Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Selecting Control Manager (TMCM) as the update source in InterScan Web Security Virtual Appliance (IWSVA)

    • Updated:
    • 10 Mar 2017
    • Product/Version:
    • InterScan Web Security Virtual Appliance 6.5
    • Platform:
    • N/A N/A
Summary

In some scenarios, you would like to use a Control Manager (TMCM) server as the update source for virus pattern files, scan engine and URL filtering engine for IWSVA.

Details
Public
 

Before modifying the update source, check if TMCM is already deploying updates to IWSVA as this is usually the case with the "default deployment" plan:

  1. Log on to the TMCM console.
  2. Go to Updates > Deployment Plan.

    Check the default deployment plan and if there are any custom plans for IWSVA.

To modify the default update source for IWSVA from the default Trend Micro Global ActiveUpdate source to TMCM please follow the steps below.

  1. Using putty, log in to IWSVA as a root user.
  2. Open intscan.ini by running the following command:

    vi /etc/iscan/intscan.ini

  3. In the vi editor, type "/registration" then locate the IWSVA ActiveUpdate Server URL (https://iwsva65-p.activeupdate.trendmicro.com/activeupdate/) in the following section:

    # company's server where the up-to-date virus pattern file is maintained
    hostname=https://iwsva65-p.activeupdate.trendmicro.com/activeupdate/
    #when use_ssl is yes. above download url must be a url using ssl.
    use_ssl=yes
    #0 ---No checking at all, just use HTTPS to encrypt transfer
    #1 ---The CA (Certificate Authority) of the server certificate must be one of the trusted CAs of the
    #local client.
    #2 ---Checking as above, also CommonName in the server certificate must match the
    # domain name in the update URL
    #3 --- checked as above, also checking signature files
    ssl_level=1
    download_path=/var/iwss/actupdate
  4. Change the URL of the IWSVA ActiveUpdate Server (https://iwsva65-p.activeupdate.trendmicro.com/ activeupdate) to the URL of the TMCM server (http://<TMCM_hostname>/TVCSDownload/activeupdate/). 

    use_ssl=no
    ssl_level=0

    # company's server where the up-to-date virus pattern file is maintained
    hostname=http://<TMCM_hostname>/TVCSDownload/activeupdate/
    #when use_ssl is yes. above download url must be a url using ssl.
    use_ssl=no
    #0 ---No checking at all, just use HTTPS to encrypt transfer
    #1 ---The CA (Certificate Authority) of the server certificate must be one of the trusted CAs of the
    #local client.
    #2 ---Checking as above, also CommonName in the server certificate must match the
    # domain name in the update URL
    #3 --- checked as above, also checking signature files
    ssl_level=0
    download_path=/var/iwss/actupdate
  5. Test the connection by downloading server.ini from the IWSVA server by running the following wget command:

    wget http://<TMCM_hostname>/TVCSDownload/activeupdate/server.ini

    If the wget is successful, this confirms that the IWSVA active update should be able to download updates from TMCM successfully.

  6. On the IWSVA Web console, go to Updates > Manual > Select pattern file then click Update.
  1. Using putty, log in to IWSVA as a root user.
  2. Open intscan.ini by running the following command:

    vi /etc/iscan/intscan.ini

  3. In the vi editor, type "/registration" then locate the IWSVA ActiveUpdate Server URL (https://iwsva65-p.activeupdate.trendmicro.com/activeupdate/) in the following section:

    # company's server where the up-to-date virus pattern file is maintained
    hostname=https://iwsva65-p.activeupdate.trendmicro.com/activeupdate/
    #when use_ssl is yes. above download url must be a url using ssl.
    use_ssl=yes
    #0 ---No checking at all, just use HTTPS to encrypt transfer
    #1 ---The CA (Certificate Authority) of the server certificate must be one of the trusted CAs of the
    #local client.
    #2 ---Checking as above, also CommonName in the server certificate must match the
    # domain name in the update URL
    #3 --- checked as above, also checking signature files
    ssl_level=1
    download_path=/var/iwss/actupdate
  4. Change the URL of the IWSVA ActiveUpdate Server (https://iwsva65-p.activeupdate.trendmicro.com/activeupdate) to the URL of the TMCM server (https://<TMCM_hostname>/TVCSDownload/activeupdate/).

    use_ssl=yes
    ssl_level=0

    # company's server where the up-to-date virus pattern file is maintained
    hostname=https://TMCM_hostname>/TVCSDownload/activeupdate/
    #when use_ssl is yes. above download url must be a url using ssl.
    use_ssl=yes
    #0 ---No checking at all, just use HTTPS to encrypt transfer
    #1 ---The CA (Certificate Authority) of the server certificate must be one of the trusted CAs of the
    #local client.
    #2 ---Checking as above, also CommonName in the server certificate must match the
    # domain name in the update URL
    #3 --- checked as above, also checking signature files
    ssl_level=0
    download_path=/var/iwss/actupdate
  5. Edit the configuration file aucfg.ini

    vi /usr/iwss/lib/aucfg.ini

  6. Add "check_https_auth = 0" in the “;for selfupdate” section so that the two entries will look like this:

    AU_PRODUCT_ID = 55
    check_https_auth = 0

  7. Save and quit.
  8. Test the connection by downloading server.ini from the IWSVA server by running the following wget command:

    wget https://<TMCM_hostname>/TVCSDownload/activeupdate/server.ini

    If the wget is successful, this confirms that the IWSVA active update should be able to download updates from TMCM successfully.

  9. On the IWSVA Web console, go to Updates > Manual > Select pattern file then click Update.

The TMCM Server can update the following IWSVA scan components:

  • Virus Scan Engine (VSAPI)
  • Virus pattern file, spyware pattern file, IntelliTrap pattern file and exception file
  • Trend Micro URL Filtering Engine (TMUFE)
Premium
Internal
Rating:
Category:
Configure; Troubleshoot; Update
Solution Id:
1116706
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support


To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.