Trend Micro Automation Center is a central hub for APIs and documentation across Trend Micro products. It offers searchable cross-product APIs and use cases for IT and security teams to automate tasks and improve efficiency.
The Education Portal serves as a comprehensive resource for Trend Micro employees to develop their professional capabilities. Through a variety of curated training modules, employees can deepen their understanding of company culture, product knowledge, processes, and essential soft skills.
The Trend Micro Online Help Center provides customers with comprehensive product information and troubleshooting guidance. It offers general product usage information and in-depth solutions for complex issues.
Trend Micro Service Status Portal provides real-time information on the performance of Trend Micro products. It offers up-to-date incident reports and historical data for monitoring system health.
TrendConnect is a mobile application that provides users with real-time insights into their Trend Micro security environment, including threat alerts and system health assessments.
SMS High Availability: The Security Management System (SMS) can be configured to operate in a two-node, high-availability (HA) cluster, increasing the SMS server's availability in case an unexpected event causes the primary SMS server to fail or become inaccessible. The SMS HA cluster consists of two SMS servers, one designated as the active (primary) SMS server and the other as the passive (secondary) SMS server.
Flow Management Filters are a special set of policy-based DV filters which 'match' once a certain amount of traffic has passed, these filters are to be used in conjunction with TRUST as an Action. Most attacks occur in the first few bytes of a flow; using these filters, you can trust a flow after the flow has been clean for the first 5, 10, 100, or 500MB of transferred data. So when a filter match occurs, the stream will be placed in the Trusted Streams table.
Intrinsic HA, also known as 'Layer 2 Fallback' (L2FB), is a mode wherein the IPS passes traffic from one interface to its partner without inspecting it. If an internal failure is detected, the device goes into L2FB mode and either permits or blocks all traffic on each segment, depending on the preference of the network administrator.
Transparent High Availability (TRHA) allows users to install two IPS devices in a redundant network configuration. Transparent HA keeps the devices in sync so that if one experiences a system failure, the network flow can be routed to the other without interruption in intrusion prevention services. Transparent HA requires you to configure two IPS devices with the same settings.
Zero Power High Availability (ZPHA) technology ensures constant, non-interrupted network traffic flow. If the power to the IPS is interrupted, the ZPHA bypasses the IPS device, thus providing continuous (but uninspected) network traffic. The ZPHA modules include a set of relays (contacts for copper and mirrors for fiber) for receiving network traffic from a network device, routing the traffic through the device, and sending it back out to a network device. The network device could be a switch, a single workstation, a server, or other network devices. Be aware that ZPHA technology is not “hitless,” when relays are being switched over, you will suffer some traffic loss. Note: the ZPHA modules do not support VLAN Translation.
Traffic Management filters are manually created filters that react to traffic based on limited parameters, including source/destination IP, port number, protocol, or other defined values. You can set up different actions like Trust, Allow, Block, and Rate Limit.
Inspection Bypass is a feature available in the Trend Micro TippingPoint devices that, once enabled, allows traffic to bypass the device inspection engine. Any traffic that matches an inspection bypass rule is directed through the device without further inspection. In addition, traffic that is passed with an inspection bypass rule does not count against the device's maximum traffic capacity.
Scan/Sweep Filters track the number of port scans and host sweep attempts from a single source IP address. These filters have threshold values that can be configured per Security Profile and per filter. The filter becomes active when the number of connection attempts from a source IP address exceeds the threshold. Host scans and port sweeps are blocked through the Quarantine feature.
Trend Micro TippingPoint 'How to Videos'. This article list the available videos that describe how to perform various tasks and configurations on TippingPoint products
SMS High Availability: The Security Management System (SMS) can be configured to operate in a two-node, high-availability (HA) cluster, increasing the SMS server's availability in case an unexpected event causes the primary SMS server to fail or become inaccessible. The SMS HA cluster consists of two SMS servers, one designated as the active (primary) SMS server and the other as the passive (secondary) SMS server.
Flow Management Filters are a special set of policy-based DV filters which 'match' once a certain amount of traffic has passed, these filters are to be used in conjunction with TRUST as an Action. Most attacks occur in the first few bytes of a flow; using these filters, you can trust a flow after the flow has been clean for the first 5, 10, 100, or 500MB of transferred data. So when a filter match occurs, the stream will be placed in the Trusted Streams table.
Intrinsic HA, also known as 'Layer 2 Fallback' (L2FB), is a mode wherein the IPS passes traffic from one interface to its partner without inspecting it. If an internal failure is detected, the device goes into L2FB mode and either permits or blocks all traffic on each segment, depending on the preference of the network administrator.
Transparent High Availability (TRHA) allows users to install two IPS devices in a redundant network configuration. Transparent HA keeps the devices in sync so that if one experiences a system failure, the network flow can be routed to the other without interruption in intrusion prevention services. Transparent HA requires you to configure two IPS devices with the same settings.
Zero Power High Availability (ZPHA) technology ensures constant, non-interrupted network traffic flow. If the power to the IPS is interrupted, the ZPHA bypasses the IPS device, thus providing continuous (but uninspected) network traffic. The ZPHA modules include a set of relays (contacts for copper and mirrors for fiber) for receiving network traffic from a network device, routing the traffic through the device, and sending it back out to a network device. The network device could be a switch, a single workstation, a server, or other network devices. Be aware that ZPHA technology is not “hitless,” when relays are being switched over, you will suffer some traffic loss. Note: the ZPHA modules do not support VLAN Translation.
Traffic Management filters are manually created filters that react to traffic based on limited parameters, including source/destination IP, port number, protocol, or other defined values. You can set up different actions like Trust, Allow, Block, and Rate Limit.
Inspection Bypass is a feature available in the Trend Micro TippingPoint devices that, once enabled, allows traffic to bypass the device inspection engine. Any traffic that matches an inspection bypass rule is directed through the device without further inspection. In addition, traffic that is passed with an inspection bypass rule does not count against the device's maximum traffic capacity.
Scan/Sweep Filters track the number of port scans and host sweep attempts from a single source IP address. These filters have threshold values that can be configured per Security Profile and per filter. The filter becomes active when the number of connection attempts from a source IP address exceeds the threshold. Host scans and port sweeps are blocked through the Quarantine feature.