Smart Protection Server

Smart Protection Server 3.3 Patch 5 is now available
Trend Micro has released Smart Protection Server 3.3 Patch 5 Build 1233 at the Trend Micro Download Center. This patch contains accumulated fixes and enhancements.
Smart Protection Server disconnected for Smart Scan with error "ICRC_WARNING_UPD_GEN_FULLMARK_FAIL"
There is an alert for the Anti-Malware module for "Smart Protection Server Disconnected for Smart Scan" with the event details showing "ICRC_WARNING_UPD_GEN_FULLMARK_FAIL" error message.This error occurs on Linux servers with issues in the locale which causes the update. To confirm this, run the locale or locale -a command on the server and check if the following symptoms will occur:locale: locale: Cannot set LC_CTYPE to default locale: No such file or directory locale: Cannot set LC_MESSAGES to default locale: No such file or directory locale: Cannot set LC_COLLATE to default locale: No such file or directory locale -a: This indicates that there is no available Locale in the system.
Smart Scan Pattern update failed in Smart Protection Server (SPS)
Smart Scan Pattern Update failed with [errno:232]2021/05/18 13:15:03 +0200 [08744] [ERROR] [Update_FRS.cpp (153)] The counter of continuous download full TBL is reached the limitation, stop AU update. (ContFullTBLPtnCount=168, MaxDownloadFullTBL=168
Generating a Certificate Signing Request (CSR) for Smart Protection Server (SPS)
This article shows you the steps in creating a Certificate Signing Request (CSR).
Installing Smart Protection Server (SPS) on Amazon Web Services (AWS) or Microsoft Azure
The support for AWS and Microsoft Azure has been introduced in the release of SPS 3.3. This article shows you how to build SPS on AWS or Microsoft Azure.
Error "ActiveUpdate was unable to verify signed information" is received from Smart Protection Server (SPS)
You receive an alert from SPS similar to the one below:Hostname: xxxxxxxxxxxxxxxx,IP address:Pattern name: Web Safety Pattern,Code: 62,Message: ActiveUpdate was unable to verify signed information. The signature file was not re-signed after a server information file update. Please contact your Trend Micro technical support provider.
Resetting root password in standalone Smart Protection Server (SPS) 3.3
There is no default password for Linux where SPS is installed. A password is set in the installation process.When a customer forgets the root password for the SPS appliance, reset the root password to prevent the reinstallation of SPS.
Enabling TLS 1.2 support in Smart Protection Server
This article shows the steps when turning on TLS 1.2 support in Standalone Smart Protection Server (SPS).
Collecting logs from standalone Smart Protection Server (SPS)
This article shows the steps in collecting logs from standalone Smart Protection Server.
SECURITY BULLETIN: Trend Micro Smart Protection Server (Standalone) Auth Command Injection Authentication Bypass Vulnerability
Release Date: February 28, 2018CVE Vulnerability Identifier(s): CVE-2018-6231Platform(s): LinuxCVSS 3.0 Score(s): 10Severity Rating(s): Critical Trend Micro has released Critical Patches (CPs) for Trend Micro Smart Protection Server (Standalone).  These CPs resolve a critical auth command injection authentication bypass vulnerability in the product.
0 of rows(s) selected.
Page 1 of 2
Latest in Downloads
View all Downloads
Related Documentation
View all Documents