Views:

The following table outlines the Security Agent proxy settings available for connecting to internal and external servers.

Proxy Configuration

Description

Internal agents

Configure internal agent proxy settings for connections to the following servers:

  • Apex One server: The server computer hosts the Apex One server and the integrated Smart Protection Server. Security Agents connect to the Apex One server to update components, obtain configuration settings, and send logs. Security Agents connect to the integrated Smart Protection Server to send scan queries.

  • Smart Protection Servers: Smart Protection Servers include all standalone Smart Protection Servers and the integrated Smart Protection Server of other Apex One servers. Security Agents connect to the servers to send scan and web reputation queries.

For more information, see Configuring Internal Agent Proxy Settings.

External agents

External Security Agents use the proxy settings configured in Internet Explorer to connect to the Trend Micro Smart Protection Network.

For more information, see Configuring External Agent Proxy Settings.

Global Smart Protection Service

Security Agents use the configured Smart Protection Service Proxy settings when querying Smart Protection sources for the following features:

  • Predictive Machine Learning

  • Behavior Monitoring

Note:

If the integrated Smart Protection Server is unavailable, Security Agents connect to the Trend Micro Smart Protection Network when performing queries.

For more information, see Configuring Global Smart Protection Service Proxy Settings.

Agent user proxy privilege

You can grant agent users the privilege to configure proxy settings. Security Agents use user-configured proxy settings only on the following instances:

  • When Security Agents perform "Update Now".

  • When users disable, or the Security Agent cannot detect, automatic proxy settings.

Warning:

Incorrect user-configured proxy settings can cause update problems. Exercise caution when allowing users to configure their own proxy settings.

For more information, see Granting Proxy Configuration Privileges.