OfficeScan XG Server Online Help > Using Trend Micro Smart Protection > Setting Up Smart Protection Services
        • Online Help Center Home

        • Preface
          • OfficeScan Documentation
          • Audience
          • Document Conventions
          • Terminology
        • Introducing OfficeScan
          • About OfficeScan
          • What's New in OfficeScan XG
          • Key Features and Benefits
          • The OfficeScan Server
          • The OfficeScan Agent
          • Integration with Trend Micro Products and Services
        • Getting Started with OfficeScan
          • The Web Console
            • Requirements for Opening the Web Console
            • Logon Account
            • The Web Console Banner
            • Getting Help
          • The Dashboard
            • Product License Status Section
            • Product Information Bars
            • Tabs and Widgets
              • Working with Tabs
              • Working with Widgets
            • Summary Tab Widgets
              • Overall Threat Detections and Policy Violations Widget
              • Endpoint Status Widget
              • Ransomware Summary Widget
              • Top Ransomware Detections Widget
              • Security Risk Detections Over Time Widget
            • Smart Protection Network Widgets
              • File Reputation Threat Map Widget
              • Web Reputation Top Threatened Users Widget
              • Web Reputation Top Threat Sources Widget
            • Data Protection Widgets
              • Data Loss Prevention Incidents Over Time Widget
              • Top Data Loss Preventions Incidents Widget
            • OfficeScan Widgets
              • C&C Callback Events Widget
              • Security Risk Detections Widget
              • OfficeScan and Plug-ins Mashup Widget
              • Antivirus Agent Connectivity Widget
              • Agents Connected to the Edge Relay Server Widget
              • Outbreaks Widget
              • Agent Updates Widget
            • Management Widget
              • Agent-Server Connectivity Widget
          • The Server Migration Tool
            • Using the Server Migration Tool
          • Active Directory Integration
            • Integrating Active Directory with OfficeScan
            • Synchronizing Data with Active Directory Domains
          • The OfficeScan Agent Tree
            • Agent Connection Status
            • Agent Tree Icons
            • Agent Tree General Tasks
              • Advanced Search Options
            • Agent Tree Specific Tasks
              • Agent Management Screen
              • Outbreak Prevention Screen
              • Agent Selection Screen
              • Rollback Screen
              • Security Risk Logs Screen
          • OfficeScan Domains
            • Agent Grouping
              • Manual Agent Grouping
                • Configuring Manual Agent Grouping
              • Automatic Agent Grouping
                • Configuring Automatic Agent Grouping
              • Defining Agent Grouping Rules by Active Directory Domains
              • Defining Agent Grouping Rules by IP Addresses
              • Agent Grouping Tasks
                • Adding a Domain
                • Deleting a Domain or Agent
                • Renaming a Domain
                • Moving OfficeScan Agents to Another Domain or OfficeScan Server
        • Getting Started with Data Protection
          • Data Protection Installation
            • Installing Data Protection
          • Data Protection License
            • Activating the Plug-in Program License
            • Viewing and Renewing the License Information
          • Deployment of Data Protection to OfficeScan Agents
            • Deploying the Data Protection Module to OfficeScan Agents
          • Forensic Folder and DLP Database
            • Modifying the Forensic Folder and Database Settings
            • Creating a Backup of Forensic Data
          • Uninstalling Data Protection
            • Uninstalling Data Protection from Plug-in Manager
        • Using Trend Micro Smart Protection
          • About Trend Micro Smart Protection
            • The Need for a New Solution
          • Smart Protection Services
            • File Reputation Services
            • Web Reputation Services
            • Smart Feedback
          • Smart Protection Sources
            • Trend Micro Smart Protection Network
            • Smart Protection Server
            • Smart Protection Sources Compared
          • Smart Protection Pattern Files
            • Smart Scan Agent Pattern
            • Smart Scan Pattern
            • Web Blocking List
            • Smart Protection Pattern Update Process
            • Usage of Smart Protection Patterns
          • Setting Up Smart Protection Services
            • Smart Protection Server Installation
              • Standalone Smart Protection Server Installation
              • Integrated Smart Protection Server Installation
                • Integrated Smart Protection Server Tool
              • Smart Protection Server Best Practices
                • Customizing ptngrowth.ini for the Standalone Server
                • Customizing ptngrowth.ini for the Integrated Server
            • Integrated Smart Protection Server Management
              • Enabling the Integrated Server’s File Reputation Services and Web Reputation Services
              • Recording the Integrated Server’s Addresses
              • Updating the Integrated Server’s Components
              • Integrated Server’s Approved/Blocked URL List Configuration
              • Configuring Integrated Smart Protection Server Settings
            • Smart Protection Source List
              • IPv6 Support for Smart Protection Sources
              • Smart Protection Sources and Endpoint Location
              • Configuring the Standard List of Smart Protection Sources
              • Configuring Custom Lists of Smart Protection Sources
            • Agent Connection Proxy Settings
            • Endpoint Location Settings
            • Trend Micro Network VirusWall Installations
          • Using Smart Protection Services
        • Installing the OfficeScan Agent
          • OfficeScan Agent Fresh Installations
          • Installation Considerations
            • OfficeScan Agent Features
            • OfficeScan Agent Installation and IPv6 Support
              • Operating System
              • Installation Methods
              • Agent IP Addresses
                • Configuring the IP Address that Dual-stack Agents Use When Registering to the Server
          • Deployment Considerations
            • Web Install Page Installations
              • Installing from the Web Install Page
            • Browser-based Installation
              • Initiating a Browser-based Installation
            • Performing a UNC-based Installation
            • Installing Remotely from the OfficeScan Web Console
            • Installing with Login Script Setup
              • OfficeScan Agent Installation
              • Program and Component Updates
              • Windows Server Scripts
              • Adding Autopcc.exe to the Login Script Using Login Script Setup
            • Installing with Agent Packager
              • Package Deployment Guidelines
                • Scan Method Guidelines for Agent Packages
              • Creating an Installation Package Using Agent Packager
              • Deploying an MSI Package Using Active Directory
              • Deploying an MSI Package Using Microsoft SMS
                • Obtaining the Package Locally
                • Obtaining the Package Remotely
                • Distributing the Package to Target Endpoints
            • Installations Using Agent Disk Images
              • Creating a Disk Image of the OfficeScan Agent
            • Vulnerability Scanner Usage
              • Considerations When Using Vulnerability Scanner
                • Network Administration
                • Network Topology and Architecture
                • Software/Hardware Specifications
                • Domain Structure
                • Network Traffic
                • Network Size
              • Guidelines When Installing the OfficeScan Agent Using Vulnerability Scanner
              • Vulnerability Scan Methods
                • Running a Manual Vulnerability Scan
                • Running a DHCP Scan
                • Configuring a Scheduled Vulnerability Scan
              • Vulnerability Scan Settings
                • Product Query
                  • Configuring Product Query Settings
                • Method for Retrieving Endpoint Descriptions
                  • Configuring Retrieval Settings
                • Notifications
                  • Configuring Notification Settings
                • Vulnerability Scan Results
                  • Configuring Scan Results
                • Ping Settings
                  • Configuring Ping Settings
                • OfficeScan Server Settings
                  • Configuring OfficeScan Server Settings
            • Installing with Security Compliance
              • Installing the OfficeScan Agent
          • Migrating to the OfficeScan Agent
            • Migrating from Other Endpoint Security Software
              • OfficeScan Agent Migration Issues
            • Migrating from ServerProtect Normal Servers
              • Using the ServerProtect Normal Server Migration Tool
          • Post-installation
            • OfficeScan Agent Shortcut
            • Programs List
            • OfficeScan Agent Services
            • OfficeScan Agent Installation Logs
            • Recommended Post-installation Tasks
              • Component Updates
              • Test Scan Using the EICAR Test Script
                • Performing a Test Scan
          • OfficeScan Agent Uninstallation
            • Uninstalling the OfficeScan Agent from the Web Console
            • The OfficeScan Agent Uninstallation Program
              • Granting the OfficeScan Agent Uninstallation Privilege
              • Running the OfficeScan Agent Uninstallation Program
            • Manually Uninstalling the OfficeScan Agent
        • Keeping Protection Up-to-Date
          • OfficeScan Components and Programs
            • Antivirus Components
              • Updating the Scan Engine
            • Anti-spyware Components
            • Damage Cleanup Services Components
            • Firewall Components
            • Behavior Monitoring Components
            • Suspicious Connections Components
            • Browser Exploit Solution
            • Programs
              • Hot Fix and Patch History
            • Web Reputation Component
          • Update Overview
            • OfficeScan Server and OfficeScan Agent Update
            • Smart Protection Source Update
          • OfficeScan Server Updates
            • OfficeScan Server Update Sources
              • IPv6 Support for OfficeScan Server Updates
            • Proxy for OfficeScan Server Updates
              • Configuring Proxy Settings
            • Configuring the Server Update Source
            • OfficeScan Server Component Duplication
              • Component Duplication Scenario
            • Isolated OfficeScan Server Updates
              • Updating an Isolated OfficeScan Server
            • OfficeScan Server Update Methods
              • Manually Updating the OfficeScan Server
              • Scheduling Updates for the OfficeScan Server
            • OfficeScan Server Update Logs
              • Viewing the Update Logs
          • Integrated Smart Protection Server Updates
          • OfficeScan Agent Updates
            • OfficeScan Agent Update Sources
              • IPv6 Support for OfficeScan Agent Updates
              • Standard Update Source for OfficeScan Agents
                • Configuring the Standard Update Source for OfficeScan Agents
                • OfficeScan Agent Update Process
              • Customized Update Sources for OfficeScan Agents
                • Configuring Customized Update Sources for OfficeScan Agents
                • OfficeScan Agent Update Process
              • ActiveUpdate Server as the OfficeScan Agent Update Source
                • Limiting Downloads from the ActiveUpdate Server
            • OfficeScan Agent Update Methods
              • OfficeScan Agent Automatic Updates
                • Event-triggered Updates
                • Schedule-based Updates
                • Configuring OfficeScan Agent Automatic Updates
                • Configuring Scheduled OfficeScan Agent Updates with NAT
              • Using the Domains Schedule Update Tool
              • OfficeScan Agent Manual Updates
                • Updating OfficeScan Agents Manually
              • Configuring Update Privileges and Other Settings
            • Configuring Reserved Disk Space for OfficeScan Agents Updates
            • Proxy for OfficeScan Agent Component Updates
            • Configuring OfficeScan Agent Update Notifications
            • Viewing OfficeScan Agent Update Logs
            • Enforcement of OfficeScan Agent Updates
            • Rolling Back Components for OfficeScan Agents
            • Running the Touch Tool for OfficeScan Agent Hot Fixes
          • Update Agents
            • Update Agent System Requirements
            • Update Agent Configuration
              • Assigning OfficeScan Agents as Update Agents
              • Specifying the OfficeScan Agents that Update from an Update Agent
            • Update Sources for Update Agents
              • IPv6 Support for Update Agents
              • Standard Update Source for Update Agents
              • Customized Update Sources for Update Agents
              • Configuring the Update Source for the Update Agent
              • Update Agent Component Duplication
            • Update Methods for Update Agents
              • Using the Scheduled Update Configuration Tool
            • Update Agent Analytical Report
          • Component Update Summary
            • Update Status for OfficeScan Agents
            • Components
        • Scanning for Security Risks
          • About Security Risks
            • Viruses and Malware
            • Spyware and Grayware
              • How Spyware/Grayware Gets into the Network
              • Potential Risks and Threats
              • Guarding Against Spyware/Grayware and Other Threats
          • Scan Method Types
            • Default Scan Method
            • Scan Methods Compared
            • Changing the Scan Method
            • Switching from Smart Scan to Conventional Scan
            • Switching from Conventional Scan to Smart Scan
          • Scan Types
            • Real-time Scan
              • Configuring Real-time Scan Settings
            • Manual Scan
              • Configuring Manual Scan Settings
            • Scheduled Scan
              • Configuring Scheduled Scan Settings
            • Scan Now
              • Configuring Scan Now Settings
              • Initiating Scan Now
          • Settings Common to All Scan Types
            • Scan Criteria
              • User Activity on Files
              • Files to Scan
              • Scan Settings
              • CPU Usage
              • Schedule
            • Scan Exclusions
              • Wildcard Exceptions
              • Scan Exclusion List (Directories)
                • Supported System Variables for Scan Exclusion List (Directories)
              • Scan Exclusion List (Files)
              • Scan Exclusion List (File Extensions)
              • Apply Scan Exclusion Settings to All Scan Types
            • Scan Actions
              • Virus/Malware Scan Actions
              • Use ActiveAction
              • Use the Same Action for all Virus/Malware Types
              • Use a Specific Action for Each Virus/Malware Type
              • Quarantine Directory
              • Back Up Files Before Cleaning
              • Damage Cleanup Services
              • Display a Notification Message When Virus/Malware is Detected
              • Display a Notification Message When Probable Virus/Malware is Detected
            • Restoring Quarantined Files
            • Restoring Encrypted Files
              • Decrypting and Restoring Files
            • Spyware/Grayware Scan Actions
              • Display a Notification Message When Spyware/Grayware is Detected
            • Spyware/Grayware Approved List
              • Adding Already Detected Spyware/Grayware to the Approved List
              • Managing the Spyware/Grayware Approved List
            • Restoring Spyware/Grayware
            • Trusted Program List
              • Configuring the Trusted Programs List
          • Scan Privileges and Other Settings
            • Scan Type Privileges
              • Granting Scan Type Privileges
              • Configuring Scan Settings for the OfficeScan Agent
            • Scheduled Scan Privileges and Other Settings
              • Postpone Scheduled Scan
              • Skip and Stop Scheduled Scan
              • Scheduled Scan Privilege Notification
              • Granting Scheduled Scan Privileges and Displaying the Privilege Notification
              • Postponing/Skipping and Stopping Scheduled Scan on the Agent
            • Mail Scan Privileges and Other Settings
              • Granting Mail Scan Privileges and Enabling POP3 Mail Scan
            • Cache Settings for Scans
              • Digital Signature Cache
              • On-demand Scan Cache
              • Configuring Cache Settings for Scans
            • Trusted Program List Privilege
              • Granting the Trusted Program List Settings
          • Global Scan Settings
            • Configuring Global Scan Settings
              • Scan Settings Section
                • Exclude the OfficeScan Server Database Folder from Real-time Scan
                • Exclude Microsoft Exchange Server Folders and Files from Scans
                • Enable Deferred Scanning on File Operations
                • Enable Early Launch Anti-Malware Protection on Endpoints
                • Clean/Delete Infected Files Within Compressed Files
                • Enable Assessment Mode
                • Scan for Cookies
              • Scheduled Scan Settings Section
                • Remind Users of the Scheduled Scan __ Minutes Before it Runs
                • Postpone Scheduled Scan for up to __ Hours and __ Minutes
                • Automatically Stop Scheduled Scan When Scanning Lasts More Than __ Hours and __ Minutes
                • Skip Scheduled Scan When a Wireless Endpoint's Battery Life is Less Than __ % and its AC Adapter is Unplugged
                • Resume a Missed Scheduled Scan
          • Security Risk Notifications
            • Security Risk Notifications for Administrators
              • Configuring Security Risk Notifications for Administrators
            • Security Risk Notifications for OfficeScan Agent Users
              • Notifying Users of Virus/Malware and Spyware/Grayware Detections
              • Configuring Virus/Malware Notifications
              • Configuring Spyware/Grayware Notifications
            • Notifying Agents of a Restart to Finish Cleaning Infected Files
          • Security Risk Logs
            • Viewing Virus/Malware Logs
              • Virus/Malware Scan Results
              • Viewing Central Quarantine Restore Logs
            • Viewing Spyware/Grayware Logs
              • Spyware/Grayware Scan Results
              • Viewing Spyware/Grayware Restore Logs
            • Viewing Suspicious File Logs
            • Viewing Scan Operation Logs
          • Security Risk Outbreaks
            • Security Risk Outbreak Criteria and Notifications
              • Configuring the Security Risk Outbreak Criteria and Notifications
            • Configuring Security Risk Outbreak Prevention
            • Outbreak Prevention Policies
              • Limiting/Denying Access to Shared Folders
              • Blocking Vulnerable Ports
              • Denying Write Access to Files and Folders
              • Creating Mutual Exclusion Handling on Malware Processes/Files
              • Denying Access to Executable Compressed Files
            • Disabling Outbreak Prevention
        • Protecting Against Unknown Threats
          • Predictive Machine Learning
            • Configuring Predictive Machine Learning Settings
          • Suspicious Connection Service
            • Configuring Global User-defined IP List Settings
            • Configuring Suspicious Connection Settings
          • Sample Submission
            • Configuring Sample Submission
          • Unknown Threat Logs
            • Viewing Predictive Machine Learning Logs
              • Predictive Machine Learning Log Details
            • Viewing Suspicious Connection Logs
            • Viewing Sample Submission Logs
        • Using Behavior Monitoring
          • Behavior Monitoring
            • Malware Behavior Blocking
              • Ransomware Protection
              • Anti-Exploit Protection
            • Newly Encountered Program Protection
            • Event Monitoring
            • Behavior Monitoring Exception List
            • Configuring Malware Behavior Blocking, Event Monitoring, and the Exception List
          • Configuring Global Behavior Monitoring Settings
          • Behavior Monitoring Privileges
            • Granting Behavior Monitoring Privileges
          • Behavior Monitoring Notifications for OfficeScan Agent Users
            • Enabling the Sending of Notification Messages
            • Modifying the Content of the Notification Message
          • Behavior Monitoring Logs
            • Viewing Behavior Monitoring Logs
            • Configuring the Behavior Monitoring Log Sending Schedule
        • Using Device Control
          • Device Control
          • Permissions for Storage Devices
            • Advanced Permissions for Storage Devices
              • Specifying a Digital Signature Provider
              • Specifying a Program Path and Name
          • Permissions for Non-storage Devices
          • Managing Access to External Devices (Data Protection Activated)
            • Configuring Advanced Permissions
            • Configuring an Approved List of USB Devices
            • Device List Tool
              • Running the Device List Tool
          • Managing Access to External Devices (Data Protection Not Activated)
            • Adding Programs to the Device Control Lists Using ofcscan.ini
          • Modifying Device Control Notifications
          • Device Control Logs
            • Viewing Device Control Logs
        • Using Data Loss Prevention
          • About Data Loss Prevention (DLP)
          • Data Loss Prevention Policies
            • Policy Configuration
          • Data Identifier Types
            • Expressions
              • Predefined Expressions
                • Viewing Settings for Predefined Expressions
              • Customized Expressions
                • Criteria for Customized Expressions
                • Creating a Customized Expression
                • Importing Customized Expressions
            • File Attributes
              • Predefined File Attributes List
              • Creating a File Attribute List
              • Importing a File Attribute List
            • Keywords
              • Predefined Keyword Lists
              • How Keyword Lists Work
                • Number of Keywords Condition
                • Distance Condition
              • Customized Keyword Lists
                • Customized Keyword List Criteria
                • Creating a Keyword List
                • Importing a Keyword List
          • Data Loss Prevention Templates
            • Predefined DLP Templates
            • Customized DLP Templates
              • Condition Statements and Logical Operators
              • Creating a Template
              • Importing Templates
          • DLP Channels
            • Network Channels
              • Email Clients
              • FTP
              • HTTP and HTTPS
              • IM Applications
              • SMB Protocol
              • Webmail
            • Transmission Scope and Targets for Network Channels
              • Transmission Scope: All Transmissions
              • Transmission Scope: Only Transmissions Outside the Local Area Network
              • Resolving Conflicts
            • System and Application Channels
              • Cloud Storage Service
              • Data Recorders (CD/DVD)
                • Blocking Access to Data Recorders (CD/DVD)
              • Peer-to-Peer Applications
              • PGP Encryption
              • Printer
              • Removable Storage
              • Synchronization Software (ActiveSync)
              • Windows Clipboard
          • Data Loss Prevention Actions
          • Data Loss Prevention Exceptions
            • Defining Non-monitored and Monitored Targets
            • Decompression Rules
              • Rule 1: Maximum Size of a Decompressed File
              • Rule 2: Maximum Compression Layers
              • Rule 3: Maximum Number of Files to Scan
              • Events that Trigger Decompression Rules
          • Data Loss Prevention Policy Configuration
            • Creating a Data Loss Prevention Policy
            • Creating Data Loss Prevention Rules
            • Importing, Exporting, and Copying DLP Rules
          • Data Loss Prevention Notifications
            • Data Loss Prevention Notifications for Administrators
              • Configuring Data Loss Prevention Notification for Administrators
            • Data Loss Prevention Notifications for Agent Users
              • Configuring Data Loss Prevention Notification for Agents
          • Data Loss Prevention Logs
            • Viewing Data Loss Prevention Logs
              • Processes by Channel
              • Data Loss Prevention Log Details
            • Enabling Debug Logging for the Data Protection Module
        • Using Web Reputation
          • About Web Threats
          • Command & Control Contact Alert Services
          • Web Reputation
          • Web Reputation Policies
            • Configuring a Web Reputation Policy
          • Web Threat Notifications for Agent Users
            • Enabling the Web Threat Notification Message
            • Modifying the Web Threat Notifications
          • C&C Callback Notifications for Administrators
            • Configuring C&C Callback Notifications for Administrators
          • C&C Contact Alert Notifications for Agent Users
            • Enabling the C&C Callback Notification Message
            • Modifying the C&C Callback Notifications
          • C&C Callback Outbreaks
            • Configuring the C&C Callback Outbreak Criteria and Notifications
          • Web Threat Logs
            • Viewing Web Reputation Logs
            • Viewing C&C Callback Logs
        • Using the OfficeScan Firewall
          • About the OfficeScan Firewall
            • Traffic Filtering
            • Application Filtering
            • Certified Safe Software List
            • Scanning for Network Viruses
            • Customizable Profiles and Policies
            • Stateful Inspection
            • Intrusion Detection System
            • Firewall Violation Outbreak Monitor
            • OfficeScan Agent Firewall Privileges
          • Enabling or Disabling the OfficeScan Firewall
            • Enabling or Disabling the OfficeScan Firewall on Selected Endpoints
            • Enabling or Disabling the OfficeScan Firewall on All Endpoints
          • Firewall Policies and Profiles
            • Firewall Policies
              • Default Firewall Policies
              • Adding a Firewall Policy
              • Modifying an Existing Firewall Policy
              • Editing the Firewall Exception Template
                • Adding a Firewall Policy Exception
                • Modifying a Firewall Policy Exception
                • Saving the Policy Exception List Settings
            • Firewall Profiles
              • Configuring the Firewall Profile List
              • Adding and Editing a Firewall Profile
                • Adding a Firewall Profile
                • Modifying a Firewall Profile
          • Firewall Privileges
            • Granting Firewall Privileges
          • Global Firewall Settings
            • Configuring Global Firewall Settings
          • Firewall Violation Notifications for OfficeScan Agent Users
            • Granting Users the Privilege to Enable/Disable the Notification Message
            • Modifying the Content of the Firewall Notification Message
          • Firewall Logs
            • Viewing Firewall Logs
          • Firewall Violation Outbreaks
            • Configuring the Firewall Violation Outbreak Criteria and Notifications
          • Testing the OfficeScan Firewall
        • Managing the OfficeScan Server
          • Role-based Administration
            • User Roles
              • Menu Item Permissions
              • Menu Item Types
              • Menu Items for Servers and Agents
              • Menu Items for Managed Domains
            • Built-in User Roles
            • Custom Roles
              • Adding a Custom Role
              • Modifying a Custom Role
              • Deleting a Custom Role
              • Importing or Exporting Custom Roles
            • User Accounts
              • Agent Management Menu Items
              • Adding a Custom Account
                • Defining Permissions for Domains
              • Modifying a Custom Account
              • Adding Active Directory Accounts or Groups
          • Trend Micro Control Manager
            • Control Manager Integration in this OfficeScan Release
            • Supported Control Manager Versions
            • Registering OfficeScan to Control Manager
              • Control Manager Certificate Authorization
            • Checking the OfficeScan Status on the Control Manager Management Console
            • The Policy Export Tool
              • Using the Policy Export Tool
          • Suspicious Object List Settings
            • Configuring Suspicious Object List Settings
          • Reference Servers
            • Managing the Reference Server List
          • Administrator Notification Settings
            • Configuring General Notification Settings
          • System Event Logs
            • Viewing System Event Logs
          • Log Management
            • Log Maintenance
              • Deleting Logs Based on a Schedule
              • Manually Deleting Logs
          • Licenses
            • Viewing Product License Information
            • Activating or Renewing a License
          • OfficeScan Database Backup
            • Backing up the OfficeScan Database
            • Restoring the Database Backup Files
          • SQL Server Migration Tool
            • Using the SQL Server Migration Tool
            • Configuring the SQL Database Unavailable Alert
          • OfficeScan Web Server/Agent Connection Settings
            • Configuring Connection Settings
          • Server-Agent Communication
            • Authentication of Server-initiated Communications
              • Configuring Authentication of Server-initiated Communications
              • Using Authentication Certificate Manager
            • Enhanced Encryption of Server-Agent Communication
          • Web Console Password
          • Web Console Settings
            • Configuring Web Console Settings
          • Quarantine Manager
            • Configuring Quarantine Directory Settings
          • Server Tuner
            • Running Server Tuner
          • Smart Feedback
            • Participating in the Smart Feedback Program
        • Managing the OfficeScan Agent
          • Endpoint Location
            • Location Criteria
            • Configuring Location Settings
            • Gateway Settings Importer
              • Using Gateway Settings Importer
          • OfficeScan Agent Program Management
            • OfficeScan Agent Services
              • Enabling or Disabling the Agent Services from the Web Console
              • Using the Trend Micro Performance Tuning Tool
            • OfficeScan Agent Service Restart
              • Configuring Service Restart Settings
            • OfficeScan Agent Self-protection
              • Configuring OfficeScan Agent Self-protection Settings
              • Protect OfficeScan Agent Services
              • Protect Files in the OfficeScan Agent Installation Folder
              • Protect OfficeScan Agent Registry Keys
              • Protect OfficeScan Agent Processes
            • OfficeScan Agent Console Access Restriction
              • Restricting Access to the OfficeScan Agent Console
            • OfficeScan Agent Unloading and Unlocking
              • Granting the Agent Unloading and Unlocking Privilege
            • OfficeScan Agent Independent Mode Privilege
              • Granting the Agent Independent Mode Privilege
              • Disabling Automatic Agent Update on Independent Agents
              • Revoking the Scheduled Update Privilege on Independent Agents
            • OfficeScan Agent Language Configuration
              • Configuring OfficeScan Agent Language Settings
            • Agent Mover
              • Running Agent Mover
            • Inactive OfficeScan Agents
              • Automatically Removing Inactive Agents
          • Agent-Server Connection
            • OfficeScan Agent Icons
              • Smart Scan Icons
              • Conventional Scan Icons
              • Solutions to Issues Indicated in OfficeScan Agent Icons
            • Agent-Server Connection Verification
              • Verifying Agent-Server Connections
            • Connection Verification Logs
              • Viewing Connection Verification Logs
            • Unreachable Agents
              • Heartbeat
              • Server Polling
              • Configuring the Heartbeat and Server Polling Features
          • OfficeScan Agent Proxy Settings
            • Internal Proxy for OfficeScan Agents
              • Configuring Internal Proxy Settings
            • External Proxy for OfficeScan Agents
              • Configuring Proxy Server Authentication Credentials
            • Configuring Global Smart Protection Service Proxy Settings
            • Proxy Configuration Privileges for Agents
              • Granting Proxy Configuration Privileges
            • Automatic Proxy Settings for the OfficeScan Agent
              • Configuring Automatic Proxy Settings
          • Viewing OfficeScan Agent Information
          • Importing and Exporting Agent Settings
            • Exporting Agent Settings
            • Importing Agent Settings
          • Security Compliance
            • Security Compliance for Managed Agents
              • Services
              • Components
              • Scan Compliance
              • Settings
            • On-demand Compliance Reports
              • Generating an On-demand Compliance Report
            • Scheduled Compliance Reports
              • Configuring Settings for Scheduled Compliance Reports
            • Security Compliance for Unmanaged Endpoints
              • Defining the Active Directory/IP Address Scope and Query
              • Viewing the Query Results
              • Configuring the Scheduled Query Assessment
          • Trend Micro Virtual Desktop Support
            • Virtual Desktop Support System Requirements
            • Virtual Desktop Support Installation
              • Installing Virtual Desktop Support
            • Virtual Desktop Support License
              • Activating or Renewing Virtual Desktop Support
              • Viewing License Information for Virtual Desktop Support
            • Virtual Server Connections
              • Adding Server Connections
              • Adding Additional Server Connections
              • Deleting a Connection Setting
            • Changing the VDI Scan Capacity
            • Troubleshooting Microsoft Hyper-V Connections
              • Allowing WMI Communication through the Windows Firewall
              • Opening Port Communication through the Windows Firewall or a Third-party Firewall
            • VDI Pre-Scan Template Generation Tool
              • Creating a Pre-scan Template
              • Removing GUIDs from Templates
          • Global Agent Settings
          • Configuring Agent Privileges and Other Settings
        • Protecting Off-premises Agents
          • Edge Relay Server
          • Edge Relay Server System Requirements
          • Installing the Edge Relay Server
          • Connecting to the Edge Relay Server
          • Managing the Edge Relay Server Connection
          • Managing Edge Relay Server Certificates
        • Using Plug-in Manager
          • About Plug-in Manager
            • Plug-in Program Agents on Endpoints
            • Widgets
          • Plug-in Manager Installation
            • Performing Post-installation Tasks
          • Native OfficeScan Feature Management
          • Managing Plug-in Programs
            • Plug-in Program Installation
              • Installing Plug-in Programs
              • Activating the Plug-in Program License
              • Viewing and Renewing the License Information
            • Plug-in Program Management
              • Managing Plug-in Programs
            • Plug-in Program Upgrades
              • Upgrading Plug-in Programs
            • Plug-in Program Uninstallation
              • Uninstalling Plug-in Programs from the Plug-in Manager Console
          • Uninstalling Plug-in Manager
          • Troubleshooting Plug-in Manager
            • Plug-in Program Does not Display on the Plug-in Manager Console
            • Plug-in Agent Installation and Display Issues on Endpoints
            • Agents on the Endpoints Cannot be Launched if the Automatic Configuration Script Setting on Internet Explorer Redirects to a Proxy Server
            • An Error in the System, Update Module, or Plug-in Manager Program occurred and the Error Message Provides a Certain Error Code
        • Troubleshooting Resources
          • Support Intelligence System
          • Case Diagnostic Tool
          • Trend Micro Performance Tuning Tool
          • OfficeScan Server Logs
            • Server Debug Logs Using LogServer.exe
              • Enabling Debug Logging
              • Disabling Debug Logging
              • Enabling Debug Logging for Server Installation and Upgrade
            • Installation Logs
            • Active Directory Logs
            • Role-based Administration Logs
            • OfficeScan Agent Grouping Logs
            • Component Update Logs
              • Getting Detailed Server Update Information
              • Stopping the Collection of Detailed Server Update Information
            • Agent Packager Logs
              • Enabling Logging for Agent Packager Creation
              • Disabling Logging for Agent Packager Creation
            • Security Compliance Report Logs
            • Outside Server Management Logs
            • Device Control Exception Logs
            • Integrated Smart Protection Server Web Reputation Logs
            • ServerProtect Normal Server Migration Tool Logs
            • VSEncrypt Logs
            • Control Manager MCP Agent Logs
              • Enabling Debug Logging for the MCP Agent
              • Disabling Debug Logging for the MCP Agent
            • Virus/Malware Logs
            • Spyware/Grayware Logs
            • Outbreak Logs
            • Virtual Desktop Support Logs
          • OfficeScan Agent Logs
            • OfficeScan Agent Debug Logs Using LogServer.exe
            • Fresh Installation Logs
            • Upgrade/Hot Fix Logs
            • Damage Cleanup Services Logs
            • Mail Scan Logs
            • OfficeScan Agent Connection Logs
            • OfficeScan Agent Update Logs
              • Getting Detailed OfficeScan Agent Update Information
            • Virus Scan Engine Logs
            • Outbreak Prevention Logs
            • Outbreak Prevention Restore Logs
            • Behavior Monitoring Debug Logs
            • OfficeScan Firewall Logs
              • Enabling Debug Logging for the Common Firewall Driver on Windows Vista/Server 2008/7/Server 2012/8/8.1/10 Computers
              • Enabling Debug Logging for the Common Firewall Driver on Windows XP and Windows Server 2003 Computers
              • Disabling Debug Logging for the Common Firewall Driver (all operating systems)
              • Enabling Debug Logging for the OfficeScan NT Firewall Service
              • Disabling Debug Logging for the OfficeScan NT Firewall Service
            • Web Reputation and POP3 Mail Scan Logs
              • Enabling Debug Logging for the Web Reputation and POP3 Mail Scan Features
              • Disabling Debug Logging for the Web Reputation and POP3 Mail Scan Features
            • Device Control Exception List Logs
            • Data Protection Debug Logs
            • Windows Event Logs
            • Transport Driver Interface (TDI) Logs
        • Technical Support
          • Troubleshooting Resources
            • Using the Support Portal
            • Threat Encyclopedia
          • Contacting Trend Micro
            • Speeding Up the Support Call
          • Sending Suspicious Content to Trend Micro
            • Email Reputation Services
            • File Reputation Services
            • Web Reputation Services
          • Other Resources
            • Download Center
            • Documentation Feedback
        • IPv6 Support in OfficeScan
          • IPv6 Support for OfficeScan Server and Agents
            • OfficeScan Server Requirements
            • OfficeScan Agent Requirements
            • Pure IPv6 Server Limitations
            • Pure IPv6 OfficeScan Agent Limitations
          • Configuring IPv6 Addresses
          • Screens That Display IP Addresses
        • Windows Server Core Support
          • Windows Server Core Support
          • Installation Methods for Windows Server Core
            • Installing the OfficeScan Agent Using Login Script Setup
            • Installing the OfficeScan Agent Using the OfficeScan Agent Package
          • OfficeScan Agent Features on Windows Server Core
          • Windows Server Core Commands
        • Windows 8/8.1/10 and Windows Server 2012/2016 Support
          • About Windows 8/8.1/10 and Windows Server 2012/2016
            • OfficeScan Support for Tiles and Toast Notifications
            • Enabling Toast Notifications in Windows 8/8.1 and Windows Server 2012
            • Enabling Toast Notifications in Windows 10 and Windows Server 2016
          • OfficeScan Feature Support by UI Mode
          • Internet Explorer 10/11 and Microsoft Edge
        • OfficeScan Rollback
          • Rolling Back the OfficeScan Server and OfficeScan Agents Using the Server Backup Package
            • Rolling Back the OfficeScan Agents
            • Restoring the Previous OfficeScan Server Version
        • Glossary
          • ActiveUpdate
          • Compressed File
          • Cookie
          • Denial of Service Attack
          • DHCP
          • DNS
          • Domain Name
          • Dynamic IP Address
          • ESMTP
          • End User License Agreement
          • False Positive
          • FTP
          • GeneriClean
          • Hot Fix
          • HTTP
          • HTTPS
          • ICMP
          • IntelliScan
          • IntelliTrap
          • IP
          • Java File
          • LDAP
          • Listening Port
          • MCP Agent
          • Mixed Threat Attack
          • NAT
          • NetBIOS
          • One-way Communication
          • Patch
          • Phish Attack
          • Ping
          • POP3
          • Proxy Server
          • RPC
          • Security Patch
          • Service Pack
          • SMTP
          • SNMP
          • SNMP Trap
          • SSL
          • SSL Certificate
          • TCP
          • Telnet
          • Trojan Port
          • Trusted Port
            • Determining the Trusted Ports
          • Two-way Communication
          • UDP
          • Uncleanable Files
            • Files Infected with Trojans
              • Files Infected with Worms
              • Write-protected Infected Files
              • Password-protected Files
              • Backup Files

        Setting Up Smart Protection Services

        Before agents can leverage File Reputation Services and Web Reputation Services, ensure that the smart protection environment has been properly set up. Check the following:

        • Smart Protection Server Installation

        • Integrated Smart Protection Server Management

        • Smart Protection Source List

        • Agent Connection Proxy Settings

        • Trend Micro Network VirusWall Installations

        • Smart Protection Server Installation
        • Integrated Smart Protection Server Management
        • Smart Protection Source List
        • Agent Connection Proxy Settings
        • Endpoint Location Settings
        • Trend Micro Network VirusWall Installations
        Parent topic: Using Trend Micro Smart Protection