User`s guide
Trend Micro™ Web Protection Module 1.0 Administrator’s Guide
1-20
helpful if individuals in your environment use something other than a Web browser to
access potentially bad sites. When activated, this feature displays a pop-up window like
the one that follows that appears for 30 seconds in the lower left corner of the screen
whenever the Agent detects a threat.
FIGURE 1-24. Threat Detection screen
Note: Threat events are also recorded in the logs. See the sections on Log Maintenance and
Viewing Analyses for more information.