TMCM 5.0 Ag
TMCM 5.0 Ag
Control Manager TM
5
Administrator’s Guide
cm
Control Manager
Trend Micro Incorporated reserves the right to make changes to this document
and to the products described herein without notice. Before installing and
using the software, please review the readme files, release notes and the latest
version of the Control Manager documentation, which are available from
Trend Micro’s Web site at:
www.trendmicro.com/download/documentation/
NOTE: A license to the Trend Micro Software usually includes the right to
product updates, pattern file updates, and basic technical support for one (1)
year from the date of purchase only. Maintenance must be reviewed on an
annual basis at Trend Micro’s then-current Maintenance fees.
Trend Micro, the Trend Micro t-ball logo, Trend Micro Control Manager,
Damage Cleanup Services, Outbreak Prevention Services, Trend Virus Control
System, ServerProtect, OfficeScan, ScanMail, InterScan, and eManager are
trademarks or registered trademarks of Trend Micro, Incorporated. All other
product or company names may be trademarks or registered trademarks of
their owners.
All other brand and product names are trademarks or registered trademarks of
their respective companies or organizations.
Copyright© 1998-2008 Trend Micro Incorporated. All rights reserved. No part
of this publication may be reproduced, photocopied, stored in a retrieval
system, or transmitted without the express prior written consent of Trend
Micro Incorporated.
Document Part No. TMEM53360/70921
Release Date: February 2008
The Administrator’s Guide for Trend Micro Control Manager™ is intended to
introduce the main features of the software, installation instructions for your
production environment, and provide details on how best to use and configure
Control Manager. You should read through it prior to installing or using the
software.
For technical support, please refer to Contacting Technical Support starting on
page 11-2 for technical support information and contact details. Detailed
information about how to use specific features within the software are
available in the online help file and online Knowledge Base at Trend Micro’s
Web site.
Trend Micro is always seeking to improve its documentation. If you have
questions, comments, or suggestions about this or any Trend Micro
documents, please contact us at docs@trendmicro.com. Your feedback is
always welcome. Please evaluate this documentation on the following site:
www.trendmicro.com/download/documentation/
rating.asp
Contents
Preface
What’s New in This Version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . P-ii
Control Manager Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .P-vi
About this Administrator’s Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . P-vii
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . P-viii
Document Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . P-ix
i
Trend Micro Control Manager™ Administrator’s Guide
ii
Renewing Your Product Maintenance .................................................. 3-26
iii
Trend Micro Control Manager™ Administrator’s Guide
iv
Configure Network Virus Alert Settings .............................................. 6-21
Configure Potential Vulnerability Attack Detected Settings ............. 6-22
Using Logs ..................................................................................................... 6-23
Understanding Control Manager Generated Logs ............................. 6-24
Understanding Managed Product Logs ................................................ 6-24
Understanding Log Aggregation ........................................................... 6-27
Querying Log Data .................................................................................. 6-28
Understanding Data Views ................................................................. 6-29
Performing an Ad Hoc Query ............................................................... 6-30
Working With Saved and Shared Ad Hoc Queries ............................ 6-39
Editing Saved Ad Hoc Queries .......................................................... 6-40
Sharing Saved Ad Hoc Queries .......................................................... 6-43
Working With Shared Ad Hoc Queries ............................................ 6-43
Deleting Logs ........................................................................................... 6-44
Configuring Automatic Log Deletion Settings ................................ 6-45
Working With Reports ................................................................................. 6-47
Understanding Control Manager Report Templates .......................... 6-47
Understanding Control Manager 5.0 Templates .............................. 6-47
Understanding Control Manager 3.0 Templates .............................. 6-54
Adding Control Manager 5.0 Report Templates ................................. 6-57
Adding One-time Reports ...................................................................... 6-71
Adding Scheduled Reports ..................................................................... 6-77
Enabling/Disabling Scheduled Reports ............................................... 6-84
Viewing Generated Reports ................................................................... 6-84
Configuring Report Maintenance .......................................................... 6-85
v
Trend Micro Control Manager™ Administrator’s Guide
vi
Renewing Control Manager or Managed Service
Maintenance .............................................................................................. 7-49
Managing Child Servers ............................................................................... 7-50
Understanding the Parent Server and Child
Server Communication ........................................................................... 7-52
Registering or Unregistering Child Servers .......................................... 7-53
Unregistering a Child Server ............................................................... 7-55
Accessing the Cascading Folder ............................................................ 7-56
Viewing the Product Directory Status Summaries ............................. 7-57
Configuring Log Upload Settings .......................................................... 7-57
Enabling or Disabling Child Server Connection ................................ 7-58
Issuing Tasks to Child Servers ............................................................... 7-59
Viewing Child Server Reports ................................................................ 7-60
Refreshing the Product Directory ......................................................... 7-61
Renaming a Child Server ........................................................................ 7-61
Recovering Child Servers Accidentally Removed
from the Cascading Manager ................................................................. 7-62
Registering a Child Control Manager Server to
a Parent Control Mananger Server ........................................................ 7-62
Understanding the Control Manager Database ........................................ 7-64
Understanding the db_ControlManager Tables .................................. 7-64
Backing Up db_ControlManager Using osql ................................... 7-68
Restoring Backup db_ControlManager Using osql ......................... 7-69
Backing Up db_ControlManager Using the
SQL Server Enterprise Manager ........................................................ 7-70
Restoring Backup db_ControlManager Using
SQL Server Enterprise Manager ........................................................ 7-71
Shrinking db_controlmanager_log.ldf Using
SQL Server Enterprise Manager ........................................................ 7-72
Shrinking db_ControlManager.mdf and
db_ControlManager.ldf Using SQL Commands ............................. 7-73
vii
Trend Micro Control Manager™ Administrator’s Guide
viii
Chapter 10: Removing Trend Micro Control Manager
Removing a Control Manager Server ........................................................ 10-2
Manually Removing Control Manager ....................................................... 10-2
Remove the Control Manager Application .......................................... 10-3
Stopping Control Manager Services .................................................. 10-3
Removing Control Manager IIS Settings .......................................... 10-4
Removing Crystal Reports, TMI, and CCGI ................................... 10-5
Deleting Control Manager Files/Directories and
Registry Keys ......................................................................................... 10-6
Removing the Database Components ............................................... 10-7
Removing Control Manager and NTP Services ............................... 10-7
Removing a Windows-Based Control Manager 2.x Agent ..................... 10-7
Appendix A:
Server Address Checklist .............................................................................. A-2
Ports Checklist ................................................................................................ A-3
Control Manager 2.x Agent installation Checklist .................................... A-4
Control Manager Conventions .................................................................... A-4
Core Process and Configuration Files ........................................................ A-5
Communication and Listening Ports .......................................................... A-7
Trend Micro Control Manager Product Features ..................................... A-8
Appendix B:
Product Information ......................................................................................B-2
Security Threat Information ..........................................................................B-2
Data Views: Product Information ................................................................B-3
License Information ..................................................................................B-3
Managed Product License Status .........................................................B-3
Managed Product License Information Summary .............................B-5
Detailed Managed Product License Information ..............................B-6
Managed Product Information ................................................................B-7
ix
Trend Micro Control Manager™ Administrator’s Guide
x
Overall Threat Information ....................................................................B-83
Complete Network Security Risk Analysis Information ................B-83
Network Protection Boundary Information ....................................B-84
Security Risk Entry Point Analysis Information ..............................B-85
Security Risk Destination Analysis Information ..............................B-87
Security Risk Source Analysis Information ......................................B-87
Index
xi
Trend Micro Control Manager™ Administrator’s Guide
xii
Preface
Preface
This Administrator’s Guide introduces Trend Micro Control Manager™ 5.0, guides you
through the installation planning and steps, and walks you through configuring Control
Manager to function according to your needs.
This preface contains the following topics:
• What’s New in This Version on page P-ii
• Control Manager Documentation on page P-vi
• About this Administrator’s Guide on page P-vii
• Audience on page P-viii
• Document Conventions on page P-ix
P-i
Trend Micro Control Manager™ Administrator’s Guide
P-ii
Preface
console). However, Jane oversees operation for all OfficeScan servers, while Bob on
the other hand only oversees operation for OfficeScan servers protecting desktops
for the Marketing department. The information that they can view on the Web
console will be very different. Bob logs on and only sees information that is
applicable to the OfficeScan servers his Control Manager user account allows (the
OfficeScan servers for the Marketing department). When Jane logs on, she sees
information for all OfficeScan servers because her Control Manager user account
grants her access to all OfficeScan servers registered to Control Manager.
P-iii
Trend Micro Control Manager™ Administrator’s Guide
OfficeScan 8.0
• 1.5
InterScan Gateway Security Appliance
• 1.5 + SP1
• 7.0
InterScan Messaging Security Suite
• 7.0 + SP1
P-iv
Preface
• 5.0
InterScan WebProtect for ISA
• 5.01
• 1.0
InterScan Messaging Security Appliance 5000
• 7.0
• 1.0
Total Discovery Appliance
• 2.0 (under development)
P-v
Trend Micro Control Manager™ Administrator’s Guide
DOCUMENT DESCRIPTION
P-vi
Preface
TASK DESCRIPTION
P-vii
Trend Micro Control Manager™ Administrator’s Guide
TASK DESCRIPTION
Audience
The Control Manager documentation assumes a basic knowledge of security systems.
There are references to previous versions of Control Manager to help system
administrators and personnel who are familiar with earlier versions of the product. If
you have not used earlier versions of Control Manager, the references may help
reinforce your understanding of the Control Manager concepts.
P-viii
Preface
Document Conventions
To help you locate and interpret information easily, the Control Manager documentation
(Administrator’s and Installation Guide) uses the following conventions.
TABLE PREFACE-4. Control Manager Documentation Conventions
CONVENTION DESCRIPTION
P-ix
Trend Micro Control Manager™ Administrator’s Guide
P-x
Chapter 1
Introducing Trend Micro Control Manager™
Trend Micro Control Manager is a central management console that manages Trend
Micro products and services, at the gateway, mail server, file server, and corporate
desktop levels. The Control Manager Web-based management console provides a single
monitoring point for antivirus and content security products and services throughout
the network.
Control Manager allows system administrators to monitor and report on activities such
as infections, security violations, or virus/malware entry points. System administrators
can download and deploy update components throughout the network, helping ensure
that protection is consistent and up-to-date. Example update components include virus
pattern files, scan engines, and anti-spam rules. Control Manager allows both manual
and pre-scheduled updates. Control Manager allows the configuration and
administration of products as groups or as individuals for added flexibility.
This chapter contains the following topics:
• Control Manager Standard and Advanced on page 1-2
• How to Use Control Manager on page 1-2
• Understanding Trend Micro Management Communication Protocol on page 1-3
• Control Manager Architecture on page 1-7
1-1
Trend Micro Control Manager™ Administrator’s Guide
Note: Control Manager 5.0 Advanced supports the following as child Control Manager
servers:
For a complete list of all features Standard and Advanced Control Manager servers
support see Trend Micro Control Manager Product Features on page A-8.
FEATURE DESCRIPTION
1-2
Introducing Trend Micro Control Manager™
FEATURE DESCRIPTION
Secure configuration and These features allow you to configure secure management
component download console access and component download
Centralized update Update virus patterns, anti-spam rules, scan engines, and
other antivirus or content security components to help ensure
control that all managed products are up-to-date.
1-3
Trend Micro Control Manager™ Administrator’s Guide
1-4
Introducing Trend Micro Control Manager™
data transfer strategy, network bandwidth can be preserved and improved scalability is
also created.
HTTPS Support
The MCP integration protocol applies the industry standard communication protocol
(HTTP/HTTPS). HTTP/HTTPS has several advantages over TMI:
1-5
Trend Micro Control Manager™ Administrator’s Guide
One-way Communication
NAT traversal has become an increasingly more significant issue in the current
real-world network environment. In order to address this issue, MCP uses one-way
communication. One-way communication has the MCP client initiating the connection
to and polling of commands from the server. Each request is a CGI-like command
query or log transmission. In order to reduce the network impact, the connection is kept
alive and open as much as possible. A subsequent request uses an existing open
connection. Even if the connection is dropped, all connections involving SSL to the
same host benefit from session ID cache that drastically reduces re-connection time.
Two-way Communication
Two-way communication is an alternative to one-way communication. It is still based on
one-way communication, but has an extra channel to receive server notifications. This
extra channel is also based on HTTP protocol. Two-way communication can improve
real time dispatching and processing of commands from the server by the MCP agent.
The MCP agent side needs a Web server or CGI compatible program that can process
CGI-like requests to receive notifications from Control Manager server.
1-6
Introducing Trend Micro Control Manager™
COMPONENT DESCRIPTION
Acts as a repository for all data collected from the agents. It can be
a Standard or Advanced Edition server. A Control Manager server
includes the following features:
• An SQL database that stores managed product configurations
and logs
Control Manager uses the Microsoft SQL Server database
(db_ControlManager.mdf) to store data included in logs,
Communicator schedule, managed product and child server
information, user account, network environment, and
notification settings.
• A Web server that hosts the Control Manager management
console
Control Manager server • A mail server that delivers event notifications through email
messages
Control Manager can send notifications to individuals or groups
of recipients about events that occur on the Control Manager
network. Configure Event Center to send notifications through
email messages, Windows event log, MSN Messenger, SNMP,
Syslog, pager, or any in-house/industry standard application
used by your organization to send notification.
• A report server, present only in the Advanced Edition, that
generates antivirus and content security product reports
A Control Manager report is an online collection of figures about
virus/malware and content security events that occur on the
Control Manager network.
1-7
Trend Micro Control Manager™ Administrator’s Guide
COMPONENT DESCRIPTION
1-8
Chapter 2
Planning and Implementing the Control
Manager Deployment
Administrators must take several factors into consideration before deploying Control
Manager to their network. This chapter helps you plan for Control Manager deployment
and manage a Control Manager test deployment.
This chapter contains the following topics:
• Identifying Deployment Architecture and Strategy on page 2-2
• Installation Flow on page 2-9
• Supported Operating Systems on page 2-9
• Testing Control Manager at One Location on page 2-10
• Server Distribution Plan on page 2-12
• Network Traffic Plan on page 2-13
• Sources of Network Traffic on page 2-15
• Deploying Updates on page 2-18
• Data Storage Plan on page 2-19
• Web Server Plan on page 2-20
2-1
Trend Micro Control Manager™ Administrator’s Guide
Note: If you are using Control Manager for the first time, Trend Micro recommends the use
of a Control Manager Advanced parent server to handle single-site and multiple-site
deployments.
2-2
Planning and Implementing the Control Manager Deployment
Note: Control Manager 5.0 Advanced supports the following as child Control Manager
servers:
2-3
Trend Micro Control Manager™ Administrator’s Guide
many Control Manager servers you need to deploy, as well as where to put these servers
on your network to optimize communication and management.
If you have a heterogeneous network environment (that is, if your network has different
operating systems, such as Windows and UNIX), identify how many managed products
are Windows or UNIX-based. Use this information to decide whether to implement a
Control Manager cascading structure environment.
Note: Both OfficeScan and Control Manager use IIS to communicate with clients and
agents/child servers, respectively. There is no conflict between these two applications,
but since both of them are using IIS resources, Trend Micro recommends installing
Control Manager on another computer to reduce the performance stress on the
server.
2-4
Planning and Implementing the Control Manager Deployment
Depending on your network topology, you may need to perform additional site-specific
tasks.
2-5
Trend Micro Control Manager™ Administrator’s Guide
CONSIDERATION DESCRIPTION
2-6
Planning and Implementing the Control Manager Deployment
estimates will be helpful. You will need this information to determine how many servers
you need to install.
2-7
Trend Micro Control Manager™ Administrator’s Guide
Note: Both OfficeScan and Control Manager use IIS to communicate with clients and
agents/child servers, respectively. There is no conflict between these two applications,
but since both of them are using IIS resources, Trend Micro recommends installing
Control Manager on another computer to reduce the performance stress on the
server.
Tip: Trend Micro recommends installing a parent server in the central office.
2-8
Planning and Implementing the Control Manager Deployment
• Remote office: A remote office is defined as any small professional office that is
part of a larger organization and has a WAN connection to the central office. If you
have managed products and child servers in a remote office that report to the server
in the central office, they may encounter difficulties connecting to the server.
Bandwidth limitations may prevent proper communication to and from the Control
Manager server.
The network bandwidth between your central office and remote office may be
sufficient for routine client-server communication, such as notifications for updated
configuration settings and status reporting, but insufficient for deployment and
other tasks.
Installation Flow
Setting up your Control Manager system is a multi-step process that involves the
following:
Step 1: Planning the Control Manager system installation (server distribution, network
traffic, data storage, and Web server considerations).
Step 2: Installing the Control Manager server. During installation of the Control
Manager server, provide a location for backup and restoration files.
Step 3: Installing Control Manager agents.
2-9
Trend Micro Control Manager™ Administrator’s Guide
MICROSOFT OTHERS
Piloting Control Manager at one location allows you to accomplish the following:
• Gain familiarity with Control Manager and managed products
• Develop or refine the company's network policies
A pilot deployment is useful to determine which configurations need improvements. It
gives the IT department or installation team a chance to rehearse and refine the
deployment process and test if your deployment plan meets your organization’s business
requirements.
A Control Manager test deployment consists of the following tasks:
2-10
Planning and Implementing the Control Manager Deployment
2-11
Trend Micro Control Manager™ Administrator’s Guide
2-12
Planning and Implementing the Control Manager Deployment
However, there are advantages to dividing control of your Control Manager network
among different servers (including parent and child servers for Advanced Edition users).
Based on the uniqueness of your network, you can decide the optimum number of
Control Manager servers.
Single-Server Topology
The single-server topology is suitable for small to medium, single-site enterprises. It
facilitates administration by a single administrator, but does not preclude the creation of
additional administrator accounts as required by your Administration plan.
However, this arrangement concentrates the burden of network traffic (agent polling,
data transfer, update deployment, and so on) on a single server, and the LAN that hosts
it. As your network grows, the impact on performance also increases.
Multiple-Server Topology
For larger enterprises with multiple sites, it may be necessary to set up regional Control
Manager servers to divide the network load.
For information on the traffic that a Control Manager network generates, see
Understanding Control Manager Network Traffic on page 2-13.
2-13
Trend Micro Control Manager™ Administrator’s Guide
Traffic Frequency
The following sources frequently generate traffic on a Control Manager network:
• Logs
• MCP polling and commands
• Trend Micro Management Infrastructure policies
Logs
Managed products send logs to Control Manager at different intervals – depending on
their individual log settings.
2-14
Planning and Implementing the Control Manager Deployment
Note: Before adjusting the interval to a number below 15 minutes, study your existing
network traffic to understand the impact of increased use of network bandwidth.
Network Protocols
Control Manager uses the UDP and TCP protocols for communication.
Log Traffic
Constant sources of network traffic in a Control Manager network are ‘product logs’,
logs that managed products regularly send to the Control Manager server.
TABLE 2-3. Control Manager Log Traffic
2-15
Trend Micro Control Manager™ Administrator’s Guide
2-16
Planning and Implementing the Control Manager Deployment
2-17
Trend Micro Control Manager™ Administrator’s Guide
Deploying Updates
Note: Control Manager can only update damage cleanup templates/engines after activating
Damage Cleanup Services.
Trend Micro strongly recommends regularly updating these components to help ensure
managed products can protect your network against the latest threats. For product
program updates, refer to the specific program’s documentation.
Deploying updates to managed products is a bandwidth intensive operation. If possible,
it is important to perform deployments when it will have the least impact on the
network.
You can stagger the deployment of component updates using Deployment Plans.
Furthermore, check that the network connection between your Control Manager server
and managed products can accommodate the updates. This will be a factor to consider
when deciding how many Control Manager servers your network needs.
2-18
Planning and Implementing the Control Manager Deployment
Note: Control Manager uses SQL and Windows authentication to access the SQL server.
Database Recommendations
If you install Control Manager and its SQL server on the same computer, configure the
SQL server to use a fixed memory size equivalent to two-thirds of the total memory on
the server. For example, if the server has 256MB of RAM, set 150MB as the fixed
memory size for the SQL server.
Install the Control Manager SQL database on the Control Manager server itself, or on a
separate server (for example, a dedicated SQL server). If Control Manager manages over
1,000 products, Trend Micro recommends using a dedicated SQL server.
Note: For instructions on how to manage SQL resources, and other sizing
recommendations, refer to Microsoft SQL documentation.
ODBC Drivers
Control Manager uses an ODBC driver to communicate with the SQL server. For most
instances, ODBC version 3.7 is sufficient. However, to use a Named Instance of SQL
2000, version 2000.80.194.00 is required.
The Control Manager setup program can verify the ODBC driver version if the SQL
server is installed on the Control Manager computer. For remote SQL servers, verify the
driver manually to ensure that Control Manager can access the database.
2-19
Trend Micro Control Manager™ Administrator’s Guide
Authentication
Control Manager uses mixed-mode authentication for accessing the SQL database
rather than Windows authentication.
2-20
Chapter 3
Installing Trend Micro Control Manager for the
First Time
This chapter guides you through installing Control Manager server. In addition to listing
the system requirements for the Control Manager server the chapter also contains
post-installation configuration information as well as instructions on how to register and
activate your software.
This chapter contains the following topics:
• System Requirements on page 3-2
• Installing a Control Manager Server on page 3-4
• Verifying Successful Installations on page 3-22
• Post-installation Configuration on page 3-24
• Registering and Activating Your Software on page 3-25
3-1
Trend Micro Control Manager™ Administrator’s Guide
System Requirements
Individual company networks are as individual as the companies themselves. Therefore,
different networks have different requirements depending on the level of complexity.
This section describes both minimum system requirements and recommended system
requirements, including general recommendations and recommendations based on the
size of networks.
Note: Control Manager 5.0 Advanced supports the following as child Control Manager
servers:
Please refer to the managed product documentation for detailed agent system
requirements.
TABLE 3-1. Control Manager server hardware minimum system requirements
3-2
Installing Trend Micro Control Manager for the First Time
• MDAC 2.8 SP1 or above for SQL Express (not included in the
Control Manager package)
3-3
Trend Micro Control Manager™ Administrator’s Guide
Please refer to the URL below to download the latest Control Manager 2.x agents:
http://www.trendmicro.com/en/products/management/tmcm/evaluate/
requirements.htm
General Recommendations
• Do not install Control Manager on a Primary Domain Controller (PDC), a Backup
Domain Controller (BDC), or on a server with any other Trend Micro product. This
can result in severe performance degradation.
• Physical memory is a system resource – all applications on the server share it. Scale
the memory with the processor; do not overpopulate with memory
3-4
Installing Trend Micro Control Manager for the First Time
Note: Control Manager uses both Windows authentrication and SQL authentrication to
access the SQL server.
• Determine the number of managed products that Control Manager will handle. If
an SQL server is not detected on your server, Control Manager will install SQL 2005
Express SP 2, which can only handle a limited number of connections
Installing Control Manager requires performing the following steps:
Step 1: Install all required components
Step 2: Specify the installation location
Step 3: Register and activate the product and services
Step 4: Specify Control Manager security and Web server settings
Step 5: Specify backup settings and configure database information
Step 6: Set up root account and configure notification settings
Tip: Trend Micro recommends upgrading to version 5.0 instead of doing a fresh
installation.
3-5
Trend Micro Control Manager™ Administrator’s Guide
3-6
Installing Trend Micro Control Manager for the First Time
The installation program checks your system for existing components. Before
proceeding with the installation, close all instances of the Microsoft Management
Console. For more information about migration, see Planning Control Manager
Agent Migration on page 4-11.
3-7
Trend Micro Control Manager™ Administrator’s Guide
3-8
Installing Trend Micro Control Manager for the First Time
If you do not agree with the terms of the license, click No; the installation will
discontinue. Otherwise, click Yes. A summary of detected components appears.
3-9
Trend Micro Control Manager™ Administrator’s Guide
Note: The setup program installs files related to the Control Manager communication,
(the Trend Micro Management Infrastructure and MCP) in predetermined
folders in the Program files folder.
3-10
Installing Trend Micro Control Manager for the First Time
FIGURE 3-4. Enter the Activation Code to activate Control Manager and
services
2. Type the Activation Code for Control Manager and any other additional purchased
services (you can also activate optional services from the Control Manager console).
To use the full functionality of Control Manager 5.0 and other services (Outbreak
Prevention Services), you need to obtain Activation Codes and activate the software
or services. Included with the software is a Registration Key that you use to register
your software online to the Trend Micro Online Registration Web site and obtain an
Activation Code.
3-11
Trend Micro Control Manager™ Administrator’s Guide
4. Click Yes to participate in the World Virus Tracking Program. You can add your
data to the Trend Micro Virus Map by choosing to participate in the World Virus
Tracking Program. When you choose to participate, Trend Micro Control Manager
will only send anonymous information through HTTP, and you can stop
participating any time by choosing No and updating your status on the Control
Manager management console.
3-12
Installing Trend Micro Control Manager for the First Time
2. From the Security level list, select the security level for Control Manager
communication with agents. The options are as follows:
• High: All communication between Control Manager and managed products
use 128-bit encryption with athentication. This ensures the most secure
communication between Control Manager and managed products.
• Medium: If supported, all communication between Control Manager and
managed products use 128-bit encryption. This is the default setting when
installing Control Manager.
• Low: All communication between Control Manager and managed products use
40-bit encryption. This is the least secure communication method between
Control Manager and other products.
3. Select a host address for agents to communicate with Control Manager:
3-13
Trend Micro Control Manager™ Administrator’s Guide
Tip: Trend Micro recommends installing Control Manager using a host name.
Installing using an IP address can cause issues if the IP address of the Control
Manager server requires changing. Control Manager does not support changing
the installation IP address. This results in an administrator having to reinstall
Control Manager if the server’s IP address must change. Installing using a host
name avoids the issue.
3-14
Installing Trend Micro Control Manager for the First Time
5. From the Web site list, select the Web site to access Control Manager.
6. From the IP address list, select the IP address or FQDN/host name you want to
use for the Control Manager Management Console. This setting defines how the
Control Manager communication system identifies your Control Manager server.
The setup program attempts to detect both the server's fully qualified domain name
(FQDN) and IP address and displays them in the appropriate field.
If your server has more than one network interface card, or if you assign your server
more than one FQDN, the names and IP addresses appear here. Choose the most
appropriate address or name by selecting the corresponding option or item in the
list.
If you use the host name or FQDN to identify your server, make sure that this name
can be resolved on the product computers; otherwise the products cannot
communicate with the Control Manager server.
7. From the Web access security level list, select the security level for Control Manager
communication. The options are as follows:
3-15
Trend Micro Control Manager™ Administrator’s Guide
3-16
Installing Trend Micro Control Manager for the First Time
2. Specify the location of the Control Manager backup and authentication files (for
more information see the Control Manager files that should be backed up on page
4-7). Click Browse to specify an alternate location.
3. Click Next. The Setup Control Manager Database screen appears.
Tip: The Microsoft SQL Express is suitable only for a small number of connections.
Trend Micro recommends using an SQL server for large Control Manager
networks.
• SQL Server: the setup program automatically selects this option if the program
detects an SQL server on the server. Provide the following information:
3-17
Trend Micro Control Manager™ Administrator’s Guide
• SQL Server (\Instance): this server hosts the SQL server that you want
to use for Control Manager. If an SQL server is present on your server, the
setup program automatically selects it.
To specify an alternative server, identify it using its FQDN, IP address, or
NetBIOS name.
If more than one instance of SQL server exists on a host server (this can
be either the same server where you are installing Control Manager, or
another server), you must specify the instance. For example:
your_sql_server.com\instance
• SQL Server Authentication: provide credentials to access the SQL
server. By default, the User name is sa.
WARNING! For security reasons, do not use an SQL database that is not password
protected.
5. Under Trend Micro Control Manager database, provide a name for the Control
Manager database. The default name is db_ControlManager.
6. Click Next to create the required database. If the setup program detects an existing
Control Manager database you have the following options:
• Append new records to existing database: the Control Manager you install
retains the same settings, accounts, and Product Directory entities as the
previous server. In addition, Control Manager retains the root account of the
previous installation - you cannot create a new root account.
Note: When installing Control Manager 5.0, you cannot select Append new records
to existing database for previous Control Manager database versions.
• Delete existing records, and create a new database: the existing database is
deleted, and another, using the same name, is created
• Create a new database with a new name: you are returned to the previous
screen to allow you to change your Control Manager database name
Note: If you append records to the current database, you will not be able to change the
root account. The Root account screen appears.
3-18
Installing Trend Micro Control Manager for the First Time
FIGURE 3-10. Enter information for the Control Manager root account
3-19
Trend Micro Control Manager™ Administrator’s Guide
4. Define the routes for incoming and outgoing messages or requests. These settings
allow you to adapt Control Manager to your company's existing security systems.
Select the appropriate route.
Note: Message routing settings are only set during installation. Proxy configurations
made here are not related to the proxy settings used for Internet
connectivity–though the same proxy settings are used by default.
3-20
Installing Trend Micro Control Manager for the First Time
3-21
Trend Micro Control Manager™ Administrator’s Guide
3-22
Installing Trend Micro Control Manager for the First Time
3-23
Trend Micro Control Manager™ Administrator’s Guide
Post-installation Configuration
After successfully installing Control Manager, Trend Micro recommends you perform
the following post-installation configuration tasks.
1. Register and activate Control Manager
2. Configure user accounts and account types
3. Download the latest components
4. Set notifications
3-24
Installing Trend Micro Control Manager for the First Time
Administration > Settings > Proxy Settings). For more information, see
Downloading and Deploying New Components on page 5-35.
Setting Notifications
After installation, configure the events that will trigger notifications to monitor
significant virus/malware attacks and related security activities. Besides specifying
notification recipients, choose notification channels and test them to make sure they
work as expected (on the Web console, click Administration > Event Center). For
more information, see Using Event Center on page 6-8
Note: After activating Control Manager, log off and then log on for changes to take effect.
3-25
Trend Micro Control Manager™ Administrator’s Guide
3-26
Installing Trend Micro Control Manager for the First Time
3-27
Trend Micro Control Manager™ Administrator’s Guide
3-28
Chapter 4
Upgrading Servers or Migrating Agents to
Control Manager 5.0
Upgrading existing Control Manager 3.0 or 3.5 servers to Control Manager 5.0 requires
careful consideration and detailed planning. Likewise, the same is true when migrating
MCP and older Control Manager agents to a Control Manager 5.0 server.
This chapter contains the following topics:
• Upgrading to Control Manager 5.0 on page 4-2
• Planning Control Manager Agent Migration on page 4-11
• Migrating the Control Manager Database on page 4-17
4-1
Trend Micro Control Manager™ Administrator’s Guide
STANDARD ADVANCED
CAPABILITY EDITION EDITION
WARNING! Always back up the existing server before performing the upgrade.
4-2
Upgrading Servers or Migrating Agents to Control Manager 5.0
Note: See Table 4-3, “Control Manager files that should be backed up,” on page 4-7 for
steps 2 through 4.
To upgrade by backing up the entire operating system of the server and the
Control Manager database:
1. Backup the operating system of existing Control Manager 3.5 server.
2. Backup the existing Control Manager 3.5 database.
3. Install Windows Installer 3.1 (If necessary)
4. Install MDAC 2.8 SP1 (If necessary)
5. Install Control Manager 5.0 over Control Manager 3.5.
4-3
Trend Micro Control Manager™ Administrator’s Guide
server. See Planning Control Manager Agent Migration on page 4-11 for more
information about migrating agents.
To migrate a Control Manager 3.5 server to a fresh installation of Control
Manager 5.0:
1. Backup the existing Control Manager 3.5 database.
2. Perform a fresh installation of Control Manager 5.0 on a different computer.
3. Use the Agent Migration Tool to migrate entities from the Control Manager 3.5
server to the Control Manager 5.0 server.
Note: The Agent Migration Tool only supports migrating managed products. The Agent
Migration Tool does not support migrating logs, reports, or the Product Directory
structure from the previous server.
PARENT CONTROL
VARIABLE MANAGER SETTINGS DESCRIPTION
SCREEN
4-4
Upgrading Servers or Migrating Agents to Control Manager 5.0
PARENT CONTROL
VARIABLE MANAGER SETTINGS DESCRIPTION
SCREEN
4-5
Trend Micro Control Manager™ Administrator’s Guide
[Proxy]
Enable=
Type=
Host=
Port=
ProxyServerUser=
ProxyServerPassword=
4. Insert a CascadingUpgrade.ini file in the Control Manager folder of each child
Control Manager server.
5. Upgrade the parent Control Manager server.
6. Upgrade all child Control Manager servers.
4-6
Upgrading Servers or Migrating Agents to Control Manager 5.0
CONTROL
MANAGER 3.0/3.5 LOCATION
INFORMATION
Database Use the SQL Enterprise Manager or osql to back up the Control
Manager database. Refer to the Control Manager Back up
db_ControlManager using SQL Enterprise Manager / osql online
help topics for detailed steps.
Authentication infor-
mation
Configuration files
\Program Files\Trend Micro\Control Man-
ager\Settings\DMregisterinfo.xml
GUID information
GUID value in \Program files\Trend
Micro\COMMON\TMI\TMI.cfg
4-7
Trend Micro Control Manager™ Administrator’s Guide
CONTROL
MANAGER 3.0/3.5 LOCATION
INFORMATION
ActiveUpdate files
\Program Files\Trend Micro\Control Man-
ager\webui\download\Activeupdate
4-8
Upgrading Servers or Migrating Agents to Control Manager 5.0
CONTROL
MANAGER 3.0/3.5 LOCATION
INFORMATION
HKEY_LOCAL_MACHINE\SOFTWARE\TrendMi-
cro\TVCS\
HKEY_LOCAL_MACHINE\SOFTWARE\TrendMi-
cro\TMI\
HKEY_LOCAL_MACHINE\SOFTWARE\TrendMi-
cro\CommonCGI
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Win-
dows\CurrentVersion\Uninstall\TMCM
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Win-
dows\CurrentVersion\Uninstall\TMI
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Win-
dows\CurrentVersion\Uninstall\MSDE
Control Manager
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDE
HKEY_LOCAL_MACHINE\SOFTWARE\Micro-
soft\MSSQLServer
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControl-
Set\Services\TMCM
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControl-
Set\Services\TrendMicro_NTP
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControl-
Set\Services\TrendMicro Infrastructure\
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControl-
Set\Services\TrendCCGI
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControl-
Set\Services\MSSQLServer
4-9
Trend Micro Control Manager™ Administrator’s Guide
4-10
Upgrading Servers or Migrating Agents to Control Manager 5.0
Control Manager 3.0 SP 6 Registers Control Manager 2.5x agents to Control Man-
with Control Manager 2.5x ager 5.0 server; Control Manager agents maintain their
agents original Product Directory structure
4-11
Trend Micro Control Manager™ Administrator’s Guide
Control Manager 3.5/5.0 Registers MCP agents to Control Manager 5.0 server;
MCP agents maintain their original Product Directory
with MCP agents structure
Trend Micro recommends rapid upgrade for migrating agents in a laboratory setting
or in relatively small networks, preferably during test deployments (see Testing
Control Manager at One Location on page 2-10). However, since you cannot stop
the migration once it starts, this method works best for smaller deployments, since
the degree of difficulty increases with the size of the network.
• Phased upgrade
Trend Micro recommends a phased upgrade for large, single-server Control
Manager 3.0/3.5 networks. This is essential for multiple-server networks. This
method offers a more structured approach to migrating your system, and follows
these guidelines:
• Start migration on systems with the least impact on the existing network, and
then proceed to the systems with progressively greater impact
• Upgrade the old network in well-planned stages, rather than all at once
This will simplify any troubleshooting that may be required.
Phased upgrade involves the following steps:
4-12
Upgrading Servers or Migrating Agents to Control Manager 5.0
a. Install Control Manager 5.0 on a server that does not have any previous
Control Manager version installed (preferably without any managed products).
b. Run the AgentMigrateTool.exe tool on the Control Manager 5.0 server.
Use the Control Manager agent installation together with the Using Agent Migration
Tool (AgentMigrateTool.exe) to plan the upgrade of agents on existing Control Manager
networks. The Agent Migration tool can generate a list of servers with Control Manager
agents. Doing so eliminates the need to manually select the agent servers.
You can use both Rapid and Phased migration in this instance. See Upgrading to
Control Manager 5.0 on page 4-2.
• Consolidation of different servers/agents:
4-13
Trend Micro Control Manager™ Administrator’s Guide
4-14
Upgrading Servers or Migrating Agents to Control Manager 5.0
4-15
Trend Micro Control Manager™ Administrator’s Guide
2. Double-click AgentMigrateTool.exe.
Note: Remember to start the destination Control Manager server's Remote Registry service
or agent migration will not be successful.
Tip: Trend Micro recommends enabling the Retain tree structure and Migrate
logs options when migrating all agents from the source server.
Migrating managed products that use Control Manager 2.1 agents prevents the
destination server from querying the old logs of the migrated managed product.
Trend Micro recommends upgrading to Control Manager 2.5 agents before
running AgentMigrateTool.exe.
4-16
Upgrading Servers or Migrating Agents to Control Manager 5.0
8. Click Migrate.
AgentMigrateTool.exe migrates the agent(s) listed in the Destination list.
4-17
Trend Micro Control Manager™ Administrator’s Guide
2. Copy the Control Manager database from the old SQL Server to the new SQL
Server.
4-18
Upgrading Servers or Migrating Agents to Control Manager 5.0
4-19
Trend Micro Control Manager™ Administrator’s Guide
4-20
Chapter 5
Getting Started with Control Manager
5-1
Trend Micro Control Manager™ Administrator’s Guide
MAIN MENU
5-2
Getting Started with Control Manager
MAIN MENU
This means that when user A is arranging managed products using the Directory
Manager, user B, who is also logged on to the management console cannot access the
Directory Manager nor the User Manager option.
5-3
Trend Micro Control Manager™ Administrator’s Guide
If you attempt to access a locked option, the locked option information screen appears.
It displays the following information:
• User ID
• Date and time the user logged on to the Control Manager server
• IP address of the computer used to access Control Manager management console
To verify if the function is still in use, periodically click Reload.
Note: An Administrator account can unlock a locked function by forcibly logging out the
user who is using it. To do this, click Unlock in the locked option information screen.
Whenever the logged out user attempts to use the previously locked function, a Log on
session expired dialog box appears. Clicking OK opens the management console Log
On screen.
5-4
Getting Started with Control Manager
Upon opening the console, the initial screen will show the status summary for your
whole Control Manager system. This is identical to the status summary generated from
the Product Directory. User rights determine the Control Manager functions you can
access.
Note: You can only access one instance of the management console. Control Manager does
not allow the same Control Manager management console in more than one browser.
5-5
Trend Micro Control Manager™ Administrator’s Guide
6. Click OK to apply the Default Web Site server certificate and go back to the Default
Web Site list.
7. Select the Control Manager virtual directory from the Default Web Site list and
then right-click Properties.
8. Select Directory Security tab and then click Edit under Secure communications.
The Secure Communications window appears.
a. Select Require secure channel (SSL) and Require 128-bit encryption.
b. Click OK to close the Secure Communications window.
9. Click OK to apply changes and go back to the Default Web Site list.
The next time you access the management console using HTTPS, the following message
appears:
You must view this page over a secure channel
Where:
{host name} is the Control Manager server's fully qualified domain name
(FQDN), IP address, or server name.
443 is the port allotted during an HTTPS session.
When you access a secure Control Manager site, it automatically sends you its certificate,
and Internet Explorer displays a lock icon ( ) on the status bar.
5-6
Getting Started with Control Manager
SECTION DESCRIPTION
My Account The My Account screen contains all the account information Control
Manager has for a specific user.
User Accounts The User Accounts screen displays all Control Manager users. The
screen also provides functions allowing you to create and maintain
Control Manager user accounts.
User Types The Account Types screen displays all Control Manager user roles.
The screen also provides functions allowing you to create and main-
tain Control Manager user roles.
User roles define which areas of the Control Manager Web console a
user can access.
Tip: Assign users with different access rights and privileges to permit the delegation of
certain management tasks without compromising security.
5-7
Trend Micro Control Manager™ Administrator’s Guide
Tip: Trend Micro suggests configuring account types and user account settings in the
following order:
2. Specify which menu items the user can access. (If the default account types
are not sufficient, see To add an account type: on page 5-11 or To edit an
account type: on page 5-13)
3. Specify the account type for the user's account. (Step 7 of the To edit a
user account: on page 5-21.)
The following table shows all the features that each default account can access.
MENU ITEM
HOME z z z
5-8
Getting Started with Control Manager
ADMINISTRATOR
POWER USER
OPERATOR
MENU ITEM
PRODUCTS z z z
SERVICES z
New Ad Hoc Query z z
Saved Ad Hoc Queries z z
My Reports z z z
One-time Reports z z
LOGS/REPORTS
Scheduled Reports z z
Settings Log Aggregation z
Log Maintenance z
Report Maintenance z z
Manual Download z z
Scheduled Download z z
Component List z z
UPDATES
Deployment Plan z z
Schedule Download
Exceptions
z z
Settings
Update / Deployment z z
5-9
Trend Micro Control Manager™ Administrator’s Guide
ADMINISTRATOR
POWER USER
OPERATOR
MENU ITEM
My Account z z z
Account Management User Accounts z
User Groups z z
Account Types z
Command Tracking z z
Event Center z
License Management Managed Product z
Control Manager z
ADMINISTRATION
Settings Agent
Communication
z
Control Manager
Parent Setting
z
Event Center Settings z
Heartbeat Settings z
Proxy Settings z
Timeout Settings z
Add/Remove Product
Agents
z z z
Tools z
World Virus Tracking z
5-10
Getting Started with Control Manager
Note: Control Manager accounts log on to Control Manager only, and not the entire
network. Control Manager user accounts are not the same as network domain
accounts.
5-11
Trend Micro Control Manager™ Administrator’s Guide
4. In the working area, click Add. The Add Account Type screen appears.
5-12
Getting Started with Control Manager
Tip: The description appears in the Account Type list. Providing a meaningful description
can help administrators quickly identify an account type if the account type name
cannot fully convey which users the account type proves most useful.
7. Select the accessible menu items for the account type. The following menu items are
accessible to every account type: Home, My Reports, and My Account.
8. Click Save. The Account Type screen appears and the new account type appears in
the Account Type list.
5-13
Trend Micro Control Manager™ Administrator’s Guide
4. Click the account type to edit from the Name column. The Account Type screen
appears.
Tip: When administrators specify which products a user can access, the administrator is
also specifying what information a user can access from Control Manager. This
applies to component information, logs, product summary information, security
information, and information available for reports and queries.
Example: Bob and Jane are OfficeScan administrators. Both have identical account
type permissions (they have access to the same menu items in the Web console).
However, Jane oversees operation for all OfficeScan servers, while Bob on the other
5-14
Getting Started with Control Manager
hand only oversees operation for OfficeScan servers protecting desktops for the
Marketing department. The information that they can view on the Web console will
be very different. Bob logs on and only sees information that is applicable to the
OfficeScan servers his Control Manager user account allows (the OfficeScan servers
for the Marketing department). When Jane logs on, she sees information for all
OfficeScan servers because her Control Manager user account grants her access to all
OfficeScan servers registered to Control Manager.
SECTION DESCRIPTION
Execute This right permits the user to run commands on managed products in
assigned folders. The following are associated with this privilege.
• Start Scan Now
• Deploy pattern files/cleanup templates
• Enable Real-time Scan
• Deploy program files
• Deploy engines
• Deploy license profiles
Configure This gives the user access to the configuration consoles of the man-
aged products in the assigned folders. Users with this right can see
Configure <managed product> and similar product-specific controls
(for example, OfficeScan password configuration features) on their
menus.
Edit Directory This permits the user to modify the organization of the managed prod-
ucts/directories the user can access.
Note: The options that actually appear also depend on the product’s profile. For example, if
a product does not have a scanning function, such as eManager, then the Scan Now
control does not appear in the Product Tree Tasks menu.
5-15
Trend Micro Control Manager™ Administrator’s Guide
Tip: Trend Micro suggests configuring account types and user account settings in the
following order:
2. Specify which menu items the user can access. (If the default account types
are not sufficient, see To add an account type: on page 5-11 or To edit an
account type: on page 5-13)
3. Specify the account type for the user's account. (Step 7 of the To edit a
user account: on page 5-21.)
When adding a user account you need to provide information to identify the user, assign
an account type, and set folder access rights.
Note: Active Directory users cannot have their accounts disabled from Control Manager. To
disable an Active Directory user you must disable the account from the Active
Directory server.
5-16
Getting Started with Control Manager
4. In the working area, click Add. The Add User Account Step 1: User Information
screen appears.
5-17
Trend Micro Control Manager™ Administrator’s Guide
5-18
Getting Started with Control Manager
• Email address: The email address to which the user has notifications
delivered.
• Mobile phone number: The cell phone to which the user has
notifications delivered.
• Pager number: The pager to which the user has notifications delivered.
(Precede the pager number with a 9 and a comma "," [each comma causes
a 2 second pause])
• MSN Messenger address: The instant messenger address to which the
user has notifications delivered.
Add an Active Directory user:
Note: Active Directory users cannot have their accounts disabled from Control
Manager.
To disable an Active Directory user you must disable the account from the
Active Directory server.
7. Click Next. The Add User Account Step 2: Access Control screen appears.
5-19
Trend Micro Control Manager™ Administrator’s Guide
Assigning access to a folder allows users access to all its sub-folders and
managed products.
10. Select the rights to assign the to the user. These rights determine the actions the user
can perform on managed products.
5-20
Getting Started with Control Manager
Note: Privileges granted to an account cannot exceed those of the grantor. That means
you cannot assign a user access rights that are greater than your own. In addition,
if you reduce an account's rights, you also reduce all of its sub-accounts.
5-21
Trend Micro Control Manager™ Administrator’s Guide
5-22
Getting Started with Control Manager
address. However, they will only receive notifications if the group has been added to the
recipient list for specific events.
To add a user group:
1. Mouseover Administration on the main menu. A drop-down menu appears.
2. Mouseover Account Management from the drop-down menu. A sub-menu
appears.
3. Click User Groups from the menu. The User Groups screen appears.
5-23
Trend Micro Control Manager™ Administrator’s Guide
5-24
Getting Started with Control Manager
8. Click Save.
9. Click OK.
5-25
Trend Micro Control Manager™ Administrator’s Guide
Advanced Search Click this button to specify search criteria to perform a search for one
or more managed products.
If you select a managed product, you can only query logs for that spe-
cific product. Otherwise, you can query all the products available in
the directory.
Directory Manage- Click this button to open the Directory Management screen. From the
ment screen, move entities/directories (by dragging and dropping them) or
create new directories.
BUTTONS DESCRIPTION
Search Click this button, after typing a managed product's name, to perform a
search for the specified managed product.
5-26
Getting Started with Control Manager
Folder Click this button, after selecting a directory, to obtain status summaries
about the managed products and the managed product clients found
in the directory.
Note: Managed products belonging to child Control Manager servers cannot have tasks
applied to them by the parent Control Manager server.
5-27
Trend Micro Control Manager™ Administrator’s Guide
STRUCTURE DESCRIPTION
5-28
Getting Started with Control Manager
segment grants access to the entire Directory. Granting access to a specific managed
product only grants access to that specific product.
• Deployment planning
Control Manager deploys update components (for example, virus pattern files, scan
engines, anti-spam rules, program updates) to products based on Deployment Plans.
These plans deploy to Product Directory folders, rather than individual products. A
well-structured directory therefore simplifies the designation of recipients.
• Outbreak Prevention Policy (OPP) and Damage Control Template (DCT)
deployments
OPP and DCT deployments depend on Deployment Plans for efficient distribution
of Outbreak Prevention Policy and cleanup tasks.
A sample Product Directory appears below:
5-29
Trend Micro Control Manager™ Administrator’s Guide
Arrange the Product Directory using the Directory Manager. Use descriptive folder
names to group your managed products according to their protection type or the
Control Manager network administration model. For example, grant access rights to
mail administrators to configure the Mail folder.
STRUCTURE DESCRIPTION
5-30
Getting Started with Control Manager
The following table lists the differences between parent and child servers:
TABLE 5-10. Parent and child server feature comparison
AVAILABLE IN AVAILABLE IN
FEATURE PARENT CHILD
Note: A parent server cannot register itself to another parent server. In addition, both
parent and child servers cannot perform dual roles (become a parent and child server
at the same time).
Tip: Trend Micro recommends the management of no more than 200 child servers and
9,600 managed products for one Control Manager parent server.
5-31
Trend Micro Control Manager™ Administrator’s Guide
5-32
Getting Started with Control Manager
5-33
Trend Micro Control Manager™ Administrator’s Guide
c. If the IIS Web server of Control Manager requires authentication, type the user
name and password.
6. Configure MCP Proxy Settings:
a. If you will use a proxy server to connect to the Control Manager server, select
Use a proxy server to communicate with the Control Manager server and
complete the following settings:
b. Select the protocol the proxy uses:
• HTTP
• SOCKS 4
• SOCKS 5
c. Type the proxy server's FQDN or IP address in the Server name or IP
address field.
d. Type the proxy server port number in the Port field.
e. If the proxy server requires user authentication type the user name and
password.
7. Configure Two-way Communication Port Forwarding:
a. If you will use port forwarding with MCP agents, select Enable two-way
communication port forwarding and complete the following settings:
b. Type the forwarding IP address in the IP address field.
c. Type the port number in the Port field.
8. To verify the child server can connect to the parent Control Manager server, click
Test Connection.
9. Click Register to connect to the parent Control Manager server.
5-34
Getting Started with Control Manager
5-35
Trend Micro Control Manager™ Administrator’s Guide
The Component List screen presents a full list of all components Control Manager has
available for managed products. The list also matches components with managed
products that use the component. Click Updates > Component List to open the
Component List screen.
The Control Manager server only retains the latest component version. You can trace a
component's version history by viewing <root>:\Program Files\Trend Micro\Control
Manager\AU_log\TmuDump.txt entries. TmuDump.txt generates when ActiveUpdate
debugging is enabled.
Tip: To minimize Control Manager network traffic, disable the download of components
that have no corresponding managed products or services. When you register
5-36
Getting Started with Control Manager
managed products or activate services at a later time, be sure to configure the manual
or scheduled download of applicable components.
Tip: Ignore steps 1 and 2 if you have already configured your deployment plan and
configured your proxy settings.
5-37
Trend Micro Control Manager™ Administrator’s Guide
4. On the Add New Plan screen, type a deployment plan name in the Name field.
5. Click Add to provide deployment plan details. The Add New Schedule screen
appears.
5-38
Getting Started with Control Manager
6. On the Add New Schedule screen, choose a deployment time schedule by selecting
one the following options:
• Delay - after Control Manager downloads the update components, Control
Manager delays the deployment according to the interval you specify
Use the menus to indicate the duration, in terms of hours and minutes.
• Start at - Performs the deployment at a specific time
Use the menus to designate the time in hours and minutes.
7. Select the Product Directory folder to which the schedule will apply. Control
Manager assigns the schedule to all the products under the selected folder.
8. Click OK.
9. Click Save to apply the new deployment plan.
Step 2: Configure your proxy settings, if you use a proxy server
1. Mouseover Administration. A drop-down menu appears.
2. Mouseover Settings. A sub-menu appears.
3. Click Proxy Settings. The Connection Settings screen appears.
5-39
Trend Micro Control Manager™ Administrator’s Guide
4. Select Use a proxy server for pattern, engine, and license updates.
5. Select the protocol:
• HTTP
• SOCKS 4
• SOCKS 5
6. Type the host name or IP address of the server in the Server name or IP address
field.
7. Type a port number in the Port field.
8. Type a log on name and password if your server requires authentication.
9. Click Save.
Step 3: Select the components to update
1. Mouseover Updates on the main menu. A drop-down menu appears.
2. Click Manual Download. The Manual Download screen appears.
5-40
Getting Started with Control Manager
5-41
Trend Micro Control Manager™ Administrator’s Guide
Tip: Click Save before clicking Edit or Deployment Plan on this screen. If you do not
click Save your settings will be lost.
3. If you use an HTTP proxy server on the network (that is, the Control Manager
server does not have direct Internet access), click Edit to configure the proxy
settings on the Connection Settings screen.
Step 5: Configure the automatic deployment settings
1. Select when to deploy downloaded components from the Schedule area. The
options are:
• Do not deploy: Components download to Control Manager, but do not
deploy to managed products. Use this option under the following conditions:
• Deploying to the managed products individually
• Testing the updated components before deployment
• Deploy immediately: Components download to Control Manager, then
deploy to managed products
• Based on deployment plan: Components download to Control Manager, but
deploy to managed products based on the schedule you select
• When new updates found: Components download to Control Manager when
new components are available from the update source, but deploy to managed
products based on the schedule you select
Note: Click Save before clicking Edit or Deployment Plan on this screen. If you do not
click Save your settings will be lost.
5-42
Getting Started with Control Manager
2. Select a deployment plan after components download to Control Manager, from the
Deployment plan list.
3. Click Save.
Step 6: Complete the manual download
1. Click Download Now and then click OK to confirm. The download response
screen appears. The progress bar displays the download status.
2. Click the Command Details to view details from the Command Details screen.
3. Click OK to return to the Manual Download screen.
5-43
Trend Micro Control Manager™ Administrator’s Guide
c. Select Retry frequency and specify the number or retries and duration
between retries for downloading components.
Tip: Click Save before clicking Edit or Deployment Plan on this screen. If you do not
click Save your settings will be lost.
d. If you use an HTTP proxy server on the network (that is, the Control Manager
server does not have direct Internet access), click Edit to configure the proxy
settings on the Connection Settings screen.
3. Click Save.
Tip: Click Save before clicking Edit or Deployment Plan on this screen. If you do not
click Save your settings will be lost.
5-44
Getting Started with Control Manager
4. Select a deployment plan after components download to Control Manager, from the
Deployment plan: list.
5. Click Save.
Note: The settings in Automatic Deployment Settings only apply to components used by
managed products.
Note: Daily scheduled exceptions apply to the selected days, while hourly scheduled
exceptions apply to every day of the week.
Example: The administrator decides that they do not want Control Manager to
download components on weekends or after working hours throughout the week. The
administrator enables Daily Schedule Exception and selects Saturday and Sunday.
The administrator then enables Hourly Schedule Exception and specifies the hours
of 00:00 to 9:00 and 18:00 to 24:00.
5-45
Trend Micro Control Manager™ Administrator’s Guide
4. Do the following:
• To schedule a daily exception, under Daily schedule exceptions, select the check
box of the day(s) to prevent downloads, and then select the Do not download
updates on the specified day(s) check box. Every week, Control Manager
blocks all downloads for the selected day(s).
• To schedule an hourly exception, under Hourly schedule exceptions, select the
hour(s) to prevent downloads, and then select the Do not download updates
on the specified hour(s) check box. Every day, Control Manager blocks all
downloads for the selected hours.
5. Click Save.
5-46
Getting Started with Control Manager
5-47
Trend Micro Control Manager™ Administrator’s Guide
4. On the Add New Plan screen, type a deployment plan name in the Name field.
5. Click Add to provide deployment plan details. The Add New Schedule screen
appears.
5-48
Getting Started with Control Manager
6. On the Add New Schedule screen, choose a deployment time schedule by selecting
one the following options:
• Delay - after Control Manager downloads the update components, Control
Manager delays the deployment according to the interval you specify
Use the menus to indicate the duration, in terms of hours and minutes.
• Start at - Performs the deployment at a specific time
Use the menus to designate the time in hours and minutes.
7. Select the Product Directory folder to which the schedule will apply. Control
Manager assigns the schedule to all the products under the selected folder.
8. Click OK.
9. Click Save to apply the new deployment plan.
Step 2: Configure your proxy settings, if you use a proxy server
1. Mouseover Administration. A drop down menu appears.
2. Mouseover Settings. A sub-menu appears.
3. Click Proxy Settings. The Connection Settings screen appears.
5-49
Trend Micro Control Manager™ Administrator’s Guide
4. Select Use a proxy server for pattern, engine, and license updates.
5. Select the protocol:
• HTTP
• SOCKS 4
• SOCKS 5
6. Type the host name or IP address of the server in the Server name or IP address
field.
7. Type a port number for the proxy server in the Port field.
8. Type a logon name and password if your server requires authentication.
9. Click Save.
Step 3: Select the components to update
1. Mouseover Updates on the main menu. A drop-down menu appears.
2. Click Scheduled Download. The Scheduled Download screen appears.
5-50
Getting Started with Control Manager
5-51
Trend Micro Control Manager™ Administrator’s Guide
5-52
Getting Started with Control Manager
Tip: Click Save before clicking Edit or Deployment Plan on this screen. If you do not
click Save your settings will be lost.
3. If you use an HTTP proxy server on the network (that is, the Control Manager
server does not have direct Internet access), click Edit to configure the proxy
settings on the Connection Settings screen.
Step 6: Configure the automatic deployment settings
1. Select when to deploy downloaded components from the Schedule area. The
options are:
• Do not deploy: Components download to Control Manager, but do not
deploy to managed products. Use this option under the following conditions:
• Deploying to the managed products individually
• Testing the updated components before deployment
• Deploy immediately: Components download to Control Manager, then
deploy to managed products
• Based on deployment plan: Components download to Control Manager, but
deploy to managed products based on the schedule you select
• When new updates found: Components download to Control Manager, and
deploy to managed products when new components are available from the
update source
Tip: Click Save before clicking Edit or Deployment Plan on this screen. If you do not
click Save your settings will be lost.
5-53
Trend Micro Control Manager™ Administrator’s Guide
2. Select a deployment plan after components download to Control Manager, from the
Deployment plan list.
3. Click Save.
Step 7: Enable the schedule and save settings
1. Click the status button in the Enable column.
2. Click Save.
5-54
Getting Started with Control Manager
Note: Click Save before clicking Edit or Deployment Plan on this screen. If you do not
click Save your settings will be lost.
5-55
Trend Micro Control Manager™ Administrator’s Guide
6. If you are using a proxy server on the network (that is, the Control Manager server
does not have direct Internet access), click Edit to configure the proxy settings from
the Connection Settings screen.
7. Click Save.
5-56
Getting Started with Control Manager
Note: Click Save before clicking Edit or Deployment Plan on this screen. If you do not
click Save your settings will be lost.
5. Select a deployment plan after components download to Control Manager, from the
Deployment plan: list.
6. Click Save.
Note: The settings in Automatic Deployment Settings only apply to components used by
managed products.
5-57
Trend Micro Control Manager™ Administrator’s Guide
By default, these plans deploy updates to all products in the Product Directory
immediately.
Select or create plans from the Manual and Scheduled download pages. Customize these
plans, or create new ones, as required by your network. For example, create Deployment
Plans according to the nature of the outbreak:
• Email-borne virus
• File sharing virus
Deploying updates to the Product Directory is separate from the download process.
Control Manager downloads the components and performs the deployment plan
according to manual or scheduled download settings.
When creating or implementing a deployment plan, consider the following points:
• Assign deployment schedules to folders, not specific products.
Planning the contents of the Product Directory folders, therefore, becomes very
important.
• You can only include one folder for each deployment plan schedule.
However, you can specify more than one schedule per deployment plan.
• Control Manager bases the deployment plan delays on the completion time of the
download, and are independent of each other.
For example, if you have three folders that you want to update at five minute
intervals, you can assign the first folder a delay of 5 minutes, and then set delays of
10 and 15 minutes for the two remaining folders.
1. Mouseover Administration on the main menu. A drop down menu appears.
2. Click Deployment Plan from the drop down menu. The Deployment Plan screen
appears.
5-58
Getting Started with Control Manager
4. On the Add New Plan screen, type a deployment plan name in the Name field.
5. Click Add to provide deployment plan details. The Add New Schedule screen
appears.
5-59
Trend Micro Control Manager™ Administrator’s Guide
6. On the Add New Schedule screen, choose a deployment time schedule by selecting
one the following options:
• Delay: After Control Manager downloads the update components, Control
Manager delays the deployment according to the interval you specify
Use the menus to indicate the duration, in terms of hours and minutes.
• Start at: Performs the deployment at a specific time
Use the menus to designate the time in hours and minutes.
7. Select the Product Directory folder to which the schedule will apply. Control
Manager assigns the schedule to all the products under the selected folder.
8. Click OK.
9. Click Save to apply the new deployment plan.
5-60
Getting Started with Control Manager
4. Select Use a proxy server for pattern, engine, and license updates.
5. Select the protocol:
• HTTP
• SOCKS 4
• SOCKS 5
6. Type the host name or IP address of the server in the Server name or IP address
field.
7. Type a port number in the Port field.
8. Type a log on name and password if your server requires authentication.
9. Click Save.
5-61
Trend Micro Control Manager™ Administrator’s Guide
5-62
Getting Started with Control Manager
5. Click Save.
6. Access Manual Download or Scheduled Download.
7. On the working area under Download settings > Source group, select Internet:
Trend Micro update server or specify your organizations component source
server in the Other Internet source field.
8. Click Save.
To enable UNC download:
1. Mouseover Updates from the main menu. A drop down menu appears.
2. Mouseover Settings. A sub-menu appears.
3. Click Update/Deployment Settings. The Update/Deployment Settings screen
appears.
4. Type the Local Windows Authentication and Remote UNC Authentication
user names and passwords.
5. Click Save.
6. Access Manual Download or Scheduled Download.
7. On the working area under Download settings > From group, select File path
and then specify the shared network folder.
8. Click Save.
5-63
Trend Micro Control Manager™ Administrator’s Guide
5-64
Chapter 6
Monitoring the Control Manager Network
Control Manager provides several options to monitor the Control Manager network.
Summary screens, notifications, logs, and reports all provide ways for you to monitor the
network.
This chapter contains the following topics:
• Viewing Summary Screens in Control Manager on page 6-2
• Using Command Tracking on page 6-3
• Using Event Center on page 6-8
• Using Logs on page 6-23
• Working With Reports on page 6-47
6-1
Trend Micro Control Manager™ Administrator’s Guide
Home Screen
Use the Home screen for an at-a-glance summary of the product network Control
Manager manages. The Home screen contains the following sections:
TABLE 6-1. Home and Summary Screen Information
SECTION DESCRIPTION
Content Security Summary Displays summary information for all registered managed
products with content protection/detection capabilities. For
example, InterScan Messaging Security, or Total Discovery.
Web Security Summary Displays summary information for all registered managed
products with Web protection/detection capabilities. For
example, OfficeScan, InterScan Web Security, or Total Dis-
covery.
Network Virus Summary Displays summary information for all registered managed
products with network virus protection/detection capabilities.
For example, Network VirusWall Enforcer, or Total Discov-
ery.
Violation Status Displays summary information for all clients which violate
administrator created policies of Network VirusWall
Enforcer.
6-2
Monitoring the Control Manager Network
Tip: Clicking the underlined numbers that display in the right-hand column of each table
opens a detailed summary screen with information for the row.
Example: In the Antivirus Summary table, clicking the corresponding number for
the row Cleaned opens a Detailed Information screen. The Detailed Information
screen displays information about all the computers that have been cleaned.
INFORMATION DESCRIPTION
6-3
Trend Micro Control Manager™ Administrator’s Guide
6-4
Monitoring the Control Manager Network
For example, the Status is Skip when you invoke a Deploy patterns/rules to a child
server, and the child server already contains the latest pattern file.
These are the Status values:
TABLE 6-3. Command Details status
Unsuccessful
6-5
Trend Micro Control Manager™ Administrator’s Guide
2. Click Command Tracking from the drop down menu. The Command Tracking
screen appears.
3. On the working area, click Query. The Query (Command Tracking) screen appears.
6-6
Monitoring the Control Manager Network
4. On the Query (Command Tracking), specify values for the following parameters:
• Issued: Specify the scope of the query
Choose among the predetermined ranges, or specify your own range. Set
custom ranges according to months, days, and years.
• Command: Select the command that you want to monitor
• User: Leave this field blank to query commands issued by all users
• Status: Select the command status
• Sort records by: Specify how the Query Result screen will display results
Arrange the query results according to Time, Command, or User.
• Sort order: Specify whether the Query Result screen will display results in
ascending or descending order
5. Click View Commands. The Query Result screen shows the number of products
affected by the command, as well as the results.
Click the available link in the Successful, Unsuccessful, In Progress, or All
column to view their Command Details.
6-7
Trend Micro Control Manager™ Administrator’s Guide
INFORMATION DESCRIPTION
6-8
Monitoring the Control Manager Network
INFORMATION DESCRIPTION
ALERT DESCRIPTION
6-9
Trend Micro Control Manager™ Administrator’s Guide
ALERT DESCRIPTION
ALERT DESCRIPTION
ALERT DESCRIPTION
ALERT DESCRIPTION
6-10
Monitoring the Control Manager Network
ALERT DESCRIPTION
TAGS DESCRIPTION
%computer% Network name of the client computer where an event was detected
%entity% Product Directory path of the managed product where an event
occurred
%event% Event that triggered the notification
%act% The action taken by the managed product. Example: file cleaned, file
deleted, file quarantined
%actresult% The action result of the action taken by the managed product. Exam-
ple: successful, further action required
6-11
Trend Micro Control Manager™ Administrator’s Guide
TAGS DESCRIPTION
6-12
Monitoring the Control Manager Network
TAGS DESCRIPTION
TAGS DESCRIPTION
Special variables: Used by Damage Cleanup Services, Network VirusWall 1200, and
Vulnerability Assessment task completed-related events
6-13
Trend Micro Control Manager™ Administrator’s Guide
6-14
Monitoring the Control Manager Network
6-15
Trend Micro Control Manager™ Administrator’s Guide
6-16
Monitoring the Control Manager Network
• On the working area under Pager COM Port, select the appropriate COM
port from the list.
To set SNMP notifications:
a. On the working area under SNMP Trap Settings, specify the Community
name.
b. Specify the SNMP trap server IP address.
To set syslog notifications:
a. On the working area under Syslog Settings, type the host name and port
number of the syslog server in the fields provided. Use the fully qualified
domain name (FQDN) (example, proxy.company.com), or the IP address
of the syslog server.
b. Specify the facility for syslogs.
To trigger a specified application:
a. On the working area under Trigger Application Settings, select Use a
specified user to trigger the application.
b. Type the user name and password of the user who triggers the specified
application.
To set MSN Messenger notifications:
a. On the working area under MSN Messenger Settings, specify the MSN
Messenger email address. This is the user name in MSN Messenger.
b. Type the .Net Passport email address password.
c. If you use a proxy server to connect to the Internet, select Use a proxy server
to connect to MSN server.
i. Specify the proxy server host name and port.
ii. Select the proxy server protocol—Socks 4 or Socks 5.
iii. Type the log on name and password used for proxy authentication.
5. Click Save.
6-17
Trend Micro Control Manager™ Administrator’s Guide
5. Under Recipients, specify or remove users in the Selected Users and Groups list for
notification recipients:
To add recipients to the list:
a. Click the user or group from the Available Users and Groups list. To select
multiple recipients, use the CTRL key.
b. Click to add the entry to the Recipients list.
To remove a recipient from the list:
a. Click the user or group from the Recipient list. To select multiple recipients,
use the CTRL key.
b. Click to remove the entry from the Recipients list.
6-18
Monitoring the Control Manager Network
6. Select the check box of the corresponding notification method you prefer:
Configure the notification method settings through the Event Center Settings
screen. Refer to Configuring Notification Methods on page 6-15.
7. Expand the notification method and provide a notification message in the
corresponding message fields.
8. Click Test to experiment if your system is able to deliver the notifications.
9. Click Save.
6-19
Trend Micro Control Manager™ Administrator’s Guide
4. Type the virus names you want to monitor. You can specify up to 10 viruses.
5. Under Alert Settings, specify the Period (in hours) using the drop down list box.
6. Click Save.
6-20
Monitoring the Control Manager Network
4. Type the spyware/grayware names that you want to monitor. You can list up to 10
items of spyware/grayware.
5. Under Alert Settings, specify the Period (in hours) using the drop down list box.
6. Click Save.
6-21
Trend Micro Control Manager™ Administrator’s Guide
6-22
Monitoring the Control Manager Network
3. Expand the Alert Event Category, and click the Settings link for Potential
vulnerability attack detected.
Using Logs
Although Control Manager receives data from various log types, Control Manager now
allows users to query the log data directly from the Control Manager database. The user
can then specify filtering criteria to gather only the data they need.
Control Manager also introduces log aggregation. Log aggregation can improve query
performance and reduce the network bandwidth managed products require when
sending logs to Control Manager. However, this comes at a cost of lost data through
aggregation. Control Manager cannot query data that does not exist in the Control
Manager database.
6-23
Trend Micro Control Manager™ Administrator’s Guide
6-24
Monitoring the Control Manager Network
The following table shows the logs that managed products send to Control Manager:
TABLE 6-15. Control Manager Managed Products Logs
VIRUS/ SPYWARE/ GRAYWARE LOG
ENDPOINT LOG
SECURITY LOG
STATUS LOG
URL USAGE
EVENT LOG
MANAGED PRODUCT
InterScan eManager Q Q Q
InterScan Messaging Q Q Q Q
Security Suite
6-25
Trend Micro Control Manager™ Administrator’s Guide
ENDPOINT LOG
SECURITY LOG
STATUS LOG
URL USAGE
MANAGED PRODUCT EVENT LOG
InterScan WebProtect Q Q Q Q Q
for ICAP
OfficeScan Q Q Q Q Q
ServerProtect Q Q Q
ScanMail eManager Q Q Q
ScanMail for Q Q Q
Domino/Lotus Notes
Network VirusWall Q Q Q Q Q Q
2500
Network VirusWall Q Q Q Q Q Q
2500 Enforcer
Network VirusWall Q Q Q Q Q Q
1200
6-26
Monitoring the Control Manager Network
ENDPOINT LOG
SECURITY LOG
STATUS LOG
URL USAGE
EVENT LOG
MANAGED PRODUCT
Network VirusWall Q Q Q Q Q Q
1200 Enforcer
Tip: More logs mean abundant available information about the Control Manager network.
However, these logs occupy disk space. You must balance the need for information
with your available system resources.
6-27
Trend Micro Control Manager™ Administrator’s Guide
6-28
Monitoring the Control Manager Network
all information collected from all products registered to the Control Manager server (log
aggregation can affect the data available to query). Using Ad Hoc queries to pull data
directly from the database provides a very powerful tool for administrators.
While querying data, administrators can filter the query criteria so only the data they
need returns. Administrators can then export the data to CSV or XML for further
analysis, or save the query for future use. Control Manager also supports sharing Saved
queries with other users so others can benefit from useful queries.
Completing an Ad Hoc query consists of the following process:
Step 1: Select the managed product or current Control Manager server for the query
Step 2: Select the Data View to query
Step 3: Specify filtering criteria, and the specific information that displays
Step 4: Save and complete the query
Step 5: Export the data to CSV or XML
Note: Control Manager supports sharing saved Ad Hoc Queries with other users. Saved and
shared queries appear on the Logs/Reports > Saved Ad Hoc Queries screen.
6-29
Trend Micro Control Manager™ Administrator’s Guide
The Control Manager Web console displays the Data Views and the information
available from each Data View.
TABLE 6-16. Control Manager Major Data View Categories
Note: For more information about the available data views Control Manager supports, see
Appendix B: Understanding Data Views on page B-1.
6-30
Monitoring the Control Manager Network
After selecting the managed products/directory from which the data originates, select a
data view for the query. For more information on data views see Understanding Data
Views on page 6-29.
After selecting the data view, specify the query filter criteria, the specific information the
query displays, and the order in which the information displays.
Note: Control Manager supports specifying up to 20 criteria for filtering Ad Hoc Query
data.
Finally specify whether to save the query for future use. Control Manager supports
sharing of saved queries, so other users can benefit from useful queries.
For example, Chris, an OfficeScan Administrator, wants to check the status of pattern
files for the OfficeScan servers for which she is responsible. Chris first selects Managed
Products. She then selects the data view Managed Product Pattern File Status found
under Product Information > Component Information. Proceeding to the next step
in the process, she specifies the filtering criteria as follows: Product Type: OfficeScan,
Pattern Status: Out-of-date. Clicking Change column display, Chris also selects the
fields the query displays after the query completes. Chris selects the following to display:
Pattern Version, Host Name, IP Address. She does not select Product Name or Pattern
Status, because she already knows the results the Control Manager returns meet that
criteria.
To perform an Ad Hoc query:
1. Mouseover Logs/Reports on the main menu. A drop-down menu appears.
2. Click New Ad Hoc Query from the drop-down menu. The Ad Hoc Query screen
appears.
6-31
Trend Micro Control Manager™ Administrator’s Guide
Note: Selecting the managed product/directory on this screen affects the available data
views on the following screen.
For example, by selecting OfficeScan in the product directory only data views
associated with desktop protection display in the Available Data Views list.
6-32
Monitoring the Control Manager Network
6-33
Trend Micro Control Manager™ Administrator’s Guide
6-34
Monitoring the Control Manager Network
b. From the Available Fields list, select the data view columns that display when
the query returns information. Selected columns highlight.
Tip: Select the columns one at a time or use the Shift or Ctrl keys to select
multiple columns.
Selecting and adding one column at a time is one method that allows users to
specify the sequence which the information displays.
c. Click the Add button to include the fields in the Selected Fields list. Selected
columns appear in the Selected Fields list.
d. Continue selecting and adding columns until you have all the columns you
require.
e. Use the Move Up and Move Down buttons, after selecting a column in the
Selected Fields list, to specify the display sequence of the information. The
column at the top of the list appears as the left-most column in the returned
query.
f. Click Back. The Query Criteria screen appears.
6-35
Trend Micro Control Manager™ Administrator’s Guide
6-36
Monitoring the Control Manager Network
Note: If you do not specify any filtering criteria, the Ad Hoc query returns all results
for the applicable columns. Trend Micro recommends specifying filtering criteria
to simplify data analysis after the information for the query returns.
Note: Control Manager supports sharing saved Ad Hoc Queries with other users. Saved
Queries appear on the Logs/Reports > My Reports screen.
3. Click Query. The Results screen appears displaying the results of the query.
6-37
Trend Micro Control Manager™ Administrator’s Guide
For more detailed information about a given item, click the underlined link for the
item.
6-38
Monitoring the Control Manager Network
Note: Control Manager access control, provided by the user account and user type, restricts
the information to which a user has access. This means that even though all users can
view shared queries, access control limits the effectiveness of the query.
Example: OfficeScan administrator Chris creates and shares an Ad Hoc Query that
targets OfficeScan server information. ScanMail for Exchange administrator Sam has
access to the shared query, but if she tries to generate an Ad Hoc Query using Chris’
query, the query returns blank. This occurs because Sam does not have access to
OfficeScan server information. This example assumes Chris only has access to
OfficeScan servers and Sam only has access to ScanMail for Exchange servers.
6-39
Trend Micro Control Manager™ Administrator’s Guide
3. Click the name of the saved Ad Hoc query to edit. The Select Product Tree screen
appears.
6-40
Monitoring the Control Manager Network
Note: Selecting the managed product/directory on this screen affects the available data
views. For example, by selecting OfficeScan in the product directory only data
views associated with desktop protection display in the Data Views list.
Tip: Select the columns one at a time or use the Shift or Ctrl keys to select
multiple columns.
Selecting and adding one column at a time is one method that allows users to
specify the sequence which the information displays.
c. Click the Add button to include the fields in the Selected Fields list. Selected
columns appear in the Selected Fields list.
6-41
Trend Micro Control Manager™ Administrator’s Guide
d. Continue selecting and adding columns until you have all the columns you
require.
e. Use the Move Up and Move Down buttons, after selecting a column in the
Selected Fields list, to specify the display sequence of the information. The
column at the top of the list appears as the left-most column in the returned
query.
f. Click Back. The Query Criteria screen appears.
Note: If you do not specify any filtering criteria, the Ad Hoc query returns all results
for the applicable columns. Trend Micro recommends specifying filtering criteria
to simplify data analysis after the information for the query returns.
6-42
Monitoring the Control Manager Network
iv. Click the + icon to add another filter criterion for the data view.
Step 5: Save and complete the query:
1. Click Save this query to the saved Ad Hoc Queries list under Save Query
Settings to save the Ad Hoc query.
2. Specify an Ad Hoc Query name in the Query Name field.
Note: Control Manager supports sharing saved Ad Hoc Queries with other users. Saved
Queries appear on the Logs/Reports > My Reports screen.
3. Click Query. The Results screen appears displaying the results of the query.
6-43
Trend Micro Control Manager™ Administrator’s Guide
Deleting Logs
Use the Log Maintenance screen to immediately delete logs or to configure automatic
log deletion for the following log types:
• Virus/Spyware/Grayware logs
• Product event logs
• Security logs
• Web security logs
• Network virus logs
• Endpoint logs
• Security violation logs
• Security compliance logs
• Security statistic logs
• Suspicious virus logs
• Network reputation logs
• Desktop spyware/grayware logs
• Firewall violation logs
• Access logs
• Server event logs
To delete logs immediately:
1. Mouseover Logs/Reports on the main menu. A drop down menu appears.
2. Mouseover Settings. A submenu appears.
3. Click Log Maintenance from the submenu. The Log Maintenance screen appears.
6-44
Monitoring the Control Manager Network
4. Select the corresponding check box for the logs you want to delete.
5. Click Delete All in the corresponding row for logs you want to remove.
6-45
Trend Micro Control Manager™ Administrator’s Guide
5. Specify the maximum number of logs that Control Manager retains in the
Maximum Log Entries column.
6. In Purge offset, specify the number of logs Control Manager removes when the
number of logs reaches the number specified in the Maximum Log Entries column.
7. In Maximum Log Age, specify the age of logs that Control Manager deletes
automatically.
8. Click Save.
6-46
Monitoring the Control Manager Network
6-47
Trend Micro Control Manager™ Administrator’s Guide
page 6-29. The look and feel of generated reports falls to the report elements. Report
elements consist of the following:
TABLE 6-17. Control Manager 5.0 Report Template Elements
Page break Inserts a page break for a report. Each report page supports
up to three report template elements.
Each Control Manager 5.0 template can contain up to 100 report template elements.
Each page in the report template can contain up to three report template elements. Use
page breaks to create report template pages.
To better understand the Control Manager 5.0 report templates Trend Micro provides
the following predefined report templates.
6-48
Monitoring the Control Manager Network
Note: Access the Report Templates screen to view the Trend Micro predefined templates.
TEMPLATE DESCRIPTION
6-49
Trend Micro Control Manager™ Administrator’s Guide
TEMPLATE DESCRIPTION
6-50
Monitoring the Control Manager Network
TEMPLATE DESCRIPTION
6-51
Trend Micro Control Manager™ Administrator’s Guide
TEMPLATE DESCRIPTION
6-52
Monitoring the Control Manager Network
TEMPLATE DESCRIPTION
6-53
Trend Micro Control Manager™ Administrator’s Guide
Note: In Control Manager 3.5 spyware/grayware were no longer considered viruses. This
change affects the virus count in all original virus related reports.
Use the Report Category list on the Control Manager 3.0 Report Templates screen to
peruse the six categories of reports listed below:
TABLE 6-19. Desktop Product Reports and Report Types
• Spyware/Grayware detected
Spyware/Grayware Detection
Reports • Most commonly detected Spyware/Grayware
(10,25,50,100)
• Viruses detected
Virus Detection Reports
• Most commonly detected viruses (10,25,50,100)
• Detailed summary
OfficeScan Server Deployment
Reports • Basic summary
• Detailed failure rates summary
• Detailed summary
OfficeScan Damage Cleanup
Services Reports • Most commonly cleaned infections (10, 25, 50,
100)
6-54
Monitoring the Control Manager Network
• Viruses detected
Virus Detection Reports • Most commonly detected viruses (10, 25, 50,
100)
• Virus infection list for all entities
• Viruses detected
Virus Detection Reports • Most commonly detected viruses (10, 25, 50,
100)
6-55
Trend Micro Control Manager™ Administrator’s Guide
• Detailed summary
• Basic summary
Deployment Rate Reports
• Detailed failure rate summary
• OPS deployment rate for IMSS
• Viruses detected
• Most commonly detected viruses (10, 25, 50,
Virus Detection Reports
100)
• Top senders of infected email (10, 25, 50, 100)
• Detailed summary
Deployment Rate Reports • Basic summary
• Detailed failure rate summary
• Viruses detected
Virus Detection Reports • Most commonly detected viruses (10, 25, 50,
100)
• Spyware/Grayware, grouped by (Day, Week,
Comparative Reports Month)
• Viruses, grouped by (Day, Week, Month)
6-56
Monitoring the Control Manager Network
• Detailed summary
Deployment Rate Reports • Basic summary
• Detailed failure rate summary
It may take a few seconds to generate a report, depending on its contents. As soon as
Control Manager finishes generating a report, the screen refreshes and the View link
adjacent to the report becomes available.
6-57
Trend Micro Control Manager™ Administrator’s Guide
6-58
Monitoring the Control Manager Network
4. Type a name for the report template in the Name field, under Report template.
5. Type a description for the report template in the Description field, under Report
template.
Step 2: Specify the template component to add to the report template:
1. Drag-and-drop a report template element from the Working Panel to add to the
report template:
Note: For every component except Static text, the Add Database View > Step 1: Set
Query Criteria screen appears. Selecting Static text opens the Add Static Text
screen.
6-59
Trend Micro Control Manager™ Administrator’s Guide
• Grid table: Report data displays in a table like an Ad Hoc Query table
• Line chart: Report data displays in a line chart
• Static text: Text a user inserts into the template. This could be a summary of
the information that the report presents.
2. Add multiple components to make the report comprehensive. You can add up to
100 report components to a report template.
3. Add page breaks and rows to the report template to separate data or report template
elements.
Step 3: Specify the data view for the template:
1. Click Edit on a report template element. The Edit <Report Template Element>
screen appears.
6-60
Monitoring the Control Manager Network
Tip: If you do not specify any filtering criteria, the report returns all results for the
applicable columns. Trend Micro recommends specifying filtering criteria to
simplify data analysis after the information for the report returns.
6-61
Trend Micro Control Manager™ Administrator’s Guide
• Dynamic table
• Grid table
• Line chart
Configure bar chart settings:
1. Click Query. The Add Bar Chart > Step 3 Specify Design screen appears.
6-62
Monitoring the Control Manager Network
• Data Field: Specifies the data that appears along the vertical axis of the bar
chart
• Series Field: Specifies additional data that can appear along the horizontal axis
• Category Field: Specifies the data that appears along the horizontal axis of the
bar chart
4. Specify the display settings for the Data Field:
a. Type a meaningful label for the Data Field.
b. Specify how data displays for Data Field from the Aggregated by drop-down
list:
• Total number of instances: Specifies that the total count for the number
of incidents is used for the results
• Number of unique instances: Specifies that only the count for distinct
items is used for the results
• Sum of value: Specifies that the sum of all the values in the "Count" of a
Data View column is used for the results
Example: OfficeScan detects 10 virus instances of the same virus on one
computer. The Count number of row displays 10, while Count distinct row
displays 1.
5. Specify the display settings for the Series Field:
a. Type a meaningful label for the Series Field.
6. Specify the display settings for the Category Field:
a. Type a meaningful label for the Category Field.
b. Specify how to sort data in the chart from the Sorting drop-down lists:
• Aggregation value: Specifies data sorts from the data appearing in the
Category fields.
• Category name: Specifies data sorts from the alphabetical value of
Category names.
• Ascending: Specifies data sorts in ascending order.
• Descending: Specifies data sorts in descending order.
c. Specify how many items display in the Categories Field by selecting Filter
summarized result and specifying a value in the Display top text box.
Default value is 10.
6-63
Trend Micro Control Manager™ Administrator’s Guide
6-64
Monitoring the Control Manager Network
Example: To provide a graph that displays virus distribution across your network
Data Fields would represent the total number of viruses in your network. Category
Fields would represent how the total number of viruses would be broken down as a
percentage.
4. Specify the display settings for the Data Field.
a. Type a meaningful label for the Data Field.
b. Specify how data displays for Data Field from the Aggregated by drop-down
list:
• Total number of instances: Specifies that the total count for the number
of incidents is used for the results
• Number of unique instances: Specifies that only the count for distinct
items is used for the results
• Sum of value: Specifies that the sum of all the values in the "Count" of a
Data View column is used for the results
Example: OfficeScan detects 10 virus instances of the same virus on one
computer. The Count number of row would display 10, while Count distinct
row displays 1.
5. Specify the display settings for the Category Fields:
a. Type a meaningful label for the Category Fields.
b. Specify how to sort data in the chart from the Sorting drop-down lists:
• Aggregation value: Specifies data sorts from the data appearing in the
Category fields.
• Category name: Specifies data sorts from the alphabetical value of
Category names.
• Ascending: Specifies data sorts in ascending order.
• Descending: Specifies data sorts in descending order.
c. Specify how many items display in the Categories Field by selecting Filter
summarized result and specifying a value in the Display top text box.
Default value is 10.
6. Click Save. The The Add Report Template screen appears.
Configure dynamic table settings:
1. Click Query. The Add Dynamic Table > Step 3 Specify Design screen appears.
6-65
Trend Micro Control Manager™ Administrator’s Guide
6-66
Monitoring the Control Manager Network
displays infected clients, the viruses infecting the clients, and the action taken against
the viruses by the managed product. Olivia drags and drops the following fields to
the Data, Row, and Column Properties:
• Data Properties: Virus/Malware Detection Count
• Row Properties: Virus/Malware Name and Action Taken
• Column Properties: Infection Destination
4. Specify the display settings for the Data Properties:
a. Specify how data displays for Data Fields from the Aggregated by drop-down
list:
• Total number of instances: Specifies that the total count for the number
of incidents is used for the results
• Number of unique instances: Specifies that only the count for distinct
items is used for the results
• Sum of value: Specifies that the sum of all the values in the "Count" of a
Data View column is used for the results
Example: OfficeScan detects 10 virus instances of the same virus on one
computer. The Count number of row would display 10, while Count distinct
row displays 1.
5. Specify the display settings for the Row Properties.
a. Specify how to sort data in the table from the Sorting drop-down lists:
• Aggregation value: Specifies data sorts from the data appearing in the
rows.
• Header title: Specifies data sorts from the alphabetical value of rows.
• Ascending: Specifies data sorts in ascending order.
• Descending: Specifies data sorts in descending order.
b. Specify how many items display in the Categories Field by selecting Filter
summarized result and specifying a value in the Display top text box.
Default value is 10.
6. Specify the display settings for the Column Properties.
a. Specify how to sort data in the table from the Sorting drop-down lists:
• Aggregation value: Specifies data sorts from the data appearing in the
columns.
6-67
Trend Micro Control Manager™ Administrator’s Guide
• Header title: Specifies data sorts from the alphabetical value of columns.
• Ascending: Specifies data sorts in ascending order.
• Descending: Specifies data sorts in descending order.
b. Specify how many columns display by selecting Filter column and specifying a
value in the Display quantity text box. Default value is 10.
7. Click Save. The Add Report Template screen appears.
Configure grid table settings:
1. Click Next. The Add Grid Table > Step 3 Specify Design screen appears.
6-68
Monitoring the Control Manager Network
6-69
Trend Micro Control Manager™ Administrator’s Guide
6-70
Monitoring the Control Manager Network
c. Specify how many items display in the Categories Field by selecting Filter
summarized result and specifying a value in the Display top text box.
Default value is 10.
7. Click Save. The Add Report Template screen appears.
Step 6: Complete report template creation:
1. Add or remove Report Template Elements as you require.
2. Click Save.
6-71
Trend Micro Control Manager™ Administrator’s Guide
3. Click Add. The Add One-time Report Profile > Step 1: Contents screen appears.
6-72
Monitoring the Control Manager Network
4. Type a name for the report in the Name field, under Report Details.
5. Type a description for the report in the Description field, under Report Details.
6. Select the Control Manager template to generate the report:
Control Manager 5.0 report template:
a. Select the Control Manager 5.0 template to generate the report.
If the existing reports do not fulfill your requirements, create one from the
Report Templates screen. See Adding Control Manager 5.0 Report Templates
on page 6-57 for more information.
6-73
Trend Micro Control Manager™ Administrator’s Guide
6-74
Monitoring the Control Manager Network
Step 2: Specify the product/products from which the report data generates:
1. Select the managed product or directory from which Control Manager gathers the
report information.
2. If the report contains data from a Network VirusWall Enforcer device, specify the
clients from which the reports generate:
• All clients: Reports generate from all Network VirusWall Enforcer devices
• IP range: Reports generate from a specific IP address range
• Segment: Reports generate from a specific network segment
3. Click Next. The Add One-Time Report Profile > Step 3: Time Period screen
appears.
6-75
Trend Micro Control Manager™ Administrator’s Guide
Step 3: Specify the date that the product/products produced the data:
1. Specify the data generation date:
From the drop down list select one of the following:
• All dates
• Last 24 hours
• Today
• Last 7 days
• Last 14 days
• Last 30 days
Specify a date range:
a. Type a date in the From field.
b. Specify a time in the accompanying hh and mm fields.
c. Type a date in the To field.
d. Specify a time in the accompanying hh and mm fields.
Tip: Click the calendar icon next to the From and To fields to use a dynamic
calendar to specify the date range.
6-76
Monitoring the Control Manager Network
2. Click Next. The Add Onetime Report Profile > Step 4: Message Content and
Recipients screen appears.
6-77
Trend Micro Control Manager™ Administrator’s Guide
1. Access the Add Scheduled Report screen and select the report type.
2. Specify the product/products from which the report data generates.
3. Specify the date when the product/products produced the data.
4. Specify the recipient of the report.
To add a scheduled report:
Step 1: Access the Add Scheduled Report screen and select the report type:
1. Mouseover Logs/Reports. A drop down menu appears.
2. Click Scheduled Reports from the menu. The Scheduled Reports screen appears.
3. Click Add. The Add Scheduled Report Profile > Step 1: Contents screen appears.
6-78
Monitoring the Control Manager Network
4. Type a name for the report in the Name field, under Report Details.
5. Select the Control Manager template to generate the report:
Control Manager 5.0 report template:
a. Select the Control Manager 5.0 template to generate the report.
If the existing reports do not fulfill your requirements, create one from the
Report Templates screen. See Adding Control Manager 5.0 Report Templates
on page 6-57 for more information.
Control Manager 3 report template:
6-79
Trend Micro Control Manager™ Administrator’s Guide
6-80
Monitoring the Control Manager Network
Step 2: Specify the product/products from which the report data generates:
1. Select the managed product or directory from which Control Manager gathers the
report information.
2. If the report contains data from a Network VirusWall Enforcer device, specify the
clients from which the reports generate:
• All clients: Reports generate from all Network VirusWall Enforcer devices
• IP range: Reports generate from a specific IP address range
• Segment: Reports generate from a specific network segment
3. Click Next. The Add One-Time Report Profile > Step 3: Time Period screen
appears.
6-81
Trend Micro Control Manager™ Administrator’s Guide
Step 3: Specify the date that the product/products produced the data:
1. Specify how often reports generate:
• Daily: Reports generate daily.
• Weekly: Reports generate weekly on the specified day.
• Bi-weekly: Reports generate every two weeks on the specified day.
• Monthly: Reports generate monthly on the first day of the month, the 15th of
the month, or the last day of the month.
2. Specify the data range:
• Reports include data up to the Start the schedule time specified below:
This means that a report could have up to 23 hours more data contained in the
report. While this has a small affect on weekly or monthly reports, this can
make a "daily" report with almost two days worth of data depending on the
Start schedule time.
• Reports include data up to 23:59:59 of the previous day: This means that
data collection for the report stops just before midnight. Reports will be an
exact time period (example: Daily reports will be 24 hours) but will not contain
the absolute latest data.
6-82
Monitoring the Control Manager Network
Tip: Click the calendar icon next to the mm/dd/yyyy field to use a dynamic
calendar to specify the date range.
4. Click Next. The Add Scheduled Report Profile > Step 4: Message Content and
Recipients screen appears.
6-83
Trend Micro Control Manager™ Administrator’s Guide
6-84
Monitoring the Control Manager Network
a. Click Scheduled Reports from the drop-down menu. The Scheduled Reports
screen appears.
b. Click the link for the report you want to view from the History column. The
History screen for that report appears.
c. Select the report to view from the History screen.
6-85
Trend Micro Control Manager™ Administrator’s Guide
6-86
Chapter 7
Administering Managed Products
This chapter presents material administrators will need to manage the Control Manager
network.
This chapter contains the following topics:
• Understanding Agents on page 7-2
• Understanding the Product Directory on page 7-20
• Activating and Registering Managed Products on page 7-43
• Managing Child Servers on page 7-50
7-1
Trend Micro Control Manager™ Administrator’s Guide
Understanding Agents
Control Manager 3.0 SP6/3.5/5.0 use MCP and Control Manager 2.x agents to manage
products on the Control Manager network:
• Control Manager Agent (version 2.51 or higher) - Older versions of Trend Micro
products require this agent, built according to the Control Manager 2.5/3.0
architecture.
• Trend Micro Management Communication Protocol (MCP) Agent - Trend
Micro's next generation agent supporting enhanced security, SSO, one-way and
two-way communication, and cluster nodes.
The following table enumerates the features supported by Control Manager 2.x and
MCP agents.
TABLE 7-1. Agent Comparison
CONTROL MANAGER
FEATURE MCP AGENTS 2.X AGENTS
Communicators No Yes
7-2
Administering Managed Products
CONTROL MANAGER
FEATURE MCP AGENTS 2.X AGENTS
Each managed product has its own agent responsible for the following:
TABLE 7-2. MCP / 2.x Agent Comparison
Polling commands for the managed product Receiving commands from the Control Man-
from Control Manager server ager server, through the Communicator
Collecting managed product status and logs, Collecting managed product status and logs,
and sending them to the Control Manager and sending them to the Control Manager
server, through HTTPS server, through the Communicator
Understanding Communicators
The Communicator, or the Message Routing Framework, serves as the communications
backbone for the older managed products and Control Manager. This component of the
Trend Micro Infrastructure (TMI) handles all communication between the Control
Manager server and managed products for older products. Communicators interact with
Control Manager to communicate with older managed products.
By installing the Control Manager 2.5 agent on a managed product server, you can use
this application to manage the product with Control Manager. Agents interact with the
managed product and Communicator. An agent serves as the bridge between managed
product and communicator. Hence, you must install agents on the same computer as
managed products. There are currently only two instances where an agent must operate
remotely:
• Trend Micro OfficeScan Corporate Edition, installed on a NetWare server
• NetScreen firewall management
The Control Manager installation checks if the Communicator is already available on the
managed product server. If so, it does not install another instance of the Communicator.
7-3
Trend Micro Control Manager™ Administrator’s Guide
7-4
Administering Managed Products
7-5
Trend Micro Control Manager™ Administrator’s Guide
SECURITY LEVEL
FEATURES
HIGH MEDIUM NORMAL
7-6
Administering Managed Products
SECURITY LEVEL
FEATURES
HIGH MEDIUM NORMAL
Depending on the security level of older agents, Control Manager provides the following
encryption and authentication:
• SSL packet-level encryption: Control Manager applies Secure Socket Layer (SSL)
packet-level encryption to all security levels. SSL packet-level encryption is a
protocol developed by Netscape for secure transactions across the Web. SSL uses a
form of public key encryption, where the information can be encoded by the
browser using a publicly available public key, but can only be decoded by a party
who knows the corresponding private key.
The Control Manager agents can encrypt their communication using the public key.
In return, the Control Manager server uses a private key to decrypt the agent
message.
• Trend Micro authentication: Control Manager applies Trend Micro
authentication 5 (High) security level.
When using High level, Control Manager first applies the SSL packet-level
encryption and then further strengthens the encryption through Trend Micro
authentication
Note: You can modify the Control Manager security level through TMI.cfg. However, doing
so requires the modification of all TMI.cfg present in the Control Manager network
TMI.cfg of the Control Manager server including all managed products and child
servers. Otherwise, the server and agent communication will not work.
SECURITY LEVEL
SECURITY LEVEL END-TO-END MESSAGE-LEVEL
SELECTION (DURING
(FOUND IN TMI.CFG) AUTHENTICATION ENCRYPTION
INSTALLATION)
7-7
Trend Micro Control Manager™ Administrator’s Guide
SECURITY LEVEL
SECURITY LEVEL END-TO-END MESSAGE-LEVEL
SELECTION (DURING
(FOUND IN TMI.CFG) AUTHENTICATION ENCRYPTION
INSTALLATION)
The Agent Communication idle and working schedules apply only to the managed
product agents. You cannot set the idle schedule for Control Manager 3.5 child servers.
Note: The Agent Communication Schedule lists the child server agents. However, check
boxes are not available.
7-8
Administering Managed Products
Tip: Use the Agent Communication Scheduler to define the heartbeat working and idle
hours.
The agent polls the Control Manager server at regular intervals to ensure that the
Control Manager console displays the latest information and to verify the connection
between the managed product and the server remains functional.
There are three heartbeat statuses:
• Active: within the Working hour
• Inactive: idle hour or not within the Working hour
• Abnormal: disconnected
Refer to Understanding Connection Status Icons on page 7-4 for details.
Note: In addition to providing periodic heartbeat to the Control Manager server, the agent
also sends real-time managed product status information to the server.
MCP Heartbeat
To monitor the status of managed products, MCP agents poll Control Manager based
on a schedule. Polling occurs to indicate the status of the managed product and to check
for commands to the managed product from Control Manager. The Control Manager
Web console then presents the product status. This means that the managed product’s
status is not a real-time, moment-by-moment reflection of the network’s status. Control
Manager checks the status of each managed product in a sequential manner in the
background. Control Manager changes the status of managed products to offline when a
fixed period of time elapses without a heartbeat from the managed product.
Active heartbeats are not the only means Control Manager determines the status of
managed products. The following also provide Control Manager with the managed
product’s status:
7-9
Trend Micro Control Manager™ Administrator’s Guide
• Control Manager receives logs from the managed product. Once Control Manager
receives any type of log from the managed product successfully, this implies that the
managed product is working fine.
• In two-way communication mode, Control Manager actively sends out a notification
message to trigger the managed product to retrieve the pending command. If server
connects to the managed product successfully, it also indicates that the product is
working fine and this event counts as a heartbeat.
• In one-way communication mode, the MCP agent periodically sends out query
commands to Control Manager. This periodical query behavior works like a
heartbeat and is treated as such by Control Manager.
The MCP heartbeats implement in the following ways:
• UDP: If the product can reach the server using UDP, this is the lightest weight,
fastest solution available. However, this does not work in NAT or firewall
environments. In addition, the transmitting client cannot verify that the server does
indeed receive the request.
• HTTP/HTTPS: To work under a NAT or firewall environment, a heavyweight
HTTP connection can be used to transport the heartbeat
Control Manager supports both UDP and HTTP/HTTPS mechanisms to report
heartbeats. Control Manager server finds out which mode the managed product applies
during the registration process. A separate protocol handshake occurs between both
parties to determine the mode.
Aside from simply sending the heartbeat to indicate the product status, additional data
can upload to Control Manager along with the heartbeat. The data usually contains
managed product activity information to display on the console.
7-10
Administering Managed Products
The active periods specified by the bar are from 0:00 A.M. to 7:00 A.M, 8:00 A.M to
4:00 PM, and from 6:00 P.M. to 12:00 P.M.
7-11
Trend Micro Control Manager™ Administrator’s Guide
4. Select the managed product schedule to modify. The Set Communicator Schedule
screen appears.
7-12
Administering Managed Products
5. Define the schedule. Specify a new time or use the default setting:
• To specify a new setting, toggle the appropriate time slots in the schedule bar
and then click Save
• To use the default setting, select the setting to apply and click Reset to Default
Schedule
7-13
Trend Micro Control Manager™ Administrator’s Guide
7-14
Administering Managed Products
4. On the working area, leave the default values or specify new settings for the
following:
• Report managed product status every: Defines how often the
Communicator responds to Control Manager server messages. The permitted
values are between 5 to 480 minutes
7-15
Trend Micro Control Manager™ Administrator’s Guide
Note: The If no communication, set status as abnormal after value must be at least
triple the Report managed product status every value.
5. Click Save.
Note: These are the services that run in the background on the Windows operating system,
not the Trend Micro services that require Activation Codes (for example, Outbreak
Prevention Services, Damage Cleanup Services).
7-16
Administering Managed Products
By default, the Communicator uses port 10198 for communication between Control
Manager processes (internal communication) and port 10319 for communication
between the Control Manager agent and server (external communication).
Changing the external communication port is a two-step process.
To change the external communication port on the Control Manager server:
1. Open <root>\Program Files\Trend
Micro\COMMON\ccgi\commoncgi\config\CCGI_Config.xml using a text editor
(for example, Notepad).
WARNING! Use care when modifying Control Manager *.xml or *.cfg files. To ensure
that you can roll back to the original settings, back up CCGI_Config.xml.
2. Specify a new value for the OuterPort parameter. This value represents the external
communication port.
For example, set OuterPort="2222" to use port 2222.
3. Save and close CCGI_Config.xml.
4. Open <root>\Program Files\Trend Micro\COMMON\TMI\TMI.cfg using a
text editor.
WARNING! Making incorrect changes to the configuration file can cause serious
system problem. Back up TMI.cfg to restore your original settings.
7-17
Trend Micro Control Manager™ Administrator’s Guide
WARNING! Modify all TMI.cfg in your Control Manager network (server and agents)
to the OuterPort value. Otherwise, the server and agent communication
will not work.
WARNING! Making incorrect changes to the configuration file can cause serious
system problem.
WARNING! Set all TMI.cfg in your Control Manager network (server and agents) to
the same security level value (MaxSecurity). Otherwise, the server and
agent communication will not work.
7-18
Administering Managed Products
WARNING! Making incorrect changes to the configuration file can cause serious
system problem. Back up TMI.cfg to restore your original settings.
WARNING! Set all TMI.cfg in your Control Manager network (server and agents) to
the same security level value (AllowUDP). Otherwise, the server and
agent communication will not work.
Note: This procedure uses the default installation settings for Control Manager.
1. Click Start > Programs > Microsoft SQL Server. The SQL Server Enterprise
Manager dialog box appears.
7-19
Trend Micro Control Manager™ Administrator’s Guide
2. Click Microsoft SQL Servers > SQL Server Group > (Hostname of the
Control Manager server) > Databases > DB_ ControlManager > Tables.
3. Locate CDSM_Entity.
4. Locate and verify the following from CDSM_Entity:
• Locate the Token column. Information in the column appears in the following
format: “URLTOKEN:2; http;10.1.2.3;80; cgiCmdNotify;;!CRYPT!10…"
• URLTOKEN:1 signifies that the agent uses one-way communication to
communicate with Control Manager.
• URLTOKEN:2 signifies that the agent uses two-way communication to
communicate with Control Manager.
To verify Control Manager is using two-way communication from the Web
console:
1. Click Products. The Product Directory screen appears.
2. Click the product/directory in the Product Directory. The item highlights in the
Product Directory.
3. Click Folder. The information in the work area changes.
4. Select Connection Information View from the Folder drop-down list. The Mode
column displays which communication mode, the MCP agent on, the managed
product uses.
7-20
Administering Managed Products
Indirectly administer the managed products either individually or by groups through the
Product Directory. The following table lists the menu items and buttons on the Product
Directory screen:
TABLE 7-9. Product Directory Options
Click this button to specify search criteria to perform a search for one
Advanced Search or more managed products.
Click this button to open the Directory Management screen. From the
Directory Manage- screen, move entities/directories (by dragging and dropping them) or
ment
create new directories.
BUTTONS DESCRIPTION
Note: Managed products belonging to child Control Manager servers cannot have tasks
applied to them by the parent Control Manager server.
7-21
Trend Micro Control Manager™ Administrator’s Guide
No group configuration
Geographical or Administrative Clear structure for identical products
STRUCTURE DESCRIPTION
Company network and If different access and sharing rights apply to the company
network, group managed products and child servers
security policies according to company network and security policies.
7-22
Administering Managed Products
STRUCTURE DESCRIPTION
7-23
Trend Micro Control Manager™ Administrator’s Guide
Arrange the Product Directory using the Directory Manager. Use descriptive folder
names to group your managed products according to their protection type or the
Control Manager network administration model. For example, grant access rights to
mail administrators to configure the Mail folder.
STRUCTURE DESCRIPTION
7-24
Administering Managed Products
STRUCTURE DESCRIPTION
Cascading Folder In a cascading environment, all child servers for the parent
server appear in the Cascading Folder.
As shown in this sample Product Directory, managed products identify the registered
antivirus or content security product, as well as provide the connection status.
7-25
Trend Micro Control Manager™ Administrator’s Guide
InterScan eManager
ServerProtect Domain
Network VirusWall
All newly registered managed products usually appear in the New entity folder
regardless of the agent type.
Note: Viewing and accessing the folders in the Product Directory depends on the Account
Type and user account access rights.
7-26
Administering Managed Products
7-27
Trend Micro Control Manager™ Administrator’s Guide
2. Select a managed product or directory from the Product Directory. The managed
product or directory highlights.
3. Mouseover Tasks from the Product Directory menu. A drop down menu appears.
4. Select Deploy <component> from the drop down menu.
5. Click Next>>.
6. Click Deploy Now to start the manual deployment of new components.
7. Monitor the progress through the Command Tracking screen.
8. Click the Command Details link in the Command Tracking screen to view details
for the Deploy Now task.
7-28
Administering Managed Products
Note: By default, the Status Summary displays a week's worth of information ending with
the day of your query. You can change the scope to Today, Last Week, Last Two
Weeks, or Last month available in the Display summary for list.
Note: For additional information about configuring managed products, refer to the
managed product's documentation.
7-29
Trend Micro Control Manager™ Administrator’s Guide
• Deploy engines
• Deploy pattern files/cleanup templates
• Deploy program files
• Enable/Disable Real-time Scan
• Start Scan Now
Deploy the latest spam rule, pattern, or scan engine to managed products with outdated
components. To successfully do so, the Control Manager server must have the latest
components from the Trend Micro ActiveUpdate server. Perform a manual download to
ensure that current components are already present in the Control Manager server.
To issue tasks to managed products:
1. Access the Product Directory.
2. Select the managed product or directory to issue a task.
3. Mouseover Tasks. A drop-down menu appears.
4. Click a task from the list. Monitor the progress through Command Tracking. Click
the Command Details link at the response screen to view command information.
7-30
Administering Managed Products
7-31
Trend Micro Control Manager™ Administrator’s Guide
6. Specify the data to appear in the log and the order in which the data appears:
Items appearing at the top of the Selected Fields list appear as the left most column
of the table. Removing a field from Selected Fields list removes the corresponding
column from the Ad Hoc Query returned table.
a. Click Change column display. The Select Display Sequence screen appears.
7-32
Administering Managed Products
b. Select a query column from the Available Fields list. The selected item
highlights.
Select multiple items using the Shift or Ctrl keys.
c. Click > to add items to the Selected Fields list.
d. Specify the order in which the data displays by selecting the item and clicking
Move up or Move down.
e. Click Back when the sequence fits your requirements.
7. Specify the filtering criteria for the data:
Note: When querying for summary data, users must specify the items under Required
criteria.
Required criteria:
• Specify a Summary Time for the data or whether you want COOKIES to
appear in your reports.
Custom criteria:
a. Specify the criteria filtering rules for the data categories:
• All of the criteria: This selection acts as a logical AND function. Data
appearing in the report must meet all the filtering criteria.
7-33
Trend Micro Control Manager™ Administrator’s Guide
Tip: If you do not specify any filtering criteria, the Ad Hoc query returns all results
for the applicable columns. Trend Micro recommends specifying filtering criteria
to simplify data analysis after the information for the query returns.
Tip: To query more results on a single screen select a different value in Rows per
page. A single screen can display 10, 15, 30, or 50 query results per page.
7-34
Administering Managed Products
c. Click OK. The saved query appears on the Saved Ad Hoc Queries screen.
7-35
Trend Micro Control Manager™ Administrator’s Guide
Note: MCP agents cannot reconnect to Control Manager if the connection is lost. A user
must manually re-register the managed products.
7-36
Administering Managed Products
3. Specify your filtering criteria for the product. Control Manager supports up to 20
filtering criteria for searches.
4. Click Search to start searching. Search results appear in the Search Result folder of
the Product Directory.
7-37
Trend Micro Control Manager™ Administrator’s Guide
The Directory allows you to create, modify, or delete folders, and move managed
products between folders. You cannot, however, delete nor rename the New entity
folder.
Carefully organize the managed products belonging to each folder. Consider the
following factors when planning and implementing your folder and managed product
structure:
• Product Directory
• User Accounts
• Deployment Plans
• Ad Hoc Query
• Control Manager reports
Group managed products according to geographical, administrative, or product specific
reasons. In combination with different access rights used to access managed products or
folders in the directory, the following table presents the recommended grouping types as
well as their advantages and disadvantages:
TABLE 7-14. Product Grouping Comparison
7-38
Administering Managed Products
Note: The Permission Keep check box allows a folder to keep its source
permission when moved.
7-39
Trend Micro Control Manager™ Administrator’s Guide
Creating Folders
Group managed products into different folders to suit your organization's Control
Manager network administration model.
To create a folder:
1. Access the Directory Management screen.
2. Select Local Folder. The Local Folder highlights.
3. Click Add Folder. The Add Directory dialog box appears.
4. Type a name for the new directory in the Directory name field.
5. Click Save.
Note: Except for the New Entity folder, Control Manager lists all other folders in
ascending order, starting from special characters (!, #, $, %, (, ), *, +, -, comma,
period, +, ?, @, [, ], ^, _, {, |, }, and ~), numbers (0 to 9), or alphabetic characters
(a/A to z/Z).
7-40
Administering Managed Products
Note: Renaming a managed product only changes the name stored in the Control Manager
database; there are no effects to the managed product.
7-41
Trend Micro Control Manager™ Administrator’s Guide
WARNING! Take caution when deleting user-defined folders, you may accidentally
delete a managed product that you do not want to remove.
7-42
Administering Managed Products
Note: In previous versions of Control Manager, a serial number was included with the
product, and users needed to register online to use the full functionality of the
software.
7-43
Trend Micro Control Manager™ Administrator’s Guide
3. Click Managed Products from the sub-menu. The Managed Products License
Management screen appears.
4. Click Add and Deploy. The Add And Deploy A New License Step 1: Input
Activation Code screen appears.
5. Type an Activation Code for the product you want to activate in the New activation
code.
7-44
Administering Managed Products
6. Click Next. The Add And Deploy A New License Step 2: Select Targets screen
appears.
Note: If no products appear in the list, the selected Activation Code does not support any
products currently registered to Control Manager. This could mean that the managed
product does not support receiving Activation Codes from Control Manager servers.
7-45
Trend Micro Control Manager™ Administrator’s Guide
6. Click Save.
Note: If no products appear in the list, the selected Activation Code does not support any
products currently registered to Control Manager.
7-46
Administering Managed Products
7. Click the Command Details link to open the Command Details screen, where you
can review when Control Manager deployed the license profiles, the time of the last
report, the user who authorized the deployment, and a breakdown of deployments
in progress and successfully or unsuccessfully completed. You can also see a list of
deployments by server.
Tip: After activating Control Manager, log off and then log on to the Control Manager
Web console for changes to take effect.
7-47
Trend Micro Control Manager™ Administrator’s Guide
4. On the working area under Control Manager License Information, click the
Activate the product link.
5. Click the Register online link and follow the instructions on the Online
Registration Web site.
6. In the New box, type your Activation Code.
7. Click Activate.
8. Click OK.
7-48
Administering Managed Products
Note: Log off and then log on to the management console for changes to take effect.
Note: Log off and then log on to the management console for changes to take effect.
7-49
Trend Micro Control Manager™ Administrator’s Guide
Note: Control Manager 5.0 Advanced supports the following as child Control Manager
servers:
7-50
Administering Managed Products
Aside from its own Managed Products, a parent server indirectly manages a large
number of managed products handled directly by child servers.
The following table lists the differences between parent and child servers:
TABLE 7-15. Parent and child server feature comparison
AVAILABLE IN AVAILABLE IN
FEATURE PARENT CHILD
Note: A parent server cannot register itself to another parent server. In addition, both
parent and child servers cannot perform dual roles (become a parent and child server
at the same time).
The cascading management structure, using the Control Manager management console,
allows system administrators to manage, monitor, and perform the following actions to
all child servers belonging to a parent server:
• Monitor the Antivirus, Content Security, and Web Security summaries
• Query Event or Security logs
• Initiate tasks
• View reports
• Access the child server management console
The cascading structure can effectively manage your organization's antivirus and
content security products - nationwide or worldwide.
Tip: Trend Micro recommends the management of not more than 200 child servers and
9,600 managed products for one Control Manager parent server.
7-51
Trend Micro Control Manager™ Administrator’s Guide
Direct unregistration Q
Registration Q
7-52
Administering Managed Products
7-53
Trend Micro Control Manager™ Administrator’s Guide
c. If the IIS Web server of Control Manager requires authentication, type the user
name and password.
6. Configure MCP Proxy Settings:
7-54
Administering Managed Products
a. If you will use a proxy server to connect to the Control Manager server, select
Use a proxy server to communicate with the Control Manager server.
b. Select the protocol the proxy uses:
• HTTP
• SOCKS 4
• SOCKS 5
c. Type the proxy server's FQDN or IP address in the Server name or IP
address field.
d. Type the proxy server port number in the Port field.
e. If the proxy server requires user authentication type the user name and
password.
7. Configure Two-way Communication Port Forwarding:
a. If you will use port forwarding with MCP agents, select Enable two-way
communication port forwarding:
b. Type the forwarding IP address in the IP address field.
c. Type the port number in the Port field.
8. To verify the child server can connect to the parent Control Manager server, click
Test Connection.
9. Click Register to connect to the parent Control Manager server.
Tip: If you change any of the settings in this screen after registration, click Update
Settings to notify the Control Manager server of the changes. If you no longer want
the Control Manager server to manage the server, click Unregister anytime.
7-55
Trend Micro Control Manager™ Administrator’s Guide
connection, while the latter temporarily suspends the connection by maintaining the
heartbeat connection between two servers.
When you want to balance the server load between servers a and b, these are the
common scenarios:
• Parent server a is managing more child servers than parent server b
• Parent server a becomes overloaded and you want to reduce the load and transfer
some child servers to parent server
Use Parent Control Manager Settings screen to unregister a child server from a parent
server.
Note: Control Manger 3.0 and 3.5 servers require castool.exe to unregister from Control
Manager 5.0 servers.
Note: You can only access the Product Directory through the parent server management
console.
7-56
Administering Managed Products
Note: A child server uploads status summaries to the parent server when either 2,500
records is reached or 3 minutes elapsed time has passed. During the time when the
child server has not yet uploaded new logs to the parent server, the Outdated,
Current, and Total managed product information in the Component Status table of
the child server Product Status screen may not be current.
7-57
Trend Micro Control Manager™ Administrator’s Guide
Note: Selecting Upload logs immediately will prompt the child server to constantly
send logs to the parent server - affecting network traffic.
Tip: Trend Micro recommends that you schedule the log upload with Frequency = Daily
and Start Time = after office hours or during off-peak hours to prevent heavy
network traffic during business hours. However, when the child server has not yet
uploaded new logs to the parent server, the Component Status table of the child
server's Product Status screen may not show current Outdated, Current, and Total
managed product information.
7-58
Administering Managed Products
WARNING! Use care when disabling a child server connection. Managed products
information registered to a disabled child server does not automatically
upload to the parent server after you re-enable the child server
connection. Restart the Trend Micro Control Manager service after
enabling a child server to upload new managed product information to
the parent server.
6. Click Apply.
- Queue logs on its local server (that is, on the disabled child server itself)
7-59
Trend Micro Control Manager™ Administrator’s Guide
Note: When multiple reports are available in the Reports screen, sort reports according to
Report Profile or Last Created date.
5. Under Available Reports, click the View link of the report profile that you want to
open.
7-60
Administering Managed Products
6. On the Available Reports for {profile name}, sort reports according to Submission
Time or Stage Completion Time.
7. Under the Status column, click View Report. A new browser window opens that
displays the reports content.
7-61
Trend Micro Control Manager™ Administrator’s Guide
7-62
Administering Managed Products
c. If the IIS Web server of Control Manager requires authentication, type the user
name and password.
6. Configure MCP Proxy Settings:
a. If you will use a proxy server to connect to the Control Manager server, select
Use a proxy server to communicate with the Control Manager server and
complete the following settings:
b. Select the protocol the proxy uses:
• HTTP
• SOCKS 4
• SOCKS 5
c. Type the proxy server's FQDN or IP address in the Server name or IP
address field.
d. Type the proxy server port number in the Port field.
e. If the proxy server requires user authentication, type the user name and
password.
7. Configure Two-way Communication Port Forwarding:
a. If you will use port forwarding with MCP agents, select Enable two-way
communication port forwarding and complete the following settings:
b. Type the forwarding IP address in the IP address field.
c. Type the port number in the Port field.
8. To verify the child server can connect to the parent Control Manager server, click
Test Connection.
9. Click Register to connect to the parent Control Manager server.
Tip: If you change any of the settings in this screen after registration, click Update
Settings to notify the Control Manager server of the changes. If you no longer want
the Control Manager server to manage the server, click Unregister anytime.
7-63
Trend Micro Control Manager™ Administrator’s Guide
7-64
Administering Managed Products
Note: Do not use any of the SQL tools to add, delete, or modify records without
instructions from Trend Micro Technical Support.
7-65
Trend Micro Control Manager™ Administrator’s Guide
• tb_TotalWebSecurityCount
• tb_TotalVirusCount
• tb_TotalSecurityCount Stores virus summary information for Status Summary
• tb_TopTenSource and reports
• tb_TopTenDestination
• tb_TopTenVirus
7-66
Administering Managed Products
• tb_VirusOutbreakAccumulate
Stores virus counter information
• tb_SpecialVirusAccumulate
• tb_UGNtfRelation
• tb_NtfUserGROUP Stores user and group notification settings
• tb_GroupAndUserRelation
• tb_ReportScheduleTask
Stores and handles report generation tasks
• tb_ReportTaskQueue
7-67
Trend Micro Control Manager™ Administrator’s Guide
Where:
{ID}: user name of the administrator account used to access the Control
Manager database. This is defined during Control Manager setup.
{password}: password used to access the Control Manager database. This is
defined during Control Manager setup.
{Control Manager database}: name of the Control Manager database
{path and backup name}: target location and the backup file name
For example:
7-68
Administering Managed Products
If the backup file db.dat_bak already exists, the command osql inserts new records to
the existing file to back up new information.
Tip: Trend Micro recommends backing up the Control Manager database regularly. Always
back up when you are about to modify the Control Manager database (for example,
installing a managed product).
7-69
Trend Micro Control Manager™ Administrator’s Guide
For example:
7. Click Start > Programs > Administrative Tools > Services to open the Services
screen.
8. Right-click <Control Manager service>, and then click Restart.
9. Start Control Manager.
For more information on how to use osql, refer to the MSDN library.
7-70
Administering Managed Products
Tip: Trend Micro recommends regular back ups of the Control Manager database. Always
back up when you are about to modify the Control Manager database (for example,
adding installing a managed product).
7-71
Trend Micro Control Manager™ Administrator’s Guide
10. Click Start > Programs > Administrative Tools > Services to open the Services
screen.
11. Right-click <Control Manager service>, and then click Restart.
12. Start Control Manager.
7-72
Administering Managed Products
Note: The third command might take longer depending on the size of the database.
7-73
Trend Micro Control Manager™ Administrator’s Guide
7-74
Chapter 8
Using Trend Micro Services
This chapter provides details about the various services available when using Control
Manager.
This chapter contains the following topics:
• Understanding Trend Micro Services on page 8-2
• Understanding Enterprise Protection Strategy on page 8-3
• Introducing TrendLabs Message Board on page 8-5
• Participating in the World Virus Tracking Program on page 8-5
• Introducing Outbreak Prevention Services on page 8-6
• Preventing Virus Outbreaks and Understanding the Outbreak Prevention Mode
on page 8-9
• Using Outbreak Prevention Mode on page 8-18
8-1
Trend Micro Control Manager™ Administrator’s Guide
8-2
Using Trend Micro Services
8-3
Trend Micro Control Manager™ Administrator’s Guide
• Focus on the critical stages before and after pattern file deployment manages
explosive costs and system damage
The graph demonstrates that putting protection in place as quickly as possible and
ridding the network of post-attack vulnerabilities can minimize the devastating effects of
outbreaks over time.
By using EPS and Outbreak Prevention Services, enterprises can minimize their risk and
dramatically lower costs. By deploying policies early in the lifecycle and before pattern
file generation, an organization can dramatically reduce the cost and effort (area under
the curve), in addition to increasing the overall level of protection.
Trend Micro’s expertise, architecture, and services provide a strong return on
investment, improve overall protection, and increase the productivity of enterprise
networks.
8-4
Using Trend Micro Services
8-5
Trend Micro Control Manager™ Administrator’s Guide
8-6
Using Trend Micro Services
BENEFIT REASONS
8-7
Trend Micro Control Manager™ Administrator’s Guide
4. Do the following:
• If you don't have an Activation Code: click the Register online link and
follow the instructions on the Online Registration Web site to obtain an
Activation Code
• If you have an Activation Code: in the New box, type your Activation Code
5. Click Activate.
In addition, this page also provides an easy way to view the Control Manager
components and the version that are currently in use.
To view the Outbreak Prevention Services status:
1. Click Services on the main menu.
2. On the left-hand menu under Services, click Outbreak Prevention. This page
automatically refreshes to make sure the top threat and status information is
current.
8-8
Using Trend Micro Services
8-9
Trend Micro Control Manager™ Administrator’s Guide
8-10
Using Trend Micro Services
2. On the left-hand menu under Services, click Outbreak Prevention > Settings.
Tip: After installing Control Manager for the first time, Trend Micro strongly
recommends you perform an Update Now to update your policies immediately. For
subsequent updates, use the Scheduled Update function.
8-11
Trend Micro Control Manager™ Administrator’s Guide
7. Click Save.
8. Click OK.
3. On the working area under Service Status, click Update Now to download the
latest Outbreak Prevention Policies (this is optional if you have already enabled
Scheduled Update and are using the latest Outbreak Prevention Policies).
4. Click OK twice after downloading the Outbreak Prevention Policies.
8-12
Using Trend Micro Services
5. Under Top Threats Around the World, click the name of the virus that currently
presents a threat to your network. By default, Control Manager lists newest threat
first, and the remaining threats in alphabetic order. Each Outbreak Prevention
Policy is designed to counter a specific threat.
6. Click Start Outbreak Prevention Mode.
7. Under Outbreak Prevention Policy, in the Policy in effect for list, choose the
number of days that Control Manager continues in Outbreak Prevention Mode.
8. From the Deployment plan list, choose a plan to deploy the Outbreak Prevention
Policies to the managed products.
9. Under Outbreak Prevention Policy Details, select the Do not block permitted port
numbers specified in the Outbreak Prevention settings check box to ensure
ports defined as exceptions are not blocked.
10. Configure managed product settings or click Recommended Settings.
11. Click Activate.
12. Click OK. Outbreak Prevention Mode has started and the icon appears on
the management console header.
8-13
Trend Micro Control Manager™ Administrator’s Guide
5. From the Deployment Plan list, choose a plan to deploy the Outbreak Prevention
Policies to the managed products (to view/edit or add deployment plans, mouseover
Updates, and then click Deployment Plan).
6. Under Outbreak Prevention Policy Details, select the Do not block permitted
port numbers specified in the Outbreak Prevention settings check box to
ensure ports defined as exceptions are not blocked.
7. Configure managed product settings or click Recommended Settings.
Tip: When you click Recommended Settings, the TrendLabs recommended settings are
applied and any user-defined settings are removed. If necessary, based on the latest
information, these recommendations are updated with each Outbreak Prevention
Policy release. Trend Micro recommends you apply the recommended settings.
8. Click Activate.
8-14
Using Trend Micro Services
8-15
Trend Micro Control Manager™ Administrator’s Guide
8-16
Using Trend Micro Services
HEADING DESCRIPTION
8-17
Trend Micro Control Manager™ Administrator’s Guide
Scheduled Outbreak Prevention Control Manager can inform you if it downloads Out-
Policy downloads break Prevention Policies that correspond to an ongo-
ing virus outbreak. To receive notification about this
event, enable Active Outbreak Prevention Policy
received at the Event Center.
Upon receiving the notification, start Outbreak Preven-
tion Mode immediately.
TrendLabs Message Board The Trend Micro TrendLabs Message Board provides
the version numbers and the time TrendLabs releases
the antivirus and content security components. This
helps identify malware threats and provides update
information about your Control Manager system.
Your Technical Account Manager Depending on the support arrangement you have with
(TAM) Trend Micro, your Technical Account Manager will
inform you of any outbreak alerts.
Upon receipt of the warning, update your outbreak pre-
vention policies.
Trend Micro virus bulletins You can subscribe to this service at the Trend Micro
Web site.
8-18
Using Trend Micro Services
Special Virus alert This Control Manager feature, configured at the Event
Center, warns you when a Trend Micro product detects
an outbreak-causing virus on your network.
This allows you to immediately take precautionary
measures, such as warning your company's employ-
ees about certain kinds of email messages.
Tip: Simplify this evaluation process by enabling Control Manager features that inform
you about the availability of outbreak prevention policies that correspond to ongoing
virus outbreaks.
For Outbreak Prevention Services alerts, see Using Event Center on page 6-8
8-19
Trend Micro Control Manager™ Administrator’s Guide
Note: If you edit the policy, Control Manager resets and starts the duration on the day you
applied the changes.
Note: If none of the existing Deployment Plans suits your needs, create a new plan. See
Understanding Deployment Plans on page 5-57.
8-20
Using Trend Micro Services
Note: If any of the above products do not belong to your Control Manager network,
Control Manager ignores the settings for those products.
8-21
Trend Micro Control Manager™ Administrator’s Guide
Tip: Manually stop Outbreak Prevention Mode after the policy duration expires.
Otherwise, the Outbreak Prevention Mode Scheduled Update feature cannot
automatically apply new Outbreak Prevention Policies.
8-22
Chapter 9
Using Control Manager Tools
Control Manager provides a number of tools to help you with specific configuration
tasks.
Control Manager houses most tools at the following location:
<root>:\Control Manager\WebUI\download\tools\
This chapter provides instructions on how to use the following Control Manager tools:
• Using Agent Migration Tool (AgentMigrateTool.exe) on page 9-2
• Using the Control Manager MIB File on page 9-2
• Using the NVW 1.x SNMPv2 MIB File on page 9-3
• Using the NVW Enforcer SNMPv2 MIB File on page 9-3
• Using the NVW System Log Viewer on page 9-4
• Using the NVW 1.x Rescue Utility on page 9-4
• Using the Appliance Firmware Flash Utility on page 9-4
• Using the DBConfig Tool on page 9-5
9-1
Trend Micro Control Manager™ Administrator’s Guide
Note: For MCP agents, the Agent Migration Tool supports Windows-based and
Linux-based agent migration.
For Control Manager 2.x agents, the Agent Migration Tool can only migrate
Windows-based agents. Please contact Trend Micro Support for migrating
non-Windows based agents (see Contacting Technical Support on page 11-2).
9-2
Using Control Manager Tools
9-3
Trend Micro Control Manager™ Administrator’s Guide
9-4
Using Control Manager Tools
Note: The Default Mode is SQL authentication mode, however Windows authentication
mode is necessary when configuring for Windows authentication.
9-5
Trend Micro Control Manager™ Administrator’s Guide
9-6
Chapter 10
Removing Trend Micro Control Manager
This chapter contains information about how to remove Control Manager components
from your network, including the Control Manager server, Control Manager agents, and
other related files.
This chapter contains the following sections:
• Removing a Control Manager Server on page 10-2
• Manually Removing Control Manager on page 10-2
• Removing a Windows-Based Control Manager 2.x Agent on page 10-7
10-1
Trend Micro Control Manager™ Administrator’s Guide
Note: Keeping the database allows you to re-install Control Manager on the
server and retain all system information, such as agent registration, and
user account data.
If you re-installed the Control Manager server, and deleted the original database, but did
not remove the agents that originally reported to the previous installation then the
agents will re-register with the server when:
• Managed product servers restart the agent services
• Control Manager agents verify their connection after an 8-hour period
Note: Windows-specific instructions may vary between operating system versions. The
following procedures are written for Windows 2000.
10-2
Removing Trend Micro Control Manager
Note: After removing all components, you must restart your server. You only have to do this
once — after completing the removal.
10-3
Trend Micro Control Manager™ Administrator’s Guide
Note: These services run in the background on the Windows operating system, not the
Trend Micro services that require Activation Codes (for example, Outbreak
Prevention Services).
FIGURE 10-1. View of the command line with the necessary services
stopped
10-4
Removing Trend Micro Control Manager
3. On the left-hand menu, double-click the server name to expand the console tree.
4. Double-click Default Web Site.
5. Delete the following virtual directories:
• ControlManager
• TVCSDownload
• Viewer9
• TVCS
• Jakarta
• WebApp
6. Right-click the IIS Web site you set during installation.
7. Click Properties.
8. Click the ISAPI Filters tab.
9. Delete the following ISAPI filters:
• TmcmRedirect
• CCGIRedirect
• ReverseProxy
10. On IIS 6 only, delete the following Web service extensions:
• Trend Micro Common CGI Redirect Filter (If removing CCGI)
• Trend Micro Control Manager CGI Extensions
11. Click OK.
10-5
Trend Micro Control Manager™ Administrator’s Guide
10-6
Removing Trend Micro Control Manager
Tip: Trend Micro recommends visiting Microsoft's Web site for instructions on removing
SQL Server 2005 Express if you have any issues with the uninstallation:
http://support.microsoft.com/kb/909967
10-7
Trend Micro Control Manager™ Administrator’s Guide
10-8
Removing Trend Micro Control Manager
8. Click Next. The Control Manager source server log on screen appears.
9. Specify and provide Administrator-level logon credentials for the Control Manager
server e. Type the following information:
• Host name
• User name
• Password
10. Click Next. Select the product whose agent you want to remove.
11. Click Next. Select the servers from which to remove the agents. You have two ways
to select those servers:
To select from the list:
a. In the left list box, double-click the domain containing the antivirus servers,
and the domain expands to show all the servers inside.
10-9
Trend Micro Control Manager™ Administrator’s Guide
b. Select the target server(s) from the left list box, and then click Add. The
chosen server appears on the right list box. Click Add All to add agents to all
servers in the selected chosen domain.
Alternatively, you can double-click on a server to add it to the left list.
To specify a server name directly:
a. Type the server's FQDN or IP address in the Server name field.
b. Click Add. The server appears on the right list box.
To remove servers from the list, select a server from the right list box, and then click
Remove. To remove all servers, click Remove All.
12. Click Back to return to the previous screen, Exit to abort the operation, or Next to
continue.
13. Provide Administrator-level logon credentials for the selected servers. Type the
required user name and password in the appropriate field.
14. Click OK. The Uninstallation List screen provides the following details about the
target servers: server name, domain, and the type of agent detected.
10-10
Removing Trend Micro Control Manager
15. Click Next to continue. The table on this screen shows the following information
about the target servers: server name, operating system version, IP address, Domain
name, and the version of the agent you will remove.
Click Back to return to the previous screen, Exit to abort the operation, or
Uninstall to remove the agent. The uninstallation begins.
16. Click OK, and then at the Removing Agents screen, click Exit.
10-11
Trend Micro Control Manager™ Administrator’s Guide
10-12
Chapter 11
Getting Support
Trend Micro has committed to providing service and support that exceeds our users’
expectations. This chapter contains information on how to get technical support.
Remember, you must register your product to be eligible for support.
This chapter contains the following topics:
• Before Contacting Technical Support on page 11-2
• Contacting Technical Support on page 11-2
• TrendLabs on page 11-3
• Other Useful Resources on page 11-3
11-1
Trend Micro Control Manager™ Administrator’s Guide
To locate the Trend Micro office nearest you, open a Web browser to the following
URL:
http://www.trendmicro.com/en/about/contact/overview.htm
To speed up the problem resolution, when you contact our staff please provide as much
of the following information as you can:
• Product serial number
11-2
Getting Support
TrendLabs
Trend Micro TrendLabsSM is a global network of antivirus research and product support
centers providing continuous 24 x 7 coverage to Trend Micro customers worldwide.
Staffed by a team of more than 250 engineers and skilled support personnel, the
TrendLabs dedicated service centers worldwide ensure rapid response to any virus
outbreak or urgent customer support issue, anywhere in the world.
The TrendLabs modern headquarters has earned ISO 9002 certification for its quality
management procedures in 2000 - one of the first antivirus research and support
facilities to be so accredited. Trend Micro believes TrendLabs is the leading service and
support team in the antivirus industry.
For more information about TrendLabs, please visit:
www.trendmicro.com/en/security/trendlabs/overview.htm
11-3
Trend Micro Control Manager™ Administrator’s Guide
11-4
Appendix A
Appendix A: System Checklists
Use the checklists in this appendix to record relevant system information as a reference.
This appendix contains the following sections:
• Server Address Checklist on page A-2
• Ports Checklist on page A-3
• Control Manager 2.x Agent installation Checklist on page A-4
• Control Manager Conventions on page A-4
• Core Process and Configuration Files on page A-5
• Communication and Listening Ports on page A-7
• Trend Micro Control Manager Product Features on page A-8
A-1
Trend Micro Control Manager™ Administrator’s Guide
IP address 10.1.104.255
IP address 10.1.104.225
IP address 10.1.114.225
IP address 10.1.174.225
Fully qualified domain name (FQDN) proxy.company.com
IP address 10.1.123.225
A- 2
Appendix A: System Checklists
IP address 10.1.194.225
Ports Checklist
Control Manager uses the following ports for the indicated purposes.
SMTP 25
Proxy 8088
Note: Control Manager requires the exclusive use of ports 10319 and 10198.
A-3
Trend Micro Control Manager™ Administrator’s Guide
Note: You can use any User ID in lieu of the Root account User name. However, Trend Micro
recommends using the Root account, because deleting the User ID specified while
installing the agent makes managing the agent very difficult.
ADMINISTRATOR-LEVEL
PRODUCT NAME IP ADDRESS HOSTNAME
ACCOUNT
A- 4
Appendix A: System Checklists
User names
Folder names
Note: For the Control Manager server host name, Setup supports servers with underscores
("_") as part of the server name.
A-5
Trend Micro Control Manager™ Administrator’s Guide
PROCESSES DESCRIPTION
A- 6
Appendix A: System Checklists
PROCESSES DESCRIPTION
ProcessManager.exe 20501
CmdProcessor.exe 20101
A-7
Trend Micro Control Manager™ Administrator’s Guide
UIProcessor.exe 20701
LogReceiver.exe 20201
LogRetriever.exe 20301
ReportServer.exe 20601
MsgReceiver.exe 20001
EntityEmulator.exe 20401
CasProcessor.exe 20801
DcsProcessor.exe 20903
CONTROL MANAGER
FEATURES
3.X ENT 3.X STD 5.0 ADV 5.0 STD
Ad Hoc Query Q Q
Command Tracking Q Q Q Q
Communicator Heartbeat Q Q Q Q
A- 8
Appendix A: System Checklists
CONTROL MANAGER
FEATURES
3.X ENT 3.X STD 5.0 ADV 5.0 STD
Communicator Scheduler Q Q Q Q
Configuration by group Q Q Q Q
Deployment Plans Q Q Q Q
Directory Manager Q Q Q Q
Event Center Q Q Q Q
Improved Navigation Q Q Q Q
Logging Enhancements Q Q
Manage services Q Q Q Q
A-9
Trend Micro Control Manager™ Administrator’s Guide
CONTROL MANAGER
FEATURES
3.X ENT 3.X STD 5.0 ADV 5.0 STD
Remote management Q Q Q Q
Reporting Q Q
Syslog notification Q
A-10
Appendix A: System Checklists
CONTROL MANAGER
FEATURES
3.X ENT 3.X STD 5.0 ADV 5.0 STD
Vulnerability Assessment Q Q Q Q
Windows Authentication Q Q
Work-hour control Q Q Q Q
A-11
Trend Micro Control Manager™ Administrator’s Guide
A-12
Appendix B
Appendix B: Understanding Data
Views
Database views are available to Control Manager 5.0 report templates and to Ad Hoc
Query requests.
This appendix contains the following sections:
• Data Views: Product Information on page B-3
• License Information on page B-3
• Managed Product Information on page B-7
• Component Information on page B-11
• Control Manager Information on page B-16
• Data View: Security Threat Information on page B-19
• Virus/Malware Information on page B-20
• Spyware/Grayware Information on page B-34
• Content Violation Information on page B-48
• Spam Violation Information on page B-53
• Policy/Rule Violation Information on page B-57
• Web Violation/Reputation Information on page B-63
• Suspicious Threat Information on page B-71
• Overall Threat Information on page B-83
B-1
Trend Micro Control Manager™ Administrator’s Guide
Product Information
Product Information Data Views provide information about Control Manager,
managed products, components, and product licenses.
Overall Threat Information Displays summary and statistical data about the
overall threat landscape of your network.
Displays summary and detailed data about
Virus/Malware Information malware/viruses managed products detect on
your network.
B- 2
Appendix B: Understanding Data Views
Spam Violation Information Displays summary and detailed data about spam
managed products detect on your network.
Displays summary and detailed data about
Web Violation Information Internet violations managed products detect on
your network.
License Information
Managed Product License Status
Displays detailed information about the managed product and information about the
Activation Code the managed product uses. Examples: managed product information,
B-3
Trend Micro Control Manager™ Administrator’s Guide
whether the Activation Code is active, the number of managed products the Activation
Code activates
DATA DESCRIPTION
Managed Product Entity Displays the entity display name for a managed
Display Name product. Control Manager identifies managed
products using the managed product's entity
display name.
Managed Product Name Displays the name of the managed product.
Example: OfficeScan, ScanMail for Microsoft
Exchange
Managed Product Version Displays the managed product's version number.
Example: OfficeScan 8.0, Control Manager 3.5
Managed Product Service Displays the name of the managed product
service. Example: Vulnerability Assessment,
Outbreak Protection Service
License Status Displays the status of the license for managed
products. Example: Activated, Expired, In grace
period
Activation Code Displays the Activation Code for managed
products.
Activation Code Count Displays the number of Activation Codes a
managed products uses.
License Expiration Date Displays the date the license expires for the
managed product
B- 4
Appendix B: Understanding Data Views
DATA DESCRIPTION
B-5
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
Managed Product Entity Displays the entity display name for a managed
Display Name product. Control Manager identifies managed
products using the managed product's entity
display name.
Managed Product Name Displays the name of the managed product.
Example: OfficeScan, ScanMail for Microsoft
Exchange
Managed Product Version Displays the managed product's version number.
Example: OfficeScan 8.0, Control Manager 3.5
Managed Service Displays the name of the managed service.
Example: Vulnerability Assessment, Web
Reputation Service
License Status Displays the status of the license for managed
products. Example: Activated, Expired, In grace
period
Managed Product Type Displays the type of managed product the
Activation Code provides. Example: Trial version,
Full version
Activation Code Displays the Activation Code for managed
products.
License Expiration Date Displays the date the license expires for the
managed product.
Seat Count Displays the number of seats the Activation Code
allows.
Description Displays the description for the Activation Code.
B- 6
Appendix B: Understanding Data Views
DATA DESCRIPTION
Registered to Control Manager Displays the Control Manager server to which the
managed product is registered.
Managed Product Category Displays the threat protection category for a
managed product. Example: Server-based
products, Desktop products
Managed Product Name Displays the name of the managed product.
Example: OfficeScan, ScanMail for Microsoft
Exchange
Managed Product Version Displays the managed product's version number.
Example: OfficeScan 8.0, Control Manager 3.5
Managed Product Role Displays the role the managed product has in the
network environment. Example: server, client
Managed Product Count Displays the total number of a specific managed
product a network contains.
B-7
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
Managed Product Entity Displays the entity display name for a managed
Display Name product. Control Manager identifies managed
products using the managed product's entity
display name.
Managed Product Host Name Displays the name of the server on which the
managed product installs.
Managed Product IP Address Displays the IP address of the server on which
the managed product installs.
Managed Product MAC Displays the MAC address of the server on which
Address the managed product installs.
Managing Control Manager Displays the entity display name of the Control
Entity Display Name Manager server to which the managed product is
registered.
Managing Server Entity Display Displays the entity display name of the managed
Name product server to which a client is registered.
Domain Name Displays the domain to which the managed
product belongs.
Managed Product Connection Displays the managed product's connection
Status status to Control Manager. Example: Normal,
Abnormal, Offline
Pattern File Status Displays the status of the pattern files/rules the
managed product uses. Example: up-to-date,
out-of-date
Scan Engine Status Displays the status of the scan engines the
managed product uses. Example: up-to-date,
out-of-date
B- 8
Appendix B: Understanding Data Views
DATA DESCRIPTION
TABLE B-8. ServerProtect and OfficeScan Server/Domain Status Summary Data View
DATA DESCRIPTION
Managed Product Entity Displays the entity display name for a managed
Display Name product.
B-9
Trend Micro Control Manager™ Administrator’s Guide
TABLE B-8. ServerProtect and OfficeScan Server/Domain Status Summary Data View
DATA DESCRIPTION
DATA DESCRIPTION
Time Received from Entity Displays the time that Control Manager receives
data about the managed product event.
Time Generated at Entity Displays the time that the managed product
generates data about the event.
Managed Product Entity Displays the entity display name for a managed
Display Name product. Control Manager identifies managed
products using the managed product's entity
display name.
Managed Product Name Displays the name of the managed product.
Example: OfficeScan, ScanMail for Microsoft
Exchange
B-10
Appendix B: Understanding Data Views
DATA DESCRIPTION
Component Information
Managed Product Scan Engine Status
Displays detailed information about scan engines managed products use. Examples:
scan engine name, time of the latest scan engine deployment, and which managed
products use the scan engine
DATA DESCRIPTION
Managed Product Entity Displays the entity display name for a managed
Display Name product. Control Manager identifies managed
products using the managed product's entity
display name.
Managed Product Host Name Displays the host name of the server on which
the managed product installs.
Managed Product IP Address Displays the IP address of the server on which
the managed product installs.
B-11
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
B-12
Appendix B: Understanding Data Views
DATA DESCRIPTION
Managed Product Entity Displays the entity display name for a managed
Display Name product. Control Manager identifies managed
products using the managed product's entity
display name.
Managed Product Host Name Displays the name of the server on which the
managed product installs.
Managed Product IP Address Displays the IP address of the server on which
the managed product installs.
Connection Status Displays the connection status between the
managed product and Control Manager server or
managed products and their clients.
Managed Product Name Displays the name of the managed product.
Example: OfficeScan, ScanMail for Microsoft
Exchange
Managed Product Version Displays the managed product's version number.
Example: OfficeScan 8.0, Control Manager 3.5
Managed Product Role Displays the role the managed product has in the
network environment. Example: server, client
Pattern File/Rule Name Displays the name of the pattern file or rule.
Example: Virus Pattern File, Anti-spam Pattern
Pattern File/Rule Version Displays the version of the pattern file or rule.
Example: Virus Pattern File: 3.203.00, Anti-spam
Pattern: 14256
Pattern File/Rule Status Displays the pattern file/rule currency status.
Example: up-to-date, out-of-date
B-13
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
Time of Latest Pattern Displays the time of the latest pattern file/rule
File/Rule Update deployment to managed products or clients.
DATA DESCRIPTION
Managed Product Entity Displays the entity display name for a managed
Display Name product. Control Manager identifies managed
products using the managed product's entity
display name.
Managed Product Name Displays the name of the managed product.
Example: OfficeScan, ScanMail for Microsoft
Exchange
Managed Product Version Displays the managed product's version number.
Example: OfficeScan 8.0, Control Manager 3.5
Connection Status Displays the connection status between the
managed product and Control Manager server or
managed products and their clients.
Pattern File/Rule Status Displays the pattern file/rule currency status.
Example: up-to-date, out-of-date
Pattern File/Rule Deployment Displays the deployment status for the latest
Status pattern file/rule update. Example: successful,
unsuccessful, in progress
Time of Latest Pattern Displays the time of the latest pattern file/rule
File/Rule Deployment deployment to managed products or clients.
B-14
Appendix B: Understanding Data Views
DATA DESCRIPTION
DATA DESCRIPTION
Scan Engine Name Displays the name of the scan engine. Example:
Anti-spam Engine (Windows), Virus Scan Engine
IA 64 bit Scan Engine
Scan Engine Version Displays the version of the scan engine. Example:
Anti-spam Engine (Windows): 3.000.1153, Virus
Scan Engine IA 64 bit Scan Engine: 8.000.1008
Scan Engines Up-to-Date Displays the number of managed products with
up-to-date scan engines.
Scan Engines Out-of-Date Displays the number of managed products with
out-of-date scan engines.
Scan Engine Up-to-Date Displays the percentage of managed products
Rate (%) with up-to-date scan engines. This includes scan
engines that return N/A as a value.
B-15
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
Pattern File/Rule Name Displays the name of the pattern file or rule.
Example: Virus Pattern File, Anti-spam Pattern
Pattern File/Rule Version Displays the version of the pattern file or rule.
Example: Virus Pattern File: 3.203.00, Anti-spam
Pattern: 14256
Pattern Files/Rules Up-to-Date Displays the number of managed products with
up-to-date pattern files or rules.
Pattern Files/Rules Displays the number of managed products with
Out-of-Date out-of-date pattern files or rules.
Pattern Files/Rules Up-to-Date Displays the percentage of managed products
Rate (%) with up-to-date pattern files/rules. This includes
pattern files/rules that return n/a as a value.
DATA DESCRIPTION
B-16
Appendix B: Understanding Data Views
DATA DESCRIPTION
DATA DESCRIPTION
B-17
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
Time of Command Displays the time that the issuer of the command
issues the command.
Command Type Displays the type of command issued. Example:
scheduled update, Activation Code deployment
Command Parameter Displays the specific information relating to the
command. Example: specific pattern file name,
specific Activation Code
Issuer of Command Displays the user who issued the command.
Time of Latest Status Update Displays the time of the latest status check of all
commands for the selected Control Manager.
Successful Displays the number of successful commands.
Unsuccessful Displays the number of unsuccessful commands.
In Progress Displays the number of commands that are still in
progress.
All Displays the total number of commands
(Successful + Unsuccessful + In progress).
B-18
Appendix B: Understanding Data Views
DATA DESCRIPTION
Time of Command Displays the time that the command was issued.
Command Type Displays the type of command issued. Example:
scheduled update, Activation Code deployment
Command Parameter Displays the specific information relating to the
command. Example: specific pattern file name,
specific Activation Code
Managed Product Entity Displays the managed product to which the
Display Name command was issued.
Issuer of Command Displays the user who issued the command.
Command Status Displays the status of the command: successful,
unsuccessful, in progress
Time of Latest Status Update Displays the time of the latest status check of all
commands for the selected Control Manager.
Result Detail Description Displays the description Control Manager
provides for events.
B-19
Trend Micro Control Manager™ Administrator’s Guide
Virus/Malware Information
Summary Information
Overall Virus/Malware Summary
Provides overall specific summary for virus/malware detections. Example: name of
virus/malware, number of clients affected by the virus, total number of instances of the
virus on the network
DATA DESCRIPTION
B-20
Appendix B: Understanding Data Views
DATA DESCRIPTION
B-21
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
B-22
Appendix B: Understanding Data Views
DATA DESCRIPTION
B-23
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
Summary Time Displays the time that the summary of the data
occurs.
Unique Virus/Malware Count Displays the number of unique virus/malware
managed products detect. Example: OfficeScan
detects 10 virus instances of the same virus on
one computer. The Security Risk Detection
Count equals 10, while the Unique
Virus/Malware count equals 1.
Unique Infection Destination Displays the number of unique computers
Count affected by the virus/malware. Example:
OfficeScan detects 10 virus instances of the same
virus on 3 different computers. The Unique
Infection Destination Count equals 3.
Unique Infection Source Count Displays the number of unique infection sources
where viruses/malware originate. Example:
OfficeScan detects 10 virus instances of the same
virus originating from 2 infection sources. The
Unique Infection Source Count equals 2.
Virus/Malware Detection Displays the total number of viruses/malware
Count managed products detect. Example: OfficeScan
detects 10 virus instances of the same virus on
one computer. The Security Risk Detection
Count equals 10, while the Unique
Virus/Malware count equals 1.
B-24
Appendix B: Understanding Data Views
DATA DESCRIPTION
B-25
Trend Micro Control Manager™ Administrator’s Guide
Detailed Information
Detailed Overall Virus/Malware Information
Provides specific information about the virus/malware instances on your network.
Example: the managed product which detects the viruses/malware, the name of the
virus/malware, the name of the client with viruses/malware
DATA DESCRIPTION
Time Received from Entity Displays the time that Control Manager receives
data from the managed product.
Time Generated at Entity Displays the time that the managed product
generates data.
Managed Product Entity Displays the entity display name for a managed
Display Name product. Control Manager identifies managed
products using the managed product's entity
display name.
Managed Product Name Displays the name of the managed product.
Example: OfficeScan, ScanMail for Microsoft
Exchange
Virus/Malware Name Displays the name of viruses/malware managed
products detect. Example: NIMDA, BLASTER,
I_LOVE_YOU.EXE
Infection Destination Displays the IP address/host name of the
computer affected by viruses/malware.
Infection Source Displays the IP address/host name of the
computer where viruses/malware originates.
Log On User Name Displays the user name logged on to the infection
destination when a managed product detects
viruses/malware.
Action Result Displays the results of the action managed
products take against viruses/malware. Example:
successful, further action required
B-26
Appendix B: Understanding Data Views
DATA DESCRIPTION
DATA DESCRIPTION
Time Received from Entity Displays the time that Control Manager receives
data from the managed product.
Time Generated at Entity Displays the time that the managed product
generates data.
B-27
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
Managed Product Entity Displays the entity display name for a managed
Display Name product. Control Manager identifies managed
products using the managed product's entity
display name.
Managed Product Name Displays the name of the managed product.
Example: OfficeScan, ScanMail for Microsoft
Exchange
Virus/Malware Name Displays the name of viruses/malware managed
products detect. Example: NIMDA, BLASTER,
I_LOVE_YOU.EXE
Infection Destination Displays the name of the computer affected by
viruses/malware.
Log On User Name Displays the user name logged on to the infection
destination when a managed product detects
viruses/malware.
Detecting Scan Type Displays the type of scan the managed product
uses to detect the virus/malware. Example:
Real-time, scheduled, manual
Detected File Name Displays the name of the file managed products
detect affected by viruses/malware.
File Path Displays the file path on the infection destination
where managed products detect the
virus/malware.
File in Compressed File Displays the name of the infected
file/virus/malware in a compressed file.
Action Result Displays the results of the action managed
products take against viruses/malware. Example:
successful, further action required
Action Taken Displays the type of action managed products
take against viruses/malware. Example: File
cleaned, File quarantined, File deleted
B-28
Appendix B: Understanding Data Views
DATA DESCRIPTION
DATA DESCRIPTION
Time Received from Entity Displays the time that Control Manager receives
data from the managed product.
Time Generated at Entity Displays the time that the managed product
generates data.
Managed Product Entity Displays the entity display name for a managed
Display Name product. Control Manager identifies managed
products using the managed product's entity
display name.
Managed Product Name Displays the name of the managed product.
Example: OfficeScan, ScanMail for Microsoft
Exchange
Virus/Malware Name Displays the name of viruses/malware managed
products detect. Example: NIMDA, BLASTER,
I_LOVE_YOU.EXE
Infection Destination Displays the IP address/host name of the
computer on which managed products detect
viruses/malware.
B-29
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
Source URL Displays the URL of the Web/FTP site which the
virus/malware originates.
Log On User Name Displays the log on name of the user with a
virus/malware instance.
Inbound/Outbound Displays the direction of virus/malware entry.
Traffic/Connection
Internet Browser/FTP Client Displays the Internet browser or FTP client
where the viruses/malware originates.
Action Result Displays the results of the action managed
products take against viruses/malware. Example:
successful, further action required
Action Taken Displays the type of action managed products
take against viruses/malware. Example: File
cleaned, File quarantined, File deleted
Virus/Malware Detection Displays the total number of viruses/malware
Count managed products detect. Example: OfficeScan
detects 10 virus instances of the same virus on
one computer. The Security Risk Detection
Count equals 10, while the Unique
Virus/Malware count equals 1.
DATA DESCRIPTION
Time Received from Entity Displays the time that Control Manager receives
data from the managed product.
B-30
Appendix B: Understanding Data Views
DATA DESCRIPTION
Time Generated at Entity Displays the time that the managed product
generates data.
Managed Product Entity Displays the entity display name for a managed
Display Name product. Control Manager identifies managed
products using the managed product's entity
display name.
Managed Product Name Displays the name of the managed product.
Example: OfficeScan, ScanMail for Microsoft
Exchange
Virus/Malware Name Displays the name of viruses/malware managed
products detect. Example: NIMDA, BLASTER,
I_LOVE_YOU.EXE
Recipient Displays the recipient of email message
containing viruses/malware.
Sender Displays the sender of email message containing
viruses/malware.
Log On User Name Displays the log on name of the user with a
virus/malware instance.
Email Subject Content Displays the content of the subject line of the
email message containing viruses/malware.
Detected File Name Displays the name of the file managed products
detect affected by viruses/malware.
File in Compressed File Displays the name of the infected
file/virus/malware in a compressed file.
Action Result Displays the results of the action managed
products take against viruses/malware. Example:
successful, further action required
Action Taken Displays the type of action managed products
take against viruses/malware. Example: File
cleaned, File quarantined, File deleted
B-31
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
DATA DESCRIPTION
Time Received from Entity Displays the time that Control Manager receives
data from the managed product.
Time Generated at Entity Displays the time that the managed product
generates data.
Managed Product Entity Displays the entity display name for a managed
Display Name product. Control Manager identifies managed
products using the managed product's entity
display name.
Managed Product Name Displays the name of the managed product.
Example: OfficeScan, ScanMail for Microsoft
Exchange
Virus/Malware Name Displays the name of viruses/malware managed
products detect. Example: NIMDA, BLASTER,
I_LOVE_YOU.EXE
Infection Destination Displays the IP address/ host name of the
computer affected by viruses/malware.
B-32
Appendix B: Understanding Data Views
DATA DESCRIPTION
B-33
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
Spyware/Grayware Information
Summary Information
Overall Spyware/Grayware Summary
Provides overall specific summary for spyware/grayware detections. Example: name of
spyware/grayware, number of clients affected by the spyware/grayware, total number of
instances of the spyware/grayware on the network
DATA DESCRIPTION
B-34
Appendix B: Understanding Data Views
DATA DESCRIPTION
DATA DESCRIPTION
B-35
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
DATA DESCRIPTION
B-36
Appendix B: Understanding Data Views
DATA DESCRIPTION
DATA DESCRIPTION
Summary Time Displays the time that the summary of the data
occurs.
Unique Spyware/Grayware Displays the number of unique spyware/grayware
Count managed products detect. Example: OfficeScan
detects 10 spyware/grayware instances of the
same spyware/grayware on one computer. The
Spyware/Grayware Detection Count equals 10,
while the Unique Spyware/Grayware Count
equals 1.
Unique Spyware/Grayware Displays the number of unique computers
Destination Count affected by the spyware/grayware. OfficeScan
detects 10 spyware/grayware instances of the
same spyware/grayware on 3 different
computers. The Unique Spyware/Grayware
Destination Count equals 3.
B-37
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
DATA DESCRIPTION
B-38
Appendix B: Understanding Data Views
DATA DESCRIPTION
Detailed Information
Detailed Overall Spyware/Grayware Information
Provides specific information about the spyware/grayware instances on your network.
Example: the managed product that detects the spyware/grayware, the name of the
spyware/grayware, the name of the client with spyware/grayware
DATA DESCRIPTION
Time Received from Entity Displays the time that Control Manager receives
data from the managed product.
Time Generated at Entity Displays the time that the managed product
generates data.
Managed Product Entity Displays the entity display name for a managed
Display Name product. Control Manager identifies managed
products using the managed product's entity
display name.
B-39
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
B-40
Appendix B: Understanding Data Views
DATA DESCRIPTION
DATA DESCRIPTION
Time Received from Entity Displays the time that Control Manager receives
data from the managed product.
Time Generated at Entity Displays the time that the managed product
generates data.
Managed Product Entity Displays the entity display name for a managed
Display Name product. Control Manager identifies managed
products using the managed product's entity
display name.
Managed Product Name Displays the name of the managed product.
Example: OfficeScan, ScanMail for Microsoft
Exchange
Spyware/Grayware Name Displays the name of spyware/grayware managed
products detect.
Spyware/Grayware Destination Displays the computer that is affected by
spyware/grayware.
B-41
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
B-42
Appendix B: Understanding Data Views
direction of traffic where the spyware/grayware occurs, the Internet browser or FTP
client that downloads the spyware/grayware
DATA DESCRIPTION
Time Received from Entity Displays the time that Control Manager receives
data from the managed product.
Time Generated at Entity Displays the time that the managed product
generates data.
Managed Product Entity Displays the entity display name for a managed
Display Name product. Control Manager identifies managed
products using the managed product's entity
display name.
Managed Product Name Displays the name of the managed product.
Example: OfficeScan, ScanMail for Microsoft
Exchange
Spyware/Grayware Name Displays the name of spyware/grayware managed
products detect.
Spyware/Grayware Destination Displays the IP address/host name of the
computer on which managed products detect
spyware/grayware.
Source URL Displays the URL of the Web/FTP site which the
spyware/grayware originates.
Inbound/Outbound Displays the direction of spyware/grayware entry.
Traffic/Connection
Internet Browser/FTP Client Displays the Internet browser or FTP client
where the spyware/grayware originates.
Log On User Name Displays the user name logged on to the infection
destination when a managed product detects
spyware/grayware.
Action Result Displays the results of the action managed
products take against spyware/grayware.
Example: successful, further action required
B-43
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
DATA DESCRIPTION
Time Received from Entity Displays the time that Control Manager receives
data from the managed product.
Time Generated at Entity Displays the time that the managed product
generates data.
Managed Product Entity Displays the entity display name for a managed
Display Name product. Control Manager identifies managed
products using the managed product's entity
display name.
Managed Product Name Displays the name of the managed product.
Example: OfficeScan, ScanMail for Microsoft
Exchange
Spyware/Grayware Name Displays the name of spyware/grayware managed
products detect.
B-44
Appendix B: Understanding Data Views
DATA DESCRIPTION
B-45
Trend Micro Control Manager™ Administrator’s Guide
the spyware/grayware uses to enter your network, specific information about the source
and destination of the spyware/grayware
DATA DESCRIPTION
Time Received from Entity Displays the time that Control Manager receives
data from the managed product.
Time Generated at Entity Displays the time that the managed product
generates data.
Managed Product Entity Displays the entity display name for a managed
Display Name product. Control Manager identifies managed
products using the managed product's entity
display name.
Managed Product Name Displays the name of the managed product.
Example: OfficeScan, ScanMail for Microsoft
Exchange
Spyware/Grayware Name Displays the name of spyware/grayware managed
products detect.
Inbound/Outbound Displays the direction of spyware/grayware entry.
Traffic/Connection
Protocol Displays the protocol that the spyware/grayware
uses to enter the network. Example: HTTP,
SMTP, FTP
Spyware/Grayware Destination Displays the IP address/host name of the
computer affected by spyware/grayware.
Spyware/Grayware Destination Displays the host name of the computer affected
Host Name by spyware/grayware.
Spyware/Grayware Destination Displays the port number of the computer
Port affected by spyware/grayware.
Spyware/Grayware Destination Displays the MAC address of the computer
MAC Address affected by spyware/grayware.
Spyware/Grayware Source Displays the IP address/host name of the
computer where spyware/grayware originates.
B-46
Appendix B: Understanding Data Views
DATA DESCRIPTION
Spyware/Grayware Source Host Displays the host name of the computer where
Name spyware/grayware originates.
Spyware/Grayware Source Port Displays the port number of the computer where
spyware/grayware originates.
Spyware/Grayware Source Displays the MAC address of the computer
MAC Address where spyware/grayware originates.
Log On User Name Displays the user name logged on to the
spyware/grayware destination when a managed
product detects spyware/grayware.
Detected File Name Displays the name of the file managed products
detect affected by spyware/grayware.
Action Result Displays the results of the action managed
products take against spyware/grayware.
Example: successful, further action required
Action Taken Displays the type of action managed products
take against spyware/grayware. Example: File
cleaned, File quarantined, File deleted
Spyware/Grayware Detection Displays the total number of spyware/grayware
Count managed products detect. Example: OfficeScan
detects 10 spyware/grayware instances of the
same spyware/grayware on one computer. The
Spyware/Grayware Detection Count equals 10,
while the Unique Spyware/Grayware Count
equals 1.
B-47
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
B-48
Appendix B: Understanding Data Views
DATA DESCRIPTION
B-49
Trend Micro Control Manager™ Administrator’s Guide
affected by the content violation, total number of unique content violations and total
number of content violations on the network
TABLE B-42. Content Violation Detection Over Time Summary Data View
DATA DESCRIPTION
Summary Time Displays the time that the summary of the data
occurs.
Unique Policy in Violation Displays the number of unique policies in
Count violation managed products detect. Example: A
managed product detects 10 violation instances
of the same policy on one computer. The Policy
Violation Detection Count equals 10, while the
Unique Policy in Violation Count equals 1.
Unique Policy Violation Sender Displays the number of unique email message
Count addresses sending content that violates managed
product policies. Example: A managed product
detects 10 violation instances of the same policy
coming from 3 computers. The Unique Policy
Violation Sender Count equals 3.
Unique Policy Violation Displays the number of unique email message
Recipient Count recipients receiving content that violate managed
product policies. Example: A managed product
detects 10 violation instances of the same policy
on 2 computers. The Unique Policy Violation
Recipient Count equals 2.
Policy Violation Detection Displays the total number of policy violations
Count managed products detect. Example: A managed
product detects 10 violation instances of the
same policy on one computer. The Policy
Violation Detection Count equals 10, while the
Unique Policy in Violation Count equals 1.
B-50
Appendix B: Understanding Data Views
DATA DESCRIPTION
Detailed Information
Detailed Overall Content Violation Information
Provides specific information about the content violations on your network. Example:
the managed product that detects the content violation, the name of the specific policy
in violation, the total number of content violations on the network
DATA DESCRIPTION
Time Received from Entity Displays the time that Control Manager receives
data from the managed product.
Time Generated at Entity Displays the time that the managed product
generates data.
Managed Product Entity Displays the entity display name for a managed
Display Name product. Control Manager identifies managed
products using the managed product's entity
display name.
B-51
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
B-52
Appendix B: Understanding Data Views
DATA DESCRIPTION
DATA DESCRIPTION
B-53
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
DATA DESCRIPTION
Summary Time Displays the time that the summary of the data
occurs.
Unique Recipient Domain Displays the total number of unique recipient
Count domains affected by spam. Example: A managed
product detects 10 violation instances of the
same spam from 2 domains on 1 recipient
domain. The Unique Recipient Domain Count
equals 1.
Unique Recipient Count Displays the number of unique recipients
receiving spam from the specified domain.
Example: A managed product detects 10
violation instances of spam from the same
domain on 3 computers. The Unique Recipient
Count equals 3.
Spam Violation Detection Displays the total number of spam violations
Count managed products detect. Example: A managed
product detects 10 violation instances of the
same spam on one computer. The Spam
Violation Detection Count equals 10
B-54
Appendix B: Understanding Data Views
Detailed Information
Detailed Overall Spam Information
Provides specific information about the spam violations on your network. Example: the
managed product that detects the content violation, the name of the specific policy in
violation, the total number of spam violations on the network
DATA DESCRIPTION
Time Received from Entity Displays the time that Control Manager receives
data from the managed product.
Time Generated at Entity Displays the time that the managed product
generates data.
Managed Product Entity Displays the entity display name for a managed
Display Name product. Control Manager identifies managed
products using the managed product's entity
display name.
Managed Product Name Displays the name of the managed product.
Example: OfficeScan, ScanMail for Microsoft
Exchange
Recipient Displays the recipients of email containing spam.
Sender Displays the sender of email containing spam.
Email Subject Content Displays the content of the subject line of the
email containing spam.
Policy in Violation Displays the name of the policy the email violates.
Action Taken Displays the type of action managed products
take against spam found in email. Example:
deliver, forward, strip
Spam Violation Detection Displays the total number of spam violations
Count managed products detect. Example: A managed
product detects 10 violation instances of the
same spam on one computer. The Spam
Violation Detection Count equals 10.
B-55
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
Time Received from Entity Displays the time that Control Manager receives
data from the managed product.
Time Generated at Entity Displays the time that the managed product
generates data.
Managed Product Entity Displays the entity display name for a managed
Display Name product. Control Manager identifies managed
products using the managed product's entity
display name.
Managed Product Name Displays the name of the managed product.
Example: OfficeScan, ScanMail for Microsoft
Exchange
Spam Source IP Address Displays the IP address of the mail server where
spam originates.
Detecting Filter Type Displays the type of filter that detects the email in
violation. Example: Real-time Blackhole List
(RBL+), Quick IP List (QIL)
Action Taken Displays the type of action managed products
take against spam to prevent spam from entering
the email server. Example: drop connection,
bypass connection
Spam Violation Detection Displays the total number of spam violations
Count managed products detect. Example: A managed
product detects 10 violation instances of the
same spam on one computer. The Spam
Violation Detection Count equals 10.
B-56
Appendix B: Understanding Data Views
TABLE B-50. Detailed Overall Firewall Rule Violation Information Data View
DATA DESCRIPTION
Time Received from Entity Displays the time that Control Manager receives
data from the managed product.
Time Generated at Entity Displays the time that the managed product
generates data.
Managed Product Entity Displays the entity display name for a managed
Display Name product. Control Manager identifies managed
products using the managed product's entity
display name.
Managed Product Name Displays the name of the managed product.
Example: OfficeScan, ScanMail for Microsoft
Exchange
Event Type Displays the type of event that triggers the
violation. Example: intrusion, policy violation
Security Risk Level Displays the Trend Micro assessment of risk to
your network. Example: high security, low
security, medium security
Inbound/Outbound Displays the direction of violation entry.
Traffic/Connection
Protocol Displays the protocol the intrusion uses.
Example: HTTP, SMTP, FTP
Source IP Address Displays the IP address of the computer
attempting an intrusion on your network.
B-57
Trend Micro Control Manager™ Administrator’s Guide
TABLE B-50. Detailed Overall Firewall Rule Violation Information Data View
DATA DESCRIPTION
TABLE B-51. Detailed Overall Endpoint Security Violation Information Data View
DATA DESCRIPTION
Time Received from Entity Displays the time that Control Manager receives
data from the managed product.
Time Generated at Entity Displays the time that the managed product
generates data.
B-58
Appendix B: Understanding Data Views
TABLE B-51. Detailed Overall Endpoint Security Violation Information Data View
DATA DESCRIPTION
Managed Product Entity Displays the entity display name for a managed
Display Name product. Control Manager identifies managed
products using the managed product's entity
display name.
Managed Product Name Displays the name of the managed product.
Example: OfficeScan, ScanMail for Microsoft
Exchange
Client in Violation Displays the host name of the computer in
violation of the policy/rule.
IP Address of Client in Displays the IP address of the computer in
Violation violation of the policy/rule.
MAC Address of Client in Displays the MAC address of the computer in
Violation violation of the policy/rule.
Policy/Rule in Violation Displays the name of the policy/rule in violation.
Service in Violation Displays the name of the service/program in
violation of the policy/rule.
Log On User Name Displays the user name logged on to the client
when a managed product detects a policy/rule
violation.
Enforcement Action Displays the action a managed product takes to
protect your network. Example: block, redirect,
pass
Remediation Action Displays the action a managed product takes to
solve the policy violation. Example: file cleaned,
file quarantined, file deleted
Description Displays a detailed description of the incident by
Trend Micro.
Policy/Rule Violation Displays the total number of policy/rule
Detection Count violations managed products detect. Example: A
managed product detects 10 violation instances
of the same type on one computer. The
Policy/Rule Violation Detection Count equals 10.
B-59
Trend Micro Control Manager™ Administrator’s Guide
TABLE B-52. Detailed Overall Endpoint Security Compliance Information Data View
DATA DESCRIPTION
Time Received from Entity Displays the time that Control Manager receives
data from the managed product.
Time Generated at Entity Displays the time that the managed product
generates data.
Managed Product Entity Displays the entity display name for a managed
Display Name product. Control Manager identifies managed
products using the managed product's entity
display name.
Managed Product Name Displays the name of the managed product.
Example: OfficeScan, ScanMail for Microsoft
Exchange
Client in Compliance Displays the host name of the computer in
compliance of the policy/rule.
IP Address of Client in Displays the IP address of the computer in
Compliance compliance of the policy/rule.
MAC Address of Client in Displays the MAC address of the computer in
Compliance compliance of the policy/rule.
Policy/Rule in Compliance Displays the name of the policy/rule in
compliance.
Service in Compliance Displays the name of the service/program in
compliance of the policy/rule.
Log On User Name Displays the user name logged on to the client
when a managed product detects a policy/rule
compliance.
B-60
Appendix B: Understanding Data Views
TABLE B-52. Detailed Overall Endpoint Security Compliance Information Data View
DATA DESCRIPTION
DATA DESCRIPTION
Time Received from Entity The time at which Control Manager receives data
from the managed product.
The time at which the managed product
Time Generated at Entity generates data.
The entity display name for a managed product.
Managed Product Entity
Control Manager identifies managed products
Display Name
using the managed product's entity display name.
B-61
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
Suspicious Threat Source Port Displays the port number of the source from
which the suspicious threat originates.
Source IP Group Name
Source Network Zone
Suspicious Threat Destination Displays the IP address of the client the
IP Address suspicious threat affects.
Suspicious Threat Destination Displays the port number of the client the
Port suspicious threat affects.
Suspicious Threat Destination Displays the MAC address of the client the
MAC Address suspicious threat affects.
Destination Group Name Should this be Destination IP Group Name?
Destination Network Zone
B-62
Appendix B: Understanding Data Views
DATA DESCRIPTION
DATA DESCRIPTION
Policy in Violation Displays the name of the policy the URL violates.
Filter/Blocking Type Displays the type of filter/blocking preventing
access to the URL in violation. Example: URL
blocking, URL filtering, Web blocking
Unique Clients in Violation Displays the number of unique clients in violation
Count of the specified policy. Example: A managed
product detects 10 violation instances of the
same URL on 4 computers. The Unique Clients
in Violation Count equals 4.
B-63
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
DATA DESCRIPTION
B-64
Appendix B: Understanding Data Views
DATA DESCRIPTION
Web Violation Detection Count Displays the total number of Web violations
managed products detect. Example: A managed
product detects 10 violation instances of the
same URL on one computer. The Web Violation
Detection Count equals 10, with the URLs in
Violation Count equals 1.
DATA DESCRIPTION
B-65
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
TABLE B-58. Web Violation Detection Over Time Summary Data View
DATA DESCRIPTION
Summary Time Displays the time that the summary of the data
occurs.
B-66
Appendix B: Understanding Data Views
TABLE B-58. Web Violation Detection Over Time Summary Data View
DATA DESCRIPTION
B-67
Trend Micro Control Manager™ Administrator’s Guide
Detailed Information
Detailed Overall Web Violation Information
Provides specific information about the Web violations on your network. Example: the
managed product that detects the Web violation, the name of the specific policy in
violation, the total number of Web violations on the network
DATA DESCRIPTION
Time Received from Entity Displays the time that Control Manager receives
data from the managed product.
Time Generated at Entity Displays the time that the managed product
generates data.
Managed Product Entity Displays the entity display name for a managed
Display Name product. Control Manager identifies managed
products using the managed product's entity
display name.
Managed Product Name Displays the name of the managed product.
Example: OfficeScan, ScanMail for Microsoft
Exchange
Inbound/Outbound Displays the direction of violation entry.
Traffic/Connection
Protocol Displays the protocol over which the violation
takes place. Example: HTTP, FTP, SMTP
URL in Violation Displays the name of the URL that violates a Web
policy.
Client Host Displays the IP address/host name of the client
that violates a policy.
Filter/Blocking Type Displays the type of filter/blocking preventing
access to the URL in violation. Example: URL
blocking, URL filtering, Web blocking
Policy in Violation Displays the name of the policy the URL violates.
B-68
Appendix B: Understanding Data Views
DATA DESCRIPTION
File in Violation Displays the name of the file that violates the
policy.
Web Reputation Rating Displays the relative safety, as a percentage, of a
Web site according to Trend Micro.
Action Taken Displays the type of action managed products
take against policy violations. Example: pass,
block
Web Violation Detection Count Displays the total number of Web violations
managed products detect. Example: A managed
product detects 10 violation instances of the
same URL on one computer. The Web Violation
Detection Count equals 10, with the URLs in
Violation Count equals 1.
TABLE B-60. Detailed Overall Web Reputation Service Information Data View
DATA DESCRIPTION
B-69
Trend Micro Control Manager™ Administrator’s Guide
TABLE B-60. Detailed Overall Web Reputation Service Information Data View
DATA DESCRIPTION
B-70
Appendix B: Understanding Data Views
TABLE B-60. Detailed Overall Web Reputation Service Information Data View
DATA DESCRIPTION
Suspicious Threat Destination Displays the MAC address of the client the
MAC Address suspicious threat affects.
Destination Group Name Should this be Destination IP Group Name?
Destination Network Zone
DATA DESCRIPTION
B-71
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
B-72
Appendix B: Understanding Data Views
DATA DESCRIPTION
DATA DESCRIPTION
B-73
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
DATA DESCRIPTION
B-74
Appendix B: Understanding Data Views
DATA DESCRIPTION
B-75
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
Suspicious Threat Sender Displays the email address for the source of
policy/rule violations.
Unique Policies/Rules in The number of policies/rules the source
Violation Count computer violates. Displays the number of unique
policies/rules the source computer violates.
Example: A managed product detects 10 policy
violation instances of the same policy on 2
computers. The Unique Policies/Rules in
Violation Count equals 1.
Unique Suspicious Threat Displays the number of unique email message
Recipient Count recipients receiving content that violate managed
product suspicious threat policies. Example: A
managed product detects 10 suspicious threat
violation instances of the same policy on 2
computers. The Unique Suspicious Threat
Recipient Count equals 2.
Suspicious Threat Violation Displays the total number of policy/rule
Detection Count violations managed products detect. Example: A
managed product detects 10 violation instances
of the same type on one computer. The
Suspicious Threat Violation Detection Count
equals 10.
B-76
Appendix B: Understanding Data Views
DATA DESCRIPTION
Protocol Name Displays the name of the protocol over which the
suspicious threat occurs. Example: HTTP, FTP,
SMTP
Unique Policies/Rules in The number of policies/rules the source
Violation Count computer violates. Displays the number of unique
policies/rules the source computer violates.
Example: A managed product detects 10 policy
violation instances of the same policy on 2
computers. The Unique Policies/Rules in
Violation Count equals 1.
Unique Suspicious Threat Displays the number of unique computers
Destination Count affected by the suspicious threat. Example: A
managed product detects 10 suspicious threat
instances of the same type on 2 computers. The
Unique Suspicious Threat Destination Count
equals 2.
Unique Suspicious Threat Displays the number of unique sources where
Source Count suspicious threats originate. Example: A managed
product detects 10 suspicious threat instances of
the same type originating from 3 computers. The
Unique Suspicious Threat Source Count equals 3.
Unique Suspicious Threat Displays the number of unique email message
Recipient Count recipients receiving content that violate managed
product suspicious threat policies. Example: A
managed product detects 10 suspicious threat
violation instances of the same policy on 2
computers. The Unique Suspicious Threat
Recipient Count equals 2.
B-77
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
TABLE B-67. Suspicious Threat Detection Over Time Summary Data View
DATA DESCRIPTION
Summary Time Displays the time that the summary of the data
occurs.
Unique Policies/Rules in The number of policies/rules the source
Violation Count computer violates. Displays the number of unique
policies/rules the source computer violates.
Example: A managed product detects 10 policy
violation instances of the same policy on 2
computers. The Unique Policies/Rules in
Violation Count equals 1.
B-78
Appendix B: Understanding Data Views
TABLE B-67. Suspicious Threat Detection Over Time Summary Data View
DATA DESCRIPTION
B-79
Trend Micro Control Manager™ Administrator’s Guide
Detailed Information
Detailed Overall Suspicious Threat Information
Provides specific information about suspicious threats on your network. Example: the
managed product that detects the suspicious threat, specific information about the
source and destination, the total number of suspicious threats on the network
DATA DESCRIPTION
Time Received from Entity Displays the time that Control Manager receives
data from the managed product.
Time Generated at Entity Displays the time that the managed product
generates data.
Managed Product Entity Displays the entity display name for a managed
Display Name product. Control Manager identifies managed
products using the managed product's entity
display name.
Managed Product Name Displays the name of the managed product.
Example: OfficeScan, ScanMail for Microsoft
Exchange
Mitigation Server Entity Display Displays the entity display name for the
Name mitigation server. Control Manager identifies
managed products using the managed product's
entity display name.
Inbound/Outbound Displays the direction of network traffic or the
Traffic/Connection position on the network the suspicious threat
originates.
Protocol Group Displays the broad protocol group from which a
managed product detects the suspicious threat.
Example: FTP, HTTP, P2P
Protocol Displays the protocol from which a managed
product detects the suspicious threat. Example:
ARP, Bearshare, BitTorrent
B-80
Appendix B: Understanding Data Views
DATA DESCRIPTION
B-81
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
Email Subject Content Displays the content of the subject line of the
email containing spyware/grayware.
URL in Violation Displays the URL considered a suspicious threat.
Log On User Name Displays the user name logged on to the
destination when a managed product detects a
suspicious threat.
Instant Messaging/IRC User Displays the instant messaging or IRC user name
Name logged on when Total Discovery Appliance
detects a violation.
Internet Browser/FTP Client Displays the Internet browser or FTP client
where the suspicious threat originates.
Channel Name Displays the protocol that the instant messaging
software or IRC use for communication.
File Name of Suspicious File Displays the name of the suspicious file.
Suspicious File in Compressed Displays whether the suspicious threat originates
File from a compressed file.
File Size Displays the size of the suspicious file.
File Extension Displays the file extension of the suspicious file.
Example: .wmf, .exe, .zip
True File Type Displays the "true" file type which is detected
using the file's header not the file's extension.
Shared Folder Displays whether the suspicious threat originates
from a shared folder.
Authentication Displays whether authentication was used.
BOT Command Displays the command that bots send or receive
to or from the control channel.
BOT URL Displays the URL that bots receive their
commands from.
B-82
Appendix B: Understanding Data Views
DATA DESCRIPTION
TABLE B-69. Complete Network Security Risk Analysis Information Data View
DATA DESCRIPTION
Security Risk Category Displays the broad category of the security risk
managed products detect. Example:
Antivirus, Anti-spyware, Anti-phishing
Security Risk Name Displays the name of security risk managed
products detect.
Detected Entry Type Displays the entry point for the security risk that
managed products detect. Example: virus found
in file, HTTP, Windows Live Messenger (MSN)
B-83
Trend Micro Control Manager™ Administrator’s Guide
TABLE B-69. Complete Network Security Risk Analysis Information Data View
DATA DESCRIPTION
DATA DESCRIPTION
B-84
Appendix B: Understanding Data Views
DATA DESCRIPTION
Security Risk Category Displays the broad category of the security risk
managed products detect. Example:
Antivirus, Anti-spyware, Anti-phishing
Unique Security Risk/Violation Displays the number of unique computers
Destination Count affected by the security risk/violation. Example:
OfficeScan detects 10 virus instances of the same
virus on 2 computers. The Security
Risk/Violation Detection Count equals 10, while
the Unique Security Risk/Violation Destination
Count equals 2.
Unique Security Risk/Violation Displays the number of unique computers where
Source Count security risks/violations originate. Example:
OfficeScan detects 10 virus instances of the same
virus, coming from 3 sources, on 2 computers.
The Security Risk/Violation Detection Count
equals 10, while the Unique Security
Risk/Violation Source Count equals 3.
Security Risk/Violation Displays the total number of security
Detection Count risks/violations managed products detect.
Example: OfficeScan detects 10 virus instances
of the same virus on one computer. The Security
Risk/Violation Detection Count equals 10, while
the Unique Virus/Malware Count equals 1.
TABLE B-71. Security Risk Entry Point Analysis Information Data View
DATA DESCRIPTION
Detected Entry Type Displays the point of entry for security risks
managed products detect. Example: Virus found
in file, FTP, File transfer
B-85
Trend Micro Control Manager™ Administrator’s Guide
TABLE B-71. Security Risk Entry Point Analysis Information Data View
DATA DESCRIPTION
B-86
Appendix B: Understanding Data Views
DATA DESCRIPTION
DATA DESCRIPTION
Security Risk/Violation Source Displays the name of the computer where the
cause of the security risk/violation originates.
B-87
Trend Micro Control Manager™ Administrator’s Guide
DATA DESCRIPTION
Security Risk Category Displays the broad category of the security risk
managed products detect. Example:
Antivirus, Anti-spyware, Anti-phishing
Security Risk Name Displays the name of security risk managed
products detect.
Security Risk/Violation Displays the total number of security
Detection Count risks/violations managed products detect.
Example: OfficeScan detects 10 virus instances
of the same virus on one computer. The Security
Risk/Violation Detection Count equals 10.
Time of Latest Displays the time and date of the last security
Infection/Violation risk/violation detection on the computer affected
the security risk/violation.
B-88
Index
Index
Symbols C
"Log on as batch job" policy 5-63 cascading management structure
feature comparison 5-31
A checklist
access rights agent installation A-4
setting 5-15 ports A-3
account types server address A-2
adding 5-11 child Control Manager server
editing 5-13 unregister 5-35
understanding 5-8 child server 7-52
activating child servers
Control Manager 3-24–3-25 configuring 5-31
Outbreak Prevention Services 3-11 managing 5-30, 7-50
activating Control Manager 3-25 registering 5-32, 7-53
Activation Code 3-25 unregistering 7-53
Ad Hoc Query 6-30 client logs 6-24
shared 6-39 command polling
adding MCP 2-16
account types 5-11 command prompt
user accounts 5-16 Control Manager, stopping service from 10-4
user groups 5-22 Command Tracking 6-3
address, checklist A-2 query and view commands 6-5
Administrator’s Guide P-vi communication
about P-vii one-way 1-6
AG. See Administrator’s Guide parent-child server 7-52
agent two-way 1-6, 7-19
installation comparison
checklist A-4 cascading management structure 5-31
Agent Migration Tool 9-2 components
migrating agents 9-2 downloading 5-35
AgentMigrateTool.exe. See Agent Migration Tool configuration
agents Web server 2-20
removing Windows-based 10-7 configuring 5-43, 5-54
audience P-viii child servers 5-31
Automatic Deployment managed products 7-29
configuring 5-44 Manual Download and Automatic Deployment
automatic deployment settings settings 5-44
Scheduled Download 5-56 Outbreak Prevention Mode download settings 8-16
Scheduled Download
B automatic deployment settings 5-56
back up. See backing up Control Manager 2.5/3.0 infor- Scheduled Download Exceptions 5-45
mation
I–1
Trend Micro Control Manager™ Administrator’s Guide
Scheduled Download Settings 5-55 Control Manager antivirus and content security compo-
Scheduled Downloads 5-47 nents
user accounts 3-24, 5-7 Anti-spam rules 5-35
Control Manager 1-1 Engines 5-35
accounts 5-7 Pattern files/Cleanup templates 5-35
activating 3-24–3-25 convention
Administrator’s Guide P-vi document P-ix
agent 1-8 convert
antivirus and content security components 5-35 full version 3-26
architecture 1-7 creating
basic features 1-2 folders 7-40
child servers 7-50 user groups 5-22
command prompt, stopping service from 10-4 users 5-16
configuring accounts 5-7 customizing
installation steps 3-5 notification messages 6-11
installing 3-1, 3-6
latest documentation P-vii D
mail server 1-7 data storage
managed product 5-26, 7-20 plan 2-19
management console 5-2 data views
manually removing 10-2 product information B-3
MCP 1-8 security threat information B-19
migrating database 4-17 understanding 6-29
notifications 6-13 database
PDF documentation P-vii recommendations 2-19
registering 3-24–3-25 deleting
remove manually 10-3 logs 6-44
removing overview 10-1 user accounts 5-22
removing server 10-2 user groups 5-25
removing Windows-based agent 10-7 deployment
report server 1-7 architecture and strategy 2-2
report types 6-47 multiple-site 2-5
security levels 3-13, 3-15 single-site 2-2
server 1-7 Directory Manager 5-27, 7-22, 7-37
SQL database 1-7 grouping managed products 5-27, 7-22
supported operating systems 2-9 disable notifications 6-14
system requirements 3-2 disabling
testing pilot deployment 2-10 user accounts 5-22
Trend Micro Infrastructure 1-8 documentation P-vi
verifying installation 3-22 download components
Web server 1-7 manually 5-37
Web-based management console 1-8 downloading and deploying components 5-35
Control Manager 2.5x agent migration flow 4-14
Control Manager agents
E
supported operating systems 2-10 editing
I–2
Index
I–3
Trend Micro Control Manager™ Administrator’s Guide
I–4
Index
I–5
Trend Micro Control Manager™ Administrator’s Guide
I–6