OfficeScan XG Server Online Help
>
Using Plug-in Manager
>
Managing Plug-in Programs
>
Plug-in Program Installation
> Activating the Plug-in Program License
Online Help Center Home
Preface
OfficeScan Documentation
Audience
Document Conventions
Terminology
Introducing OfficeScan
About OfficeScan
What's New in OfficeScan XG
Key Features and Benefits
The OfficeScan Server
The OfficeScan Agent
Integration with Trend Micro Products and Services
Getting Started with OfficeScan
The Web Console
Requirements for Opening the Web Console
Logon Account
The Web Console Banner
Getting Help
The Dashboard
Product License Status Section
Product Information Bars
Tabs and Widgets
Working with Tabs
Working with Widgets
Summary Tab Widgets
Overall Threat Detections and Policy Violations Widget
Endpoint Status Widget
Ransomware Summary Widget
Top Ransomware Detections Widget
Security Risk Detections Over Time Widget
Smart Protection Network Widgets
File Reputation Threat Map Widget
Web Reputation Top Threatened Users Widget
Web Reputation Top Threat Sources Widget
Data Protection Widgets
Data Loss Prevention Incidents Over Time Widget
Top Data Loss Preventions Incidents Widget
OfficeScan Widgets
C&C Callback Events Widget
Security Risk Detections Widget
OfficeScan and Plug-ins Mashup Widget
Antivirus Agent Connectivity Widget
Agents Connected to the Edge Relay Server Widget
Outbreaks Widget
Agent Updates Widget
Management Widget
Agent-Server Connectivity Widget
The Server Migration Tool
Using the Server Migration Tool
Active Directory Integration
Integrating Active Directory with OfficeScan
Synchronizing Data with Active Directory Domains
The OfficeScan Agent Tree
Agent Connection Status
Agent Tree Icons
Agent Tree General Tasks
Advanced Search Options
Agent Tree Specific Tasks
Agent Management Screen
Outbreak Prevention Screen
Agent Selection Screen
Rollback Screen
Security Risk Logs Screen
OfficeScan Domains
Agent Grouping
Manual Agent Grouping
Configuring Manual Agent Grouping
Automatic Agent Grouping
Configuring Automatic Agent Grouping
Defining Agent Grouping Rules by Active Directory Domains
Defining Agent Grouping Rules by IP Addresses
Agent Grouping Tasks
Adding a Domain
Deleting a Domain or Agent
Renaming a Domain
Moving OfficeScan Agents to Another Domain or OfficeScan Server
Getting Started with Data Protection
Data Protection Installation
Installing Data Protection
Data Protection License
Activating the Plug-in Program License
Viewing and Renewing the License Information
Deployment of Data Protection to OfficeScan Agents
Deploying the Data Protection Module to OfficeScan Agents
Forensic Folder and DLP Database
Modifying the Forensic Folder and Database Settings
Creating a Backup of Forensic Data
Uninstalling Data Protection
Uninstalling Data Protection from Plug-in Manager
Using Trend Micro Smart Protection
About Trend Micro Smart Protection
The Need for a New Solution
Smart Protection Services
File Reputation Services
Web Reputation Services
Smart Feedback
Smart Protection Sources
Trend Micro Smart Protection Network
Smart Protection Server
Smart Protection Sources Compared
Smart Protection Pattern Files
Smart Scan Agent Pattern
Smart Scan Pattern
Web Blocking List
Smart Protection Pattern Update Process
Usage of Smart Protection Patterns
Setting Up Smart Protection Services
Smart Protection Server Installation
Standalone Smart Protection Server Installation
Integrated Smart Protection Server Installation
Integrated Smart Protection Server Tool
Smart Protection Server Best Practices
Customizing ptngrowth.ini for the Standalone Server
Customizing ptngrowth.ini for the Integrated Server
Integrated Smart Protection Server Management
Enabling the Integrated Server’s File Reputation Services and Web Reputation Services
Recording the Integrated Server’s Addresses
Updating the Integrated Server’s Components
Integrated Server’s Approved/Blocked URL List Configuration
Configuring Integrated Smart Protection Server Settings
Smart Protection Source List
IPv6 Support for Smart Protection Sources
Smart Protection Sources and Endpoint Location
Configuring the Standard List of Smart Protection Sources
Configuring Custom Lists of Smart Protection Sources
Agent Connection Proxy Settings
Endpoint Location Settings
Trend Micro Network VirusWall Installations
Using Smart Protection Services
Installing the OfficeScan Agent
OfficeScan Agent Fresh Installations
Installation Considerations
OfficeScan Agent Features
OfficeScan Agent Installation and IPv6 Support
Operating System
Installation Methods
Agent IP Addresses
Configuring the IP Address that Dual-stack Agents Use When Registering to the Server
Deployment Considerations
Web Install Page Installations
Installing from the Web Install Page
Browser-based Installation
Initiating a Browser-based Installation
Performing a UNC-based Installation
Installing Remotely from the OfficeScan Web Console
Installing with Login Script Setup
OfficeScan Agent Installation
Program and Component Updates
Windows Server Scripts
Adding Autopcc.exe to the Login Script Using Login Script Setup
Installing with Agent Packager
Package Deployment Guidelines
Scan Method Guidelines for Agent Packages
Creating an Installation Package Using Agent Packager
Deploying an MSI Package Using Active Directory
Deploying an MSI Package Using Microsoft SMS
Obtaining the Package Locally
Obtaining the Package Remotely
Distributing the Package to Target Endpoints
Installations Using Agent Disk Images
Creating a Disk Image of the OfficeScan Agent
Vulnerability Scanner Usage
Considerations When Using Vulnerability Scanner
Network Administration
Network Topology and Architecture
Software/Hardware Specifications
Domain Structure
Network Traffic
Network Size
Guidelines When Installing the OfficeScan Agent Using Vulnerability Scanner
Vulnerability Scan Methods
Running a Manual Vulnerability Scan
Running a DHCP Scan
Configuring a Scheduled Vulnerability Scan
Vulnerability Scan Settings
Product Query
Configuring Product Query Settings
Method for Retrieving Endpoint Descriptions
Configuring Retrieval Settings
Notifications
Configuring Notification Settings
Vulnerability Scan Results
Configuring Scan Results
Ping Settings
Configuring Ping Settings
OfficeScan Server Settings
Configuring OfficeScan Server Settings
Installing with Security Compliance
Installing the OfficeScan Agent
Migrating to the OfficeScan Agent
Migrating from Other Endpoint Security Software
OfficeScan Agent Migration Issues
Migrating from ServerProtect Normal Servers
Using the ServerProtect Normal Server Migration Tool
Post-installation
OfficeScan Agent Shortcut
Programs List
OfficeScan Agent Services
OfficeScan Agent Installation Logs
Recommended Post-installation Tasks
Component Updates
Test Scan Using the EICAR Test Script
Performing a Test Scan
OfficeScan Agent Uninstallation
Uninstalling the OfficeScan Agent from the Web Console
The OfficeScan Agent Uninstallation Program
Granting the OfficeScan Agent Uninstallation Privilege
Running the OfficeScan Agent Uninstallation Program
Manually Uninstalling the OfficeScan Agent
Keeping Protection Up-to-Date
OfficeScan Components and Programs
Antivirus Components
Updating the Scan Engine
Anti-spyware Components
Damage Cleanup Services Components
Firewall Components
Behavior Monitoring Components
Suspicious Connections Components
Browser Exploit Solution
Programs
Hot Fix and Patch History
Web Reputation Component
Update Overview
OfficeScan Server and OfficeScan Agent Update
Smart Protection Source Update
OfficeScan Server Updates
OfficeScan Server Update Sources
IPv6 Support for OfficeScan Server Updates
Proxy for OfficeScan Server Updates
Configuring Proxy Settings
Configuring the Server Update Source
OfficeScan Server Component Duplication
Component Duplication Scenario
Isolated OfficeScan Server Updates
Updating an Isolated OfficeScan Server
OfficeScan Server Update Methods
Manually Updating the OfficeScan Server
Scheduling Updates for the OfficeScan Server
OfficeScan Server Update Logs
Viewing the Update Logs
Integrated Smart Protection Server Updates
OfficeScan Agent Updates
OfficeScan Agent Update Sources
IPv6 Support for OfficeScan Agent Updates
Standard Update Source for OfficeScan Agents
Configuring the Standard Update Source for OfficeScan Agents
OfficeScan Agent Update Process
Customized Update Sources for OfficeScan Agents
Configuring Customized Update Sources for OfficeScan Agents
OfficeScan Agent Update Process
ActiveUpdate Server as the OfficeScan Agent Update Source
Limiting Downloads from the ActiveUpdate Server
OfficeScan Agent Update Methods
OfficeScan Agent Automatic Updates
Event-triggered Updates
Schedule-based Updates
Configuring OfficeScan Agent Automatic Updates
Configuring Scheduled OfficeScan Agent Updates with NAT
Using the Domains Schedule Update Tool
OfficeScan Agent Manual Updates
Updating OfficeScan Agents Manually
Configuring Update Privileges and Other Settings
Configuring Reserved Disk Space for OfficeScan Agents Updates
Proxy for OfficeScan Agent Component Updates
Configuring OfficeScan Agent Update Notifications
Viewing OfficeScan Agent Update Logs
Enforcement of OfficeScan Agent Updates
Rolling Back Components for OfficeScan Agents
Running the Touch Tool for OfficeScan Agent Hot Fixes
Update Agents
Update Agent System Requirements
Update Agent Configuration
Assigning OfficeScan Agents as Update Agents
Specifying the OfficeScan Agents that Update from an Update Agent
Update Sources for Update Agents
IPv6 Support for Update Agents
Standard Update Source for Update Agents
Customized Update Sources for Update Agents
Configuring the Update Source for the Update Agent
Update Agent Component Duplication
Update Methods for Update Agents
Using the Scheduled Update Configuration Tool
Update Agent Analytical Report
Component Update Summary
Update Status for OfficeScan Agents
Components
Scanning for Security Risks
About Security Risks
Viruses and Malware
Spyware and Grayware
How Spyware/Grayware Gets into the Network
Potential Risks and Threats
Guarding Against Spyware/Grayware and Other Threats
Scan Method Types
Default Scan Method
Scan Methods Compared
Changing the Scan Method
Switching from Smart Scan to Conventional Scan
Switching from Conventional Scan to Smart Scan
Scan Types
Real-time Scan
Configuring Real-time Scan Settings
Manual Scan
Configuring Manual Scan Settings
Scheduled Scan
Configuring Scheduled Scan Settings
Scan Now
Configuring Scan Now Settings
Initiating Scan Now
Settings Common to All Scan Types
Scan Criteria
User Activity on Files
Files to Scan
Scan Settings
CPU Usage
Schedule
Scan Exclusions
Wildcard Exceptions
Scan Exclusion List (Directories)
Supported System Variables for Scan Exclusion List (Directories)
Scan Exclusion List (Files)
Scan Exclusion List (File Extensions)
Apply Scan Exclusion Settings to All Scan Types
Scan Actions
Virus/Malware Scan Actions
Use ActiveAction
Use the Same Action for all Virus/Malware Types
Use a Specific Action for Each Virus/Malware Type
Quarantine Directory
Back Up Files Before Cleaning
Damage Cleanup Services
Display a Notification Message When Virus/Malware is Detected
Display a Notification Message When Probable Virus/Malware is Detected
Restoring Quarantined Files
Restoring Encrypted Files
Decrypting and Restoring Files
Spyware/Grayware Scan Actions
Display a Notification Message When Spyware/Grayware is Detected
Spyware/Grayware Approved List
Adding Already Detected Spyware/Grayware to the Approved List
Managing the Spyware/Grayware Approved List
Restoring Spyware/Grayware
Trusted Program List
Configuring the Trusted Programs List
Scan Privileges and Other Settings
Scan Type Privileges
Granting Scan Type Privileges
Configuring Scan Settings for the OfficeScan Agent
Scheduled Scan Privileges and Other Settings
Postpone Scheduled Scan
Skip and Stop Scheduled Scan
Scheduled Scan Privilege Notification
Granting Scheduled Scan Privileges and Displaying the Privilege Notification
Postponing/Skipping and Stopping Scheduled Scan on the Agent
Mail Scan Privileges and Other Settings
Granting Mail Scan Privileges and Enabling POP3 Mail Scan
Cache Settings for Scans
Digital Signature Cache
On-demand Scan Cache
Configuring Cache Settings for Scans
Trusted Program List Privilege
Granting the Trusted Program List Settings
Global Scan Settings
Configuring Global Scan Settings
Scan Settings Section
Exclude the OfficeScan Server Database Folder from Real-time Scan
Exclude Microsoft Exchange Server Folders and Files from Scans
Enable Deferred Scanning on File Operations
Enable Early Launch Anti-Malware Protection on Endpoints
Clean/Delete Infected Files Within Compressed Files
Enable Assessment Mode
Scan for Cookies
Scheduled Scan Settings Section
Remind Users of the Scheduled Scan __ Minutes Before it Runs
Postpone Scheduled Scan for up to __ Hours and __ Minutes
Automatically Stop Scheduled Scan When Scanning Lasts More Than __ Hours and __ Minutes
Skip Scheduled Scan When a Wireless Endpoint's Battery Life is Less Than __ % and its AC Adapter is Unplugged
Resume a Missed Scheduled Scan
Security Risk Notifications
Security Risk Notifications for Administrators
Configuring Security Risk Notifications for Administrators
Security Risk Notifications for OfficeScan Agent Users
Notifying Users of Virus/Malware and Spyware/Grayware Detections
Configuring Virus/Malware Notifications
Configuring Spyware/Grayware Notifications
Notifying Agents of a Restart to Finish Cleaning Infected Files
Security Risk Logs
Viewing Virus/Malware Logs
Virus/Malware Scan Results
Viewing Central Quarantine Restore Logs
Viewing Spyware/Grayware Logs
Spyware/Grayware Scan Results
Viewing Spyware/Grayware Restore Logs
Viewing Suspicious File Logs
Viewing Scan Operation Logs
Security Risk Outbreaks
Security Risk Outbreak Criteria and Notifications
Configuring the Security Risk Outbreak Criteria and Notifications
Configuring Security Risk Outbreak Prevention
Outbreak Prevention Policies
Limiting/Denying Access to Shared Folders
Blocking Vulnerable Ports
Denying Write Access to Files and Folders
Creating Mutual Exclusion Handling on Malware Processes/Files
Denying Access to Executable Compressed Files
Disabling Outbreak Prevention
Protecting Against Unknown Threats
Predictive Machine Learning
Configuring Predictive Machine Learning Settings
Suspicious Connection Service
Configuring Global User-defined IP List Settings
Configuring Suspicious Connection Settings
Sample Submission
Configuring Sample Submission
Unknown Threat Logs
Viewing Predictive Machine Learning Logs
Predictive Machine Learning Log Details
Viewing Suspicious Connection Logs
Viewing Sample Submission Logs
Using Behavior Monitoring
Behavior Monitoring
Malware Behavior Blocking
Ransomware Protection
Anti-Exploit Protection
Newly Encountered Program Protection
Event Monitoring
Behavior Monitoring Exception List
Configuring Malware Behavior Blocking, Event Monitoring, and the Exception List
Configuring Global Behavior Monitoring Settings
Behavior Monitoring Privileges
Granting Behavior Monitoring Privileges
Behavior Monitoring Notifications for OfficeScan Agent Users
Enabling the Sending of Notification Messages
Modifying the Content of the Notification Message
Behavior Monitoring Logs
Viewing Behavior Monitoring Logs
Configuring the Behavior Monitoring Log Sending Schedule
Using Device Control
Device Control
Permissions for Storage Devices
Advanced Permissions for Storage Devices
Specifying a Digital Signature Provider
Specifying a Program Path and Name
Permissions for Non-storage Devices
Managing Access to External Devices (Data Protection Activated)
Configuring Advanced Permissions
Configuring an Approved List of USB Devices
Device List Tool
Running the Device List Tool
Managing Access to External Devices (Data Protection Not Activated)
Adding Programs to the Device Control Lists Using ofcscan.ini
Modifying Device Control Notifications
Device Control Logs
Viewing Device Control Logs
Using Data Loss Prevention
About Data Loss Prevention (DLP)
Data Loss Prevention Policies
Policy Configuration
Data Identifier Types
Expressions
Predefined Expressions
Viewing Settings for Predefined Expressions
Customized Expressions
Criteria for Customized Expressions
Creating a Customized Expression
Importing Customized Expressions
File Attributes
Predefined File Attributes List
Creating a File Attribute List
Importing a File Attribute List
Keywords
Predefined Keyword Lists
How Keyword Lists Work
Number of Keywords Condition
Distance Condition
Customized Keyword Lists
Customized Keyword List Criteria
Creating a Keyword List
Importing a Keyword List
Data Loss Prevention Templates
Predefined DLP Templates
Customized DLP Templates
Condition Statements and Logical Operators
Creating a Template
Importing Templates
DLP Channels
Network Channels
Email Clients
FTP
HTTP and HTTPS
IM Applications
SMB Protocol
Webmail
Transmission Scope and Targets for Network Channels
Transmission Scope: All Transmissions
Transmission Scope: Only Transmissions Outside the Local Area Network
Resolving Conflicts
System and Application Channels
Cloud Storage Service
Data Recorders (CD/DVD)
Blocking Access to Data Recorders (CD/DVD)
Peer-to-Peer Applications
PGP Encryption
Printer
Removable Storage
Synchronization Software (ActiveSync)
Windows Clipboard
Data Loss Prevention Actions
Data Loss Prevention Exceptions
Defining Non-monitored and Monitored Targets
Decompression Rules
Rule 1: Maximum Size of a Decompressed File
Rule 2: Maximum Compression Layers
Rule 3: Maximum Number of Files to Scan
Events that Trigger Decompression Rules
Data Loss Prevention Policy Configuration
Creating a Data Loss Prevention Policy
Creating Data Loss Prevention Rules
Importing, Exporting, and Copying DLP Rules
Data Loss Prevention Notifications
Data Loss Prevention Notifications for Administrators
Configuring Data Loss Prevention Notification for Administrators
Data Loss Prevention Notifications for Agent Users
Configuring Data Loss Prevention Notification for Agents
Data Loss Prevention Logs
Viewing Data Loss Prevention Logs
Processes by Channel
Data Loss Prevention Log Details
Enabling Debug Logging for the Data Protection Module
Using Web Reputation
About Web Threats
Command & Control Contact Alert Services
Web Reputation
Web Reputation Policies
Configuring a Web Reputation Policy
Web Threat Notifications for Agent Users
Enabling the Web Threat Notification Message
Modifying the Web Threat Notifications
C&C Callback Notifications for Administrators
Configuring C&C Callback Notifications for Administrators
C&C Contact Alert Notifications for Agent Users
Enabling the C&C Callback Notification Message
Modifying the C&C Callback Notifications
C&C Callback Outbreaks
Configuring the C&C Callback Outbreak Criteria and Notifications
Web Threat Logs
Viewing Web Reputation Logs
Viewing C&C Callback Logs
Using the OfficeScan Firewall
About the OfficeScan Firewall
Traffic Filtering
Application Filtering
Certified Safe Software List
Scanning for Network Viruses
Customizable Profiles and Policies
Stateful Inspection
Intrusion Detection System
Firewall Violation Outbreak Monitor
OfficeScan Agent Firewall Privileges
Enabling or Disabling the OfficeScan Firewall
Enabling or Disabling the OfficeScan Firewall on Selected Endpoints
Enabling or Disabling the OfficeScan Firewall on All Endpoints
Firewall Policies and Profiles
Firewall Policies
Default Firewall Policies
Adding a Firewall Policy
Modifying an Existing Firewall Policy
Editing the Firewall Exception Template
Adding a Firewall Policy Exception
Modifying a Firewall Policy Exception
Saving the Policy Exception List Settings
Firewall Profiles
Configuring the Firewall Profile List
Adding and Editing a Firewall Profile
Adding a Firewall Profile
Modifying a Firewall Profile
Firewall Privileges
Granting Firewall Privileges
Global Firewall Settings
Configuring Global Firewall Settings
Firewall Violation Notifications for OfficeScan Agent Users
Granting Users the Privilege to Enable/Disable the Notification Message
Modifying the Content of the Firewall Notification Message
Firewall Logs
Viewing Firewall Logs
Firewall Violation Outbreaks
Configuring the Firewall Violation Outbreak Criteria and Notifications
Testing the OfficeScan Firewall
Managing the OfficeScan Server
Role-based Administration
User Roles
Menu Item Permissions
Menu Item Types
Menu Items for Servers and Agents
Menu Items for Managed Domains
Built-in User Roles
Custom Roles
Adding a Custom Role
Modifying a Custom Role
Deleting a Custom Role
Importing or Exporting Custom Roles
User Accounts
Agent Management Menu Items
Adding a Custom Account
Defining Permissions for Domains
Modifying a Custom Account
Adding Active Directory Accounts or Groups
Trend Micro Control Manager
Control Manager Integration in this OfficeScan Release
Supported Control Manager Versions
Registering OfficeScan to Control Manager
Control Manager Certificate Authorization
Checking the OfficeScan Status on the Control Manager Management Console
The Policy Export Tool
Using the Policy Export Tool
Suspicious Object List Settings
Configuring Suspicious Object List Settings
Reference Servers
Managing the Reference Server List
Administrator Notification Settings
Configuring General Notification Settings
System Event Logs
Viewing System Event Logs
Log Management
Log Maintenance
Deleting Logs Based on a Schedule
Manually Deleting Logs
Licenses
Viewing Product License Information
Activating or Renewing a License
OfficeScan Database Backup
Backing up the OfficeScan Database
Restoring the Database Backup Files
SQL Server Migration Tool
Using the SQL Server Migration Tool
Configuring the SQL Database Unavailable Alert
OfficeScan Web Server/Agent Connection Settings
Configuring Connection Settings
Server-Agent Communication
Authentication of Server-initiated Communications
Configuring Authentication of Server-initiated Communications
Using Authentication Certificate Manager
Enhanced Encryption of Server-Agent Communication
Web Console Password
Web Console Settings
Configuring Web Console Settings
Quarantine Manager
Configuring Quarantine Directory Settings
Server Tuner
Running Server Tuner
Smart Feedback
Participating in the Smart Feedback Program
Managing the OfficeScan Agent
Endpoint Location
Location Criteria
Configuring Location Settings
Gateway Settings Importer
Using Gateway Settings Importer
OfficeScan Agent Program Management
OfficeScan Agent Services
Enabling or Disabling the Agent Services from the Web Console
Using the Trend Micro Performance Tuning Tool
OfficeScan Agent Service Restart
Configuring Service Restart Settings
OfficeScan Agent Self-protection
Configuring OfficeScan Agent Self-protection Settings
Protect OfficeScan Agent Services
Protect Files in the OfficeScan Agent Installation Folder
Protect OfficeScan Agent Registry Keys
Protect OfficeScan Agent Processes
OfficeScan Agent Console Access Restriction
Restricting Access to the OfficeScan Agent Console
OfficeScan Agent Unloading and Unlocking
Granting the Agent Unloading and Unlocking Privilege
OfficeScan Agent Independent Mode Privilege
Granting the Agent Independent Mode Privilege
Disabling Automatic Agent Update on Independent Agents
Revoking the Scheduled Update Privilege on Independent Agents
OfficeScan Agent Language Configuration
Configuring OfficeScan Agent Language Settings
Agent Mover
Running Agent Mover
Inactive OfficeScan Agents
Automatically Removing Inactive Agents
Agent-Server Connection
OfficeScan Agent Icons
Smart Scan Icons
Conventional Scan Icons
Solutions to Issues Indicated in OfficeScan Agent Icons
Agent-Server Connection Verification
Verifying Agent-Server Connections
Connection Verification Logs
Viewing Connection Verification Logs
Unreachable Agents
Heartbeat
Server Polling
Configuring the Heartbeat and Server Polling Features
OfficeScan Agent Proxy Settings
Internal Proxy for OfficeScan Agents
Configuring Internal Proxy Settings
External Proxy for OfficeScan Agents
Configuring Proxy Server Authentication Credentials
Configuring Global Smart Protection Service Proxy Settings
Proxy Configuration Privileges for Agents
Granting Proxy Configuration Privileges
Automatic Proxy Settings for the OfficeScan Agent
Configuring Automatic Proxy Settings
Viewing OfficeScan Agent Information
Importing and Exporting Agent Settings
Exporting Agent Settings
Importing Agent Settings
Security Compliance
Security Compliance for Managed Agents
Services
Components
Scan Compliance
Settings
On-demand Compliance Reports
Generating an On-demand Compliance Report
Scheduled Compliance Reports
Configuring Settings for Scheduled Compliance Reports
Security Compliance for Unmanaged Endpoints
Defining the Active Directory/IP Address Scope and Query
Viewing the Query Results
Configuring the Scheduled Query Assessment
Trend Micro Virtual Desktop Support
Virtual Desktop Support System Requirements
Virtual Desktop Support Installation
Installing Virtual Desktop Support
Virtual Desktop Support License
Activating or Renewing Virtual Desktop Support
Viewing License Information for Virtual Desktop Support
Virtual Server Connections
Adding Server Connections
Adding Additional Server Connections
Deleting a Connection Setting
Changing the VDI Scan Capacity
Troubleshooting Microsoft Hyper-V Connections
Allowing WMI Communication through the Windows Firewall
Opening Port Communication through the Windows Firewall or a Third-party Firewall
VDI Pre-Scan Template Generation Tool
Creating a Pre-scan Template
Removing GUIDs from Templates
Global Agent Settings
Configuring Agent Privileges and Other Settings
Protecting Off-premises Agents
Edge Relay Server
Edge Relay Server System Requirements
Installing the Edge Relay Server
Connecting to the Edge Relay Server
Managing the Edge Relay Server Connection
Managing Edge Relay Server Certificates
Using Plug-in Manager
About Plug-in Manager
Plug-in Program Agents on Endpoints
Widgets
Plug-in Manager Installation
Performing Post-installation Tasks
Native OfficeScan Feature Management
Managing Plug-in Programs
Plug-in Program Installation
Installing Plug-in Programs
Activating the Plug-in Program License
Viewing and Renewing the License Information
Plug-in Program Management
Managing Plug-in Programs
Plug-in Program Upgrades
Upgrading Plug-in Programs
Plug-in Program Uninstallation
Uninstalling Plug-in Programs from the Plug-in Manager Console
Uninstalling Plug-in Manager
Troubleshooting Plug-in Manager
Plug-in Program Does not Display on the Plug-in Manager Console
Plug-in Agent Installation and Display Issues on Endpoints
Agents on the Endpoints Cannot be Launched if the Automatic Configuration Script Setting on Internet Explorer Redirects to a Proxy Server
An Error in the System, Update Module, or Plug-in Manager Program occurred and the Error Message Provides a Certain Error Code
Troubleshooting Resources
Support Intelligence System
Case Diagnostic Tool
Trend Micro Performance Tuning Tool
OfficeScan Server Logs
Server Debug Logs Using LogServer.exe
Enabling Debug Logging
Disabling Debug Logging
Enabling Debug Logging for Server Installation and Upgrade
Installation Logs
Active Directory Logs
Role-based Administration Logs
OfficeScan Agent Grouping Logs
Component Update Logs
Getting Detailed Server Update Information
Stopping the Collection of Detailed Server Update Information
Agent Packager Logs
Enabling Logging for Agent Packager Creation
Disabling Logging for Agent Packager Creation
Security Compliance Report Logs
Outside Server Management Logs
Device Control Exception Logs
Integrated Smart Protection Server Web Reputation Logs
ServerProtect Normal Server Migration Tool Logs
VSEncrypt Logs
Control Manager MCP Agent Logs
Enabling Debug Logging for the MCP Agent
Disabling Debug Logging for the MCP Agent
Virus/Malware Logs
Spyware/Grayware Logs
Outbreak Logs
Virtual Desktop Support Logs
OfficeScan Agent Logs
OfficeScan Agent Debug Logs Using LogServer.exe
Fresh Installation Logs
Upgrade/Hot Fix Logs
Damage Cleanup Services Logs
Mail Scan Logs
OfficeScan Agent Connection Logs
OfficeScan Agent Update Logs
Getting Detailed OfficeScan Agent Update Information
Virus Scan Engine Logs
Outbreak Prevention Logs
Outbreak Prevention Restore Logs
Behavior Monitoring Debug Logs
OfficeScan Firewall Logs
Enabling Debug Logging for the Common Firewall Driver on Windows Vista/Server 2008/7/Server 2012/8/8.1/10 Computers
Enabling Debug Logging for the Common Firewall Driver on Windows XP and Windows Server 2003 Computers
Disabling Debug Logging for the Common Firewall Driver (all operating systems)
Enabling Debug Logging for the OfficeScan NT Firewall Service
Disabling Debug Logging for the OfficeScan NT Firewall Service
Web Reputation and POP3 Mail Scan Logs
Enabling Debug Logging for the Web Reputation and POP3 Mail Scan Features
Disabling Debug Logging for the Web Reputation and POP3 Mail Scan Features
Device Control Exception List Logs
Data Protection Debug Logs
Windows Event Logs
Transport Driver Interface (TDI) Logs
Technical Support
Troubleshooting Resources
Using the Support Portal
Threat Encyclopedia
Contacting Trend Micro
Speeding Up the Support Call
Sending Suspicious Content to Trend Micro
Email Reputation Services
File Reputation Services
Web Reputation Services
Other Resources
Download Center
Documentation Feedback
IPv6 Support in OfficeScan
IPv6 Support for OfficeScan Server and Agents
OfficeScan Server Requirements
OfficeScan Agent Requirements
Pure IPv6 Server Limitations
Pure IPv6 OfficeScan Agent Limitations
Configuring IPv6 Addresses
Screens That Display IP Addresses
Windows Server Core Support
Windows Server Core Support
Installation Methods for Windows Server Core
Installing the OfficeScan Agent Using Login Script Setup
Installing the OfficeScan Agent Using the OfficeScan Agent Package
OfficeScan Agent Features on Windows Server Core
Windows Server Core Commands
Windows 8/8.1/10 and Windows Server 2012/2016 Support
About Windows 8/8.1/10 and Windows Server 2012/2016
OfficeScan Support for Tiles and Toast Notifications
Enabling Toast Notifications in Windows 8/8.1 and Windows Server 2012
Enabling Toast Notifications in Windows 10 and Windows Server 2016
OfficeScan Feature Support by UI Mode
Internet Explorer 10/11 and Microsoft Edge
OfficeScan Rollback
Rolling Back the OfficeScan Server and OfficeScan Agents Using the Server Backup Package
Rolling Back the OfficeScan Agents
Restoring the Previous OfficeScan Server Version
Glossary
ActiveUpdate
Compressed File
Cookie
Denial of Service Attack
DHCP
DNS
Domain Name
Dynamic IP Address
ESMTP
End User License Agreement
False Positive
FTP
GeneriClean
Hot Fix
HTTP
HTTPS
ICMP
IntelliScan
IntelliTrap
IP
Java File
LDAP
Listening Port
MCP Agent
Mixed Threat Attack
NAT
NetBIOS
One-way Communication
Patch
Phish Attack
Ping
POP3
Proxy Server
RPC
Security Patch
Service Pack
SMTP
SNMP
SNMP Trap
SSL
SSL Certificate
TCP
Telnet
Trojan Port
Trusted Port
Determining the Trusted Ports
Two-way Communication
UDP
Uncleanable Files
Files Infected with Trojans
Files Infected with Worms
Write-protected Infected Files
Password-protected Files
Backup Files
Activating the Plug-in Program License
Open the
OfficeScan
web console and click
Plug-ins
in the main menu.
On the
Plug-in Manager
screen, go to the plug-in program section and click
Manage Program
.
The
Product License New Activation Code
screen appears.
Type or copy-and-paste the Activation Code into the text fields.
Click
Save
.
The plug-in console appears.
Parent topic:
Data Protection License
Parent topic:
Plug-in Program Installation