Trend Micro, Inc.

Jan. 2014

Trend Micro™ Worry-Free™ Business Security Agent

Version 9.0

This readme file is current as of the date above. However, all customers are advised to check Trend Micro's Web site for documentation updates at http://docs.trendmicro.com/en-us/smb/worry-free-business-security.aspx.

Register online with Trend Micro within 30 days of installation to continue downloading new pattern files and product updates from the Trend Micro Web site. Register during installation, or online at http://olr.trendmicro.com.

Trend Micro always seeks to improve its documentation. Your feedback is always welcome. Please evaluate this documentation on the following site: www.trendmicro.com/download/documentation/rating.asp.

Contents


  1. About Worry-Free Business Security
  2. What's New
  3. Document Set
  4. System Requirements
  5. Installation
  6. Post-installation Configuration
  7. Known Issues
  8. Contact Information
  9. About Trend Micro
  10. License Agreement


1. About Worry-Free Business Security


Trend Micro Worry-Free Business Security (WFBS) protects small business users and assets from data theft, identity theft, risky Web sites, and spam (Advanced Only).

Back to top



2. What's New


Worry-Free Business Security includes the following new features and enhancements.

Back to top



3. Document Set


The documents for the Worry-Free Business Security Agent include:

The latest versions of the documents are available at http://docs.trendmicro.com/en-us/smb/worry-free-business-security.aspx.

Back to top



4. System Requirements


Visit the following website for a complete list of installation and upgrade requirements:

http://docs.trendmicro.com/en-us/smb/worry-free-business-security.aspx

Back to top



5. Installation


The Worry-Free Business Security administrator in your organization is responsible for installing and upgrading the Security Agent. Contact the administrator if you have questions or concerns about the installation or upgrade.

Back to top



6. Post-installation Configuration


The Worry-Free Business Security administrator will contact you if post-installation steps are required.

Back to top



7. Known Issues


The following are the known issues in this release:

7.1. Security Agent Deployment, Upgrade, and Usage

  1. To completely reinstall or upgrade the Security Agent, you will need to restart the computer. A restart will also be necessary when updating some components, including the firewall and the proxy drivers.
  2. WFBS supports Remote Desktop, Remote Web Workplace, and Citrix server terminal applications.
  3. In a Terminal Services environment, administrators can decide whether to show or hide the Security Agent icon in the Windows task bar. This setting applies to all or none of the active user sessions. It is not possible to apply the setting to individual user sessions.

    If the icon shows on all active user sessions, memory usage may increase. To prevent this issue from occurring:

    1. On the Security Agent host, open the registry.
    2. Create/modify the following REG name/value pair:
  4. The manual scan process bar is not fully synchronized to Files scanned count based scan mechanism.

7.2. Behavior Monitoring/Device Control

  1. Behavior Monitoring fully supports 32-bit operating systems. On 64-bit operating systems, only Vista x64 SP1 and later are supported.
  2. Device Control full supports 32-bit operating systems. On 64-bit operating systems, only Vista x64 SP1 and later are supported.

7.3. Web Reputation/URL Filtering

  1. Browser Exploit Prevention supports Internet Explorer 6, 7, 8, 9, 10, and 11.
  2. In an unstable network environment, the Trend Micro Web Reputation server may pass a website without filtering.

7.4. Firewall

  1. When uninstalling the firewall driver, the Client could temporarily lose the network connection. Some applications, such as Secure Shell (SSH), Terminal Services Client, or Remote Desktop, could be affected by the disconnection. If this occurs, restart the application after disabling the firewall (which also completes the uninstallation process).
  2. The Security Agent firewall might conflict with other firewall applications. Trend Micro recommends uninstalling or disabling other firewall applications.
  3. On VMware clients, the Security Agent firewall may block all incoming packets. To address this issue, add the following value to the client's registry:

7.5 Messaging Security Agent

  1. Messaging Security Agent cannot be installed on the domain controller server when the operating system is Windows Server 2012 and above. This is a limitation of SQL Server 2008 R2 on Windows Server 2012 and above.
  2. Mobile Security Policies are kept on the Exchange Server after the Messaging Security Agent is uninstalled.

Back to top



8. Contact Information


A license to the Trend Micro software usually includes the right to product updates, pattern file updates, and basic technical support for one (1) year from the date of purchase only. After the first year, Maintenance must be renewed on an annual basis at Trend Micro's then-current Maintenance fees.

You can contact Trend Micro via fax, phone, and email, or visit us at http://www.trendmicro.com.

Evaluation copies of Trend Micro products can be downloaded from our Web site.

Global Mailing Address/Telephone numbers

For global contact information in the Asia/Pacific region, Australia and New Zealand, Europe, Latin America, and Canada, refer to http://www.trendmicro.com/en/about/overview.htm.

The Trend Micro "About Us" screen displays. Click the appropriate link in the "Contact Us" section of the screen.

Note: This information is subject to change without notice.

Back to top



9. About Trend Micro


Trend Micro Incorporated, a global leader in Internet content security and threat management, aims to create a world safe for the exchange of digital information for businesses and consumers. A pioneer in server-based antivirus with over 20 years experience, we deliver top-ranked security that fits our customers' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the Trend Micro™ Smart Protection Network™ infrastructure, our industry-leading cloud-computing security technology and products stop threats where they emerge, on the Internet, and are supported by 1,000+ threat intelligence experts around the globe. For additional information, visit http://www.trendmicro.com.

Copyright 2014, Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, TrendProtect, TrendSecure, Worry-Free, OfficeScan, ServerProtect, PC-cillin, InterScan, and ScanMail are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.

Back to top



10. License Agreement


Information about your license agreement with Trend Micro can be viewed at http://us.trendmicro.com/us/about/company/user_license_agreements/.

Click here to view license attributions for this product.

Back to top