Host-based Security - FAQ
What kind of setting is necessary on the host where Host-based Security Agent is installed?ECL2.0, Host-based Security
Agent installed on the host will be required to be connected to managed server / TREND MICRO Server through the Internet.
For further information, please refer to Service Descriptions - Agent communication requirement .
In the Host-based Security, Does it appear something pop-up like normal anti-virus software?ECL2.0, Host-based Security
For Anti-Malware Measures and Web Reputation functions, pop-up will appear at detection only for Windows OS.
Other functions do not pop up, so please check from the security control panel.
About the behavior when coexisting with other company products/Trend Micro products.ECL2.0, Host-based Security
As for Host-based security, we don't carry out operation tests including competition tests with products other than Trend Micro on hosts on which the Agent is installed.
Therefore, we are not able to answer about co-existence with individual software.
Please check the operation in customer's environment.
In addition, we have detailed conditions on coexistence with Trend Micro products.
For details, please see Trend Micro web site.
Is patch application unnecessary when using Managed Virtual-Patch?ECL2.0, Host-based Security
Even with the function of Managed Virtual-Patch, the potential problem of the software itself will remain.
In addition, since this function detects communication against vulnerability via the network, thus It is difficult to respond to information that has not been established vulnerabilities such as completed on the local side or not definite attack method.
Please defend with Managed Virtual-Patch until official patch from the manufacturer is provided, and done performing the operation verification, etc. please implement a full-blown countermeasure.
Is it possible to use more than two security menus at the same time?Host-based Security
No. You can select only one from these menus per a tenant.
- Managed Anti-Virus
- Managed Virtual Patch
- Managed Host-based Security Package
Is it possible to order this service simultaneously？Host-based Security
Please wait until the processing order is completed.
Witch ports are used by the agent to keep the connection with Managers.Host-based Security
It is TCP:4118.
You may not change this port, please check in advance if this port isn't used by another application.
How long does the manager store the logs?Host-based Security
It stores the logs for 4 weeks.
Therefore you can refer to the logs in security control panel for 4 weeks.
If you require to store the logs, please export them in security control panel.