Trend Micro Control Manager™ Suspicious Object Hub and Node architecture allows you to synchronize suspicious object lists across multiple Control Manager servers. The suspicious object lists on the Hub Control Manager server consolidate the suspicious object lists from all Node Control Manager servers, and any other managed products registered to any of these servers, and then deploys the lists back to the Node Control Manager servers.
Administrators must first configure a Suspicious Object Hub Control Manager server and, depending on the environment, assign other Control Manager servers to act as Suspicious Object Node servers. Trend Micro Deep Discovery products can register to the Suspicious Object Hub or any Suspicious Object Node Control Manager server. This architecture requires that you configure all suspicious object actions through the Suspicious Object Hub Control Manager server console.
You must perform all operations on the suspicious object lists through the Suspicious Object Hub Control Manager to ensure that all Node Control Manager servers remain properly synchronized.
Scan actions performed on suspicious objects though a Suspicious Object Node Control Manager may not synchronize to all connected servers.