What's New in Control Manager 7.0

This version of Control Manager includes the following new features and enhancements.



Active Directory integration enhancements

This version of Control Manager supports integration with multiple Active Directory forests and allows you to import Active Directory groups in addition to users.

For more information, see Active Directory Integration.

Dashboard enhancements

The Dashboard has been redesigned to provide improved visibility of your network protection status.

New dwell time widget

This widget provides an overview of the top critical threats based on the length of time the threat has been present on the endpoint of the affected user.

New Executive Summary reports

Take advantage of the new Executive Summary report template to provide comprehensive intelligence about all the threat detections on your network and view actionable overviews of affected users/endpoints or threat detections by channel and product.

New Notifications menu

The new Notifications menu provides easier access to the previously named Event Center screen, which has been renamed as Event Notifications. The new menu also includes the Notification Method Settings screen (formerly General Event Settings) and the Contact Groups screen (formerly User Groups).

For more information, see Notification Method Settings.

New Read-only user role

You can assign the new Read-only user role to easily allow user accounts to view information in the Control Manager management console without granting them access rights to modify configuration settings.

New report formats

You can now generate static reports in the following formats:

  • Microsoft Word format (*.docx)

  • Microsoft Excel format (*.xlsx)

  • This version of Control Manager discontinues support for ActiveX and Crystal Report formats.

  • If you migrated from a previous version of Control Manager, you can still download previously generated Crystal Reports in Control Manager 7.0.

Operation Center

Use the Operation Center tab to gain instant insights into the antivirus pattern and Data Loss Prevention compliance status, critical threat detections, as well as resolved and unresolved events on your network.

For more information, see The Operation Center.

Platform and browser support

This version of Control Manager includes support for the following:

  • Microsoft™ Windows™ Server 2016

  • Microsoft™ Internet Explorer™ 11

  • Microsoft™ Edge™

  • Google™ Chrome™

  • Microsoft™ SQL Server™ 2016


This version of Control Manager discontinues support for the following:

  • Microsoft™ Windows™ Server 2003

  • Microsoft™ Internet Explorer™ 8, 9, or 10

  • Microsoft™ SQL Server™ 2005

Policy Management enhancements

You can now assign policies to targets selected from the organizational units of multiple synchronized Active Directory forests.

To prevent gaps in network administration, you can also designate a user account as the owner for a policy even if the user account does not have access rights for the specified targets.

Security Agent installation

Create and download Security Agent installation packages for OfficeScan or Trend Micro Security (for Mac) directly from the Control Manager console.

Simplified log queries

The previously named New Ad Hoc Query and Saved Ad Hoc Queries screens have been consolidated into the new Log Query screen. The enhanced Log Query screen features a new design that allows you to more easily query logs, perform advanced searches, save and share log queries, and export search results from a single screen.

Suspicious object management enhancements

To further enhance your protection against previously unknown threats, you can now use the User-Defined Suspicious Objects screen to upload suspicious object files to help registered managed products detect threats without having to manually type the file SHA-1 hash value.

In addition to suspicious files, URLs, and IP addresses, you can also now expand suspicious domains in the Object column to drill down for more information.

When you expand a suspicious object in the Object column, users or endpoints denoted with a star indicate "important" users or endpoints and appear at the top of the At Risk Recipients or At Risk Endpoints lists. The Latest Action Result column displays the most recent remediation action taken by managed products. You can also click the Latest Action Result column name to sort the detection list and display threats that require further mitigation at the top.

To simplify the case handling process, the previously separate Impact Assessment and Mitigation tabs have been consolidated into one Impact Assessment and Mitigation tab.

Transport Layer Security 1.2 support

This version of Control Manager supports Transport Layer Security (TLS) 1.2 protocol to provide stronger protection for your network communications.

Two-Factor Authentication

Two-Factor Authentication provides extra security on user accounts by requiring users to type the verification code generated by the Google Authenticator app in order to sign in to Control Manager.

For more information, see Enabling or Disabling Two-Factor Authentication.

Updates menu enhancements and intelligent component downloading

The redesigned Updates menu allows you to use the Schedule Update or Manual Update screens to more easily manage and deploy component updates.

You can also enable intelligent component downloading to allow Control Manager to automatically detect and download new components in the selected component categories from an update source.

User/Endpoint Directory enhancements

In addition to the traditional Tabular view, you can now display User or Endpoint information in Timeline view to visualize when the threat detections occurred in chronological order and more easily identify patterns over a specified period of time.

You can also export data from the User/Endpoint Directory as a *.csv file or *.png image.


Tabular view only supports exporting data as a *.csv file. Timeline view can export data as a *.csv file or a *.png image. The exported *.png timeline image only displays information for a maximum of 30 users or endpoints.

For more information, see User/Endpoint Directory.