Size: px
Start display at page:

Download "http://docs.trendmicro.com"

Transcription

1

2 Trend Micro Incorporated reserves the right to make changes to this document and to the product/service described herein without notice. Before installing and using the product/service, review the readme files, release notes, and/or the latest version of the applicable documentation, which are available from the Trend Micro website at: Trend Micro, the Trend Micro t-ball logo, and Worry-Free are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners Trend Micro Incorporated. All Rights Reserved. Document Part No.: APEM36510/ Release Date: July 2014 Protected by U.S. Patent No.: Patents pending.

3 This documentation introduces the main features of the product/service and/or provides installation instructions for a production environment. Read through the documentation before installing or using the product/service. Detailed information about how to use specific features within the product/service may be available at the Trend Micro Online Help Center and/or the Trend Micro Knowledge Base. Trend Micro always seeks to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro document, please contact us at docs@trendmicro.com. Evaluate this documentation on the following site:

4

5 Table of Contents Preface Preface... vii About Trend Micro... viii Audience... viii Document Conventions... viii Chapter 1: Introduction Trend Micro Remote Manager Features Integrated Platform Dashboard Widgets Customizable Settings for New Accounts Threat Status System Status License Status Network Management Reporting Integration with Third-Party Tools Feedback Submission Supported Products Worry-Free Business Security Suite Hosted Security Cloud Edge Third-Party Tools What's New Overall Infrastructure Key Terminology i

6 Trend Micro Remote Manager User's Guide Chapter 2: Getting Started Browser Requirements Adding the Trend Micro Remote Manager Web Console URL to Trusted Sites Using Internet Explorer 9 to Obtain the SSL Certificate Accessing the Platform Coordinating with the Customer Chapter 3: Understanding the Web Console The Web Console Banner Main Menu Understanding the Dashboard Dashboard Status Screens Tabs and Widgets Product/Service Information Chapter 4: Preparing the Infrastructure Infrastructure Installation Overview Worry-Free Business Security Standard and Advanced Hosted Security and Worry-Free Business Security Services ConnectWise Kaseya Autotask Adding Products Adding Customers Registering Trend Micro Products to Trend Micro Remote Manager Integrating Third-party Products with Trend Micro Remote Manager Chapter 5: Managing Customers Customers Adding New Customers ii

7 Table of Contents Associating Accounts Checking Product License Adding Products/Services Contacts Deleting Customers Filtering the Customer List Chapter 6: Managing Agents Managing Agents from the Remote Manager Web Console Checking the Connection Between the Agent and Server Agent Status Submitting Agent Commands Viewing Agent Details Managing Agents from the Managed Server Agent Status Messages Changing the Agent GUID on the Managed Server Using the Agent Configuration Tool Agent Configuration Backing Up and Restoring Agent Settings Backing Up Settings Restoring Settings Finding the Agent Build Number From the Remote Manager Web Console On the Agent Location of Agent Logs and Configuration Files Enabling the Agent Debug Log Removing Agents Removing Agents Locally Chapter 7: Managing Licenses Adding Seat Allocations Renewing Licenses iii

8 Trend Micro Remote Manager User's Guide Chapter 8: Managing Settings Configuring Notifications Configuring Console Settings Configuring Default Setting Templates Chapter 9: Managing Events Managing Events Viewing Events Event Types Outbreak Defense Status Detail Chapter 10: Reports Antivirus Status Detail Anti-Spyware Status Detail Anti-spam Status Detail Network Virus Status Detail Web Reputation Status Detail Behavior Monitoring Status Detail URL Filtering Status Detail Device Control Status Detail Smart Scan Component Update Disk Usage Reports Overview Creating Reports Creating Report Templates Viewing Reports Editing Reports Downloading and Sending Reports Subscribing to Reports iv

9 Table of Contents Chapter 11: Troubleshooting and Known Issues Troubleshooting the Trend Micro Remote Manager Web Console Access Issues Domain Tree not Visible after Installing the Agent Node on Tree Cannot Be Expanded Page Cannot be Displayed Incorrect Information on the Dashboard Unable to Deploy Commands Agent Status Is Abnormal Agent working abnormally using an existing GUID after Troubleshooting the Agent Agent Issues Unable to Connect to the Server Unable to Register with the Remote Server Connection Issues with Hosted Security Known Server Issues Inconsistent Status Icons Spam Data Inconsistent with Worry-Free Business Security Standard or Advanced Incorrect User Name on the Worry-Free Business Security Services Console Inconsistent License Info on the Worry-Free Business Security Services Console Simultaneous Sign In From Two Tabs/Windows of the Same Browser are Not Permitted Historical Reports are Automatically Deleted An Expired Worry-Free Business Security Services Account Cannot be Managed Broken ConnectWise Connection Known Agent Issues Reinstalled Agents Provide Overlapping Data Scan Command Results Cannot be Verified Agent Configuration Tool is Not Visible After Upgrading the Agent FAQs Web Console FAQs v

10 Trend Micro Remote Manager User's Guide Hosted Security FAQs Report FAQs Chapter 12: Getting Help Contacting Trend Micro Speeding Up the Support Call Using the Support Portal Threat Encyclopedia About Trend Micro TrendLabs vi

11 Preface Preface The Remote Manager User's Guide provides details on how to use the platform and perform basic tasks. Topics include: About Trend Micro on page viii Audience on page viii Document Conventions on page viii vii

12 Trend Micro Remote Manager User's Guide About Trend Micro As a global leader in cloud security, Trend Micro develops Internet content security and threat management solutions that make the world safe for businesses and consumers to exchange digital information. With over 20 years of experience, Trend Micro provides top-ranked client, server, and cloud-based solutions that stop threats faster and protect data in physical, virtualized, and cloud environments. As new threats and vulnerabilities emerge, Trend Micro remains committed to helping customers secure data, ensure compliance, reduce costs, and safeguard business integrity. For more information, visit: Trend Micro and the Trend Micro t-ball logo are trademarks of Trend Micro Incorporated and are registered in some jurisdictions. All other marks are the trademarks or registered trademarks of their respective companies. Audience The Trend Micro Remote Manager User's Guide is written for partners and Managed Service Providers (MSPs) that use the platform to oversee and manage a partner s entire Trend Micro SMB product portfolio for all of their customers from anywhere, anytime. Document Conventions The Remote Manager User's Guide uses the following conventions. TABLE 1. Document Conventions CONVENTION ALL CAPITALS DESCRIPTION Acronyms, abbreviations, and names of certain commands and keys on the keyboard viii

13 Preface CONVENTION DESCRIPTION Bold Navigation > Path Note Menus and menu commands, command buttons, tabs, and options The navigation path to reach a particular screen For example, File > Save means, click File and then click Save on the interface Configuration notes Tip Recommendations or suggestions WARNING! Critical actions and configuration options ix

14

15 Chapter 1 Introduction This section contains the following topics: Trend Micro Remote Manager on page 1-2 Features on page 1-4 Supported Products on page 1-8 What's New on page 1-15 Overall Infrastructure on page 1-17 Key Terminology on page

16 Trend Micro Remote Manager User's Guide Trend Micro Remote Manager Trend Micro Remote Manager is a robust console that works in parallel with Trend Micro Licensing Management Platform to provide managed security services to small and medium businesses. Remote Manager enables you to monitor the health of multiple managed networks through multiple, managed products and services. Trend Micro Remote Manager allows reseller administrators to issue commands to manage critical aspects of network security. Remote Manager is hosted on regional Trend Micro Data Center servers where resellers obtain an account. Resellers can use Remote Manager to establish customer accounts, monitor customer networks, and manage security using the Remote Manager web console. Remote Manager monitors the following products: Worry-Free Business Security Standard (formerly Client Server Suite) versions 6.x, 7.x, 8.x, 9.0 Worry-Free Business Security Advanced (formerly Client Server Messaging Suite) versions 6.x, 7.x, 8.x, 9.0 Worry-Free Business Security Services version 5.0, 5.1, 5.2, 5.3, 5.3 SP1, 5.6 Note Worry-Free Business Security Standard and Advanced, and Worry-Free Business Security Services are collectively referred to as Worry-Free Business Security (all) where appropriate. Trend Micro Hosted Security version 1.x Note Worry-Free Business Security Standard and Advanced, Worry-Free Business Security Services, and Hosted Security are collectively referred to as "managed products" and/or "managed services" in this document. Remote Manager has a monitoring dashboard that allows resellers to look into the following aspects of network security: 1-2

17 Introduction Worry-Free Business Security (all): Virus, network virus, and spyware/grayware incidents Spam and phishing incidents Unauthorized computer changes Outbreak situations License and update status of security products Disk usage on desktops, servers, and Exchange servers (Worry-Free Business Security Standard and Advanced only) Key security indicators Hosted Security: message traffic Accepted message size Threat summary Top spam recipients Top virus recipients Note For detailed information on Hosted Security and Worry-Free Business Security (all), see the documentation for those products available at: Remote Manager offers a structured view of customer networks and allows resellers to issue commands and manage the following aspects of network security: Component updates and updates to the managed server Vulnerability assessment Damage cleanup Automatic outbreak response 1-3

18 Trend Micro Remote Manager User's Guide Firewall and Real-time Scan settings Manual scans Remote Manager also supports comprehensive reporting features and allows resellers to subscribe individuals to automatically generated reports. Features Trend Micro Remote Manager offers the following features. Integrated Platform Remote Manager works in parallel with Trend Micro Licensing Management Platform, but with a more robust interface. You can do the following from the Remote Manager portal: Create new accounts Renew licenses for individual accounts Add more seats Remote Manager also monitors and manages multiple protected networks from a single console by communicating with a Remote Manager Agent that runs on the managed servers. In addition, Remote Manager also offers event monitoring based on key security indicators. Dashboard Widgets Customize the widgets on the dashboard page. These widgets can let you know if you need to renew licenses, add more allocated seats, or even let you know which customers experience the most threats. 1-4

19 Introduction Customizable Settings for New Accounts When creating accounts, you can customize the basic default settings that new accounts will use by default or select the settings from templates you have configured and saved. Threat Status The Remote Manager Events screen provides the status of the following aspects of network security: Worry-Free Business Security Standard and Advanced Outbreak Defense Antivirus Anti-spyware Web Reputation Behavior Monitoring Network Viruses Anti-spam URL Filtering (versions 6.x and up only) Device Control (versions 7.x, 8.x and 9.0 only) Worry-Free Business Security Services Outbreak Defense Antivirus Anti-spyware Web Reputation Behavior Monitoring Network Viruses 1-5

20 Trend Micro Remote Manager User's Guide URL Filtering Hosted Security Total Message Traffic Accepted Message Size Threat Summary Top Spam Recipients Top Virus Recipients Remote Manager provides details about these aspects including statistical data such as the number of infected computers and virus/malware incidents. Reseller administrators can also check detailed information including the names of affected computers or the threats. System Status Reseller administrators can check the following system-related aspects of network security through the Remote Manager Events screen: Smart Protection Services Component updates Disk Shortage Device/agent offline Device/agent offline (Last 24 hours) Device malfunction Device malfunction (Last 24 hours) License Status Reseller administrators can view the following license-related details: 1-6

21 Introduction Total seats purchased Number of seats in use Expired licenses, including date of expiry Expiring licenses, including number of days before expiration Network Management Remote Manager offers a structured view of managed networks and allows reseller administrators to issue commands and manage the following critical aspects of network security: Component updates and updates to the managed server Vulnerability assessment Automatic outbreak response Damage cleanup Firewall and Real-time Scan settings Manual scans Reporting In addition to notifications for security events, Remote Manager can automatically generate and send reports at regular intervals. You can create the reports according to customer, product, frequency, and content and saved in various formats. Integration with Third-Party Tools Enable log monitoring using third-party tools, including Autotask, Kaseya, or ConnectWise to standardize the tasks and processes you monitor. 1-7

22 Trend Micro Remote Manager User's Guide Feedback Submission Trend Micro would like to provide the best and most useful platform for the users. However, Trend Micro does not know what services or features are important to you. And to this end, Remote Manager welcomes your feedback and suggestions through the Submit Feedback button, which is accessible and visible from the banner. Trend Micro can then process and determine which features would help the most number of users. Supported Products Worry-Free Business Security Standard Worry-Free Business Security Advanced Worry-Free Business Security Services Hosted Security Cloud Edge Note Worry-Free Business Security Standard and Advanced, and Worry-Free Business Security Services are collectively referred to as Worry-Free Business Security (all) where appropriate. Third-party tools Autotask Kaseya ConnectWise Worry-Free Business Security Suite Trend Micro Worry-Free Business Security Standard, Worry-Free Business Security Advanced, and Worry-Free Business Security Services are comprehensive, centrallymanaged solutions for small- and medium-sized business. 1-8

23 Introduction Worry-Free Business Security Standard provides client-side antivirus and firewall protection for desktops and servers. Worry-Free Business Security Advanced includes the same features as Worry-Free Business Security Standard, but provides an anti-spam and threat solution for mail servers running Microsoft Exchange Server. Worry- Free Business Security Standard and Advanced include a server-side component for monitoring and managing client protection from a central location. Worry-Free Business Security Services provides most of the advantages of Worry-Free Business Security Standard. And because Worry-Free Business Security Services is a hosted service, you can centrally manage security from anywhere without the need to add, install, configure, or maintain a server. Trend Micro security experts host and constantly update the service for you. Note For information about Worry-Free Business Security Standard and Advanced and Worry- Free Business Security Services, refer to the documentation at: Trend Micro Remote Manager monitors and manages Worry-Free Business Security Standard and Advanced protected networks by communicating with an Agent that runs on Worry-Free Business Security Standard and Advanced servers or Worry-Free Business Security Services servers located at Trend Micro data centers. Hosted Security Trend Micro Hosted Security blocks spam, viruses, phishing, and other threats before they reach your network. As a hosted solution, it requires no hardware or software to install and maintain and helps you reclaim IT staff time, user productivity, bandwidth, mail server storage and CPU capacity. In addition, Trend Micro s worldwide team of experts manages hot fixes, patches, updates and application tuning so that solution performance is continuously optimized. Note For information about Hosted Security, refer to the documentation at: 1-9

24 Trend Micro Remote Manager User's Guide Trend Micro Remote Manager monitors and manages Hosted Security-protected networks by communicating with the Hosted Security server located at Trend Micro data centers. Cloud Edge Cloud Edge brings together the benefits of a next-generation on-premises firewall and the convenience of security as a service for managed service providers. By deeply scanning and filtering network packets on-premises or through the cloud, Cloud Edge stops threats at the gateway. Cloud Edge intelligently combines application control with user and port identification, zero-day exploit detection, anti-malware scanning, web reputation security, and URL filtering to protect your customers against network breaches and business disruptions. VPN support also secures connections from mobile devices, corporate sites, and remote employees. Deploy the Cloud Edge on-premises appliance to customer offices anywhere in the world and then centrally control user access and security policies through an intuitive cloud console, or through Trend Micro Remote Manager. Remote Manager works with Cloud Edge by providing a single point of entry to access graphical reports and summarized dashboard data for supported appliances and Trend Micro products. You can also use Remote Manager to manage licensing and billing of multiple customers. Third-Party Tools Trend Micro Remote Manager integrates with third-party tools to ensure a more secure network environment. These tools are: Autotask Remote Manager can send the following event notifications to the Autotask system: Worry-Free Business Security Standard and Advanced Agent Abnormal Outbreak Defense 1-10

25 Introduction Antivirus Anti-spyware Web Reputation Behavior Monitoring Network Virus Anti-Spam Outdated Managed Servers Unusual System Events License Expiration URL Filtering Device Control Worry-Free Business Security Standard and Advanced Server Shutdown Exchange Server Shutdown Worry-Free Business Security Services Agent Abnormal Outbreak Defense Antivirus Anti-spyware Web Reputation Behavior Monitoring Network Virus Outdated Managed Servers Unusual System Events License Expiration 1-11

26 Trend Micro Remote Manager User's Guide URL Filtering Exchange Server Shutdown These events are sent to Autotask in the form of messages that are transformed into an Autotask ticket. For this to occur, you must add notification recipients to the Remote Manager web console and several fields to Autotask's ticketing system. For more information, refer to Integrating Autotask on page Kaseya Remote Manager and Worry-Free Business Security Services can send event notifications to the Kaseya system. The following events can be sent to Kaseya: Worry-Free Business Security Standard and Advanced Agent Abnormal Outbreak Defense Antivirus Anti-spyware Web Reputation Behavior Monitoring Network Virus Anti-Spam Outdated Managed Servers Unusual System Events License Expiration URL Filtering Device Control Client Server Messaging/Worry-Free Business Security Standard and Advanced Server Shutdown 1-12

27 Introduction Exchange Server Shutdown Worry-Free Business Security Services Agent Abnormal Outbreak Defense Antivirus Anti-spyware Web Reputation Behavior Monitoring Network Virus Outdated Managed Servers Unusual System Events License Expiration URL Filtering Exchange Server Shutdown These events are sent to Kaseya in the form of messages which are transformed into a Kaseya ticket. For this to occur, notification recipients need to be added to the Remote Manager web console and several fields need to be made to Kaseya s ticketing system. For more information, refer to Integrating Kaseya on page ConnectWise Remote Manager and Worry-Free Business Security Services can send event notifications to the ConnectWise system. The following events can be sent to ConnectWise: Worry-Free Business Security Standard and Advanced Agent Abnormal Outbreak Defense 1-13

28 Trend Micro Remote Manager User's Guide Antivirus Anti-spyware Web Reputation Behavior Monitoring Network Virus Anti-Spam Outdated Managed Servers Unusual System Events License Expiration URL Filtering Device Control Client Server Messaging/Worry-Free Business Security Standard and Advanced Server Shutdown Exchange Server Shutdown Worry-Free Business Security Services Agent Abnormal Outbreak Defense Antivirus Anti-spyware Web Reputation Behavior Monitoring Network Virus Outdated Managed Servers Unusual System Events 1-14

29 Introduction License Expiration URL Filtering Exchange Server Shutdown These events are sent to ConnectWise in the form of messages which are logged into ConnectWise. For this to occur, notification recipients need to be added to the Remote Manager web console and several fields need to be made to ConnectWise s ticketing system. For more information, refer to Integrating ConnectWise on page What's New Trend Micro Remote Manager includes the following new features and enhancements: TABLE 1-1. New for the July 2014 Release FEATURE Cloud Edge Integration Agent version Reports DESCRIPTION Trend Micro Remote Manager works with Cloud Edge by providing a single point of entry to access graphical reports and summarized dashboard data for Cloud Edge appliances. You can also use Trend Micro Remote Manager to manage licensing and billing of Cloud Edge customers. You can now see the Worry-Free Business Security Services agent version from the product console. Improved the way the system displays the data generated from HTML to PDF. Widget Enhancements Provided new features and enhancements. Fixed some performance issues. Fixed some overlap issues. 1-15

30 Trend Micro Remote Manager User's Guide TABLE 1-2. New for the June 2014 Release FEATURE/ENHANCEMENT Actionable Notification Customize Your Reports Set Up New Customers in 3 Easy Steps Note This feature is only for Trend Micro Licensing Management Platform users. Contact your Managed Service Provider or Trend Micro representative for more information. Customize the Default Setting Templates Note This feature is only for Trend Micro Licensing Management Platform users. Contact your Managed Service Provider or Trend Micro representative for more information. DETAILS Click the links on the widgets or notification to see, and do something about the licenses that need an action now, or very soon. Clicking the event occurrences can also open the web console of certain products. Refer to Single Sign On. Partners and customers have different needs when it comes to the reports that they receive. You can use the new contents and templates to make sure that they get the right information. Set up and deploy default policies to new customers in three (3) steps. Afterward, these customers will have the same level of protection and monitoring from Trend Micro Remote Manager. Preconfigure different templates for the Worry- Free Business Security Services settings. This gives you flexibility to fit different service models for your customers. 1-16

31 Introduction FEATURE/ENHANCEMENT Single Sign On DETAILS Click the Open Console link from the Customer page to open the web console of the following services: Worry-Free Business Security Services Hosted Security Cloud Edge Additional Help Trend Micro Remote Manager provides easy access to the documentation from the Help button, which also includes video tutorials that you can watch directly from the console. Trend Micro Remote Manager also provided a quick link to the Trend Micro Remote Manager Best Practice Guide. Overall Infrastructure Trend Micro Remote Manager consists of three basic parts: The reseller The Trend Micro data center The customer network 1-17

32 Trend Micro Remote Manager User's Guide FIGURE 1-1. Remote Manager Overall Architecture The reseller accesses a Trend Micro Data Center (currently on different continents) through the Remote Manager web console through the Internet. The reseller does not need to install anything to be able to use the product. The reseller must add and configure each customer on the Remote Manager web console before the reseller can manage customer accounts. Each Worry-Free Business Security Standard and Advanced managed server has a Remote Manager Agent installed which allows communication to and from the Remote Manager servers. Since Worry-Free Business Security Services is hosted at the Trend Micro Data Center, no Agents have to be installed. Instead, Worry-Free Business Security Services have to be registered on the Remote Manager web console for each customer. 1-18

33 Introduction The Remote Manager Agent, which can be installed from the Remote Manager web console, runs on the Worry-Free Business Security Standard and Advanced managed server inside the customer s network. The Remote Manager Agent sends information to the Remote Manager server where you can access the data from your console 24/7 using an Internet connection. Key Terminology Knowing the following terms can help you work with Remote Manager more efficiently: TERM DEFINITION Agent Assessment Assessment indexes Client Security Agent (CSA) Dashboard Detection Installed on Worry-Free Business Security Standard and Advanced servers, this program allows Remote Manager to monitor and manage Worry-Free Business Security Standard and Advanced. Regular checks done on data collected from customer networks to determine the health of monitored networks. These checks use key indicators called assessment indexes. The basis for security assessments; reseller administrators can customize these indexes individually to control assessment intervals, ranges, and notifications. The Agent that reports to the Worry-Free Business Security server. The CSA sends event status information in real time. Agents report events such as threat detection, Agent startup, agent shutdown, start of a scan, and completion of an update. The CSA provides three methods of scanning: real-time scan, scheduled scan, manual scan. You can configure scan settings on Agents from the web console. The dashboard in Remote Manager is the main screen (Home tab) that displays the web console and the widgets. The discovery of a threat; a detection does not constitute a system infection, but simply indicates that malware has reached the computer. The detection of the same threat on different computers can constitute an outbreak. 1-19

34 Trend Micro Remote Manager User's Guide TERM DEFINITION Event Globally Unique Identifier (GUID) or Authorization Key Infection Messaging Security Agent (MSA) Reseller Reseller administrators Trend Micro Data Center Security Server Virus alert Virus outbreak The occurrence of a condition in a monitored domain. A unique reference number used as an identifier in computer software. The condition in which a threat is able to run its payloads in a computer; Remote Manager considers an infection to have occurred whenever the antivirus scanner detects a virus/ malware and is unable to clean, delete, or quarantine the threat. A spyware/grayware infection occurs when the computer cannot be completely cleaned unless it is restarted. The Agent that resides on Microsoft Exchange Servers and reports to Client Server Messaging and Worry-Free Business Security Advanced servers. This Agent protects against virus/ malware, Trojans, worms and other born threats. It also provides spam blocking, content filtering, and attachment blocking. Generic term to refer to organizations that directly provide security monitoring and management services to customers in Remote Manager. Administrators in the reseller side that perform service-related tasks using Remote Manager. The Trend Micro monitoring and management center that hosts Remote Manager (and Hosted Security) servers and provides support to reseller administrators. The Worry-Free Business Security Standard and Advanced server computer. A state of vigilance that is declared by TrendLabs to prepare customer networks for a virus outbreak; TrendLabs alerts different Trend Micro products and delivers preventive solutions that IT administrators can implement as a first line of defense before a pattern becomes available. The rapid propagation of a virus threat to different computers and networks; depending on the prevalence of the threat, an outbreak can be internal, regional, or global. 1-20

35 Chapter 2 Getting Started This section contains the following topics: Browser Requirements on page 2-2 Accessing the Platform on page 2-3 Coordinating with the Customer on page

36 Trend Micro Remote Manager User's Guide Browser Requirements Connection to the Internet Remote Manager account information from Trend Micro Supported browsers: Latest Firefox version (Recommended) Latest Google Chrome version (Recommended) Internet Explorer 9.0 Adding the Trend Micro Remote Manager Web Console URL to Trusted Sites Add the Remote Manager web console URL to your list of trusted sites in Internet Explorer to ensure that you can access all the console screens and features properly. Procedure 1. Open Internet Explorer. 2. Click Tools > Internet Options > Security (tab). 3. Select the Trusted sites zone. 4. Click Sites. 5. In Add this website to the zone, type the console URL. 6. Click Add. 7. Click OK. 2-2

37 Getting Started Using Internet Explorer 9 to Obtain the SSL Certificate To use the Agent, add the SSL certificate from Trend Micro to the browser on the managed server. Procedure 1. Open Internet Explorer and go to the Trend Micro Remote Manager site, dependent on your region. 2. Double-click the padlock icon to the right of the address bar. The website identification menu opens. 3. Click View Certificates. This opens the Certificate window showing the certificate issued to *.trendmicro.com. 4. Go to Certification Path (tab) > Geotrust or Equifax Secure Certificate Authority > View Certificate. 5. When the Certificate window showing Certificate Information Authority opens, click the Details tab. 6. Go to Copy to File > Next and then select DER encoded binary X.509 (.CER). 7. Click Next, and then type the path and filename of the certificate. For example, wfrmcert.cer. 8. Click Next > Finish. Accessing the Platform Everyone, regardless of their account type and permissions, signs in through the same page. Just type your credentials and click Sign In. You should get the sign in URL and your credentials from the user with the parent account. 2-3

38 Trend Micro Remote Manager User's Guide Users will not be able to view settings and options that they do not have privileges to see. Coordinating with the Customer Monitoring and managing your customer s network through Trend Micro Remote Manager provides many benefits for your customer. However, just like other remote management activities, actions made on the console can drastically affect the managed network. Before you start providing services, make sure that you have your customer s consent to do the following remote management and monitoring activities: View the list of computers on their network Renew or add seats to your licenses View the following security information: Virus/malware, spyware/grayware, and network virus detections Names and the number of infected computers File names of infected files addresses that have received infected files Patch information for known vulnerabilities License and system information on Worry-Free Business Security (all) and Hosted Security Send notifications to individuals within the customer organization Run the following actions: Deploy security components Start Vulnerability Assessment scans Start Damage Cleanup Services Start or stop manual scans 2-4

39 Getting Started Update the Worry-Free Business Security Standard and Advanced server Start or stop Outbreak Defense Configure the following settings: Automatic deployment of Outbreak Defense Real-time Scan settings Firewall settings Location Awareness Behavior Monitoring Web Reputation URL Filtering Device Control (Worry-Free Business Security 7.0 and above) 2-5

40

41 Chapter 3 Understanding the Web Console The web console is the central point for monitoring and managing products and customers. This section contains the following topics: The Web Console Banner on page 3-2 Main Menu on page 3-3 Understanding the Dashboard on page

42 Trend Micro Remote Manager User's Guide The Web Console Banner The banner area provides the following options: <account name>: Shows the account currently signed in. Sign out: Signs you out of the web console. Licensing Management Platform: This link will only appear if you have integrated this with the License Management Platform site. Notifications: Indicates how many events need an action. New Customer: Click this button to add a new customer. Search bar: Specify customer information to quickly find a specific customer. Export Usage: Click this button to export a document showing your license usage. Feedback: Click this button to send valuable feedback to Trend Micro regarding how you use the product and what other features you think would be added or how to make current features more useful to you. Help: How-to Videos and Best Practices: Opens the page where you can watch the How-to videos and provides a link to the best practices guide. Contents and Index: Opens the Trend Micro Remote Manager Online Help. User s Guide: Downloads and shows the User s Guide, in PDF format. 3-2

43 Understanding the Web Console Support: Displays the Trend Micro Support web page, where you can submit questions and find answers to common questions about Trend Micro products. About: Provides an overview of the product and instructions to check component version details. What's New: Links to the page that lets you know what the new features are. Main Menu The main menu shows buttons that you can use to navigate to features and options. You can use the navigation bar to click the following: Home: This will bring you to the homepage, which shows the dashboard and widgets on the right panel. Customers: This shows the list of customers, wherein you can add customers, or make changes to customer settings or configurations. 3-3

44 Trend Micro Remote Manager User's Guide Reports: This shows the reports and new reports that can be added. Administration: This is the page where you can change the notification or web console settings, the default setting templates, or configure integration with thirdparty tools. My Account: This will show only if you have not integrated your account with Licensing Management Platform. Understanding the Dashboard This section contains information on the tabs, widgets, and dashboard. Dashboard Status Screens The Dashboard is the central screen for reviewing the status of monitored networks. The Dashboard lists only the products whose statuses are not normal. For example, if a customer's Worry-Free Business Security Services license is expiring or if a customer has too many threats, those customers would be listed here. To access the Dashboard, open a compatible browser and sign into the Trend Micro Remote Manager site for your region. FIGURE 3-1. Dashboard Threat Status Tab 3-4

45 Understanding the Web Console Most items on the Dashboard are linked to help you resolve an issue. Click an item (graph, link, number) to resolve the issue. See Product/Service Information on page 3-20 for details on what you can do. Tabs and Widgets Tabs provide a container for widgets. Each tab on the Summary screen can hold up to 20 widgets. The Summary screen itself supports up to 30 tabs. Widgets are the core components of the dashboard. Widgets provide specific information about various security or license-related events. Some widgets allow you to perform certain tasks. The information that a widget displays comes from: Worry-Free Business Security server and clients Worry-Free Business Security Services server Hosted Security services Cloud Edge servers and clients Tab Tasks The following table lists all the tab-related tasks: TASK STEPS Add a tab Click the plus icon ( ) on top of the Summary screen. The New Tab window displays. Edit tab settings Play tab slide show Move tab Click Tab Settings. A window similar to the New Tab window opens, where you can edit settings. Click Play Tab Slide Show. The information in the selected tabs will change similar to a slide show. Use drag-and-drop to change a tab s position. 3-5

46 Trend Micro Remote Manager User's Guide TASK STEPS Delete tab Click the delete icon ( ) next to the tab title. Deleting a tab also deletes all the widgets in the tab. New Tab Window The New Tab window opens when you add a new tab in the Summary screen. This window includes the following options: OPTION STEPS Title Layout Type the name of the tab. Choose from the available layouts. 3-6

47 Understanding the Web Console OPTION Slide Show Auto-fit STEPS The information in the selected tabs will change similar to a slide show. If you enable this option, you can select which tabs you want to appear in your slide show, and you can also control the speed at which your slide show plays. Auto-fit adjusts a widget to fit the size of a box. Widget Tasks The following table lists widget-related tasks: TASK Add a widget STEPS Open a tab and then click Add Widgets at the top right corner of the tab. The Add Widgets screen displays. Refresh widget data Click the refresh icon ( ). View help Click the Help ( ). Delete a widget Click the Close Widget ( ). This action removes the widget from the tab that contains it, but not from the other tabs that contain it or from the widget list in the Add Widgets screen. Move a widget Use drag-and-drop to move a widget to a different location within the tab. 3-7

48 Trend Micro Remote Manager User's Guide TASK Resize a widget STEPS To resize a widget, point the cursor to the right edge of the widget. When you see a thick vertical line and an arrow (as shown in the following image), hold and then move the cursor to the left or right. Only widgets on multi-column tabs can be resized. These tabs have any of the following layouts and the highlighted sections contain widgets that can be resized. Available Widgets The dashboard shows the following widgets. Notifications Widget Shows events that need an action. These can be threat-related, or license-related events. 3-8

49 Understanding the Web Console Note This is a permanent widget and cannot be added or deleted. Customers Needing the Most Attention Widget Shows the most recent number of customers with the highest number of events that need an immediate action or response. Data displays in a table and pie chart. You can switch between the table and pie chart by clicking the display icons ( ). If the number of clients for a particular status is 1 or more, you can click the number to view the events in the product tree. Click the customer name to view all the events for this customer or expand the customer name to see the events for certain categories. The number of events under Action Required are events that should be handled as soon as possible. The number of events under Warning are events that are not as urgent as the events under Action Required but will also need to be handled soon. 3-9

50 Trend Micro Remote Manager User's Guide Threat Management Widget Shows the threat event count for all the registered products. You can change the time range for the data shown by selecting from: Last 24 hours (default) Last 7 days Last 30 days If the number of events for a particular category is 1 or more, you can click the number to view the event logs. 3-10

51 Understanding the Web Console System Management Widget Shows the current number of all system events for the registered products. You can use this to determine hardware issues or events for the server or agent. If the number of events for a particular category is 1 or more, you can click the number to view the event logs. 3-11

52 Trend Micro Remote Manager User's Guide Managed Customers and Products/Services Widget Shows the number of managed customers for each product within a specified time period. You can change the time range for the data shown by selecting from: Last month (default) Last 3 months Last 6 months Last year You can click the names of the registered products on the right side to add or remove the data from the graph. 3-12

53 Understanding the Web Console Each bar chart represents a week or month. The bar chart shows the total number of products/services. Worry-Free Business Security Services Customers with the Most Threats Widget Shows the Worry-Free Business Security Services customers with the highest number of threat events. Data displays in a table and pie chart. You can switch between the table and pie chart by clicking the display icons ( ). You can change the threat type for the data shown by selecting from: Antivirus Anti-spyware Web Reputation URL Filtering Behavior Monitoring Network Virus Device Control Click the customer name to view the customer information. 3-13

54 Trend Micro Remote Manager User's Guide If the number of threats is 1 or more, you can click the number to view the event logs. Cloud Edge Customers with the Most Threats Widget Shows the Cloud Edge customers with the highest number of threat events. Data displays in a table and pie chart. You can switch between the table and pie chart by clicking the display icons ( ). You can change the time range for the data shown by selecting from: Last hour Last 24 hours (default) Last 7 days 3-14

55 Understanding the Web Console Last 30 days You can change the threat type for the data shown by selecting from: All Botnet Intrusion Prevention System (IPS) Web Reputation Virus Click the customer name to view the customer information. Click the threat count to open the threat information from the Cloud Edge console. Cloud Edge Devices with the Most Threats Widget Shows the Cloud Edge devices with the highest number of threat events. You can change the time range for the data shown by selecting from: Last hour 3-15

56 Trend Micro Remote Manager User's Guide Last 24 hours (default) Last 7 days Last 30 days You can change the threat type for the data shown by selecting from: All Botnet Intrusion Prevention System (IPS) Web Reputation Virus Click the customer name to view the customer information. Click the threat count to open the threat information from the Cloud Edge console. License Management Widget Displays the current status of the licenses being used by customers. Shows the following license-related details for customers and products: Expiring soon: These are the number of licenses that have not yet expired, but will expire soon. 3-16

57 Understanding the Web Console Expired: These are licenses that have already expired. Note Trend Micro suggests renewing these licenses as soon as possible. Seats Used: These are the number of seats that are currently being used. Provisioned: These are the number of seats that the customer provisioned. 3-17

58 Trend Micro Remote Manager User's Guide Trial and Full License Usage Widget Shows how many trial or full licenses were used for the registered products. You can change the time range for the data shown by selecting from: Last month (default) 3-18

59 Understanding the Web Console Last 3 months Last 6 months Last year You can change the product/service by selecting from: All Hosted Security Worry-Free Business Security Worry-Free Business Security Services Cloud Edge License Usage Widget Displays a graphical analysis of seats that were allocated and those that were actually purchased, for the year. These can help determine whether you should increase or decrease your seat allocation. You can change the product/service by selecting from: 3-19

60 Trend Micro Remote Manager User's Guide All Hosted Security Worry-Free Business Security Worry-Free Business Security Services Product/Service Information The dashboard lists only customers that need attention. To get details for any product, including those that are not listed on the dashboard, go to the Customers tab and access the product on the customer tree. Click Customers > {customer} > {product} to display additional information. Note The displayed options differ for each product/service. Worry-Free Business Security Services Groups: Lists the configured groups and the types. License Info: Displays all the details of the license. Endpoints: Lists the name, IP Address, online/offline status, and details of the scan engine, pattern file, and the platform. Security Settings: Configure the security settings of Worry-Free Business Security Services. Refer to the Trend Micro Worry-Free Business Security Services documentation for detailed information. Note To make more detailed changes, access the Worry-Free Business Security Services console. Worry-Free Business Security 3-20

61 Understanding the Web Console Groups: Lists the different groups configured on the server. You can request to start or stop a scan from here. Endpoints: Lists the name, IP Address, online/offline status, and details of the scan engine, pattern file, and the platform. License Info: Displays all the details of the license. Domain Settings: Configure settings for the entire domain. Refer to the Trend Micro Worry-Free Business Security documentation for detailed information. Note Security settings of individual groups cannot be configured from here. You will need to access the Worry-Free Business Security console to make these changes. Managed Server: Displays all the details of the server. You can request to update the server and update agents from here. TMRM Agent: Contains general information about the Trend Micro Remote Manager agent including the availability, the Globally Unique Identifier (GUID) or Authorization Key, and the IP address. Security Settings: Configure the security settings of a particular group (applicable only for Worry-Free Business Security 6.0 and above). Refer to the Trend Micro Worry-Free Business Security documentation for detailed information. Hosted Security Live Status: Displays the latest Hosted Security information Policy Settings: Lists all the available policies. Approved Senders: Lists all the approved senders. License Info: Displays all the details of the license. Note To make more detailed changes, access the Hosted Security console. 3-21

62 Trend Micro Remote Manager User's Guide Viewing Managed Products To view managed products, click Customers > {customer name} > Products (tab). This tab displays a tree view of the customer's managed products on the right pane and detailed information, settings, and control possibilities on the right pane. For detailed information on Hosted Security and Worry-Free Business Security (all), see the documentation for those products. Customers The Customers page provides a representation of the customers and their products that you manage. By default, the tab displays a table view of all customers. Click the company name to show a tree view with their products in the left pane and detailed information, settings, and control possibilities in the right pane. Note For detailed information on Hosted Security and Worry-Free Business Security (all), see the documentation for those products. To view a product on the customer list, click Customers > {customer name} > {product}. You can do the following: Type the name of a customer or account Filter the displayed list by customer, products, threats, systems, or license events Note When filtering events, you can choose one, two, or all the events or products at once. Browse through all the customers using the pagination arrows. Some other tasks that can be done: Add new customers on page 5-2 Renew licenses for customers with expiring or expired licenses on page 7-2 Export reports for specific customers on page

63 Understanding the Web Console You can also add new customers here and right click on most nodes of the tree to perform specific commands. FIGURE 3-2. List of Customers FIGURE 3-3. Customer Tree Network Tree On the left side of the Customers tab, the screen displays a tree representation of your customers networks. You can search for a customer, view all products at once or only Worry-Free Business Security (all), Hosted Security, or Cloud Edge under the View by drop down list, or browse through all the customers using the pagination arrows. You can also add a customer here and right click on most nodes of the tree to perform specific commands. The table below describes the objects in the network tree. TABLE 3-1. Network tree objects ICON NETWORK OBJECT DESCRIPTION Product/service This product/service is not connected to Remote Manager. 3-23

64 Trend Micro Remote Manager User's Guide ICON NETWORK OBJECT DESCRIPTION Product/service Group Group Server Exchange server Desktop This product/service is connected to Remote Manager. Server Group; this group manages several Client Security Agents (CSAs). Desktop Group A server computer; this computer runs the Client Security Agent (CSA). Exchange Server computer; this computer runs the Messaging Security Agent (MSA). A desktop computer; this computer runs the Client Security Agent (CSA). Right Pane This right pane displays the following: Products The Products tab on the right pane lists all products of a customers and allows you to delete those products. To view Products, click Customers > {customers name} > Products (tab). To delete a product, check the icon to the left of the product and click Delete. Interface items in the Products tab follow: Product Name Product Type Category Incidents Details Status 3-24

65 Understanding the Web Console Note New Hosted Security data can take as long as three hours before it updates on the Remote Manager web console. Hosted Security Customer information is updated once a day. See Hosted Security Settings and Data Updates on page Licenses The Licenses tab of a customer lists all the licenses associated with a customer. Interface items in the Licenses tab follow: Product name Service Plan/Version Used Seats Provisioned Seats Expiration Date Auto-renew status 3-25

66 Trend Micro Remote Manager User's Guide Security Settings Status Real-time Security Settings Status can be viewed by clicking Customers > {customer name} > {product} in the network tree > {group} > Security Settings (right pane). FIGURE 3-4. Real-time Security settings status Both In Office and Out Of Office settings are viewable (applies to Worry-Free Business Security Standard and Advanced only). Settings are controlled through the Settings drop down menu. Out of Office settings are relevant only when Location Awareness is turned on. For more information, refer to see Menu Bar on page 3-27 and Worry-Free Business Security Commands on page Location Awareness With Location Awareness (applies to Worry-Free Business Security Standard and Advanced only), administrators can control security settings depending on how the 3-26

67 Understanding the Web Console Client is connected to the network. Worry-Free Business Security Standard and Advanced automatically identifies the location of the client and controls the web sites users can access. The restrictions differ based on the user's location. Worry-Free Business Security classifies Clients as: Normal Clients: computers that are stationary and maintain a continuous network connection with the Security Server. Roaming Clients: computers that do not always maintain a constant network connection with the Security Server, such as portable computers. These Clients' Client/Server Security Agents continue to provide virus protection, but have delays in sending their status to the Security Server. Note Location Awareness controls the In Office/Out of Office connection settings. Menu Bar The menu bar on the right pane only displays when Worry-Free or Hosted Security is selected on the network tree. These commands enable you to manage critical aspects of network security including real-time scan settings and the deployment of component updates. For a list of the network commands on the menu bar and instructions on how to use these commands, see Worry-Free Business Security Commands on page FIGURE 3-5. Menu Bar 3-27

68 Trend Micro Remote Manager User's Guide Note Items in the menu bar are disabled and will not respond to mouse clicks if the selected network object cannot receive commands. Endpoints If you select a server or desktop computer on the network tree, Trend Micro Remote Manager displays information about the endpoint. The information it displays varies depending on whether the endpoint is a server/desktop or an Exchange server. To see this information, go to Customers > {customer name} > {product} > {group} > Devices (right pane). Remote Manager displays the following information: FIGURE 3-6. Endpoint status Name IP Address Status Virus Engine Virus Pattern Platform Version 3-28

69 Understanding the Web Console Worry-Free Business Security Commands Worry-Free Business Security (Standard and Advanced) commands let you manage critical aspects of security including deploying security components, scanning computers for viruses and known vulnerabilities, and upgrading managed servers. Note The commands in this section are only available for Worry-Free Business Security (Standard and Advanced). For Worry-Free Business Security Services and Hosted Security, you need to sign into the web console of those products. The table below lists the commands of the Worry-Free Business Security (Standard and Advanced) Settings menu. TABLE 3-2. Commands on the Settings Menu COMMAND ACTION EFFECTS Manual Scan Update Now Real-time Antivirus/ Anti-spyware Real-time Scan for POP3 Mail Start or stop a scan for an entire domain or group. Deploy the latest security components, including the scan engine and pattern files. Enable/Disable the realtime Antivirus and Antispyware scanners on all computers in the domain. Enable/Disable Real-time Scan for POP3 Mail for the entire domain. Allows for an on-demand, manual scan. Allows on-demand component updates. Real-time Scan automatically scans accessed files. Disabling Real-time Scan will leave the domain at risk. POP3 Mail Scan (using the Trend Micro Anti-Spam toolbar plug-in) protects computers in real-time against security risks and spam transmitted through POP3 messages. 3-29

70 Trend Micro Remote Manager User's Guide COMMAND ACTION EFFECTS Enable Behavior Monitoring Location Awareness Firewall Web Reputation Enable/Disable Behavior Monitoring for the entire domain. Enable/Disable Location Awareness for the entire domain. Enable/Disable the personal firewall for the entire domain. Configure Web Reputation for the entire domain. Behavior Monitoring protects computers from unauthorized changes to the operating system, registry entries, other software, or files and folders. With Location Awareness, administrators can control security settings depending on how the Client is connected to the network. This affects "In Office/Out of Office" settings of the Firewall, Web Reputation and TrendSecure toolbars: Anti-Key Loggers, Keystroke Encryption, Page Ratings. In Office Settings work as the default settings if Location Awareness is disabled. Out of Office Settings are available only if Location Awareness is enabled. Depending on existing firewall rules, enabling the firewall can limit the ability of computers to communicate with the network. Disabling can expose computers to unwanted network traffic. Web Reputation helps prevent access to URLs that pose potential security risks by checking any requested URL against the Trend Micro Web Security database. 3-30

71 Understanding the Web Console COMMAND ACTION EFFECTS URL Filtering Device Control Start Vulnerability Assessment Start Damage Cleanup Service Update Managed Server Update Client Server Security Agent Enable/Disable URL Filtering for the entire domain. Enable/Disable Device Control for the entire domain. Initiate Vulnerability Assessment (VA) to scan computers in the domain for known vulnerabilities. Deploy Damage Cleanup Services (DCS) to clean infected computers. Deploy the latest security components, including the scan engine and pattern files, only to the Managed Server. Deploy the latest security components, including the scan engine and pattern files, to all Client Server Security Agents (CSA) in the domain. Enabling URL Filtering will monitor attempts to access unauthorized websites. This is only available for Worry-Free Business Security Services and Worry-Free Business Security Advanced 6.0 and above. Enabling Device Control will monitor unauthorized attempts to access devices. This is only available for Worry-Free Business Security Advanced 7.x and 8.0. Consumes some resources on computers and slightly increases traffic between the managed server and the computers. Consumes some resources on computers and can add some traffic between the managed server and the computers. Ensures that computers are running the latest security components. The deployment can increase traffic between computers and the managed server. Ensures that computers are running the latest security components. The deployment can increase traffic between computers and the managed server. Hosted Security Settings and Data Updates To view Hosted Security settings and data including Live Status, Global Settings, and About, click Customers (tab) > {customer} > Hosted Security. 3-31

72 Trend Micro Remote Manager User's Guide The following details are listed for all the domains and are updated once a day: All the information under the Live Status tab. Policy Settings Approved Senders All the information under the License Info tab. Note New Hosted Security data can take as long as three hours before it updates on the Remote Manager web console. Notifications Customer notifications can be sent by or seen from the Notifications widget or a third-party software. The Configure Notifications screen will appear. In this page, you can set the following: Events that will trigger notifications: License related events: Expiring soon: Sends a notification if there are licenses that will be expiring soon. You can also set how often the system will send a notification. Monthly: The system will send an notification every 30 days, starting from 60 days before expiration. Bi-weekly: The system will send an notification every 14 days, starting from 28 days before expiration. Weekly: The system will send an notification every 7 days, starting from 14 days before expiration. 3-32

73 Understanding the Web Console Note Although you have set the notification to send an only every week, every two weeks, or every month, you may get an notification everyday, because the notification is dependent on the expiration date of a company. However, to ensure that you do not get several notifications on the same day, Trend Micro also includes the company names and dates of other products that will expire soon in the same . Expired: Sends a notification if there are licenses that have already expired. Exceeded allocation: Send a notification if the percentage of used seats exceeds the provisioned number of seats. You can specify the percentage of seats used that exceeded the seats the customer provisioned. This can be any value between 100 to 120. Product-related events: Worry-Free Business Security and Worry-Free Business Security Services events: Threats: Sends a notification if the number of threat events exceed the specified threshold. System: Sends a notification if the number of system or device events exceed the specified threshold. Cloud Edge events: Notification recipients: Web threats detected exceeds: Sends a notification if the number of web threats detected exceed the specific threshold. Kaseya (Only Worry-Free Business Security and Worry-Free Business Security Services events) Autotask (Only Worry-Free Business Security and Worry-Free Business Security Services events) ConnectWise Me: This is the address that will receive the notification. 3-33

74 Trend Micro Remote Manager User's Guide Note If the address is incorrect, click the Licensing Management Platform link or the My Account button to go to the profile setting page and change the settings for the profile. Additional recipients: You can specify additional recipients for customer-specific events. For more information on how you configure notification, refer to Configuring Notifications on page 8-2. Worry-Free Business Security Services Status and Data Updates To view Worry-Free Business Security Services settings and data including the status, click Customers > {customer name} > {product} > WFBS-SVC. Worry-Free Business Security Services information is updated once a day. This includes: All the information under the Security Settings. The Expiration Date under the License Info tab (this is the Expiration Date for the Worry-Free Business Security Services activation code). Note New Worry-Free Business Security Services data can take as long as three hours before it updates on the Remote Manager web console. Depending on your license mechanism, the options displayed could be different. 3-34

75 Chapter 4 Preparing the Infrastructure This section contains the following topics: Infrastructure Installation Overview on page 4-2 Adding Products on page

76 Trend Micro Remote Manager User's Guide Infrastructure Installation Overview In general, preparing the service infrastructure involves the following steps for each type of product/service. Worry-Free Business Security Standard and Advanced 1. Add a new customer on the Remote Manager web console. 2. Add the main customer contact. 3. Add at least one product to that customer. 4. Install the Agent on the customer s server. 5. Enter the GUID or Authorization Key on the Agent. Hosted Security and Worry-Free Business Security Services 1. Add a new customer on the Remote Manager web console. 2. Add the main customer contact. 3. Add at least one service to that customer. 4. Enter the Authorization Key on the customer s service console. ConnectWise 1. Link ConnectWise and add the ConnectWise logon credentials on the Administration > Configure third-party integration (screen) on the Remote Manager web console. 2. Specify the global ConnectWise notification settings. 3. Add the notification recipient to the recipient list on the Customers > {customer} > Notification (tab) on the Remote Manager web console. 4-2

77 Preparing the Infrastructure 4. Add the required fields to the ConnectWise console. 5. (Optional) Configure the ConnectWise settings and notification for each customer. Kaseya 1. Link Kaseya and add the Kaseya user on the Administration > Configure third-party integration (screen) on the Remote Manager web console. 2. Add the notification recipient to the recipient list on the Customers > {customer} > Notification (tab) on the Remote Manager web console. 3. Add the required fields to the Kaseya console. Autotask 1. Link Autotask and add the Autotask logon credentials on the Administration > Configure third-party integration (screen) on the Remote Manager web console. 2. Add the notification recipient to the recipient list on the Customers > {customer} > Notification (tab) on the Remote Manager web console. 3. Add the required fields to the Autotask console. Adding Products Adding Customers You should identify basic customer information before you create the customer account. Fields to note include First and Last Name (as it will appear on reports and notifications), Time zone (of the customer), and Language (in which the customer will receive reports and notifications). Before you add a customer and install the Agent on the managed server, make sure you have written approval to perform tasks to access, monitor, and manage the customer's resources. 4-3

78 Trend Micro Remote Manager User's Guide Procedure 1. From the Remote Manager web console banner, click New Customer. Note You can click New Customer from the Banner, or from the Customers tab. 2. Provide the customer information. FIGURE 4-1. Customer Info Screen 3. Click Next >. 4. Assign a service plan, license start date, and the number of units per license. 4-4

79 Preparing the Infrastructure 5. Set up the product default settings for this account. These are: Note This feature is only for Worry-Free Business Security Services. Basic product settings: Configure only the settings on this screen that new customer accounts will use. FIGURE 4-2. Basic product settings Templates: Use this option to select a default setting template. Configure the settings from Admin > Configure default settings template. 6. Verify all the information and then click Done. Note After adding the customer, profile changes can only be made from the Trend Micro Licensing Management Platform. 4-5

80 Trend Micro Remote Manager User's Guide Registering Trend Micro Products to Trend Micro Remote Manager You can register Trend Micro products to Trend Micro Remote Manager. For thirdparty products, refer to Integrating Third-party Products with Trend Micro Remote Manager on page Registering Worry-Free Business Security This section helps you understand how to connect or disconnect Worry-Free Business Security from Trend Micro Remote Manager. Agent GUID or Authorization Key To distinguish between products and services, Remote Manager assigns a globally unique identifier (GUID) or Authorization Key to each product and service. Every time you add a product or service to the Remote Manager web console, Remote Manager generates a new GUID or Authorization Key. The person who installs the Agent on the managed server or adds the service to the Remote Manager web console must input the GUID or Authorization Key during installation to allow the product to register to Remote Manager. 4-6

81 Preparing the Infrastructure The GUID or Authorization Key for a customer's products/services are always available from: Customers > All Customers (on the tree) > {customer} > TMRM Agent (tab). FIGURE 4-3. The Agent GUID or Authorization Key is always available (Worry-Free Business Security Standard and Advanced) Remote Manager Agent GUID 1A2B3C4567D8-E1FGHI23-J456-78K9-1L23 Agent Installation for Worry-Free Business Security 6.0 and Above There are several ways to install the Trend Micro Remote Manager Agent to the Worry- Free Business Security Standard or Advanced 6.0 and above server. The installation procedures depend on whether the customer is new or already has an existing account on the Remote Manager web console. Before You Begin Remote Manager Agent GUID Agent installer (WFRMAgentforWFBS.exe) 4-7

82 Trend Micro Remote Manager User's Guide Active Internet connection 50MB available hard disk space Customers Without Remote Manager Accounts Procedure Option 1: From the Remote Manager web console 1. From the Remote Manager web console, add the customer and provide an optional description. 2. Add Worry-Free Business Security Standard or Advanced to the Remote Manager web console, generating a GUID in the process. 3. Install the Remote Manager Agent on the Worry-Free Business Security Standard or Advanced server using the console-generated GUID. Option 2: Install the Agent on the Worry-Free Business Security server Use the Remote Manager Agent installer on the Worry-Free Business Security server (without first adding the customer to the Remote Manager web console) to install the agent. Customers With Remote Manager Accounts Procedure 1. Add Worry-Free Business Security Standard or Advanced to the Remote Manager web console, generating a GUID in the process. 2. Install the Remote Manager Agent on the Worry-Free Business Security Standard or Advanced server using the console-generated GUID. Verifying Trend Micro Remote Manager Agent Installation Verify that the Agent has been installed successfully. 4-8

83 Preparing the Infrastructure Checking the Agent Service Status On the computer where the Remote Manager Agent is installed, check if Trend Micro Information Center for CSM has started. Procedure 1. Click Start > Settings > Control Panel > Administrative Tools > Services. 2. Look for Trend Micro Remote Manager Agent. 3. Check if the Status has Started. Checking the Start Menu Shortcuts On the computer where the Trend Micro Remote Manager Agent is installed, check the Program Group in the Start Menu. Procedure 1. Click Start > Programs > Trend Micro Remote Manager Agent. 2. Verify that the Program Group contains the following items: Agent Configuration Tool Readme Checking the System Tray Icon On the computer where the Trend Micro Remote Manager Agent is installed, check for the Trend Micro Remote Manager Agent icon in the system tray. If for any reason the icon is not visible, you can start it by clicking Start > Programs > Trend Micro Remote Manager Agent > Agent Configuration Tool. Exiting the tool does not stop the Trend Micro Remote Manager service. It only closes the Configuration Tool and removes the icon from the task bar. The tool can be restarted at any time. Suspend the mouse over the icon for status information. 4-9

84 Trend Micro Remote Manager User's Guide TABLE 4-1. System Tray Icons ICON DESCRIPTION A green icon indicates that the Agent is connected to the Trend Micro Remote Manager communication server. The Agent is working normally. A red icon indicates that the Agent is not connected to the Trend Micro Remote Manager communication server or the version of the Agent is mismatched with the server and needs to be updated. An icon with a red arrow indicates that the Agent has signed out from Trend Micro Remote Manager. An icon with a red "X" means that the Agent has been disabled. Checking the Connection Between the Agent and Server To ensure that the Trend Micro Remote Manager service is running smoothly, make sure that Agents have a status of "connected" or "online" on the Remote Manager web console. Go to Customers > {customer} > Products (tab). The tree lists the status of each Agent in the Status column. For details on each status, see Agent Status on page 6-2. In addition to the current section, refer to Troubleshooting and Known Issues on page 11-1 for more issues dealing with Server/Agent connectivity. Viewing Installation Errors The Agent installation logs cover Agent installation activities. Collect these logs and send them to your support provider if you encounter problems during installation. The Agent installation logs can be obtained from the following location on the managed server: C:\WFRMAgentForCSM_Install.log 4-10

85 Preparing the Infrastructure Registering Worry-Free Business Security Services This section lets you know how to connect or disconnect Worry-Free Business Security Services from Trend Micro Remote Manager. Connecting a Worry-Free Business Security Services Customer to the Remote Manager Web Console To manage Worry-Free Business Security Services from the Trend Micro Remote Manager web console, a customer s Worry-Free Business Security Services account must register with Remote Manager by carrying out the following: Note If the reseller added the product to your account from Licensing Management Platform, you do not need to do the following steps. Procedure 1. Add the product to the Remote Manager web console and save the GUID or Authorization Key. For more information, refer to Adding Products/Services on page Sign into the customer s Worry-Free Business Security Services account. 3. Go to Administration > Trend Micro Remote Manager. 4. Type the Authorization Key and click Connect. Disconnecting a Worry-Free Business Security Services Customer from the Remote Manager Web Console To disconnect Worry-Free Business Security Services from the Remote Manager web console: If the account has been integrated with Licensing Management Platform, the reseller can delete the service plan from the Licensing Management Platform web 4-11

86 Trend Micro Remote Manager User's Guide console. Once the service plan has been deleted, the customer will be disconnected from the Remote Manager web console. For other accounts, the customer can open the Remote Manager screen on the Worry-Free Business Security Services web console and click Disconnect. The customer will then be notified on the Worry-Free Business Security Services console. Registering Hosted Security This section lets you know how to connect or disconnect Hosted Security from Trend Micro Remote Manager. Connecting a Hosted Security Customer to the Remote Manager Web Console To manage Hosted Security from the Trend Micro Remote Manager web console, a customer s Hosted Security account must register with Remote Manager. Note If the reseller added the product to your account from Licensing Management Platform, you do not need to do the following steps. Procedure 1. Add the product to the Remote Manager web console and save the GUID or Authorization Key. 2. Sign into the customer s Hosted Security account. 3. Go to Administration > Remote Manager. 4. Type the GUID or Authorization Key and click Connect. After entering the GUID or Authorization Key and clicking Connect, it can take as long as ten minutesfor Hosted Security to complete the connection to the Remote Manager web console. 4-12

87 Preparing the Infrastructure 5. Review the connection status. New Hosted Security data can take as long as three hours before it updates on the Remote Manager web console. Hosted Security Customer information is updated once a day. See Hosted Security Settings and Data Updates on page Disconnecting a Hosted Security Customer from the Remote Manager Web Console To disconnect Hosted Security from the Remote Manager web console: If the account has been integrated with Licensing Management Platform, the reseller can delete the service plan from the Licensing Management Platform web console. Once the service plan has been deleted, the customer will be disconnected from the Remote Manager web console. For other accounts, the customer can open the Remote Manager screen on the Hosted Security web console and click Discontinue. The customer is then notified on the Hosted Security console and clicks OK. Integrating Third-party Products with Trend Micro Remote Manager You can register third-party products to Trend Micro Remote Manager. For Trend Micro products, refer to Registering Trend Micro Products to Trend Micro Remote Manager on page 4-6. Integrating Autotask Configure the following settings to integrate Autotask with Remote Manager: 4-13

88 Trend Micro Remote Manager User's Guide Configuring Autotask Settings in Remote Manager Procedure 1. Click Administration > Configure 3rd-party Integration. The Third-party Integration window opens. FIGURE 4-4. Account Information Notifications Group Box 2. Click Enable Integration. 3. Specify the sign in credentials. You can check the Autotask credentials in Admin > AutotaskExtend > Tools > Incoming Processing > Add Ticket E- mail Service (ATES) > Edit > General. 4-14

89 Preparing the Infrastructure 4. Select the preferred language. 5. Click Save. 6. Click Customers > All Customers (on the tree) > {customer} > Notifications (tab). FIGURE 4-5. Select the required notifications 7. Select the notifications that should be sent to Autotask for Worry-Free Business Security Services. 4-15

90 Trend Micro Remote Manager User's Guide 8. Select Autotask as one of the recipients. 9. Repeat steps 5, 6, and 7 for each customer. Configuring Settings in Autotask Procedure 1. In Autotask, go to Admin > Service Desk > Issue and Sub-Issue Types > Managed Services Alert to add the following fields to the ticketing system. This will enable Autotask to show Trend Micro Remote Manager notifications. Choose from the following managed service alerts: Trend Micro Threat Events Trend Micro System Events Trend Micro License Events 4-16

91 Preparing the Infrastructure FIGURE 4-6. Trend Micro Sub-issue Types 2. Go to Admin > AutotaskExtend > Tools > Incoming Processing > Add Ticket Service (ATES) > Edit > Ticket and ensure that the setting is correct: 4-17

92 Trend Micro Remote Manager User's Guide 3. Go to Admin > Site Setup > User-Defined Fields and create the Trend Micro Site ID field: 4-18

93 Preparing the Infrastructure FIGURE 4-7. Trend Micro Site ID Definition 4. Go to CRM > New Account and input the Remote Manager unique ID in the new Trend Micro Site ID field. This is the unique ID exported from Remote Manager. 4-19

94 Trend Micro Remote Manager User's Guide Integrating Kaseya Configure the following settings to integrate Kaseya with Remote Manager: Configuring Kaseya Settings in Remote Manager Procedure 1. Click Administration > Configure 3rd-party Integration. The Third-party Integration window opens. FIGURE 4-8. Account Information Notifications Group Box 2. Click Enable integration. 4-20

95 Preparing the Infrastructure 3. Add the Kaseya address. 4. Click Save. 5. Go to Customers > All Customers (on the tree) > {customer} > Notifications (tab). 4-21

96 Trend Micro Remote Manager User's Guide FIGURE 4-9. Select the required notifications 6. Select the product notification settings that should be sent to Kaseya. 4-22

97 Preparing the Infrastructure Note You select the default real-time notification settings that is applicable to all products and customers, or specify the settings for this customer. 7. Select Kaseya as one of the recipients. 8. Repeat steps 5, 6, and 7 for each customer. Configuring Settings in Kaseya Procedure 1. In Kaseya, add the following fields to the ticketing system to show Trend Micro Remote Manager notifications. Worry-Free Business Security FIELD NAME TM_CreateTime TM_ProductName TM_AgentGUID TM_CustomerName TM_EventName TM_ServerName TM_MASClientName (optional) PURPOSE Event generation time Product name Remote Manager agent GUID Customer/Company name Event name Client Server Messaging/Worry-Free Business Security server name Exchange server name (only affects the Exchange Server Shutdown event) 4-23

98 Trend Micro Remote Manager User's Guide FIGURE Kaseya Ticketing Fields Worry-Free Business Security Services FIELD NAME TM_CreateTime TM_ProductName TM_CustomerName TM_EventName PURPOSE Event generation time Product name Customer/Company name Event name 4-24

99 Preparing the Infrastructure FIGURE Kaseya Ticketing Fields 2. Ensure that the setting is correct as shown on the following screen: 4-25

100 Trend Micro Remote Manager User's Guide FIGURE Kaseya Settings 4-26

101 Preparing the Infrastructure When an event is triggered, Kaseya will receive the ticket: FIGURE Kaseya Event Ticket Integrating ConnectWise Configure the following settings to integrate ConnectWise with Remote Manager: Configuring General ConnectWise Settings in Remote Manager Procedure 1. Go to Administration > Configure 3rd-party Integration. 4-27

102 Trend Micro Remote Manager User's Guide The Third-party Integration window opens. FIGURE Account Information Notifications Group Box 2. Update the following: Enable ConnectWise Integration: Select the checkbox to enable integration between Trend Micro Remote Manager and ConnectWise. ConnectWise URL: Type the URL of the service. Company ID Logon ID: The account used to sign into ConnectWise. Logon password: The password associated with the account. Select how frequently Remote Manager should send billing information. Select how frequently Remote Manager should send spam statistics. 3. Click Save. Configuring Customer-specific ConnectWise Settings in Remote Manager Configure the ConnectWise settings for each customer. These settings are optional. However, if you also want to receive customer-specific notification, you have to enable this feature. 4-28

103 Preparing the Infrastructure Procedure 1. Go to Customers (tab) > {customer} > ConnectWise (tab, right pane). 2. Select Enable integration. 3. Specify a valid Company ID that exists in ConnectWise. Note You can click Test Validity to verify the company ID if you are unsure of the spelling. 4. Select the integration settings. Use the default settings under Administration. Specify your own options for billing and executive summaries. 5. Click Save. 6. Go to Customers (tab) > {customer} > Notification (tab, right pane). 7. Configure the notification settings for this customer. 8. Select ConnectWise as one of the recipients. 9. Click Save. 4-29

104 Trend Micro Remote Manager User's Guide Configuring Settings in ConnectWise Procedure 1. Log on to ConnectWise using the Professional services automation (PSA) tool. 2. Build a new service board. This is an optional step. But completing this step will help you filter results from Trend Micro Remote Manager efficiently. a. Go to Setup > Setup Table > Search and type Service Board. b. Click Service Board. A list of service boards appear. c. Click the new icon to create a new service board. The new service board screen appears. d. Update Board Name, Location, Business Unit, and Sign Off Template. All other fields are optional. 4-30

105 Preparing the Infrastructure e. Click Save. f. Click the Statuses tab. g. Click the new icon to create a new status service. h. Update Status to Description, Sort Order, and check Display on Board. i. Click Save. 3. Assign rights to the user. a. Go to Setup > Setup Table > Search and type Integrator Login. b. Click the required Integrator Login and click the new icon to create a new login account. The General screen opens. c. From Access Levels, select All records. 4-31

106 Trend Micro Remote Manager User's Guide d. Check the following options: Service Ticket API, Management Services API, Company API, System API, and Configuration API. e. Select the service board you previously created, update the Ticket Callback URL to or any other arbitrary URL, and click Save. f. Click Save. 4. Build a new management solution. a. Go to Setup > Setup Table > Search and type Management IT. b. Click Management IT. c. Click the new icon to create a management solution. d. Update Name to TMRM Management Setup, Management IT Solution to Custom, and Custom Solution Name to TMRM Management Solution. Using other values might break the connection. e. Click Save. 5. Change the default status of the company to Active. a. Go to Setup > Setup Table > Search and type Company Status. b. Click Company Status. c. Click Active. d. Select Default Flag. e. Click Save. 6. Build a new service for every Remote Manager managed product/service. a. Go to Setup > Products > New. b. Update Product ID to a managed product/service. Choose from HES/ WFBS-SVC/WFBS-S/WFBS-A. c. Update the pricing as required. d. Click Save. 4-32

107 Preparing the Infrastructure Repeat these steps for every managed product/service. 7. Build cross references for each Remote Manager managed product/service. a. Go to Setup > Setup Table > Search and type Managed Devices Integration. b. Click Managed Devices Integration. c. Select the Management Solution named "Remote Manager Management Solution". d. Go to Cross Reference (tab) > New. e. Update the fields as required. Settings for Remote Manager managed products/services. PRODUCT/SERVICE Worry-Free Business Security Standard SETTINGS Type: T-WFBS-S Level: Standard Agreement Type: Managed Service Product: WFBS-S Configuration Type: Spam Stats Worry-Free Business Security Advanced Type: T-WFBS-A Level: Advanced Agreement Type: Managed Service Product: WFBS-A Configuration Type: Spam Stats 4-33

108 Trend Micro Remote Manager User's Guide PRODUCT/SERVICE Worry-Free Business Security Services SETTINGS Type: T-WFBSS Level: Standard Agreement Type: Managed Service Product: WFBSS Configuration Type: Spam Stats Hosted Security Type: T-HES Level: Standard Agreement Type: Managed Service Product: HES Configuration Type: Spam Stats f. Click Save. 8. Build a new company for every customer you want to integrate with ConnectWise. a. Go to Contacts > Company > New. b. Update Company ID. Trend Micro recommends using the Remote Manager Customer Name as the ConnectWise Company ID. c. Click Save. Repeat these steps to build a company for each customer. 9. Build a new management for each company a. Click Management (tab). b. Click Save. c. Click New Item. d. Update Solution to Remote Manager Management Solution. e. Update Managed ID to the company ID specified in the previous step. 4-34

109 Preparing the Infrastructure f. Click Save. 10. Build configurations for each company. a. Click Configuration (tab). b. Build a new configuration with Configuration Type set to Spam Stats and the Name set to use the company ID. c. Click Save. 11. Build a new agreement for each customer you want to integrate with ConnectWise. a. Go to Agreements (tab) > New. b. Select Managed Service as the Agreement Type and update the other details as required. c. Click Save. 12. Include additions for the agreement. a. Go to Agreements > Additions. 4-35

110 Trend Micro Remote Manager User's Guide b. Update the fields as required. For example, update the price and the serial number. Important The serial number must use the SerialNumber: Serial_Company ID format. c. Click Save. Repeat these steps for every managed product/service. 4-36

111 Chapter 5 Managing Customers This section contains the following topic: Customers on page

112 Trend Micro Remote Manager User's Guide Customers Check your customer details and license information through the Customers page. You can also do the following: Click each customer s name to see more details of the customer information Filter the customer list Export customers information to a csv file Add new customers Renew licenses Manage products Adding New Customers Procedure For Licensing Management Platform accounts: 1. Go to Customers > {customer name} > Products (tab) > Add. 2. Select the service plan, the start date, and the number of units per license. 3. Click Next. 4. Configure the default settings for the product. You can choose one of the following: 5-2

113 Managing Customers Note This feature will show only if you selected Worry-Free Business Security Services. 5-3

114 Trend Micro Remote Manager User's Guide Basic: Configure only the settings shown. 5-4

115 Managing Customers Approved List for Web Reputation and URL Filtering Note If you are adding a URL to the Approved list, make sure it has not been added to the Blocked List, and vice versa. Blocked List for URL Filtering Scheduled Scan for the Server and device Templates: Go to Administration > Configure default setting templates to set up more settings, using a console similar to Worry-Free Business Security. 5. Click Done. The product/service is added and the details of the addition appear. Note Make note of the GUID or Authorization Key. 6. Click Connect to get information on how to connect the product/service to the console. For other accounts: 1. Click New Customer from the banner or go to Customers > New Customer. A New Customer page will open. 5-5

116 Trend Micro Remote Manager User's Guide 2. Provide the necessary information. 3. Click Next >. 4. Select the product type and provide a product description. 5. Click Done. 5-6

117 Managing Customers Associating Accounts If you manage other Trend Micro Remote Manager accounts that have not migrated to the new Licensing Management Platform, you can merge those accounts with the current one. Procedure 1. Sign into a Remote Manager account that has been migrated to Licensing Management Platform. The Dashboard screen opens. 2. Click the arrow next to the sign in name and click Merge Another Account > Continue. WARNING! If you merge an account to the current one, all data from the other account will be moved. For example, if you are currently signed in as admin1 and you merge admin2 to the admin1 account, all the data from the admin2 account will be deleted from the admin2 account. This data has been merged with the admin1 account. You will still be able to open the admin2 account but all the data will be in the admin1 account. 3. Enter the user name and password of the account you want to merge with the current one. 4. Click Merge. Wait a couple of minutes for the data to be merged. 5-7

118 Trend Micro Remote Manager User's Guide What to do next After migrating the account, you will always see the following when adding a new customer: With an active Licensing Management Platform account: If the new customer already has an account in Licensing Management Platform. With existing product servers that need to be connected to this account: If the new customer has a product/service but the account has not been integrated into Licensing Management Platform. Checking Product License Check your customers' managed server product licenses regularly to ensure continuous protection. Procedure 1. Click Customers > {customer} > {product} > License (tab). 2. Check the product license information. 5-8

119 Managing Customers Adding Products/Services Procedure 1. Go to Customers > {customer name} > Products (tab) > Add. For Licensing Management Platform accounts: a. Select the service plan, the start date, and the number of units per license. b. Add the product or service. The product/service is added and the details of the addition appear. c. Click Done. If you are using an account that has been integrated with the Trend Micro Licensing Management Platform: a. Select the product type and add a product description. b. Click Done. 5-9

120 Trend Micro Remote Manager User's Guide c. Make note of the GUID or Authorization Key. You will need this when you are registering your products on page 4-6. Contacts If your account is associated with Licensing Management Platform, you can add contacts, modify customer information, or delete contacts from the Licensing Management Platform. Click the Licensing Management Platform link above Sign Out to do so. If you do not see that link, you can only view contact information from the Remote Manager web console. Adding Contacts To subscribe to event notifications and reports, users in your customer s organization first need to be added as contacts. Note If your account is associated with Licensing Management Platform, click the Licensing Management Platform link above Sign Out to add contacts. If you do not see that link, you can only view contact information from the Remote Manager web console. Procedure 1. Go to Customers > {customer} > Contact Information (tab). 2. Click Add. 3. In Add Contact, provide the following information: Contact name Phone number ZIP/Postal code Remote Manager will send event notifications and reports to this address. 5-10

121 Managing Customers Other 4. Click Save. Modifying Customer Information The Company Profile and Contact Information tab lets you edit a customer's information. Note If your account is associated with Licensing Management Platform, click the Licensing Management Platform link above Sign Out to modify the contact information. If you do not see that link, you can only view contact information from the Remote Manager web console. Procedure 1. Go to Customers > {customer} > Company Profile (tab). 2. Update the company information. Note You can also change the logo that customers will see when they sign into the Remote Manager web console. 3. Go to Customers > {customer} > Contact Information (tab). 4. Update the contact details. 5. Click Save. Deleting Contacts Customers can subscribe to notifications and reports as contacts. However, there are times when the contacts change and some contacts have to be removed from the list of recipients. 5-11

122 Trend Micro Remote Manager User's Guide Note If your account is associated with Licensing Management Platform, click the Licensing Management Platform link above Sign Out to modify the contact information. If you do not see that link, you can only view contact information from the Remote Manager web console. Procedure 1. Go to Customers > {customer} > Contact Information (tab). 2. Select the contact to delete. 3. Click Delete. Deleting Customers If you delete a product or service, all the records for this product or service will be deleted. If you wish to re-register the product or service to the Trend Micro Remote Manager server, you have to create a GUID for this customer. You also need to reinstall the Remote Manager Agent on the managed product and use the new GUID. Note This feature is only applicable on accounts that have not integrated with Licensing Management Platform. Procedure 1. Delete all associated products/services from the customer. a. Click Customers > {customer}. b. Select all the products/services in the Product tab. c. Click Delete. 2. Delete one or more customers. a. Click Customers. 5-12

123 Managing Customers b. Select the customers in the list. Note c. Click Delete. Select only customers that do not have products or services. Filtering the Customer List The Customer list can show a short or long list, depending on how many customers you have. To get to the information you need, you can narrow down the customers and find only the customers that fit the profile you set. Procedure 1. From the Remote Manager web console, click Customers. All your customers will show on this page. 2. On the right-hand side, select one or more fields. Note If you select more than one (1) field, you might get the specific information you need, and that is a good thing. However, you might also have filtered out the information you need, so be careful what you select. 3. (Optional) Click Export to generate a CSV file of your filtered customers. 5-13

124

125 Chapter 6 Managing Agents This section contains the following topics: Managing Agents from the Remote Manager Web Console on page 6-2 Managing Agents from the Managed Server on page 6-6 Removing Agents on page

126 Trend Micro Remote Manager User's Guide Managing Agents from the Remote Manager Web Console This section contains information on how to manage agents from the Trend Micro Remote Manager web console. Checking the Connection Between the Agent and Server To ensure that the Trend Micro Remote Manager service is running smoothly, make sure that Agents have a status of "connected" or "online" on the Remote Manager web console. Go to Customers > {customer} > Products (tab). The tree lists the status of each Agent in the Status column. For details on each status, see Agent Status on page 6-2. In addition to the current section, refer to Troubleshooting and Known Issues on page 11-1 for more issues dealing with Server/Agent connectivity. Agent Status The status of a Remote Manager Agent indicates whether the Agent is able to collect data and receive commands from the Remote Manager server. The status also indicates the reason why the Agent cannot function properly and how you can handle the situation. The table below describes the different Agent status types and ways to handle the situation. TABLE 6-1. Agent status types STATUS DESCRIPTION RESOLUTION Online The Agent is running normally. NA 6-2

127 Managing Agents STATUS DESCRIPTION RESOLUTION Abnormal Disabled Offline The Agent appears offline and is not responding to the Remote Manager server, but has not sent a logoff request. This status is set manually from the console. When an Agent in disabled status, the Agent queries commands from the server every 10 minutes. The Agent closed normally after having sent a logoff request to the Remote Manager server. Typically, an Agent is in this status if a user has shut down the Agent service or the managed server has shut down. This status can occur if the managed server did not shut down properly. Ensure that the managed server administrator is aware of this situation. Contact the administrator if necessary. Submit a command to enable the Agent (See Submitting Agent Commands on page 6-4). Ensure that the managed server administrator is aware that the server has shut down. Contact the managed server administrator if necessary. Unknown The Agent is not working normally. Remove the Agent and have the managed server administrator reinstall the Agent. Contact your support provider if this issue persists. Plug-in errors Unregistered The console has detected errors in the Agent's service plug-in component. The Agent has not registered to the Remote Manager server. Remove the Agent and ask the managed server administrator to re-install the Agent. Contact your support provider if this issue persists. The Agent may have not been installed or has not been able to communicate successfully with the Remote Manager server. Contact the managed server administrator. 6-3

128 Trend Micro Remote Manager User's Guide STATUS DESCRIPTION RESOLUTION Version mismatch Incompatibility between the versions of any of the following components has been detected: Agent Remote Manager Worry-Free Business Security (Standard and Advanced) Upgrade the Agent and the managed server. If this does not work, report this problem to the Trend Micro Data Center administrator. Submitting Agent Commands Agent commands allow you to remotely resolve issues affecting the Worry-Free Business Security (Standard and Advanced) Agent. If an Agent is in abnormal or unregistered status, you cannot submit a command to it. Procedure 1. Go to Customers > {customers} > {product} > Groups (tab). Select one of the following commands: Scan Now: Initiates a scan of the endpoint. Stop Scan: Stops the scanning process. 2. Go to Customers > {customers} > {product} > Domain Settings (tab). Select one of the following commands: Enable: Restores the Agent from disabled status to normal functionality. Disable: Agent stops collecting information but continues to query the server for commands every 10 minutes. Start Vulnerability Assessment: Performs a vulnerability assessment scan. Start Damage Cleanup Services: Scans and cleans computer of file-based and network viruses, and virus and worm remnants. 6-4

129 Managing Agents 3. Go to Customers > {customers} > {product} > Managed Server (tab). Select one of the following commands: Update Managed Server: Downloads and installs managed server updates. Update Security Agent: Downloads and installs agent updates. Viewing Agent Details Procedure 1. Go to Customers > {customer} > Products (tab) > WFBS-S/WFBS-A > Endpoint. The following information is displayed: Status Name GUID: Globally unique identifier; Remote Manager generates this string automatically. Provide the GUID to the administrator who will install the Agent program. IP address: IP address of the server where the Agent is installed. Registered on Last update: Date and time the Agent was last updated Agent version Managed product: Product managed through the Agent Managed product version: Version of the product managed through the Agent 6-5

130 Trend Micro Remote Manager User's Guide Managing Agents from the Managed Server This section contains information on how to manage agents from the managed server. Agent Status Messages On the managed server, the Agent displays one of the following system tray icons: TABLE 6-2. System tray icons ICON DESCRIPTION A green icon indicates that the Agent is connected to the Remote Manager communication server. The Agent is working normally. A red icon indicates that the Agent isn t connected to the Remote Manager communication server or the version of the Agent is mismatched with the server and needs to be updated. An icon with a red arrow indicates that the Agent has logged off from Remote Manager. An icon with a red "X" means that the Agent has been disabled. Changing the Agent GUID on the Managed Server If you entered an incorrect Globally Unique Identifier (GUID) during Remote Manager Agent installation, delete the agent and install it again using the correct GUID. If you are unable to do this procedure, you can do the following: Procedure 1. Go to C:\Program Files\Trend Micro\TMRMAgentForCSM. 2. Open the AgentSysConfig.xml file using a text editor. 3. Look for the GUID between the parameters <AgentGUID> and </AgentGUID>. 4. Edit the GUID and then save the file. 6-6

131 Managing Agents 5. In the same folder, open the csmsysconfig.xml file using a text editor. 6. Look for the GUID between the parameters <ProductGUID> and </ ProductGUID>. 7. Edit the GUID and then save the file. 8. Right-click the Trend Micro Remote Manager Agent icon on the task bar and then click Restart Service. Using the Agent Configuration Tool The Agent Configuration Tool allows changes to be made to Remote Manager Agent configuration settings. Go to Start > Programs > Trend Micro Remote Manager Agent > Agent Configuration Tool or right-click the tray icon and click Configure. See Agent Configuration on page 6-7 for more information. Agent Configuration Agent Configuration Menu To configure the Agent, right click on the tray icon to open the following menu: FIGURE 6-1. Agent Configuration Tool pop-up menu The following items appear: 6-7

132 Trend Micro Remote Manager User's Guide Configure: Opens the Agent configuration screen. Select Language: In addition to other possible languages, the "English" language always exists. Service: Start, Stop, Restart. Exit: Exiting the tool does not stop the Remote Manager service. It only closes the Configuration Tool and removes the icon from the task bar. The tool can be restarted at any time. 6-8

133 Managing Agents Configuration Tool Main Dialog Right-click on the tray icon and click Configure on the Agent configuration menu to open the Agent configuration tool General tab. FIGURE 6-2. Agent Configuration Tool "General" tab 6-9

for Small and Medium Business Getting Started Guide for Resellers

for Small and Medium Business Getting Started Guide for Resellers for Small and Medium Business Getting Started Guide for Resellers Trend Micro Incorporated reserves the right to make changes to this document and to the products/services described herein without notice.

More information

Worry-Free TM Remote Manager TM 1

Worry-Free TM Remote Manager TM 1 Worry-Free TM Remote Manager TM 1 for Small and Medium Business Getting Started Guide for Resellers Trend Micro Incorporated reserves the right to make changes to this document and to the products described

More information

for Small and Medium Business Quick Start Guide

for Small and Medium Business Quick Start Guide for Small and Medium Business Quick Start Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products/services described herein without notice. Before using

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Copyright 2013 Trend Micro Incorporated. All rights reserved.

Copyright 2013 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

http://downloadcenter.trendmicro.com/

http://downloadcenter.trendmicro.com/ Trend Micro Incorporated reserves the right to make changes to this document and to the product/service described herein without notice. Before installing and using the product/service, review the readme

More information

http://docs.trendmicro.com/en-us/smb/worry-free-business-security.aspx

http://docs.trendmicro.com/en-us/smb/worry-free-business-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Worry-Free TM Remote Manager

Worry-Free TM Remote Manager Worry-Free TM Remote Manager for Small and Medium Business Agent Installation Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products/services described

More information

http://docs.trendmicro.com/en-us/enterprise/cloud-app-encryption-foroffice-365.aspx

http://docs.trendmicro.com/en-us/enterprise/cloud-app-encryption-foroffice-365.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the cloud service described herein without notice. Before installing and using the cloud service, review the readme files,

More information

Worry-FreeTM. Business Security Standard and Advanced Editions. Installation and Upgrade Guide. Administrator s Guide

Worry-FreeTM. Business Security Standard and Advanced Editions. Installation and Upgrade Guide. Administrator s Guide 8 Worry-FreeTM Business Security Standard and Advanced Editions Securing Your Journey to the Cloud Administrator s Guide Installation and Upgrade Guide Trend Micro Incorporated reserves the right to make

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

http://downloadcenter.trendmicro.com/

http://downloadcenter.trendmicro.com/ Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

http://downloadcenter.trendmicro.com/

http://downloadcenter.trendmicro.com/ Trend Micro Incorporated reserves the right to make changes to this document and to the product/service described herein without notice. Before installing and using the product/service, review the readme

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before using this service, please review the latest version of the applicable

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Best Practice Configurations for OfficeScan (OSCE) 10.6

Best Practice Configurations for OfficeScan (OSCE) 10.6 Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan

More information

Client Server Security3

Client Server Security3 Client Server Security3 for Small and Medium Business Getting Started Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

More information

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE

CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE Quick Start Guide for Partners Cloud Security for Endpoints powered by GravityZone Quick Start Guide for Partners Publication date 2013.10.28 Copyright

More information

Trend Micro Worry-Free Remote Manager Agent Installation Guide

Trend Micro Worry-Free Remote Manager Agent Installation Guide Trend Micro Worry-Free Remote Manager Agent Installation Guide Agent Installation Guide The Agent Installation Guide contains information about the Worry-Free Remote Manager (WFRM) agent installation process

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Analyzer 7.1 Administrator s Guide

Analyzer 7.1 Administrator s Guide Analyzer 7.1 Administrator s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage

More information

IBM Security SiteProtector System Configuration Guide

IBM Security SiteProtector System Configuration Guide IBM Security IBM Security SiteProtector System Configuration Guide Version 2.9 Note Before using this information and the product it supports, read the information in Notices on page 209. This edition

More information

Client Server Messaging Security3

Client Server Messaging Security3 Client Server Messaging Security3 for Small and Medium Business Getting Started Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Trend Micro KASEYA INTEGRATION GUIDE

Trend Micro KASEYA INTEGRATION GUIDE Trend Micro KASEYA INTEGRATION GUIDE INTRODUCTION Trend Micro Worry-Free Business Security Services is a server-free security solution that provides protection anytime and anywhere for your business data.

More information

AV Management Dashboard

AV Management Dashboard LabTech AV Management Dashboard AV MANAGEMENT DASHBOARD... 1 Overview... 1 Requirements... 1 Dashboard Overview... 2 Clients/Groups... 2 Offline AV Agents... 3 Threats... 3 AV Product... 4 Sync Agent Data

More information

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems

More information

Kaspersky Security Center Web-Console

Kaspersky Security Center Web-Console Kaspersky Security Center Web-Console User Guide CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 7 KASPERSKY SECURITY CENTER WEB-CONSOLE... 8 SOFTWARE REQUIREMENTS... 10 APPLICATION

More information

http://www.trendmicro.com/download

http://www.trendmicro.com/download Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Kaspersky Security Center Web-Console

Kaspersky Security Center Web-Console Kaspersky Security Center Web-Console User Guide CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 7 KASPERSKY SECURITY CENTER WEB-CONSOLE... 8 SOFTWARE REQUIREMENTS... 10 APPLICATION

More information

http://docs.trendmicro.com/en-us/enterprise/safesync-for-enterprise.aspx

http://docs.trendmicro.com/en-us/enterprise/safesync-for-enterprise.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide

Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide APPLICATION VERSION: 9.0 Dear User! Thank you for choosing our product. We hope that this document will help you in your work

More information

Endpoint Protection Small Business Edition 2013?

Endpoint Protection Small Business Edition 2013? Symantec Endpoint Protection Small Business Edition 2013 Customer FAQ FAQ: Endpoint Security What is Symantec Endpoint Protection Small Business Edition 2013? is a new solution that offers simple, fast,

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers

More information

GFI Product Manual. Administration and Configuration Manual

GFI Product Manual. Administration and Configuration Manual GFI Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is"

More information

Desktop Surveillance Help

Desktop Surveillance Help Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting

More information

Table of Contents. Preface. Chapter 1: Getting Started with Endpoint Application Control. Chapter 2: Updating Components

Table of Contents. Preface. Chapter 1: Getting Started with Endpoint Application Control. Chapter 2: Updating Components Table of Contents Preface Preface... v Endpoint Application Control Documentation... vi Audience... vi Document Conventions... vii Terminology... viii Chapter 1: Getting Started with Endpoint Application

More information

Symantec Mail Security for Domino

Symantec Mail Security for Domino Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

IBM Security SiteProtector System Configuration Guide

IBM Security SiteProtector System Configuration Guide IBM Security IBM Security SiteProtector System Configuration Guide Version 3.0 Note Before using this information and the product it supports, read the information in Notices on page 205. This edition

More information

Trustwave SEG Cloud Customer Guide

Trustwave SEG Cloud Customer Guide Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation

More information

Sophos Anti-Virus for Mac OS X: Home Edition Help

Sophos Anti-Virus for Mac OS X: Home Edition Help Sophos Anti-Virus for Mac OS X: Home Edition Help For standalone Macs running Mac OS X Product version: 9C Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5

More information

Veeam Backup Enterprise Manager. Version 7.0

Veeam Backup Enterprise Manager. Version 7.0 Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

K7 Business Lite User Manual

K7 Business Lite User Manual K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the

More information

Trend Micro Email Encryption Gateway 5

Trend Micro Email Encryption Gateway 5 Trend Micro Email Encryption Gateway 5 Secured by Private Post Quick Installation Guide m Messaging Security Trend Micro Incorporated reserves the right to make changes to this document and to the products

More information

IBM Security QRadar SIEM Version 7.1.0 MR1. Administration Guide

IBM Security QRadar SIEM Version 7.1.0 MR1. Administration Guide IBM Security QRadar SIEM Version 7..0 MR Administration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 07. Copyright

More information

Secure Messaging Service

Secure Messaging Service Secure Messaging Service Powered by Trend Micro Email Security Platform for Service Providers Service Provider s Guide Trend Micro Incorporated reserves the right to make changes to this document and

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

Data Center Connector 3.0.0 for OpenStack

Data Center Connector 3.0.0 for OpenStack Product Guide Data Center Connector 3.0.0 for OpenStack For use with epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd. GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Single Product Review - Bitdefender Security for Virtualized Environments - November 2012

Single Product Review - Bitdefender Security for Virtualized Environments - November 2012 Single Product Review Bitdefender Security for Virtualized Environments Language: English November 2012 Last Revision: 1 st December 2012 Review commissioned by Bitdefender - 1 - Bitdefender Security for

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation

More information

GFI Cloud User Guide A guide to administer GFI Cloud and its services

GFI Cloud User Guide A guide to administer GFI Cloud and its services GFI Cloud User Guide A guide to administer GFI Cloud and its services Contents 1 Introduction to GFI Cloud 5 1.1 The aim of this guide 6 1.2 What is GFI Cloud? 6 1.3 GFI Cloud features 6 1.4 How it works

More information

escan Corporate Edition User Guide

escan Corporate Edition User Guide Anti-Virus & Content Security escan Corporate Edition (with Hybrid Network Support) User Guide www.escanav.com sales@escanav.com The software described in this guide is furnished under a license agreement

More information

Best Practice Configurations for OfficeScan (OSCE) 10.6

Best Practice Configurations for OfficeScan (OSCE) 10.6 Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches, refer to http://www.trendmicro.com/download/product.asp?productid=5 Enable

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is

More information

Kaspersky Internet Security

Kaspersky Internet Security Kaspersky Internet Security User Guide APPLICATION VERSION: 16.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding

More information

Data Center Connector for vsphere 3.0.0

Data Center Connector for vsphere 3.0.0 Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Avira Exchange Security Small Business Edition. Quick Guide

Avira Exchange Security Small Business Edition. Quick Guide Avira Exchange Security Small Business Edition Quick Guide Table of contents Table of contents 1 Introduction...3 2 System requirements...4 3 The Avira Exchange Console...5 3.1 Virus Scanner status...6

More information

Sophos Anti-Virus for Mac OS X Help

Sophos Anti-Virus for Mac OS X Help Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5

More information

USER GUIDE: MaaS360 Services

USER GUIDE: MaaS360 Services USER GUIDE: MaaS360 Services 05.2010 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document

More information

SMB Technical Product Marketing

SMB Technical Product Marketing TREND MICRO Worry Free Business Security 6.0 Best Practices Guide Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com SMB Technical

More information

User Guide. Cloud Gateway Software Device

User Guide. Cloud Gateway Software Device User Guide Cloud Gateway Software Device This document is designed to provide information about the first time configuration and administrator use of the Cloud Gateway (web filtering device software).

More information

McAfee Endpoint Security 10.0.0 Software

McAfee Endpoint Security 10.0.0 Software Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without

More information

LogLogic Trend Micro OfficeScan Log Configuration Guide

LogLogic Trend Micro OfficeScan Log Configuration Guide LogLogic Trend Micro OfficeScan Log Configuration Guide Document Release: September 2011 Part Number: LL600065-00ELS090000 This manual supports LogLogic Trend Micro OfficeScan Release 1.0 and later, and

More information

Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0

Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0 Sophos Anti-Virus for NetApp Storage Systems user guide Product version: 3.0 Document date: May 2014 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp Storage Systems...4 3 System requirements...5

More information

System Administrator Guide

System Administrator Guide System Administrator Guide Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 3.5 Webroot AntiSpyware Corporate Edition System Administrator Guide Version 3.5 2007 Webroot Software,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Comodo Endpoint Security Manager SME Software Version 2.1

Comodo Endpoint Security Manager SME Software Version 2.1 Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick

More information

GFI Product Manual. ReportPack Manual

GFI Product Manual. ReportPack Manual GFI Product Manual ReportPack Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of

More information

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd. GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Product Guide. McAfee Endpoint Protection for Mac 2.1.0

Product Guide. McAfee Endpoint Protection for Mac 2.1.0 Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

How to Configure Threat Management Services Portal in Windows Vista

How to Configure Threat Management Services Portal in Windows Vista Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide

Sophos Anti-Virus for NetApp Storage Systems startup guide Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp

More information

LEVEL PLATFORMS INTEGRATION GUIDE

LEVEL PLATFORMS INTEGRATION GUIDE LEVEL PLATFORMS INTEGRATION GUIDE Trend Micro LEVEL PLATFORMS INTEGRATION GUIDE Introduction Trend Micro Worry-Free Business Security Services is a server-free security solution that provides protection

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

Nasuni Management Console Guide

Nasuni Management Console Guide Nasuni Management Console Guide Version 5.5 April 2014 2014 Nasuni Corporation All Rights Reserved Document Information Nasuni Management Console Guide Version 5.5 April 2014 Copyright Copyright 2010-2014

More information

Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide

Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide A P P L I C A T I O N V E R S I O N : 9. 0 Dear User! Thank you for choosing our product. We hope that this document will help

More information

STEPfwd Quick Start Guide

STEPfwd Quick Start Guide CERT/Software Engineering Institute June 2016 http://www.sei.cmu.edu Table of Contents Welcome to STEPfwd! 3 Becoming a Registered User of STEPfwd 4 Learning the Home Page Layout 5 Understanding My View

More information

Core Protection Module 1.6 for Mac powered by. User s Guide

Core Protection Module 1.6 for Mac powered by. User s Guide Core Protection Module 1.6 for Mac July, 2010 Copyright All rights reserved. Copyright 1998-2010 Trend Micro Incorporated. BigFix, Fixlet, Relevance Engine, Powered by BigFix and related BigFix logos are

More information

Kaspersky Security Center 10 Getting Started

Kaspersky Security Center 10 Getting Started Kaspersky Security Center 10 Getting Started A P P L I C A T I O N V E R S I O N : 1 0 M A I N T E N A N C E R E L E A S E 1 Dear User, Thank you for choosing our product. We hope that this document will

More information

Server Installation Guide ZENworks Patch Management 6.4 SP2

Server Installation Guide ZENworks Patch Management 6.4 SP2 Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch

More information

BITDEFENDER SECURITY FOR AMAZON WEB SERVICES

BITDEFENDER SECURITY FOR AMAZON WEB SERVICES BITDEFENDER SECURITY FOR AMAZON WEB SERVICES Beta Version Testing Guide Bitdefender Security for Amazon Web Services Beta Version Testing Guide Publication date 2015.03.04 Copyright 2015 Bitdefender Legal

More information