User`s guide
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide
1-6
3. Click the here link in the Actions box. The Take Action window appears.
4. Select the computer or computers from which you want to uninstall the Web
Protection Agent and click OK. The Private Key Password window appears.
5. Enter your Private Key Password and click OK. An Action window appears in
which you can track the progress of your uninstall. When it is finished, the status
shows “Pending Restart.”
FIGURE 1-8. Action window
Configuring Log Maintenance
The Web Protection Agent maintains two logs on your endpoints:
• A history of the URLs accessed on the endpoint (
urlhist.txt)
• A record of the threats blocked per day by the Web Protection Agent
(
urlthreats.txt)
Trend Micro Web Protection Module agents can accumulate very large log files. Trend
Micro recommends that you configure Agents to perform automatic log maintenance
regularly to prevent these files from consuming excessive disk space.
Use the Web Protection Module – Log Maintenance task to set the maximum amount of
time (in days) that the Web Protection Agent will maintain these logs on the endpoint.
Note: Trend Micro strongly recommends setting up a global log maintenance regimen. If
you do not perform regular log maintenance, large Web Protection Module logs will
accumulate on each endpoint. The existence of these logs can slow the performance
of both the endpoint itself and the Web Protection Module Dashboard. To archive
Web Threat logs to the ESP server for later analysis, use the Web Protection Module
– Upload Web Threat Logs task. For more information on using this task, see the
Uploading Logs section below.