Trend Micro, Inc.

May 2014

Trend Micro™ Worry-Free™ Business Security Server

Version 9.0

This readme file is current as of the date above. However, all customers are advised to check Trend Micro's Web site for documentation updates at http://docs.trendmicro.com/en-us/smb/worry-free-business-security.aspx.

This readme is for both Trend Micro Worry-Free Business Security (WFBS) Standard and Advanced. Sections for the Advanced version are labeled "Advanced Only".

Register online with Trend Micro within 30 days of installation to continue downloading new pattern files and product updates from the Trend Micro Web site. Register during installation, or online at http://olr.trendmicro.com/.

Trend Micro always seeks to improve its documentation. Your feedback is always welcome. Please evaluate this documentation on the following site: www.trendmicro.com/download/documentation/rating.asp.

Contents


  1. About Worry-Free Business Security
  2. What's New
  3. Document Set
  4. System Requirements
  5. Installation
  6. Post-installation Configuration
  7. Known Issues
  8. Contact Information
  9. About Trend Micro
  10. License Agreement


1. About Worry-Free Business Security


Trend Micro Worry-Free Business Security (WFBS) protects small business users and assets from data theft, identity theft, risky Web sites, and spam (Advanced Only).

Back to top



2. What's New


Worry-Free Business Security 9.0 has the following new features:

Back to top



3. Document Set


The Worry-Free Business Security Standard solution consists of an on-premise server (Security Server) and desktop protection software (Security Agent).

The Worry-Free Business Security Advanced solution consists of two components hosted/offsite email protection service (Trend Micro Hosted Email Security) and on-premise server (Security Server), desktop(Security Agent), and email protection (Messaging Security Agent) software.

The documents for Trend Micro Hosted Email Security are available at http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx.

The documents for the Worry-Free Business Security Server include:

The latest versions of the documents are available at http://docs.trendmicro.com/en-us/smb/worry-free-business-security.aspx.

Back to top



4. System Requirements


Visit the following website for a complete list of installation and upgrade requirements:

http://docs.trendmicro.com/en-us/smb/worry-free-business-security.aspx

Back to top



5. Installation


See the Installation and Upgrade Guide for instructions on:

For instructions on installing agents, see the Administrator's Guide.

 

5.1. Inserting Contact Information (for Resellers and Partners)

Resellers and partners can add their contact information to the Security Server web console by performing the following steps:

  1. On the computer where the Security Server is installed, navigate to {Security Server installation folder}\PCCSRV\Private.

    {Security Server installation folder} is typically C:\Program Files\Trend Micro\Security Server.

  2. Open contact_info.ini using a text editor such as Notepad and then type the relevant contact information. Save the file.
  3. Log on to the Security Server web console and navigate to Preferences > Product License. A Reseller Information section is added to the Product License screen.

Back to top



6. Post-installation Configuration


See the post-installation tasks in the Installation and Upgrade Guide if you:

If you installed agents, see the agent post-installation tasks in the Administrator's Guide.

Back to top



7. Known Issues


Some product features do not support certain operating systems and associated applications. For details, visit http://docs.trendmicro.com/all/smb/wfbs-s/v9.0/en-us/wfbs_9.0_olhsrv/agent_features.html.

The following are the known issues in this release:

7.1. Security Agent Deployment, Upgrade, and Usage

Note: For details about installation limitations on certain operating systems, see the Help topic: http://docs.trendmicro.com/all/smb/wfbs-s/v9.0/en-us/wfbs_9.0_olhsrv/install_meth.html.

  1. To completely reinstall or upgrade the Security Agent, you will need to restart the computer. A restart will also be necessary when updating some components, including the firewall and the proxy drivers.
  2. WFBS supports Remote Desktop, Remote Web Workplace, and Citrix server terminal applications.

    In a Terminal Services environment, administrators can decide whether to show or hide the Security Agent icon in the Windows task bar. This setting applies to all or none of the active user sessions. It is not possible to apply the setting to individual user sessions.

    If the icon shows on all active user sessions, memory usage may increase. To prevent this issue from occurring:

    1. On the Security Agent host, open the registry.
    2. Create/modify the following REG name/value pair:
  3. The manual scan process bar is not fully synchronized to Files scanned count based scan mechanism.

7.2. Security Server

  1. The following default Security Server and Scan Server ports must not be used or blocked by other applications, such as Microsoft ISA Server and other firewalls:
  2. If an Internet connection problem occurs during the Security Server installation, the installer will keep trying to validate the Activation Code without indicating any problem or the installer might freeze. A stable Internet connection is required during installation.
  3. During Security Server install/upgrade, Setup.exe or TrustedInstaller.exe may use up to 50% of CPU resources.

7.3. Web Console

  1. Trend Micro recommends setting Internet Explorer to Medium or lower security levels when accessing the Web console. Higher security settings may block necessary ActiveX controls.

    By default, Internet Explorer applies Medium-low security levels for intranet sites and Medium security levels for sites in its Trusted Sites list. To help ensure you can access the console properly, add it to the Trusted Sites list.

  2. The Security Server Help does not display properly on Internet Explorer 6. Use Internet Explorer 7 or later.

7.4. Behavior Monitoring/Device Control

  1. Behavior Monitoring fully supports 32-bit operating systems. On 64-bit operating systems, only Vista x64 SP1 and later are supported.
  2. Device Control full supports 32-bit operating systems. On 64-bit operating systems, only Vista x64 SP1 and later are supported.

7.5. Web Reputation/URL Filtering

  1. Browser Exploit Prevention supports Internet Explorer versions 6, 7, 8, 9, 10, and 11.
  2. In an unstable network environment, the Trend Micro Web Reputation server may pass a website without filtering.

7.6. Firewall

  1. When uninstalling the firewall driver, the Client could temporarily lose the network connection. Some applications, such as Secure Shell (SSH), Terminal Services Client, or Remote Desktop, could be affected by the disconnection. If this occurs, restart the application after disabling the firewall (which also completes the uninstallation process).
  2. The Security Agent firewall might conflict with other firewall applications. Trend Micro recommends uninstalling or disabling other firewall applications.
  3. On VMware clients, the Security Agent firewall may block all incoming packets. To address this issue, add the following value to the client's registry:

7.7. Messaging Security Agent

  1. The Messaging Security Agent only supports typical installations of Exchange Server 2007, 2010, and 2013 that include the Hub Transport, the Mailbox, and the Client Access server roles.
  2. Device Access Control for mobile devices is only supported for Exchange 2010, and 2013.
  3. As an anti-spam solution on Exchange Server 2003, users can choose between EUQ or Junk Mail integration. If you use Junk Mail integration, install Exchange Server 2003 SP2 or above. This requires that the Intelligent Message Filter (IMF) be preinstalled.
  4. During Messaging Security Agent installation, the installer may be unable to submit passwords that have special, non-alphanumeric characters to the Exchange Server computer. As a result, you may be unable to install the Messaging Security Agent if the domain administrator account you are using has a complex password. To work around this issue, temporarily change the password for the domain administrator account.
  5. When installing Messaging Security Agent remotely, using the Web console or the Worry-Free Business Security Advanced installer on a computer running Windows Server 2008, SBS 2008, EBS 2008, SBS 2011 Standard, 2008 R2, 2012, or 2012 R2 you need to specify the built-in domain administrator account because of User Access Control restrictions. Note that for computers with other operating systems, you need an account that is in the Exchange Organization Administrators group.

7.8 Mac Security

Trend Micro Security (for Mac) does not support server installations on Windows Server 2012 or 2012 R2 with domain controller role. This is due to a Microsoft limitation wherein you cannot run SQL Server services on a domain controller under a local service account or a network service account.

NOTE: For a list of all Trend Micro Security (for Mac) known issues, refer to the readme: http://docs.trendmicro.com/all/ent/tmsm/v2.1/en-us/tmsm_2.1_readme.htm

Back to top



8. Contact Information


A license to the Trend Micro software usually includes the right to product updates, pattern file updates, and basic technical support for one (1) year from the date of purchase only. After the first year, Maintenance must be renewed on an annual basis at Trend Micro's then-current Maintenance fees.

You can contact Trend Micro via fax, phone, and email, or visit us at http://www.trendmicro.com/.

Evaluation copies of Trend Micro products can be downloaded from our Web site.

Global Mailing Address/Telephone numbers

For global contact information in the Asia/Pacific region, Australia and New Zealand, Europe, Latin America, and Canada, refer to http://www.trendmicro.com/en/about/overview.htm.

The Trend Micro "About Us" screen displays. Click the appropriate link in the "Contact Us" section of the screen.

Note: This information is subject to change without notice.

Back to top



9. About Trend Micro


Trend Micro Incorporated, a global leader in Internet content security and threat management, aims to create a world safe for the exchange of digital information for businesses and consumers. A pioneer in server-based antivirus with over 20 years experience, we deliver top-ranked security that fits our customers' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the Trend Micro™ Smart Protection Network™ infrastructure, our industry-leading cloud-computing security technology and products stop threats where they emerge, on the Internet, and are supported by 1,000+ threat intelligence experts around the globe. For additional information, visit http://www.trendmicro.com/.

Copyright 2014, Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, TrendProtect, TrendSecure, Worry-Free, OfficeScan, ServerProtect, PC-cillin, InterScan, and ScanMail are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.

Back to top



10. License Agreement


Information about your license agreement with Trend Micro can be viewed at http://us.trendmicro.com/us/about/company/user_license_agreements/.

Click here to view license attributions for this product.

Back to top