Specify proxy server authentication credentials if you have set up a proxy server to handle HTTP communication in your organization and authentication is required before web access is allowed.
For instructions on configuring the proxy settings, see External Proxy for OfficeScan Agents.
To configure a policy for agents running Windows desktop platforms, select the root domain icon (), specific domains, or agents.
When you select the root domain or specific domains, the setting will only apply to agents running Windows desktop platforms. The setting will not apply to agents running Windows Server platforms, even if they part of the domains.
To configure a policy for agents running Windows Server platforms, select a specific agent.
Configure agent location settings if you have not done so. Agents will use these settings to determine their location and apply the correct web reputation policy. For details, see Endpoint Location.
The operating systems listed in the screen depends on the targets you selected in step 1.
Trend Micro recommends disabling web reputation for internal agents if you already use a Trend Micro product with the web reputation capability, such as InterScan Web Security Virtual Appliance.
When a web reputation policy is enabled:
External agents send web reputation queries to the Smart Protection Network.
Internal agents send web reputation queries to:
Smart Protection Servers if the Send queries to Smart Protection Servers option is enabled. For details about this option, see step 7.
Smart Protection Network if the Send queries to Smart Protection Servers option is disabled.
When in assessment mode, agents will allow access to all websites but will log access to websites that are supposed to be blocked if assessment was disabled. Trend Micro provides assessment mode to allow you to evaluate websites and then take appropriate action based on your evaluation. For example, websites that you consider safe can be added to the approved list.
HTTPS communication uses certificates to identify web servers. It encrypts data to prevent theft and eavesdropping. Although more secure, accessing websites using HTTPS still has risks. Compromised sites, even those with valid certificates, can host malware and steal personal information. In addition, certificates are relatively easy to obtain, making it easy to set up malicious web servers that use HTTPS.
Enable checking of HTTPS URLs to reduce exposure to compromised and malicious sites that use HTTPS. OfficeScan can monitor HTTPS traffic on the following browsers:
Microsoft Internet Explorer
3.5 or later
HTTPS scanning only supports Windows 8, Windows 8.1, Windows 10, or Windows 2012 platforms operating in desktop mode.
After enabling HTTPS scanning for the first time on OfficeScan agents, users must enable the required add-on in the browser before HTTPS scanning is operational.
For OfficeScan agents running Windows 7, 8, 8.1, 10, Server 2008 R2, or Server 2012, users must enable the Trend Micro Osprey Firefox Extension 184.108.40.2067 add-on in the browser pop-up window (or in the Add-ons > Extensions screen).
For OfficeScan agents running Windows XP, Vista, Server 2003 or Server 2008, users must enable the Trend Micro NSC Firefox Extension 220.127.116.112 add-on in the browser pop-up window (or in the Add-ons > Extensions screen).
Internet Explorer 9, 10, and 11
For OfficeScan agents running Windows 7, 8, 8.1, 10, Server 2008 R2, or Server 2012, users must enable the Trend Micro Osprey Plugin Class add-on in the browser pop-up window.
For OfficeScan agents running Windows XP, Vista, Server 2003, or Server 2008, users must enable the TmIEPlugInBHO Class add-on in the browser pop-up window.
For more information on configuring Internet Explorer settings for web reputation, see the following Knowledge Base articles:
Not supported on Windows 7, 8, 8.1, 10, or Windows Server 2008 R2, 2012 or later platforms.
If you enable this option:
Agents refer to the smart protection source list to determine the Smart Protection Servers to which they send queries.
For details about the smart protection source list, see Smart Protection Source List.
Be sure that Smart Protection Servers are available. If all Smart Protection Servers are unavailable, agents do not send queries to Smart Protection Network. The only remaining sources of web reputation data for agents are the approved and blocked URL lists (configured in step 10).
If you want agents to connect to Smart Protection Servers through a proxy server, specify proxy settings in Administration > Settings > Proxy > Internal Proxy tab.
Be sure to update Smart Protection Servers regularly so that protection remains current.
Agents will not block untested websites. Smart Protection Servers do not store web reputation data for these websites.
If you disable this option:
Agents send web reputation queries to Smart Protection Network. Agent endpoints must have Internet connection to send queries successfully.
If connection to Smart Protection Network requires proxy server authentication, specify authentication credentials in Administration > Settings > Proxy > External Proxy (tab) > OfficeScan Agent Connection with Trend Micro Servers.
Agents will block untested websites if you select Block pages that have not been tested by Trend Micro in step 11.
The security levels determine whether OfficeScan will allow or block access to a URL. For example, if you set the security level to Low, OfficeScan only blocks URLs that are known to be web threats. As you set the security level higher, the web threat detection rate improves but the possibility of false positives also increases.
While Trend Micro actively tests web pages for safety, users may encounter untested pages when visiting new or less popular websites. Blocking access to untested pages can improve safety but can also prevent access to safe pages.
OfficeScan utilizes both the Browser Exploit Prevention pattern and the Script Analyzer pattern to identify and block web pages before exposing the system.
Microsoft Internet Explorer
The Browser Exploit Prevention feature requires that you enable the Advanced Protection Service.
To enable the Advanced Protection Service, go to Agents > Agent Management, click Settings > Additional Service Settings.
After enabling the Browser Exploit Prevention feature for the first time on OfficeScan agents, users must enable the required add-on in the browser before Browser Exploit Prevention is operational. For OfficeScan agents running Internet Explorer 9, 10, or 11, users must enable the Trend Micro IE Protection add-on in the browser pop-up window.
The approved list takes precedence over the blocked list. When a URL matches an entry in the approved list, agents always allow access to the URL, even if it is in the blocked list.
You can add a wildcard character (*) anywhere on the URL.
Typing www.trendmicro.com/* means that all pages in the Trend Micro website will be approved.
Typing *.trendmicro.com/* means that all pages on any sub-domain of trendmicro.com will be approved.
You can type URLs containing IP addresses. If a URL contains an IPv6 address, enclose the address in parentheses.
Web Reputation does not perform any scanning on addresses located in the Approved and Blocked lists.
Apply to All Agents: Applies settings to all existing agents and to any new agent added to an existing/future domain. Future domains are domains not yet created at the time you configured the settings.
Apply to Future Domains Only: Applies settings only to agents added to future domains. This option will not apply settings to new agents added to an existing domain.