Choose any of the following topics where you have encountered issues to know the corresponding logs to gather.
Deep Security Manager (DSM)
Gather any of the following files:
- For Windows:
- %ProgramFIles%\Trend Micro\Deep Security Manager\server*.log
- %ProgramFIles%\Trend Micro\Deep Security Manager\install.log
- %ProgramFIles%\Trend Micro\Deep Security Manager\error.log
- %ProgramFIles%\Trend Micro\Deep Security Manager\install4j\installation.log
- C:\Program Files\Trend Micro\Deep Security Manager\webclient\webapps\ROOT\WEB-INF\ dsm.properties
- For Linux:
- uname –a
- /opt/dsm/install.log
- /opt/dsm/server*.log
- /opt/dsm/error.log
- /opt/dsm/.install4j/installation.log
- /opt/dsm/webclient/webapps/ROOT/WEB-IN/dsm.properties
Deep Security Agent (DSA)
To enable the debug mode in Windows:
- Create %SystemRoot%\ds_agent.ini file.
- Add "Trace=*" content and save the file.
- Restart the DSA service.
- Replicate the issue.
- Delete ds_agent.ini file afterwards.
- Restart the service to disable debug mode.
- Run msinfo32.exe and save the following system information:
- %SystemRoot%\inf\ setupapi.dev.log
- %SystemRoot%\inf\ setupapi.app.log
- %programdata%\Trend Micro\Deep Security Agent\diag\ds_agent*.log
- %programdata%\Trend Micro\Deep Security Agent\am\ AMSP-Inst-YYYY-MM-DD.log
- %Program Files%\Trend Micro\AMSP\debug\Amsp_DebugLog.log
- %Program Files%\Trend Micro\AMSP\debug\Amsp_Event.log
To enable the debug mode in Linux:
- Get the following and take a screenshot:
uname –a
cat /proc/driver/dsa/info
rpm -qa ds_agent
/var/log/syslog
/var/opt/ds_agent/diag/ds_agent.log
lsmod | grep -i dsa_filter
cat /proc/driver/dsa/info - Create /etc/ds_agent.conf file.
- Add "Trace=*" content and save the file.
- Restart the DSA service.
- Replicate the issue.
- Delete ds_agent.conf file afterwards.
- Restart the service to disable debug mode.
- Collect /var/log/messages to collect debug log.
Deep Security Virtual Appliance (DSVA)
When collecting server*.log, enable the debug mode first:
- Stop the DSM service.
- Open the logging.properties file under any of the locations below:
- For Windows: ..\Program Files\Trend Micro\Deep Security Manager\jre\lib\
- For Linux: /opt/dsm/jre/lib
- Add the following items:
com.thirdbrigade.level = ALL
com.trendmicro.ds.level = ALL - Save the changes and close the file.
- Start the DSM service.
- Collect the DSM diagnostic package.
- Collect the vmware.log of the specific virtual machine (VM) in VMware Datastore locally:
- Click on the VM.
- Go to Summary > Storage.
- Right-click Datastore and select Browse Datastore.
- Download the vmware.log.
- Take screenshots of installation and uninstallation failure and vCenter recent tasks.
Deep Security Manager
On the DSA, open a command prompt and run the following commands then copy the results to a text file:
- Ping <DSM hostname exactly as it appears in DSA program window>
- Nslookup <DSM hostname exactly as it appears in DSA program window>
- Telnet <DSM hostname exactly as it appears in DSA program window> 4120
Once the command is completed, you may need to press CTRL-] to break the input.
To get the diagnostic package with debug mode enabled:
- Stop the DSM service.
- Open the logging.properties file under any of the following locations:
- For Windows: ..\Program Files\Trend Micro\Deep Security Manager\jre\lib\
- For Linux: /opt/dsm/jre/lib
- Add the following items:
com.thirdbrigade.level = ALL
com.trendmicro.ds.level = ALL - Save the changes and close the file.
- Start the DSM service.
- Record the time stamp and then reproduce the issue.
- Collect the diagnostic package:
- Log in to the DSM console.
- Go to Administration > System Information.
- Click Create Diagnostic Package.
- Select everything and click Next.
- Save the created diagnostic package from client.
- Remove the following rows by adding the hash sign (#) prefix:
#com.thirdbrigade.level = ALL
#com.trendmicro.ds.level = ALL - Save the changes and close the logging.properties file.
- Restart the DSM service to disable debug mode.
Deep Security Agent
For Windows:
On the DSM, open a command prompt and run the following commands, then copy the results to a text file:
- Ping <DSA hostname exactly as it appears in DSM console>
- Nslookup <DSA hostname exactly as it appears in DSM console>
- Telnet <DSA hostname exactly as it appears in DSM console> 4118
Once the command is completed, you may need to press CTRL-] to break the input.
To get the diagnostic package with debug mode enabled:
- Create %SystemRoot%\ds_agent.ini file.
- Add "Trace=*" to the file.
- Restart the DSA service.
- Replicate the issue and record the time frame when the issue starts.
- Collect diagnostic package:
- From the Computers page, right-click the specific client and select Details.
- Go to Actions tab and click Create Diagnostic Package under the Support section.
- Select everything and click Next until the gathering of diagnostic package is finished.
- Delete the ds_agent.ini file and restart the service to disable debug mode.
For Linux:
On the DSM, open command prompt and run the following commands, then copy the results to a text file:
- Ping <DSA hostname exactly as it appears in DSM console>
- Nslookup <DSA hostname exactly as it appears in DSM console>
- Telnet <DSA hostname exactly as it appears in DSM console> 4118
Once the command is completed, you may need to press CTRL-] to break the input.
To get the diagnostic package with debug mode enabled:
- Create /etc/ds_agent.conf file.
- Add "Trace=*" to the file.
- Restart the DSA service.
- Replicate the issue.
- Collect /var/log/messages for the debug log.
- Collect diagnostic package:
- From the Computers page, right-click the specific client and select Details.
- Go to Actions tab and click Create Diagnostic Package under the Support section.
- Select everything and click Next until the gathering of diagnostic package is finished.
- Delete the ds_agent.conf file and restart the service to disable debug log.
Deep Security Virtual Appliance
- Enable debug logs for slowpath and increase the debug level using the command below:
sudo killall -USR1 dsa_slowpath (increase the level by 1, default 1, max 4)
- Collect diagnostic package:
- From the Computers page, right-click the specific client and select Details.
- Go to Actions tab and select Create Diagnostic Package under the Support section.
- Select everything and click Next until the gathering of diagnostic package is finished.
- Disable debug logs for slowpath. After log collection, decrease the debug level to normal:
sudo killall -USR2 dsa_slowpath
Deep Security Relay (DSR)
For Windows:
On the DSM, open a command prompt and run the following commands, then copy the results to a text file:
- Ping <DSA hostname exactly as it appears in DSM console>
- Nslookup <DSA hostname exactly as it appears in DSM console>
- Telnet <DSA hostname exactly as it appears in DSM console> 4118
Once the command is completed, you may need to press CTRL-] to break the input.
To get the diagnostic package with debug mode enabled:
- Create %SystemRoot%\ds_agent.ini file.
- Add "Trace=*" to the file.
- Restart the DSA service.
- Replicate the issue.
- Collect diagnostic package:
- From the Computers page, right-click the specific client and select Details.
- Click the Actions tab > Create Diagnostic Package under the Support section.
- Select everything and click Next until the gathering of diagnostic package is finished.
- Delete the ds_agent.ini file and restart the service to disable debug log.
For Linux:
From the DSM, open a command prompt and run the following commands, then copy the results to a text file:
- Ping <DSA hostname exactly as it appears in DSM console>
- Nslookup <DSA hostname exactly as it appears in DSM console>
- Telnet <DSA hostname exactly as it appears in DSM console> 4118
Once the command is completed, you may need to press CTRL-] to break the input.
To get the diagnostic package with debug mode enabled:
- Create /etc/ds_agent.conf file.
- Add "Trace=*" to the file.
- Restart the DSA service.
- Replicate the issue.
- Collect /var/log/messages for the debug log.
- Collect diagnostic package:
- From the Computers page, right-click the specific client and select Details.
- Go to Actions tab and click Create Diagnostic Package under the Support section.
- Select everything and click Next until the gathering of diagnostic package is finished.
- Delete the ds_agent.conf file and restart service to disable debug log.
Deep Security Manager
To get the diagnostic package with debug mode enabled:
- Stop the DSM service.
- Open the logging.properties file under any of the following locations:
- For Windows: ..\Program Files\Trend Micro\Deep Security Manager\jre\lib\
- For Linux: /opt/dsm/jre/lib
- Add the following items:
com.thirdbrigade.level = ALL
com.trendmicro.ds.level = ALL - Save the changes and close the file.
- Start the DSM service.
- Collect diagnostic package:
- Log in to the DSM console.
- Go to Administration > System Information .
- Click Create Diagnostic Package.
- Select everything and click Next.
- Save the created diagnostic package from client.
- Remove the following rows by adding the hash sign (#) prefix:
#com.thirdbrigade.level = ALL
#com.trendmicro.ds.level = ALL - Save the changes and close the logging.properties file.
- Restart the DSM service to disable debug mode.
Deep Security Agent
To get the diagnostic package with debug mode enabled:
For Windows:
- Create %SystemRoot%\ds_agent.ini file.
- Add "Trace=*" to the file.
- Restart the DSA service.
- Replicate the issue.
- Collect diagnostic package:
- From the Computers page, right-click the specific client and select Details.
- Go to Actions tab and click Create Diagnostic Package under the Support section.
- Select everything and click Next until the gathering of diagnostic package is finished.
- Delete the ds_agent.ini file and restart the service to disable debug log.
For Linux:
- Create /etc/ds_agent.conf file.
- Add "Trace=*" to the file.
- Restart the DSA service.
- Replicate the issue.
- Collect /var/log/messages for the debug log.
- Collect diagnostic package:
- From the Computers page, right-click the specific client and select Details.
- Go to Actions tab and click Create Diagnostic Package under the Support section.
- Select everything and click Next until the gathering of diagnostic package is finished.
- Delete the ds_agent.conf file and restart service to disable debug log.
Deep Security Relay
For Windows:
- Create %SystemRoot%\ds_agent.ini file.
- Add "Trace=*" to the file.
- Restart the DSA service.
- Enable iaurelay debug log:
- Log in to Relay server.
- Go to C:\Program Files\Trend Micro\Deep Security Agent\lib.
- Change "<level>300</level>" into "<level>-1</level>".
The following are the log level values:
all = -1, Enable all logs
disable = 0, Disable logging completely
err = 100, Only output error logs
app = 300, Output application level logs
dbg = 400, Output detailed logs for debugging
vbs = 500, Output verbose logs including err, app, and dbgIt is recommended to clean the iau.log file.
- Collect iaurelay.log from C:\Program Files\Trend Micro\Deep Security Agent\lib\iaulogs\iaurelay.log.
- Collect diagnostic package:
- From the Computers page, right-click the specific client and select Details.
- Go to Actions tab and click Create Diagnostic Package under the Support section.
- Select everything and click Next until the gathering of diagnostic package is finished.
- Delete the ds_agent.ini file and restart the service to disable debug log.
For Linux:
- Create /etc/ds_agent.conf file.
- Add "Trace=*" to the file.
- Restart the DSA service.
- Replicate the issue.
- Collect /var/log/messages for the debug log.
- Collect diagnostic package:
- From the Computers page, right-click the specific client and select Details.
- Go to Actions tab and click Create Diagnostic Package under the Support section.
- Select everything and then, click Next until the gathering of diagnostic package is finished.
- Delete the ds_agent.conf file and restart service to disable debug log.
Deep Security Manager
To get the diagnostic package with debug mode enabled:
For Windows:
- Log in to the DSM console.
- Go to Administration > System Information.
- Click Create Diagnostic Package.
- Select everything and click Next.
- Save the created diagnostic package from client.
- Collect *.mdmp under the following location:
%programdata%\trend micro\deep security manager\diag\*.mdmp
- Manually collect the system events.
For Linux:
- Log in to the DSM console.
- Go to Administration > System Information.
- Click Create Diagnostic Package.
- Select everything and click Next.
- Save the created diagnostic package from client.
- Collect *.core file in the system. File path depends on the pattern_core file.
Deep Security Agent
To get the diagnostic package with debug mode enabled:
For Windows:
- From the Computers page, right-click the specific client and select Details.
- Go to Actions tab and click Create Diagnostic Package under the Support section.
- Select everything and click Next until the gathering of diagnostic package is finished.
- Collect ds_agent.mdmp under the following location:
%programdata%\trend micro\deep security agent\diag\*.mdmp
For Linux:
- From the Computers page, right-click the specific client and select Details.
- Go to Actions tab and click Create Diagnostic Package under the Support section.
- Select everything and click Next until the gathering of diagnostic package is finished.
- Collect *.core file in the system. File path depends on the pattern_core file.
- To enable the process dump controlled by the system, refer to the article: Re-enabling Core Dumps in RedHat 7 or Centos 7.
- For Deep Security 9.6 users, if the machine is protected in Combined Mode, submit DSA and DSVA logs together.
- If the customer's server is based on AWS, provide also the AWS access log. For more information, refer to this AWS document: Server Access Logging.
Deep Security Manager
To get the diagnostic package with debug mode enabled:
- Stop the DSM service.
- Open the logging.properties file under any of the following locations:
- For Windows: ..\Program Files\Trend Micro\Deep Security Manager\jre\lib\
- For Linux: /opt/dsm/jre/lib
- Add the following items:
com.thirdbrigade.level = ALL
com.trendmicro.ds.level = ALL - Save the changes and close the file.
- Start the DSM service.
- Collect DSM diagnostic package.
- Log in to the DSM console.
- Go to Administration > System Information.
- Click Create Diagnostic Package.
- Select everything and click Next.
- Save the created diagnostic package from client.
-
Remove the following rows by adding the hash sign (#) prefix:
#com.thirdbrigade.level = ALL
#com.trendmicro.ds.level = ALL - Save the changes and close the logging.properties file.
- Restart the DSM service to disable debug mode.
- Enable the DSM profiling for DSM itself and database performance issues:
- Go to https://[server-name]:4119/ProfilingSettings.screen.
- Enable the profiling. The result will be in $DSM_INSTALL_DIR/profiling.
- After the replication, go back to the page and disable the profiling.
- Take a screenshot of the Task Manager.
Deep Security Agent and Relay
To get the diagnostic package with debug mode enabled:
For Windows:
- Create %SystemRoot%\ds_agent.ini file.
- Add "Trace=*" to the file.
- Restart the DSA service.
- Replicate the issue.
- Collect diagnostic package:
- From the Computers page, right-click the specific client and select Details.
- Go to Actions tab and click Create Diagnostic Package under the Support section.
- Select everything and then, click Next until the gathering of diagnostic package is finished.
- Take screenshot of the Task Manager.
- Delete the ds_agent.ini file and restart the service to disable debug mode.
For Linux:
- Create /etc/ds_agent.conf file.
- Add "Trace=*" to the file.
- Restart the DSA service.
- Replicate the issue.
- Collect /var/log/messages to collect debug log.
- Collect diagnostic package:
- From the Computers page, right-click the specific client and select Details.
- Go to Actions tab and click Create Diagnostic Package under the Support section.
- Select everything and click Next until the gathering of diagnostic package is finished.
- Collect *.core file in the system. File path depends on the patter_core file.
- Take screenshots of top command output.
- Delete the ds_agent.conf file and restart the service to disable debug log.
Deep Security Virtual Appliance
To get the diagnostic package with debug mode enabled:
- Isolate the issue first.
If the issue happened in slowpath, enable slowpath debug by executing the following:
sudo killall -USR1 dsa_slowpath (increase the level by 1, default 1, max 4)
/etc/init.d/ds_agent stop
/etc/init.d/dsa_slowpath restart
/etc/init.d/ds_agent startAfter log is collected, decrease the debug level:
sudo killall -USR2 dsa_slowpath (increase level by 1, default 1, max 4)
If the issue happened in ds_am, enable ds_am debug by executing the following:
sudo killall -USR1 ds_am (increase level by 1 default 5, max 8)
/etc/init.d/ds_agent restartAfter log is collected, decreases debug level:
sudo killall -USR2 ds_am decrease level by 1 default 5, max 8)
- Collect diagnostic package:
- From the Computers page, right-click the specific client and select Details.
- Go to Actions tab and click Create Diagnostic Package under the Support section.
- Select everything and click Next until the gathering of diagnostic package is finished.
Take screenshots if it is CPU-related issue.
Collecting EPSec logs
- Take a screenshot of vShield Manager:
- Log in to the vShield Manager web console. Use the default Admin username and password.
- Expand Datacenters and click the server hosting the DSVA.
- View the summary and ensure that vShield Endpoint is installed.
- Enable EPSec Thin Agent log.
The EPSec logs are recorded in vmware.log file after enabling debug logging for the Thin Agent:- Get the version number of vnetflt.sys and vsepflt.sys drivers on the guest VM.
- Enable Thin Agent (vsepflt.sys) debugging inside the guest VM by editing the registry using with following content:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\vsepflt\Parameters]
"log_level"=dword:0000001f
"log_dest"=dword:00000002These keys should be created if they do not exist. Setting "log_dest" to "00000002" records logs into the vmware.log file.
Collecting vShield Manager (vSM) logs
- Go to the vSM console.
- Click Settings & Reports > Configuration > Support.
- Click the Initiate button to start collecting logs.
Deep Security Virtual Appliance
To get the diagnostic package with debug mode enabled:
- Enable ds_am debug:
sudo killall -USR1 ds_am
/etc/init.d/ds_agent restart
(increase the level by 1, default 5, max 8, increase it 3 times)After log is collected, decrease the debug level:
sudo killall -USR2 ds_am
(decrease level by 1, default 5, max 8, decrease it 3 times) - Collect diagnostic package:
- From the Computers page, right-click the specific client and select Details.
- Go to Actions tab and click Create Diagnostic Package under the Support section.
- Select everything and click Next until the gathering of diagnostic package is finished.
Deep Security Agent
To get the diagnostic package with debug mode enabled:
For Windows:
- Create %SystemRoot%\ds_agent.ini file.
- Add "Trace=*" to the file.
- Restart the DSA service.
- Collect diagnostic package:
- From the Computers page, right-click the specific client and select Details.
- Go to Actions tab and click Create Diagnostic Package under the Support section.
- Select everything and click Next until the gathering of diagnostic package is finished.
- Delete the ds_agent.ini file and restart the service to disable debug mode.
For Linux:
- Create /etc/ds_agent.conf file.
- Add "Trace=*" to the file.
- Restart the DSA service.
- Replicate the issue.
- Collect /var/log/messages for the debug log.
- Collect diagnostic package:
- From the Computers page, right-click the specific client and select Details.
- Go to Actions tab and click Create Diagnostic Package under the Support section.
- Select everything and click Next until the gathering of diagnostic package is finished.
- Delete the ds_agent.conf file and restart the service to disable debug log.
- Collect lsmod –l output to check module status.
- Check anti-malware related process whether it is running or not.
ps -ef | grep ds
root 32501 1 0 17:23 ? 00:00:00 /opt/ds_agent/ds_am
-g ../diag -v 6 -d/var/opt/ds_agent/am -m
/opt/ds_agent/lib/libvmpd_full_scan.so -m
/opt/ds_agent/lib/libvmpd_scanctrl.so -m
/opt/ds_agent/lib/libvmpd_dsa_rtscan.so
- For Deep Security 9.6 users, if the machine is protected in Combined Mode, submit DSA and DSVA logs together.
- For Deep Security 9.6 SAP protection, the debug information is included in Anti-Malware. You can follow the above AM debug log and it should be enough.
For Linux:
- Download Java SE Development Kit (JDK).
- Upload the JDK installer package into the DSM server.
- Install JDK with root privilege using the command below:
#rpm -ivh jdk-8u91-linux-x64.rpm
- Start VisualVM with root account using the command below and wait for the JVisualVM window to appear.
#/usr/java/jdk1.8.91/bin/jvisualvm
- Right-click the DSM Launcher and select Sample.
- Enable Settings and type the following under Profile Only Package:
com.thirdbrigade.*
com.trendmicro.* - Click CPU to start.
- Click Snapshot and take at least three (3) snapshots.
- Click Thread Dump and take at least take three (3) threads.
- Change the scheduled task and reproduce the issue.
- When the issue is reproduced, wait for 10 minutes and save all open snapshots and thread dumps.
- Stop the Sampler.
- Provide the following files:
- Snapshots
- Thread dumps
- Exported DSM system event for whole the day
For Windows:
- Download Java SE Development Kit (JDK).
- Upload the JDK installer package into the DSM server.
- Install JDK via CMD with an administrator permission, if the target OS is Linux.
- Start VisualVM via CMD with an administrator permission and wait for the JVisualVM window to appear.
- Right-click the DSM Launcher and select Sample.
- Enable Settings and type the following under Profile Only Package:
com.thirdbrigade.*
com.trendmicro.* - Click CPU to start.
- Click Snapshot and take at least three (3) snapshots.
- Click Thread Dump and take at least take three (3) threads.
- Change the scheduled task and reproduce the issue.
- When the issue is reproduced, wait for 10 minutes and save all open snapshots and thread dumps.
- Stop the Sampler.
- Provide the following files:
- Snapshots
- Thread dumps
- Exported DSM system event for whole the day
For vShield Manager:
- Log into the vShield Manager using https://vsmip(sample)/.
- Navigate to Settings & Reports > Configuration.
- Go to Support tab and click Initiate. The vShield Manager logs will be generated.
For NSX Manager
- Log into the NSX Manager using https://nsxip(sample)/.
- Click Download Tech Support Log.
- On the pop-up window, click Download.
For ESXi and vCenter:
To collect ESXi support package:
- SSH to the ESXi server.
- Run the command "vm-support". A compressed bundle of logs will be generated and stored in a .tgz file, which will be located in /var/log/, /var/tmp/ or current working directory.
For more information, refer to this article: "vm-support" command in ESX/ESXi to collect diagnostic information (1010705)
To collect vCenter logs, refer to this VMware article: Collecting diagnostic information for VMware vCenter Server 4.x, 5.x and 6.0.
Deep Security Manager
For Windows and Linux:
- Enable DSM debugging in UI for Host Updater Job.
- Collect DSM diagnostic and DSA diagnostic.
Deep Security Manager
For Windows and Linux:
- Enable DSM debugging logging.properties:
- com.thirdbrigade.manager.core.scheduler.jobschedulers.jobs.HostUpdaterSession
- com.trendmicro.manager.core.cloud.CloudSupportingServices
- Restart DSM service to take effect.
- Collect DSM diagnostic and DSA diagnostic.
Deep Security Manager
For Windows and Linux:
- Provide CTD of DDAn/TMCM.
- Enable CTD debug log from DSM console by editing/jre/lib/logging.properties, and adding the following lines:
- CTD jobs
Com.thirdbrigade.manager.core.scheduler.jobschedulers.SuspiciousFileSubmission.Job.level=ALL
Com.thirdbrigade.manager.core.scheduler.jobschedulers.DDAnReportQueryJob.level=ALL - DDAn API
Com.trendmicro.manager.core.ddan.level=ALL
- AM
Com.trendmicro.ds.antimalware.ctd.level=ALL
Com.trendmicro.ds.antimalware.models.AntiMalwareQuarantinedFilesWizardDean.level=ALL
- CTD jobs
Deep Security Agent
- Download ratt tools and run the following command:
ratt -s trace -s ""
As an example, "2,net.packet" sets log level to 2, and will only print logs related to net.packet.
Filter driver log will be in the output of dmesg.
Remember to turn it off when it's done. - Use "#mdb -K" for live debugging.
- Create live system dump (for crash issue) using the command "#savecore -L". Use "#dumpadm" to find the dump location.
- Provide diagnostic package of DSA, live debug output.
Deep Security Manager
For Windows and Linux:
- Enable DSM debugging logging.properties:
- com.thirdbrigade.manager.core.scheduler.jobschedulers.jobs.HostUpdaterSession
- com.trendmicro.manager.core.cloud.CloudSupportingServices
- Restart DSM service to take effect.
- Collect DSM diagnostic.
Deep Security Agent
For Windows and Linux:
- Collect SAP Netweaver Log:
- Execute “SM50” t-code to view log list.
- Select all logs by pressing 'Ctrl-A'.
- Press "Ctrl-Shift-F7" to open Change Trace Components dialog. Set Input Trace level to 2.
- Check Security.
- Press F8 to save the configuration.
- Execute “vscantest” t-code to scan a file. As an example, html_with_javascript_b64.html
- After scanning, open a debug log file and search for “VsiScanClean” in the log.
- The name of scanned file is in the same line where VsiScanClean is.
- Collect DSA diagnostic with Trace = *.
Deep Security Agent
For Windows:
- Enable AMSP debug locally:
- In the AMSP installation folder, open AmspConfig.ini.
- Set DebugLogMode to "0" for local mode. (1 is remote pipemode.)
- The log is located at C:\Program Files\Trend Micro\AMSP\debug in the AMSP_DebugLog.log file.
- Restart the AMSP service.
- Collect DSA diagnostic package.
Deep Security Manager
For Windows and Linux:
- Go to https://[server-name]:4119/ProfilingSettings.screen
- Enable profiling.
- The result will be in $DSM_INSTALL_DIR/profiling.
- After reproducing, go to the page and disable the profiling.