Quick Start: System Configuration

This Quickstart Guide describes the initial basic Vulnerability ProtectionDeep Security system configuration that is required before you can start protecting your computer resources.

To complete basic Vulnerability ProtectionDeep Security system configuration, you will need to:

  1. Make sure you have at least one Relay-enable Agent
  2. Configure Vulnerability ProtectionDeep Security's ability to retrieve Updates from Trend Micro
  3. Check that you have a Scheduled Task to perform regular Updates
  4. Set up email notification of important events

Make sure you have at least one Relay-enabled Agent

The Relay is responsible for retrieving Security Updates from Trend Micro and distributing them to your protected computers, therefore you must have at least one Relay available. See the Installation Guide for instructions if you do not.

You must have at least one Relay available. See the Installation Guide for instructions if you do not.

The Windows (64-bit) and Linux (64-bit) versions of the Deep Security Agents have built-in Relay functionality that can be enabled from the Computer Editor window.
The Vulnerability Protection Agents have built-in Relay functionality that can be enabled from the Computer Editor window.
Relays are always organized into Relay Groups, even if it's only the one "Default Relay Group" to which all new Relays are assigned. You can create multiple Relay Groups if you have a large number of computers and want to create a hierarchical Relay structure or if your computers are spread out over large geographical areas. For more information on Relay Groups, see Relay Groups.

To view your Vulnerability ProtectionDeep Security Relays, go to Administration > Updates > Relay Groups.

This will display your current Relay Groups in the Relay Groups window. Usually you will only have the single Default Relay Group.

Double-click the Default Relay Group to display its Relay Group Properties window.:

In the Members area of the Relay Group Properties window you'll see the Relays that are members of the group.

If there are no computers in the Members area see Installing and Configuring a Relay-enabled Agent in the Installation Guide.

Configure the ability to retrieve Updates from Trend Micro

Now that you've confirmed that you have a Relay, you can check that it can retrieve updates from Trend Micro.

Go to the Administration > Updates > Security and click the Check For Updates and Download button under both Pattern Updates and Rule Updates.

This will display the Download Patterns or Download Rules Wizard, which contacts the Trend Micro Update Servers, downloads the latest Security Updates, and distributes them to your computers. If the wizard displays a success message at its completion, it means your Relay computer can communicate with the Update servers.

If your Relays are unable to update their Components, see Installing and Configuring a Relay-enabled Agent in the Installation Guide.

Check that you have a Scheduled Task to perform regular Updates

Now that you know your Relay can communicate with the Update servers, you should create a Scheduled Task that will regularly retrieve and distribute security Updates.

Next, you should create a Scheduled Task that will regularly retrieve and distribute security updates.

Go to Administration > Scheduled Tasks. You should see two default scheduled tasks: Daily Check for Security Updates and Daily Check for Software Updates:

Go to Administration > Scheduled Tasks. You should see a default scheduled task: Daily check for Security Updates. Double-click the scheduled task to view its Properties window.

Double-click a Scheduled Task to view its Properties window:

If you don't have a Default Check for Security Updates Scheduled Task in your list, you can create one by clicking on New on the Scheduled Task page menu bar and following the instructions in the New Scheduled Task wizard.

Set up email notification of important events

Vulnerability ProtectionDeep Security Alerts are raised when situations occur that require special attention. Alerts can be raised due to security Events such as the detection of malware or an abnormal restart on a protected computer, or they can be system events like the Vulnerability ProtectionDeep Security Manager running low on disk space. Vulnerability ProtectionDeep Security can be configured to send email notifications when specific Alerts are raised.

To configure which Alerts will generate an email notification, go to the Alerts page and click Configure Alerts... to display the list of Vulnerability ProtectionDeep Security Alerts.:

Double-click on an Alert to see its Properties window where you can you can set the Alert options for email notification.:

Now you need to configure your User account to receive the email notifications Vulnerability ProtectionDeep Security will send out. Go to Administration > User Management > Users and double-click on your User account to display its Properties window. Go to the Contact Information tab and enter an email address and select the Receive Alert Emails option.:

In order for Vulnerability ProtectionDeep Security to send email notification it has to be able to communicate with an SMTP server (access to an SMTP server is a requirement for email notifications). To connect the Vulnerability ProtectionDeep Security Manager to your SMTP server, go to the Administration > System Settings > SMTP tab.:

Complete the required fields in the SMTP area press test SMTP Settings at the bottom of the page when you're done. You should see a Test connection to SMTP server succeeded message.:

If you are unable to connect with your SMTP server, make sure the Manager can connect with the SMTP server on port 25.

Basic Configuration is complete

This completes the basic Vulnerability ProtectionDeep Security system configuration. Vulnerability ProtectionDeep Security is now configured to regularly contact Trend Micro for security Updates and distribute those Updates on regular basis, and it will send you email notifications when Alerts are raised. Now you need to apply Vulnerability ProtectionDeep Security protection to your computers. See QuickStart: Protecting a Computer or Protecting a Mobile Laptop for a quick guide to protecting those two kinds of computer resources.