Security Settings for Worry-Free Business Security Services

Feature

Description

Scan Method

  • Smart Scan: The client uses its own scan engine, but instead of using only a local pattern file to identify threats, it primarily relies on the pattern file held on the Scan Server.

  • Conventional Scan: The client uses its own scan engine and local pattern file to identify threats.

Antivirus/Anti-Spyware

  • Enable real-time Antivirus/Anti-Spyware: Real-time scanning provides protection against file-based threats.

Firewall

  • Enable Firewall: The firewall can block or allow certain types of network traffic by creating a barrier between the client and the network. Additionally, the firewall will identify patterns in network packets that may indicate an attack on clients.

    • Simple mode: Enables the firewall with Trend Micro default settings

    • Advanced mode:Configure the security level, IDS, notifications and expectations.

      Important:

      After selecting advanced mode, you must configure the advanced settings using the Worry-Free Business Security Services console.

Web Reputation

  • Enable Web Reputation: Web Reputation enhances protection against malicious websites. Web Reputation leverages Trend Micro's extensive web security database to check the reputation of URLs that Clients are attempting to access or URLs embedded in email messages that are contacting websites.

    • High: Blocks the following pages:

      • Dangerous: Verified to be fraudulent or known sources of threats

      • Highly suspicious: Suspected to be fraudulent or possible sources of threats

      • Suspicious: Associated with spam or possibly compromised

      • Untested: While Trend Micro actively tests web pages for safety, users may encounter untested pages when visiting new or less popular websites. Blocking access to untested pages can improve safety but can also prevent access to safe pages

    • Medium: Blocks the following pages:

      • Dangerous: Verified to be fraudulent or known sources of threats

      • Highly suspicious: Suspected to be fraudulent or possible sources of threats

    • Low (default): Blocks the following pages:

      • Dangerous: Verified to be fraudulent or known sources of threats

URL Filtering

  • Enable URL Filtering: URL filtering helps you control access to websites to reduce unproductive employee time, decrease Internet bandwidth usage, and create a safer Internet environment. You can choose a level of URL filtering protection or customize which types of websites you want to screen.

    • High: Blocks known or potential security threats, inappropriate or possibly offensive content, content that can affect productivity or bandwidth, and unrated pages

    • Medium: Blocks known security threats and inappropriate content

    • Low (default): Blocks known security threats

    • Custom: Select your own categories, and whether you want to block the categories during business hours or leisure hours.

Behavior Monitoring

  • Enable Behavior Monitoring: Behavior Monitoring protects clients from unauthorized changes to the operating system, registry entries, other software, or files and folders.

    • Enable all ransomware protection features

      • Enable document protection against unauthorized encryption or modification: Protects documents from unauthorized changes.

        Note:

        Enabling this option stops processes that rename, modify and delete files, and then quarantines the programs that are running these processes.

      • Automatically back up and restore files modified by suspicious programs: Automatically backs up files modified by suspicious programs if document protection is enabled.

      • Enable blocking of processes commonly associated with ransomware: Protects endpoints from ransomware attacks by blocking processes commonly associated with hijacking attempts.

      • Enable program inspection to detect and block compromised executable files: Increases detection by monitoring processes for ransomware-like behavior.

    • Enable Intuit QuickBooks Protection: Protects all Intuit QuickBooks files and folders from unauthorized changes by other programs. Enabling this feature will not affect changes made from within Intuit QuickBooks programs, but will only prevent changes to the files from other unauthorized applications.

Predictive Machine Learning

  • Enable Predictive Machine Learning: Predictive Machine Learning protects your network from new, previously unidentified, or unknown threats through advanced file feature analysis and heuristic process monitoring.

    • File

      • Quarantine: Select to automatically quarantine files that exhibit malware-related features based on the Predictive Machine Learning analysis

      • Log only: Select to scan unknown files and log the Predictive Machine Learning analysis for further in-house investigation of the threat

    • Process

      • Terminate: Select to automatically terminate processes or scripts that exhibit malware-related behaviors based on the Predictive Machine Learning analysis

        Important:

        Predictive Machine Learning attempts to clean the files that executed the malicious processes or scripts. If the clean action is unsuccessful, Predictive Machine Learning quarantines the affected files.

      • Log only: Select to scan unknown processes or scripts and log the Predictive Machine Learning analysis for further in-house investigation of the threat

Mail Scan

  • Enable POP3 message scanning: The POP3 Mail Scan plug-in protects clients in real-time against security risks and spam transmitted through POP3 email messages.

For more details, see the Worry-Free Business Security Services Online Help.