Configuring Suspicious Connection Settings
About this task
CPM can log all connections made between agents and addresses in the Global C&C IP list. The Suspicious Connection Settings screen also allows you to log, but still allow access to IP addresses configured in the User-defined Blocked IP List.
CPM can also monitor connections that may be the result of a botnet or other malware threat. After detecting a malware threat, CPM can attempt to clean the infection.
Procedure
- Go to .
- Check Log network connections made to addresses
in the Global C&C IP list to monitor connections made
to Trend Micro confirmed C&C servers.
- Click Create Configuration Task to create and save a deployment task.
- Specify a task name and click OK to save the task.
- Select the created and saved task and click Take Action.
- Specify one or more target computers in the Target tab of the Take Action page.
- Click OK to start deploying the task.