Trend Micro, Incorporated.

                      August, 2012

Trend Micro™ Client/Server Security Agent for
Worry-Free Business Security Services 5.0

This Readme file was current as of the date above. All customers are advised to check the Trend Micro download page for documentation updates at:



1.     About Client/Server Security Agent

2.     What's New

3.     Documentation Set

4.     System Requirements

5.     Installation

6.     Post-Installation Configuration

7.     Known Issues

8.     Release History

9.     Contact Information

10.  About Trend Micro

11.  License Agreement

1. About Client/Server Security Agent

The Trend Micro Client/Server Security Agent (CSA) is the endpoint component for the "Services" edition of the Trend Micro Worry-Free Business Security package. It provides desktop and server computers with centrally manageable protection against all kinds of web threats, including viruses, spyware, data theft, messaging spam, intrusions, and harmful Web sites.

2. What's New

o    Support for Mac and Mobile: This version of WFBS-SVC now manages Android phones and Macs to provide increased security at work (or at home).

o    Flexible Device Management: With custom tags, you can use email addresses, employee IDs, or any other unique combination to speed up your workflow.

o    Improved User Experience: Features that require a lot of parameters in the background have been simplified on the console. The Common Tasks on Live Status gives you quick access to commonly used tasks.

o    Enhanced Flows: We've changed a few flows to reduce the steps taken to complete a task. For example, you can now add a device and the device to a group with ease.

o    Refreshed Look and Feel: We have refreshed the interface that makes it easier for you to use WFBS-SVC.

3. Documentation Set

In addition to this Readme, the documentation set for this product includes the following:

o    Quick Start Guide: Provides instructions to install/upgrade the product and get started. It provides a description of the basic features and default settings.

o    Online Help: Provides help topics for performing tasks.

o    Knowledge Base: A searchable database of known product issues, including specific problem-solving and troubleshooting topics.

4. System Requirements

The following table describes the minimum requirements for the Client/Server Security Agent (CSA).

Note: Client/Server Security Agent supports Citrix Presentation Server™ 4.5/5.0 and Remote Desktop.

Client/Server Security Agent supports VMware© ESX™ 3.0/3.5/4.0, VMware vSphere Hypervisor™ (ESXi) 4.0/5.0, VMware Workstation 6.5/7.0/8.0, and Microsoft Hyper-V™ Server 2008/2012


Minimum Specifications


o    Intel™ Pentium™ x86 or compatible processor

o    x64 processor supporting AMD64 and Intel EM64T technologies

Clock speed requirements vary depending on the operating system:

o    Windows SBS 2008, SBS 2011: 2GHz

o    Windows Server 2012: 1.4GHz

o    Windows 8, Server 2008, EBS 2008: 1GHz

o    Windows Vista, Windows 7: 800MHz

o    Windows XP, Server 2003, SBS 2003, or Home Server: 450MHz


o    Windows SBS 2008, EBS 2008, SBS 2011: 4GB

o    Windows 8, Server 2008, SBS 2003: 1GB minimum; 2GB recommended

o    Windows Server 2012, Server 2003, Home Server, Windows Vista, Windows 7: 512MB minimum; 1GB recommended

o    Windows XP: 256MB minimum; 512MB recommended

Disk space


Note: This is the minimum disk space required for installing the Agent. The actual requirements depend on the number of quarantined files, the retained logs, and other changes made to the default configuration.

Operating system

Series or Family

Supported Service Packs or Releases

Windows XP


Windows Server 2003 R2 (with Storage Server 2003)

SP1 or SP2

Windows Server 2003 (with Storage Server 2003)

SP1 or SP2

Windows SBS 2003 R2

SP1 or SP2

Windows SBS 2003

SP1 or SP2

Windows Vista

SP1 or SP2

Windows Home Server

No service pack

Windows Server 2008 R2

None or SP1

Windows Server 2008

SP1 or SP2

Windows SBS 2008

SP1 or SP2

Windows 2008 Foundation

SP1 or SP2

Windows Essential Business Server (EBS) 2008

SP1 or SP2

Windows 7

None or SP1

Windows SBS 2011 No service pack
Windows 8

No service pack

Windows Server 2012

No service pack

Note: All major editions and 64-bit versions of these operating systems are supported unless noted otherwise.

Web browser (for downloading the Agent Installer)

Internet Explorer 7.0, 8.0, 9.0, 10.0 (32 and 64 bit)

Firefox 10.0, 12.0, 13.0, 14.0


256-color display or higher with resolution of 800x600 pixels or higher

The following table describes the minimum requirements for Trend Micro Security for Mac (TMSM), the Mac Agent.


Minimum Specifications


o    OS X 10.8: 64-Bit Intel Core 2 Duo processor or better required

o OS X 10.7:    Mac with an Intel Core 2 Duo, Core i3, Core i5, Core i7, or Xeon processor

o OS X 10.6, OS X 10.5:    Mac with an Intel core processor


o    OS X 10.8, 10.7:: 2GB

o    OS X 10.6: 1GB

o    OS X 10.5: 512MB or more

Disk space


Operating System

o    Mac OS X v10.5.7 (Leopard) or later

o    Mac OS X v10.6 (Snow Leopard) or later

o    Mac OS X v10.7 (Lion) or later

o    Mac OS X v10.8 (Mountain Lion)


o    Java for Mac OS X 10.5, Update 4

o    Java for Mac OS X 10.6

o    Java for Mac OS X 10.7

o    Java for Mac OS X 10.8

Web browser (for downloading the Agent Installer)

Safari 3.2.3, 4.0, 5.0, 5.1, 6.0


256-color display or higher with resolution of 800x600 pixels or higher

The following table describes the minimum requirements for Trend Micro Mobile Security (TMMS), the Android Agent.


Minimum Specifications


o    Android 2.2 (Froyo) or later

o    Android 2.3 (Gingerbread) or later

o    Android 3.0 (Honeycomb) or later

o    Android 4.0 (Ice Cream Sandwich) or later

Web browser (for downloading the Agent Installer)

Default web browser on the device

5. Installation

Refer to the Online Help for information about deploying clients.

6. Post-Installation Configuration

Trend Micro recommends performing an update immediately after installation.

7. Known Issues

The following issues have been identified in this release:

7.1. Client Deployment and Upgrade

7.1.1. To completely reinstall or upgrade the CSA, you will need to restart the computer. A restart will also be necessary when updating some components including the firewall and the proxy drivers.

7.1.2. After installing the CSA on a computer with IIS 7.0, you must restart the IIS service. IIS 7.0 may not work as expected with the CSA, which uses the Windows Filtering Platform, until IIS is restarted. This issue only occurs on Microsoft Windows 2008 without service pack 2.

7.1.3. Some CSA components, such as the Trend Micro Web Protection Add-On or the TrendProtect Toolbar, can be installed without the CSA. These components may conflict with the CSA installation and must be removed before the CSA is installed.

7.1.4. Real-time scan on CSA can prevent Hyper-V Manager from creating virtual machines. If you encounter this issue, configure real-time scan to exclude the storage folder for your virtual machines from scanning. Hyper-V Manager uses "C:\ProgramData\Microsoft\Windows\Hyper-V" as the default storage folder, but a different folder may be specified during virtual machine creation.

7.1.5. In environments such as distributed file systems, scanning offline files causes unnecessary file recalls and can eventually lead to performance issues. To avoid scanning offline files:

1.    Open the Windows registry and navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\tmfilter\Parameters.

2.    Set the registry keys SkipOffLineFile and SkipSparseFile to 1.

For more information, refer to

7.1.6. The WFBS-SVC_Downloader.exe file can only be run on the computer on which the user downloads it. If a user copies the file to another computer and runs it there, an error results.

7.1.7. Computer loses network connection temporarily during installation.

7.1.8. Users cannot successfully uninstall the agent if Dropbox is installed on the same computer.

7.1.9. Users cannot deploy agent program when Internet Explorer 10 running in Metro mode on Windows 8.

7.2. Client/Server Security Agent

7.2.1. On Windows Vista/2008/7 guest operating systems running VMware ESX 3.5 servers, PccNTmon cannot render the CSA console correctly. The system hangs and eventually crashes.

To prevent this issue:

1.     Click Start > Control Panel > Performance Information and Tools > Visual Effects.

2.      Select Adjust for best performance.

7.2.2. CSA self-protection for Process and Registry Keys does not work on 64-bit platforms.

7.2.3. If Client Security is set to High and a malware program resides in the CSA folder before real-time scan starts, CSA cannot restrict that malware from updating the registry.

7.2.4. If virus pattern or spyware active-monitoring pattern files are not available to the CSA, the CSA will keep its current scan method until the pattern is delivered.

7.3. Firewall

7.3.1. During CSA installation or firewall driver uninstallation, the computer may temporarily lose its network connection. Some applications, such as Secure Shell (SSH), Terminal Services Client, or Remote Desktop could be affected by the disconnection. If the network connection is lost, restart the application after installing the CSA or after disabling the firewall.

7.3.2. The CSA firewall may conflict with other firewall applications. Trend Micro recommends uninstalling or disabling other firewall applications.

7.3.3. On VMware clients, the CSA firewall may block all incoming packets.

To address this issue, add the following value to the client's registry:

o    Key: HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro\PC-cillinNTCorp\CurrentVersion\PFW

o    Name: EnableBypassRule

o    Type: REG_DWORD

o    Data: 1

7.3.4. The firewall does not support IPV6.

7.3.5.On Windows Vista, Windows 7, Windows 8, Windows Server 2008, Windows Server 2008 R2 and Windows Server 2012 computers, if the firewall is disabled and then re-enabled, Firewall patterns fail to load sometimes. To fix this problem, restart the affected computer

7.4. Behavior Monitoring

Behavior Monitoring supports only 32-bit operating systems; 64-bit operating systems are not supported.

7.5. Web Reputation and URL Filtering

7.5.1. When running Internet Explorer 9 with IE Enhanced Security Configuration, the Web Reputation plug-in module (TmIEPlugInBHO Class) cannot be automatically applied. Risky URLs using SSL cannot be blocked.

7.5.2.Web Reputation Services and URL Filtering are not supported when Internet Explorer 10 is running in Metro mode on Windows 8.

7.6. SBS Dashboard Add-In Tool

When Internet Explorer 9 is installed under Windows Small Business Server 2011 Essentials, a popup window concerning unused windows appears when closing the Dashboard console.  

7.7. Login Script Setup Tool

Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Vista, Windows 7, and Windows 8 computers with UAC enabled prohibit automatic installation.  

7.8. Trend Micro Mobile Security

7.8.1. When TMMS is installed on a device running Android 2.x, the system proxy is not updated as this version of the operating system does not support system proxies. This could also prevent the device from connecting to the server to receive updates.

7.8.2. TMMS will not be installed on rooted Android devices.

7.8.3. If the user goes to Settings > Applications > Manage Applications > TMMS and taps Clear Data, TMMS might not be able to connect to the server to receive updates. The user would need to re-enroll the device.

7.8.4. If other installed apps interfere with the device’s network connection, TMMS might not be able to connect to the server to receive updates.

7.9. Trend Micro Security for Mac

7.9.1. The Agent does not support root accounts.

7.9.2. When the operating system is upgraded to Mac OSX 10.8, TMSM does not start. TMSM requires Java and the upgrade to Mac OSX 10.8 automatically removes Java. To fix this, install the latest version of Java and then restart the Mac.

8. Release History

Previous releases include the following:



WFBS-H v2.5

September 2008

WFBS-H v2.5 Sp1

February 2009

WFBS-H v2.5 Sp2

April 2009


December 2009


September 2010


November 2010


December 2010


April 2011


September 2011

WFBS-SVC v3.6 SP1 January 2012
WFBS-SVC v3.7 February 2012

9. Contact Information

A license to the Trend Micro software usually includes the right to product updates, pattern file updates, and basic technical support for one (1) year from the date of purchase only. After the first year, Maintenance must be renewed on an annual basis at Trend Micro's then-current Maintenance fees.

You can contact Trend Micro via fax, phone, and email, or visit us at:

Evaluation copies of Trend Micro products can be downloaded from our Web site.

Global Mailing Address/Telephone Numbers

The Trend Micro "About Us" screen displays. Click the appropriate link in the "Contact Us" section of the screen.

Note: This information is subject to change without notice.

10. About Trend Micro

Trend Micro Incorporated, a global leader in Internet content security and threat management, aims to create a world safe for the exchange of digital information for businesses and consumers. A pioneer in server-based antivirus with over 20 years experience, we deliver top-ranked security that fits our customers’ needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the Trend Micro Smart Protection Network(TM) infrastructure, our industry-leading cloud-computing security technology and products stop threats where they emerge, on the Internet, and are supported by 1,000+ threat intelligence experts around the globe. For additional information, visit:

Copyright 2012, Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, Worry-Free, TrendProtect, and InterScan are trademarks of Trend Micro Incorporated and are registered in some jurisdictions. All other marks are the trademarks or registered trademarks of their respective companies.

11. License Agreement

Information about your license agreement with Trend Micro can be viewed at:

Third-party licensing agreements can be viewed by selecting the "About" option in the application user interface.