User`s guide
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide
1-14
3. Enter the port number and click OK. Another window appears asking for the
username for accessing the proxy.
FIGURE 1-17. Action Parameter window 3
4. Enter the username you would like to use. If your proxy does not require a
username, leave the field blank. When you are finished, click OK. Another window
appears, asking you to enter the password you would like to use to access the proxy.
FIGURE 1-18. Action Parameter window 4
5. If you do not use a password to access the proxy, leave the field blank. Otherwise,
copy and paste the encrypted string you saved earlier into the indicated field and
click OK. The Take Action window appears.
6. Select the computers for which you would like to use the proxy and click OK. A
window appears asking for your Private Key Password.