
            • Scheduled Reports
              • Adding Scheduled Reports
              • Editing Scheduled Reports
              • Viewing Scheduled Reports
            • Configuring Report Maintenance
            • Viewing My Reports
          • Connected Threat Defense
            • About Connected Threat Defense
            • Feature Requirements
            • Suspicious Object List Management
              • Suspicious Object Lists
                • Adding Exceptions to the Virtual Analyzer Suspicious Object List
                • Suspicious Object Scan Actions
              • Configuring Distribution Settings
              • Suspicious Object Detection
                • Viewing At Risk Endpoints and Recipients
                • Assessing Impact Using Endpoint Sensor
                  • Retro Scan in Endpoint Sensor
              • Viewing the Handling Process
            • Preemptive Protection Against Suspicious Objects
              • Adding Objects to the User-Defined Suspicious Object List
                • Importing User-Defined Suspicious Object Lists
              • Assessing Impact and Responding to IOCs
              • Isolating Endpoints
            • Connected Threat Defense Product Integration
              • Control Manager
              • Deep Discovery Analyzer
              • Trend Micro Endpoint Sensor
              • Deep Discovery Inspector
              • Deep Security
              • OfficeScan
              • Smart Protection Server
              • InterScan Messaging Security Virtual Appliance
              • InterScan Web Security Virtual Applicance
              • ScanMail for Microsoft Exchange
              • Trend Micro Endpoint Application Control
              • Deep Discovery Email Inspector
              • Cloud App Security
          • Data Loss Prevention Incidents
            • Administrator Tasks
              • Setting Up Manager Information in Active Directory Users
              • Understanding DLP User Roles
              • Creating DLP Auditing Logs
            • DLP Incident Review Process
              • Understanding the Incident Information List
              • Reviewing Incident Details
        • Tools and Support
          • Administering the Database
            • Understanding the Control Manager Database
              • Understanding the db_ControlManager Tables
            • Backing Up db_ControlManager Using SQL Server Management Studio
              • Restoring Backup db_ControlManager Using SQL Server Management Studio
            • Shrinking db_ControlManager_Log.ldf Using SQL Commands
            • Shrinking db_ControlManager_log.ldf Using SQL Server Management Studio
              • Shrinking the db_ControlManager_log.ldf File Size on Microsoft SQL Server 2008 (or later)
          • Control Manager Tools
            • About Control Manager Tools
            • Using the Agent Migration Tool (AgentMigrateTool.exe)
            • Using the Database Configuration Tool (DBConfig.exe)
          • Suspicious Object Hub and Node Control Manager Architecture
            • Suspicious Object Hub and Node Control Manager Architecture
            • Configuring the Suspicious Object Hub and Nodes
            • Unregistering a Suspicious Object Node from the Hub Control Manager
            • Configuration Notes
          • Suspicious Object List Exporter and Importer User Guide
            • Suspicious Object List Exporter and Importer User Guide
            • Using the Suspicious Object List Exporter (SuspiciousObjectExporter.exe)
              • Modifying the Configuration File
            • Using Control Manager to Export the Virtual Analyzer Exception List
            • Using Control Manager to Export the User-Defined List
            • Using the Suspicious Object List Importer (ImportSOFromCSV.exe)
            • Using Control Manager to Import the Virtual Analyzer Exception List
            • Using Control Manager to Import the User-Defined List
          • Using the LogForwarder Tool (LogForwarder.exe)
            • Introduction
            • System Requirements
            • Limitations
            • Configuring LogForwarder Settings
            • Starting and Stopping Log Forwarding
          • Suspicious Object Migration Tool User Guide
            • Suspicious Object Migration Tool User Guide
            • Preparing the Check Point Firewall Server
            • Preparing the Authentication Certificate Configuration Files
            • Using the Suspicious Object Migration Tool
            • Using the Suspicious Object List Exporter (SuspiciousObjectExporter.exe)
              • Modifying the Configuration File
            • Using the Check Point Suspicious Activity Monitoring Client Tool
          • Technical Support
            • Troubleshooting Resources
              • Using the Support Portal
              • Threat Encyclopedia
            • Contacting Trend Micro
              • Speeding Up the Support Call
            • Sending Suspicious Content to Trend Micro
              • Email Reputation Services
              • File Reputation Services
              • Web Reputation Services
            • Other Resources
              • Download Center
              • Documentation Feedback
        • Automation API Guide
          • Getting Started with Control Manager Automation APIs
            • Using Control Manager Automation APIs
            • Adding an Application
            • Using the Automation API Demo Project for Visual Studio
            • Using the Automation API Demo Project for Python
            • Authorization Token Structure
              • Sample of a Decoded JWT Token
              • Checksum Calculation
            • Automation API Responses
              • Automation API Result Codes
          • Supported Automation APIs
            • Control Manager Automation APIs
            • ProductServers :: List
            • ProductAgents :: List
            • ProductAgents :: Isolate
            • ProductAgents :: Restore
            • ProductAgents :: Relocate
            • ProductAgents :: Uninstall
            • FileUDSO :: Add
          • Automation API References
            • Automation API Product Values
            • Automation API Isolation Statuses
            • Automation API Actions/Capabilities
            • Automation API Result Codes
        • Appendices
          • Control Manager System Checklists
            • Server Address Checklist
            • Port Checklist
            • Control Manager Conventions
            • Core Processes and Configuration Files
            • Communication and Listening Ports
          • Data Views
            • Data View: Security Logs
              • Virus/Malware Information
                • Overall Virus/Malware Summary
                • Virus/Malware Source Summary
                • Virus/Malware Endpoint Summary
                • Virus/Malware Action/Result Summary
                • Virus/Malware Detection Over Time Summary
                • Detailed Virus/Malware Information
                • Endpoint Virus/Malware Information
                • Web Virus/Malware Information
                • Email Virus/Malware Information
                • Network Virus/Malware Information
              • Spyware/Grayware Information
                • Overall Spyware/Grayware Summary
                • Spyware/Grayware Source Summary
                • Endpoint Spyware/Grayware Summary
                • Spyware/Grayware Detection Over Time Summary
                • Spyware/Grayware Action/Result Summary
                • Detailed Spyware/Grayware Information
                • Endpoint Spyware/Grayware
                • Web Spyware/Grayware
                • Email Spyware/Grayware
                • Network Spyware/Grayware
              • Content Violation Information
                • Content Violation Policy Summary
                • Content Violation Sender Summary
                • Content Violation Detection Over Time Summary
                • Content Violation Action/Result Summary
                • Detailed Content Violation Information
                • Email Messages with Advanced Threats
              • Spam Violation Information
                • Overall Spam Violation Summary
                • Spam Recipient Summary
                • Spam Detection Over Time Summary
                • Detailed Spam Information
                • Spam Connection Information
              • Policy/Rule Violation Information
                • Detailed Firewall Violation Information
                • Network Content Inspection Information
                • Detailed Endpoint Security Violation Information
                • Detailed Endpoint Security Compliance Information
                • Detailed Application Activity
                • Detailed Behavior Monitoring Information
                • Device Access Control Information
                • Detailed Endpoint Application Control Violation Information
                • Detailed Intrusion Prevention Information
                • Integrity Monitoring Information
              • Web Violation/Reputation Information
                • Overall Web Violation Summary
                • Web Violation Endpoint Summary
                • Web Violation URL Summary
                • Web Violation Filter/Blocking Type Summary
                • Web Violation Detection Over Time Summary
                • Web Violation Detection Summary
                • Detailed Web Violation Information
                • Detailed Web Reputation Information
              • Deep Discovery Information
                • Overall Suspicious Threat Summary
                • Suspicious Source Summary
                • Suspicious Riskiest Endpoints Summary
                • Suspicious Riskiest Recipient Summary
                • Suspicious Sender Summary
                • Suspicious Threat Protocol Detection Summary
                • Suspicious Threat Detection Over Time Summary
                • Detailed Suspicious Threat Information
                • Detailed Mitigation Information
                • Detailed Correlation Information
              • Advanced Threat Information
                • Detailed C&C Callback Information
                • Detailed Suspicious File Information
                • Detailed Predictive Machine Learning Information
                • Virtual Analyzer Detection Information
                • Detailed Virtual Analyzer Suspicious Object Impact Information
              • Overall Threat Information
                • Network Security Threat Analysis Information
                • Network Protection Boundary Information
                • Security Threat Entry Analysis Information
                • Security Threat Source Analysis Information
                • Security Threat Endpoint Analysis Information
              • Data Loss Prevention Information
                • DLP Incident Information
                • DLP Template Match Information
              • Data Discovery Information
                • Data Discovery Data Loss Prevention Detection Information
                • Data Discovery Endpoint Information
            • Data View: Product Information
              • License Information
                • Product License Status
                • Product License Information Summary
                • Detailed Product License Information
              • Managed Product Information
                • Product Distribution Summary
                • Product Status Information
                • Product Event Information
                • Product Auditing Event Log
              • Component Information
                • Engine Status
                • Pattern/Rule Status
                • Product Component Deployment
                • Scan Engine Status Summary
                • Pattern File/Rule Status Summary
                • Endpoint Pattern/Engine Status Summary
                • Endpoint Pattern/Rule Update Status Summary
              • Control Manager Information
                • User Access Information
                • Control Manager Event Information
                • Command Tracking Information
                • Detailed Command Tracking Information
          • Token Variables
            • About Token Variables
            • Standard Token Variables
            • Advanced Threat Activity Token Variables
            • C&C Callback Token Variables
            • Content Policy Violation Token Variables
            • Web Access Security Violation Token Variables
            • Data Loss Prevention Token Variables
            • Known Threat Activity Token Variables
            • Network Access Control Token Variables
          • IPv6 Support
            • Control Manager Server Requirements
            • IPv6 Support Limitations
            • Configuring IPv6 Addresses
            • Screens That Display IP Addresses
          • MIB Files
            • Using the Control Manager MIB File
            • Using the NVW Enforcer SNMPv2 MIB File
          • Syslog Content Mapping - CEF
            • CEF Data Loss Prevention Logs
              • Action Result Mapping Table
              • Channel Mapping Table
            • CEF Behavior Monitoring Logs
            • CEF Device Access Control Logs
              • Product ID Mapping Table
            • CEF Engine Update Status Logs
            • CEF Predictive Machine Learning Logs
              • Threat Type Mapping Table
            • CEF Pattern Update Status Logs
            • CEF Content Security Logs
              • Filter Action Mapping Table
            • CEF Spyware/Grayware Logs
              • Action Mapping Table
              • Spyware/Grayware Scan Type Mapping Table
              • Spyware/Grayware Risk Type Mapping Table
            • CEF Virus/Malware Logs
              • Second Action Mapping Table
            • CEF Web Security Logs
              • Filter/Blocking Type Mapping Table
              • Protocol Mapping Table
            • CEF C&C Callback Logs
            • CEF Suspicious File Logs
            • CEF Network Content Inspection Logs
            • CEF Endpoint Application Control Logs
            • CEF Sandbox Detection Logs

        Introduction

        • Introducing Control Manager