Skip to main content

Netskope Help

Trend Micro Maximum Security

Trend Micro Maximum Security provides comprehensive protection against ransomware, identity theft, malware issues, and so on, thereby securing your data from attacks and threats.

This document contains the best practices that ensure smooth interoperability between Trend Micro Maximum Security and Netskope Client.

Environment

This document was created using the following components:

  • Trend Micro Maximum Security Version: 17.7.1243 - USOI202074.Q4EXP

  • Netskope Client version: 94.0.0.2359

  • OS: Windows 10

Specific configurations in Netskope tenant web UI can ensure that the processes or traffic from either of the applications are not blocked and directed to the Netskope Cloud. You must add exceptions to the Netskope Steering Configuration. To learn more, view Exceptions.

Configurations In Netskope Client

Add steering configuration exceptions (Certificate Pinned Application exception type) on the Netskope tenant WebUI to allow Trend Micro traffic to bypass Netskope and reach its destination.

To add Trend Micro as a Certificate Pinned Application on the Netskope UI:

  1. Go to Settings > Security Cloud Platform > Steering Configuration and select a configuration.

  2. On the configuration page, click EXCEPTIONS > NEW EXCEPTION > Certificate Pinned Applications.

    Certificate_Pinned_App.png
  3. In the New Exception window, do the following:

    1. From Certificate Pinned App, select the application. To add a new certificate pinned application in the New Certificate Pinned Application window, do the following:

      • Application Name: Enter the name of the application.

      • Platform: Select the operating system where the application is managed.

      • Definition: Provide the processes and .exe(s) list that you want to bypass. Here, add the following processes:

        • TmBrowserProxy.exe

        • uiWinMgr.exe

        • PwmConsole.exe

        • SecureBrowser.exe

        • uiUpdateTray.exe,

        • uiWatchDog.exe

        • coreServiceShell.exe

        • AMSPTelemetryService.exe

        • AMSP_LogServer.exe

        • coreFrameworkHost.exe

        • utilRollback.exe

        • TmsaInstance64.exe

        • DREBoot64.exe

        • OEMConsole.exe

        • PackageRemover.exe

        • Remove.exe

        • RescueHelper.exe

        • ShorcutLauncher.exe

        • SupportTool.exe

        • TiMiniService.exe

        • TiPreAU.exe

        • TiResumeSrv.exe,

        • TMSToolEx.exe

        • uiProtectedBrowser.exe

        • VizorShortCut.exe

        • WSCTool.exe

        • CleanerOneChecker.exe

        • PtLauncher.exe

        • PtSessionAgent.exe

        • PtSvcHost.exe

        • PtWatchDog.exe

        • TMAS_OL.exe

        • TMAS_OLImp.exe

        • TMAS_OLSentry.exe

        • TmWscSvc.exe

        • WSCHandler.exe

        • WSCStatusController.exe

        • ToolbarNativeMsgHost.exe

        • PwmSvc.exe

        • uiSeAgnt.exe

        • PwmTower.exe

    2. From Custom App Domains, add the URL: trendmicro.co.jp, trendmicro.com that you want to exclude.

    3. From Actions, select Bypass for all operating systems that you want to allow directly to the destination.

    4. Click ADD.

Note

  • The processes listed from TrendMicro Maximum security (Home edition), may vary in the TrendMicro enterprise edition.

  • These processes are used by the TrendMicro client. For specific use cases, all these may not be required to be bypassed.

Netskope Client Functions

Refer to the list of validated use cases that you can use to verify Client operations.

Trend Micro Validation

To verify if Trend Micro Maximum Security features function smoothly:

  1. Ensure that an infected file is detected by TrendMicro.

    Image_1.png
  2. Click Check for program updates.

  3. Ensure that Components are updated.

    Image_2.png