Atp Analyzer 5.5 Idg
Atp Analyzer 5.5 Idg
the product described herein without notice. Before installing and using the product,
review the readme files, release notes, and/or the latest version of the applicable
documentation, which are available from the Trend Micro website at:
http://docs.trendmicro.com
© 2016 Trend Micro Incorporated. All Rights Reserved.Trend Micro, the Trend Micro
t-ball logo, and Control Manager are trademarks or registered trademarks of Trend
Micro Incorporated. All other product or company names may be trademarks or
registered trademarks of their owners.
Document Part No.: APEM57301/160118
Release Date: April 2016
Protected by U.S. Patent No.: Patents pending.
This documentation introduces the main features of the product and/or provides
installation instructions for a production environment. Read through the documentation
before installing or using the product.
Detailed information about how to use specific features within the product may be
available in the Trend Micro Online Help and/or the Trend Micro Knowledge Base at
the Trend Micro website.
Trend Micro always seeks to improve its documentation. If you have questions,
comments, or suggestions about this or any Trend Micro document, please contact us at
[email protected].
Evaluate this documentation on the following site:
http://www.trendmicro.com/download/documentation/rating.asp
Table of Contents
Preface
Preface .................................................................................................................. v
Documentation ................................................................................................... v
Audience ............................................................................................................. vi
Document Conventions .................................................................................. vii
Terminology ..................................................................................................... viii
About Trend Micro ............................................................................................ x
Chapter 1: Introduction
About TippingPoint Advanced Threat Protection Analyzer ................... 1-2
What's New ..................................................................................................... 1-2
Features and Benefits ..................................................................................... 1-3
Enable Sandboxing as a Centralized Service ...................................... 1-4
Custom Sandboxing ............................................................................... 1-4
Broad File Analysis Range ..................................................................... 1-4
YARA Rules ............................................................................................ 1-4
Document Exploit Detection ............................................................... 1-5
Automatic URL Analysis ....................................................................... 1-5
Detailed Reporting ................................................................................. 1-5
Alert Notifications .................................................................................. 1-5
Clustered Deployment ........................................................................... 1-5
Trend Micro Integration ........................................................................ 1-5
Web Services API and Manual Submission ....................................... 1-6
Custom Defense Integration ................................................................ 1-6
i
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
ii
Table of Contents
Index
Index .............................................................................................................. IN-1
iii
Preface
Welcome to the TippingPoint Advanced Threat Protection Analyzer Installation and
Deployment Guide. This guide contains information about the requirements and
procedures for deploying and installing ATP Analyzer.
Documentation
The documentation set for TippingPoint Advanced Threat Protection Analyzer includes
the following:
DOCUMENT DESCRIPTION
Quick Start Card The Quick Start Card provides user-friendly instructions on
connecting ATP Analyzer to your network and on
performing the initial configuration.
v
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
DOCUMENT DESCRIPTION
View and download product documentation from the Trend Micro Documentation
Center:
http://docs.trendmicro.com/en-us/home.aspx
Audience
The TippingPoint Advanced Threat Protection Analyzer documentation is written for
IT administrators and security analysts. The documentation assumes that the reader has
an in-depth knowledge of networking and information security, including the following
topics:
• Network topologies
• Database management
The documentation does not assume the reader has any knowledge of sandbox
environments or threat event correlation.
vi
Document Conventions
The documentation uses the following conventions:
TABLE 2. Document Conventions
CONVENTION DESCRIPTION
Configuration notes
Note
Recommendations or suggestions
Tip
vii
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
Terminology
TERMINOLOGY DESCRIPTION
Active primary appliance Clustered appliance with which all management tasks are
performed. Retains all configuration settings and
allocates submissions to secondary appliances for
performance improvement.
High availability cluster In a high availability cluster, one appliance acts as the
active primary appliance, and one acts as the passive
primary appliance. The passive primary appliance
automatically takes over as the new active primary
appliance if the active primary appliance encounters an
error and is unable to recover.
viii
TERMINOLOGY DESCRIPTION
Passive primary appliance Clustered appliance that is on standby until active primary
appliance encounters an error and is unable to recover.
Provides high availability.
ix
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
TERMINOLOGY DESCRIPTION
YARA YARA rules are malware detection patterns that are fully
customizable to identify targeted attacks and security
threats specific to your environment.
x
Chapter 1
Introduction
This chapter introduces Trend Micro™ TippingPoint Advanced Threat Protection
Analyzer 5.5 and the new features in this release.
1-1
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
It also provides a Web Services API to allow integration with any third party product,
and a manual submission feature for threat research.
What's New
TABLE 1-1. What's New in TippingPoint Advanced Threat Protection Analyzer 5.5
FEATURE/ENHANCEMENT DETAILS
1-2
Introduction
FEATURE/ENHANCEMENT DETAILS
1-3
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
Custom Sandboxing
TippingPoint Advanced Threat Protection Analyzer performs sandbox simulation and
analysis in environments that match the desktop software configurations attackers
expect in your environment and ensures optimal detection with low false-positive rates.
YARA Rules
TippingPoint Advanced Threat Protection Analyzer uses YARA rules to identify
malware. YARA rules are malware detection patterns that are fully customizable to
identify targeted attacks and security threats specific to your environment.
1-4
Introduction
Detailed Reporting
TippingPoint Advanced Threat Protection Analyzer delivers full analysis results
including detailed sample activities and C&C communications via central dashboards
and reports.
Alert Notifications
Alert notifications provide immediate intelligence about the state of TippingPoint
Advanced Threat Protection Analyzer.
Clustered Deployment
Multiple standalone TippingPoint Advanced Threat Protection Analyzer appliances can
be deployed and configured to form a cluster that provides fault tolerance, improved
performance, or a combination thereof.
1-5
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
1-6
Chapter 2
2-1
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
Deployment Overview
Product Specifications
Standard TippingPoint Advanced Threat Protection Analyzer appliances have the
following specifications.
Contact Trend Micro if the appliance you are using does not meet these hardware
specifications.
FEATURE SPECIFICATIONS
Dimensions (WxDxH) 48.2 cm (18.98 in) x 75.58 cm (29.75 in) x 8.73 cm (3.44 in)
Deployment Considerations
Any TippingPoint Advanced Threat Protection Analyzer appliance can be deployed and
configured as a standalone appliance. A standalone appliance processes all submitted
objects without the assistance of other TippingPoint Advanced Threat Protection
Analyzer appliances. It cannot provide continued scanning and analysis services when it
encounters an error and is unable to recover.
2-2
Preparing to Deploy TippingPoint Advanced Threat Protection Analyzer
High availability cluster In a high availability cluster, one appliance acts as the active
primary appliance, and one acts as the passive primary
appliance. The passive primary appliance automatically takes
over as the new active primary appliance if the active primary
appliance encounters an error and is unable to recover.
For details, see High Availability Cluster on page 2-3.
Load-balancing cluster In a load balancing cluster, one appliance acts as the active
primary appliance, and any additional appliances act as
secondary appliances. The secondary appliances process
submissions allocated by the active primary appliance for
performance improvement.
For details, see Load-Balancing Cluster on page 2-4.
High availability cluster In a high availability cluster with load balancing, one appliance
with load balancing acts as the active primary appliance, one acts as the passive
primary appliance, and any additional appliances act as
secondary appliances. The passive primary appliance takes
over as the active primary appliance if the active primary
appliance encounters an error and is unable to recover. The
secondary appliances process submissions allocated by the
active primary appliance for performance improvement.
For details, see High Availability Cluster with Load Balancing
on page 2-5.
2-3
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
over as the new active primary appliance if the active primary appliance encounters an
error and is unable to recover.
Deploy this cluster configuration if you want to ensure that TippingPoint Advanced
Threat Protection Analyzer capabilities remain available even when the appliance
encounters an error and is unable to recover.
The following figure shows two TippingPoint Advanced Threat Protection Analyzer
appliances deployed in a high availability cluster configuration and how integrating
products communicate with TippingPoint Advanced Threat Protection Analyzer.
Note
Trend Micro recommends using a Category 6 or higher Ethernet cable to directly connect
the active primary appliance and passive primary appliance using eth3.
Load-Balancing Cluster
In a load balancing cluster, one appliance acts as the active primary appliance, and any
additional appliances act as secondary appliances. The secondary appliances process
submissions allocated by the active primary appliance for performance improvement.
2-4
Preparing to Deploy TippingPoint Advanced Threat Protection Analyzer
2-5
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
Note
Trend Micro recommends using a Category 6 or higher Ethernet cable to directly connect
the active primary appliance and passive primary appliance using eth3.
2-6
Preparing to Deploy TippingPoint Advanced Threat Protection Analyzer
The networks must be independent of each other so that malicious samples in the
custom network do not affect hosts in the management network.
Network Settings
Ports are found at the back of the appliance, as shown in the following image.
2-7
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
• Custom ports (eth1, eth2, eth3): Connect the appliance to isolated networks that
are reserved for sandbox analysis
Note
When using high availability, eth3 is used to directly connect two identical appliances
and cannot be used for sandbox analysis.
If sandbox instances require Internet connectivity during sample analysis, Trend Micro
recommends allocating one extra IP address for Virtual Analyzer. The Sandbox
Management > Network Connection screen allows you to specify static addresses. For
more information, see the TippingPoint Advanced Threat Protection Analyzer
Administrator's Guide.
Deployment Requirements
REQUIREMENT DETAILS
Monitor and VGA cable Connects to the VGA port of the appliance
2-8
Preparing to Deploy TippingPoint Advanced Threat Protection Analyzer
REQUIREMENT DETAILS
Third party software Licenses for all third party software installed on sandbox
licenses images
2-9
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
Logon Credentials
DEFAULT YOUR
CONSOLE PURPOSE
CREDENTIALS INFORMATION
2-10
Preparing to Deploy TippingPoint Advanced Threat Protection Analyzer
2-11
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
2-12
Preparing to Deploy TippingPoint Advanced Threat Protection Analyzer
443 TCP Listening and ATP Analyzer uses this port to:
outbound
• Access the management console
with a computer through HTTPS
• Communicate with other
TippingPoint Advanced Threat
Protection Analyzer appliances in
a cluster environment
• Connect to Trend Micro Threat
Connect
• Communicate with Trend Micro
Control Manager
• Connect to Web Reputation
Services to query the blocking
reason
• Receive files from a computer
with Manual Submission Tool
• Receive samples from integrated
products
• Send anonymous threat
information from Smart Feedback
• Send Suspicious Objects list and
analysis information to integrated
products
• Update components by
connecting to the ActiveUpdate
server
• Verify the safety of files through
the Certified Safe Software
Service
2-13
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
Note
This is the default port.
Configure this port through the
management console.
Note
This is the default port.
Configure this port through the
management console.
2-14
Chapter 3
3-1
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
Installation Tasks
Procedure
1. Prepare the appliance for installation. For details, see Setting Up the Hardware on
page 3-2.
2. Install TippingPoint Advanced Threat Protection Analyzer. For details, see
Installing TippingPoint Advanced Threat Protection Analyzer on page 3-3.
3. Configure the IP address of the appliance on the preconfiguration console. For
details, see Configuring Network Addresses on the Preconfiguration Console on
page 4-4.
Procedure
1. Mount the appliance in a standard 19-inch 4-post rack, or on a free-standing object,
such as a sturdy desktop.
Note
When mounting the appliance, leave at least two inches of clearance on all sides for
proper ventilation and cooling.
3-2
Installing TippingPoint Advanced Threat Protection Analyzer
3. Connect the monitor to the VGA port at the back of the appliance.
4. Connect the keyboard and mouse to the USB ports at the back of the appliance.
Note
When using high availability, eth3 is used to directly connect two identical
appliances and cannot be used for sandbox analysis.
Note
The power button is found on the front panel of the appliance, behind the bezel.
Procedure
Note
The power button is found on the front panel of the appliance, behind the bezel.
3-3
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
4. Press F11.
3-4
Installing TippingPoint Advanced Threat Protection Analyzer
5. Under Boot Manager Main Menu, select BIOS Boot Menu and press Enter.
3-5
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
3-6
Installing TippingPoint Advanced Threat Protection Analyzer
8. Click Accept.
3-7
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
9. Select the disk on which to install the TippingPoint Advanced Threat Protection
Analyzer software.
10. Click Continue.
3-8
Installing TippingPoint Advanced Threat Protection Analyzer
The program checks if the minimum hardware requirements are met, and then
displays the Hardware Profile screen.
Note
TippingPoint Advanced Threat Protection Analyzer requires at least:
• 8 GB RAM
• Two CPUs
3-9
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
WARNING!
Installation involves repartitioning of the disks. All data on the disks are lost.
What to do next
Configure the IP address of the appliance on the preconfiguration console to complete
the deployment process. For details, see Configuring Network Addresses on the
Preconfiguration Console on page 4-4.
3-10
Chapter 4
4-1
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
The following table describes the tasks performed on the preconfiguration console.
TASK PROCEDURE
4-2
Using the Preconfiguration Console
TASK PROCEDURE
Viewing high availability details View the active and passive appliance host names, IP
addresses, and sync status.
Note
High availability cannot be configured on the
preconfiguration console. Use the management
console to configure high availability. For details
see the High Availability Tab and Cluster Tab
topics in theTippingPoint Advanced Threat
Protection Analyzer Administrator’s Guide.
Pinging a remote host Type a valid IP address or FQDN and click Ping.
Changing the preconfiguration Type the new password twice and click Save.
console password
Important
Disable scroll lock (using the SCROLL LOCK key on the keyboard) to perform the
following operations.
4-3
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
Note
An alternative way of moving to an item is by typing the item
number.
Left and Right Move between buttons. Buttons are enclosed in angle brackets <>.
arrows
Move between characters in a text box.
TAB Move between screen sections, where one section requires using
a combination of arrow keys (Up, Down, Left, and Right keys).
Procedure
• Password: admin
4-4
Using the Preconfiguration Console
Note
None of the characters you type appear on the screen.
This password is different from the password used to log on to the web-based
management console. For more information, see Logon Credentials on page 2-10.
4-5
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
ITEM GUIDELINES
4-6
Using the Preconfiguration Console
ITEM GUIDELINES
Note
Changing the IP address changes the management console
URL.
• 255.255.255.255
The Main Menu screen appears after the settings are successfully saved.
The High Availability screen looks different depending on the appliance you log on to.
Use the High Availability screen to view details about the high availability configuration.
Note
On a passive primary appliance, this screen can be used to detach the appliance from the
cluster.
4-7
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
Procedure
1. Type valid logon credentials. The default credentials are:
• User name: admin
• Password: admin
Note
None of the characters you type appear on the screen.
This password is different from the password used to log on to the web-based
management console. For more information, see Logon Credentials on page 2-10.
4-8
Using the Preconfiguration Console
The following table shows the on-screen labels and high availability configuration
details.
TABLE 4-1. High Availability Screen
LABEL DETAIL
IPv4 virtual address IPv4 virtual address of the active primary appliance.
IPv6 virtual address IPv6 virtual address of the active primary appliance.
3. (Optional) On the passive primary appliance, press TAB to navigate to Detach, and
then press ENTER to detach the passive primary appliance.
4-9
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
Note
Detaching the passive primary appliance disables high availability.
4-10
Chapter 5
Technical Support
Learn about the following topics:
• Troubleshooting Resources on page 5-2
• Contacting Trend Micro TippingPoint Support on page 5-3
• Sending Suspicious Content to Trend Micro on page 5-4
• Other Resources on page 5-5
5-1
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
Troubleshooting Resources
Before contacting technical support, consider visiting the following Trend Micro online
resources.
Procedure
1. Go to http://esupport.trendmicro.com.
2. Select a product or service from the appropriate drop-down list and specify any
other related information.
4. If no solution is found, click Submit a Support Case from the left navigation and
add any relevant details, or submit a support case here:
http://esupport.trendmicro.com/srf/SRFMain.aspx
A Trend Micro support engineer investigates the case and responds in 24 hours or
less.
Threat Encyclopedia
Most malware today consists of “blended threats” which combine two or more
technologies to bypass computer security protocols. Trend Micro combats this complex
malware with products that create a custom defense strategy. The Threat Encyclopedia
provides a comprehensive list of names and symptoms for various blended threats,
including known malware, spam, malicious URLs, and known vulnerabilities.
5-2
Technical Support
Go to http://www.trendmicro.com/vinfo/us/threat-encyclopedia/#malware to learn
more about:
• Malware and malicious mobile code currently active or “in the wild”
• Correlated threat information pages to form a complete web attack story
• Internet threat advisories about targeted attacks and security threats
• Web attack and online trend information
• Weekly malware reports
5-3
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
https://ers.trendmicro.com
Refer to the following Knowledge Base entry to send message samples to Trend Micro:
http://esupport.trendmicro.com/solution/en-US/1112106.aspx
http://esupport.trendmicro.com/solution/en-us/1059565.aspx
5-4
Technical Support
http://global.sitesafety.trendmicro.com
Other Resources
In addition to solutions and support, there are many other helpful resources available
online to help you stay up to date, learn about innovations, and to be aware of the latest
security trends.
Download Center
From time to time, Trend Micro may release a patch for a reported known issue or an
upgrade that applies to a specific product or service. To find out whether any patches
are available, go to:
http://downloadcenter.trendmicro.com
If a patch has not been applied (patches are dated), open the Readme to determine
whether it is relevant to your environment. The Readme also contains installation
instructions.
Documentation Feedback
Trend Micro always seeks to improve its documentation. If you have questions,
comments, or suggestions about this or any Trend Micro document, please go to the
following site:
http://www.trendmicro.com/download/documentation/rating.asp
5-5
Appendix A
Getting Started
This chapter describes how to get started with TippingPoint Advanced Threat
Protection Analyzer and configure initial settings.
A-1
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
Open the management console from any computer on the management network with
the following resources:
• Microsoft Edge™
• Google Chrome™
• Mozilla Firefox™
To log on, open a browser window and type the following URL:
https://<Appliance IP Address>/pages/login.php
This opens the logon screen, which shows the following options:
A-2
Getting Started
OPTION DETAILS
User name Type the logon credentials (user name and password) for the
management console.
Password
Use the default administrator logon credentials when logging on
for the first time:
• User name: admin
• Password: Admin1234!
Trend Micro recommends changing the password after logging on
to the management console for the first time.
Configure user accounts to allow other users to access the
management console without using the administrator account. For
details, see Accounts Tab on page A-4.
Session duration Choose how long you would like to be logged on.
• Default: 10 minutes
• Extended: 1 day
To change these values, navigate to Administration > System
Settings and click the Session Timeout tab.
Procedure
1. Activate the product license using a valid Activation Code. For details, see License
on page A-8.
2. Specify the TippingPoint Advanced Threat Protection Analyzer host name and IP
address. For details, see Network Tab on page A-11.
A-3
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
4. Configure date and time settings to ensure that TippingPoint Advanced Threat
Protection Analyzer features operate as intended. For details, see Time Tab on
page A-14.
5. Configure SMTP settings to enable sending of notifications through email. For
details, see SMTP Tab on page A-17.
6. Import sandbox instances to Virtual Analyzer. For details, see Importing an Image
on page A-18.
7. Configure Virtual Analyzer network settings to enable sandbox instances to
connect to external destinations. For details, see Enabling External Connections on
page A-20.
8. (Optional) Deploy and configure additional TippingPoint Advanced Threat
Protection Analyzer appliances for use in a high availability or load-balancing
cluster. For details, see Cluster Tab on page A-21.
Accounts Tab
Use the Accounts tab, in Administration > Accounts / Contacts > Accounts, to create
and manage user accounts. Users can use these accounts, instead of the default
administrator account, to access the management console.
Some settings are shared by all user accounts, while others are specific to each account.
A-4
Getting Started
TASK STEPS
Add Click Add to add a new user account. This opens the Add
Account window, where you specify settings for the account. For
details, see Add Account Window on page A-6.
Edit Select a user account and then click Edit to edit its settings. This
opens the Edit Account window, which contains the same
settings as the Add Account window. For details, see Add
Account Window on page A-6.
Only one user account can be edited at a time.
Delete Select a user account to delete and then click Delete. Only one
user account can be deleted at a time.
Sort Column Data Click a column title to sort the data below it.
Search If there are many entries in the table, type some characters in the
Search text box to narrow down the entries. As you type, the
entries that match the characters you typed are displayed.
TippingPoint Advanced Threat Protection Analyzer searches all
cells in the table for matches.
Records and The panel at the bottom of the screen shows the total number of
Pagination Controls user accounts. If all user accounts cannot be displayed at the
same time, use the pagination controls to view the accounts that
are hidden from view.
A-5
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
A-6
Getting Started
FIELD DETAILS
User name and Type an account name that does not exceed 40 characters.
password
Type a password with at least six characters and then confirm it.
If you want to use a stricter password, configure the global
password policy in Administration > System Settings >
Password Policy tab. The password policy will be displayed in
the window and must be satisfied before you can add a user
account.
When a user exceeds the number of retries allowed while entering
incorrect passwords, TippingPoint Advanced Threat Protection
Analyzer sets the user account to inactive (locked). You can
unlock the account in the Accounts screen.
Tip
Record the user name and password for future reference.
Role Select the role and associated permissions of this user account.
• Administrator: Users have full access to submitted objects,
analysis results, and product settings
• Investigator: Users have read-only access to submitted
objects, analysis results, and product settings, but can
download the investigation package, including submitted
objects
• Operator: Users have read-only access to submitted objects,
analysis results, and product settings
Add to contacts Select to add this user account to the Contacts list.
Phone number (Optional) Type the phone number of the account owner.
A-7
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
License
Use the License screen, in Administration > License, to view, activate, and renew the
TippingPoint Advanced Threat Protection Analyzer license.
After the first year, Maintenance must be renewed on an annual basis at the current
Trend Micro rate.
A-8
Getting Started
The Maintenance Agreement has an expiration date. Your License Agreement does not.
If the Maintenance Agreement expires, you will no longer be entitled to receive technical
support from Trend Micro or access Trend Micro Threat Connect.
Typically, 90 days before the Maintenance Agreement expires, you will start to receive
email notifications, alerting you of the pending discontinuation. You can update your
Maintenance Agreement by purchasing renewal maintenance from your Reseller, Trend
Micro sales, or on the Trend Micro Customer Licensing Portal at:
https://clp.trendmicro.com/fullregistration
The License screen includes the following information and options.
TABLE A-4. Product Details
FIELD DETAILS
Firmware version Displays the full patch and build number for the product.
License agreement Displays a link to the Trend Micro License Agreement. Click the
link to view or print the license agreement.
A-9
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
FIELD DETAILS
Activation Code View the Activation Code in this section. If your license has
expired, obtain a new Activation Code from Trend Micro. To
renew the license, click Specify New Code, and type the new
Activation Code.
Expiration date View the expiration date of the license. Renew the license before
it expires.
A-10
Getting Started
Network Tab
Use this screen to configure the host name, the IPv4 and IPv6 addresses of the
TippingPoint Advanced Threat Protection Analyzer appliance, and other network
settings.
An IPv4 address is required and the default is 192.168.252.2. Modify the IPv4
address immediately after completing all deployment tasks.
Note
You can also use the Preconfiguration Console to modify the network settings.
For details, see the Configuring Network Addresses on the Preconfiguration Console on
page 4-4.
A-11
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
Smart Protection Network, the ActiveUpdate server, and Threat Connect. The IP
addresses also determine the URLs used to access the management console.
The following table lists configuration limitations when using TippingPoint Advanced
Threat Protection Analyzer in a high availability cluster configuration.
TABLE A-6. Configuration Limitations when Using High Availability
FIELD LIMITATION
A-12
Getting Started
Proxy Tab
Specify proxy settings if TippingPoint Advanced Threat Protection Analyzer connects to
the Internet or management network through a proxy server.
TASK STEPS
Server name or IP Type the proxy server host name or IPv4 address, or IPv6
address address.
The management console does not support host names with
double-byte encoded characters. If the host name includes such
characters, type its IP address instead.
A-13
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
TASK STEPS
Proxy server Select this option if the connection to the proxy server requires
requires authentication. TippingPoint Advanced Threat Protection Analyzer
authentication supports the following authentication methods:
• No authentication
• Basic authentication
• Digest authentication
Note
TippingPoint Advanced Threat Protection Analyzer
product license cannot be validated when connecting
to the Internet through proxy server with digest
authentication.
• NTMLv1 authentication
Note
This option is only available if Proxy server requires
authentication is enabled.
Note
This option is only available if Proxy server requires
authentication is enabled.
Time Tab
Configure date and time settings immediately after installation.
A-14
Getting Started
Procedure
1. Go to Administration > System Settings and click the Time tab.
The Time screen appears.
3. Select one of the following methods and configure the applicable settings.
• Select Connect to an NTP server and type the host name, IPv4 address, or
IPv6 address of the NTP server.
• Select Set manually and configure the time.
A-15
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
4. Click Save.
Note
Daylight Saving Time (DST) is used when applicable.
7. Click Save.
A-16
Getting Started
SMTP Tab
TippingPoint Advanced Threat Protection Analyzer uses SMTP settings when sending
notifications through email.
TASK STEPS
Server address Type the SMTP server host name, IPv4 address, or IPv6 address.
The management console does not support host names with
double-byte encoded characters. If the host name includes such
characters, type its IP address instead.
SMTP server Select this option if connection to the SMTP server requires
requires authentication.
authentication
A-17
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
TASK STEPS
Note
This option is only available if SMTP server requires
authentication is enabled.
Note
This option is only available if SMTP server requires
authentication is enabled.
Importing an Image
The hardware specifications of your product determine the number of images that you
can import and the number of instances that you can deploy per image.
Important
Virtual Analyzer stops analysis and keeps all samples in the queue whenever an image is
added or deleted, or when instances are modified.
Procedure
1. Go to Virtual Analyzer > Sandbox Management and click the Images tab.
2. Click Import.
A-18
Getting Started
Note
Trend Micro recommends distributing the number of instances evenly across all
deployed images. Submitted objects must pass through all images before
analysis results are generated.
4. Click Import.
Virtual Analyzer validates the OVA files before starting the import process.
Note
If you selected HTTP or FTP server, TippingPoint Advanced Threat Protection
Analyzer downloads the images first before importing into Virtual Analyzer. The
process can only be canceled before the download completes.
A-19
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
Procedure
Important
Trend Micro recommends using an environment isolated from the management
network, such as a test network with Internet connection but without proxy
settings, proxy authentication, and connection restrictions.
A-20
Getting Started
WARNING!
Enabling connections to the management network may result in malware
propagation and other malicious activity in the network.
• Subnet mask
• Gateway
• DNS
5. Click Save.
Cluster Tab
Multiple standalone TippingPoint Advanced Threat Protection Analyzer appliances can
be deployed and configured to form a cluster that provides fault tolerance, improved
performance, or a combination thereof.
High availability cluster In a high availability cluster, one appliance acts as the active
primary appliance, and one acts as the passive primary
appliance. The passive primary appliance automatically takes
over as the new active primary appliance if the active primary
appliance encounters an error and is unable to recover.
A-21
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
Load-balancing cluster In a load balancing cluster, one appliance acts as the active
primary appliance, and any additional appliances act as
secondary appliances. The secondary appliances process
submissions allocated by the active primary appliance for
performance improvement.
High availability cluster In a high availability cluster with load balancing, one appliance
with load balancing acts as the active primary appliance, one acts as the passive
primary appliance, and any additional appliances act as
secondary appliances. The passive primary appliance takes
over as the active primary appliance if the active primary
appliance encounters an error and is unable to recover. The
secondary appliances process submissions allocated by the
active primary appliance for performance improvement.
The following table lists the available configuration modes and associated appliance
behavior.
TABLE A-10. Cluster Configuration Modes
CONFIGURATION
DESCRIPTION
MODE
A-22
Getting Started
CONFIGURATION
DESCRIPTION
MODE
Nodes List
The Nodes list is displayed on the active primary appliance.
The Nodes list contains the following information:
A-23
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
COLUMN DESCRIPTION
Last Connected Date and time that the appliance last connected to the active
primary appliance.
Note
No data (indicated by a dash) if appliance is passive primary
appliance.
A-24
Getting Started
COLUMN DESCRIPTION
A-25
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
COLUMN DESCRIPTION
A-26
Getting Started
REQUIREMENT DESCRIPTION
In a high availability cluster, one appliance acts as the active primary appliance, and one
acts as the passive primary appliance. The passive primary appliance automatically takes
over as the new active primary appliance if the active primary appliance encounters an
error and is unable to recover.
Note
If your network has Trend Micro Control Manager, only register the active primary
appliance to Control Manager.
A-27
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
Procedure
c. Type the IPv4 address or IPv6 address of the active primary appliance in
Active primary IP address.
e. Click Save.
• The passive primary appliance stops processing objects if it was previously doing
so.
• The passive primary appliance will sync all settings from the active primary
appliance. The total time to complete syncing depends on the appliance model.
Important
While the appliance is syncing, it cannot:
A-28
Getting Started
Procedure
Detach the passive primary appliance to update or upgrade the product, and to modify
the host name.
Important
Detaching the passive primary appliance does not reset the appliance settings. Trend Micro
recommends reinstalling the appliance if you want to use it as a standalone appliance.
Procedure
2. Click Detach to detach the passive primary appliance from the cluster.
A-29
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
Procedure
1. On the management console of the active primary appliance, go to Administration
> System Maintenance and click the Cluster tab.
2. Wait for Remove to appear next to the passive primary appliance in the nodes list.
3. Click Remove to remove the passive primary appliance from the cluster.
Note
The passive primary appliance automatically rejoins the cluster if it reconnects to the
active primary appliance.
Note
If your network has Trend Micro Control Manager, only register the active primary
appliance to Control Manager.
Procedure
1. Perform the installation and deployment tasks as described in Installing
TippingPoint Advanced Threat Protection Analyzer on page 3-1.
A-30
Getting Started
Note
If you have a passive primary appliance, type the IPv4 virtual address or IPv6
virtual address.
Tip
Secondary appliances can test their connection to the active primary appliance
at any time. Click Test Connection to get detailed information about any
connectivity problems.
f. Click Save.
3. (Optional) Configure additional settings on the secondary appliance.
a. Configure the sandbox network connection setting.
Note
Trend Micro recommends using the external network connection setting of the
active primary appliance.
A-31
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
Procedure
1. On the management console of the active primary appliance, go to Administration
> System Maintenance and click the Cluster tab.
2. Wait for Remove to appear next to the secondary appliance in the nodes list.
Note
Secondary appliances attempt to connect to the active primary appliance every 10
seconds. If the active primary appliance does not receive a heartbeat within one
minute, Remove appears next to the secondary appliance in the Nodes list.
Secondary appliances automatically rejoin the cluster if they reconnect to the active
primary appliance.
A-32
Getting Started
Tip
Trend Micro recommends deployment of a passive primary appliance for high availability.
For details, see Adding a Passive Primary Appliance to the Cluster on page A-27.
Important
Submissions do not have a result if they were being analyzed on the active primary
appliance when it becomes unresponsive.
Procedure
1. Power off the active primary appliance.
2. Select a secondary appliance from the same cluster and configure it as the new
active primary appliance.
a. On the management console of the secondary appliance, go to Administration
> System Maintenance and click the Cluster tab.
b. Select Primary mode (active).
c. Click Save.
3. Configure the IP address of the new active primary appliance.
Note
Trend Micro recommends using the same IP address as the original active primary
appliance. This allows secondary appliances and integrated products to connect
without reconfiguration.
A-33
Trend Micro TippingPoint Advanced Threat Protection Analyzer 5.5 Installation and Deployment
Guide
Note
Settings take up to one day to propagate to secondary appliances.
A-34
Index
A management port, 2-8
account management, A-4
Activation Code, A-8 N
network environment, 2-6
C
contacting, 5-5 P
documentation feedback, 5-5 port, 2-7
custom network, 2-6 ports, 2-10
custom port, 2-8 power supply, 3-2
preconfiguration console, 4-2
D operations, 4-3
deployment tasks product specifications, 2-2
hardware setup, 3-2
installation, 3-6 S
documentation feedback, 5-5 sandbox images, A-18
sandbox management
E images
Ethernet cables, 2-9 importing, A-18
network connection, A-20
F
form factor, 2-2 session duration (for management console),
A-3
G system maintenance
getting started tasks, A-3 cluster tab
primary appliance, A-33
I
remove, A-32
images, A-18
secondary appliance, A-30, A-32,
installation tasks, 3-2
A-33
IP addresses (for product), 2-8
test connection, A-30
L nodes list, A-23
license, A-8 system settings
Network Tab, A-11
M Proxy Tab, A-13
management console, A-2 SMTP Tab, A-17
management console accounts, A-4 Time Tab, A-14
management network, 2-6
IN-1