Trend Micro, Inc.

June 2019

Trend Micro™ Worry-Free™ Business Security Server

Version 10.0 Service Pack 1

This readme file is current as of the date above. However, all customers are advised to check Trend Micro's Web site for documentation updates at

This readme is for both Trend Micro Worry-Free Business Security (WFBS) Standard and Advanced. Sections for the Advanced version are labeled "Advanced Only".

Register online with Trend Micro within 30 days of installation to continue downloading new pattern files and product updates from the Trend Micro Web site. Register during installation, or online at


  1. About Worry-Free Business Security
  2. What's New
  3. Document Set
  4. System Requirements
  5. Installation
  6. Post-installation Configuration
  7. Known Issues
  8. Contact Information
  9. About Trend Micro
  10. License Agreement

1. About Worry-Free Business Security

Trend Micro™ Worry-Free™ Business Security is a centrally managed anti-malware solution that protects Windows and Mac endpoints from a wide variety of Internet threats. Optimized to address the needs of small business users, Worry-Free Business Security offers extra security against advanced threats and malware by providing antivirus, antispam (Advanced only), web security, ransomware protection, and data security to ensure complete user protection.

Back to top

2. What's New

Worry-Free Business Security includes the following new features and enhancements:

Note: For Exchange Server 2019, Trend Micro recommends getting ScanMail™ for Microsoft Exchange.

See for details.

Back to top

3. Document Set

The Worry-Free Business Security Standard solution consists of an on-premise server (Security Server) and desktop protection software (Security Agent).

The Worry-Free Business Security Advanced solution consists of an on-premise server (Security Server), desktop protection software (Security Agent), and email protection software (Messaging Security Agent).

The documents for the Worry-Free Business Security Server include:

The latest versions of the documents are available at

Back to top

4. System Requirements

Visit the following website for a complete list of installation and upgrade requirements:

Back to top

5. Installation

See the Installation and Upgrade Guide for instructions on:

For instructions on installing the Security Agent, see the Administrator's Guide.


5.1. Inserting Contact Information (for Resellers and Partners)

Resellers and partners can add their contact information to the Security Server web console by performing the following steps:

  1. On the endpoint where the Security Server is installed, navigate to {Security Server installation folder}\PCCSRV\Private.

    {Security Server installation folder} is typically C:\Program Files\Trend Micro\Security Server.

  2. Open contact_info.ini using a text editor such as Notepad and then type the relevant contact information. Save the file.
  3. Log on to the Security Server web console and navigate to Preferences > Product License. A Reseller Information section is added to the Product License screen.

Back to top

6. Post-installation Configuration

See the post-installation tasks in the Installation and Upgrade Guide if you:

If you installed the Security Agent, see the agent post-installation tasks in the Administrator's Guide.

Back to top

7. Known Issues

The following are the known issues in this release:

7.1. Security Agent Deployment, Upgrade, and Usage

Note: For details about installation limitations on certain operating systems, see the Help topic:

  1. To completely reinstall or upgrade the Security Agent, you will need to restart the computer. A restart will also be necessary when updating some components.
  2. WFBS supports Remote Desktop, Remote Web Workplace, and Citrix server terminal applications.

    In a Terminal Services environment, administrators can decide whether to show or hide the Security Agent icon in the Windows task bar. This setting applies to all or none of the active user sessions. It is not possible to apply the setting to individual user sessions.

    If the icon shows on all active user sessions, memory usage may increase. To prevent this issue from occurring:

    1. On the Security Agent host, open the registry.
    2. Create/modify the following REG name/value pair:
  3. The manual scan process bar is not fully synchronized to the Files scanned count based scan mechanism.
  4. Security Agents running on Windows Server 2019 cannot report security statuses to Windows Security Center because Windows Server 2019 does not provide the Windows Security Center service. If Windows Defender is enabled on Windows Server 2019 with the Security Agent installed, performance issues may occur. Trend Micro recommends disabling Windows Defender before installing the Security Agent.

7.2. Security Server

  1. The following default Security Server and Scan Server ports must not be used or blocked by other applications, such as Microsoft ISA Server and other firewalls:
  2. If an Internet connection problem occurs during the Security Server installation, the installer will keep trying to validate the Activation Code without indicating any problem, or the installer may freeze. A stable Internet connection is required during installation.
  3. During Security Server install/upgrade, Setup.exe or TrustedInstaller.exe may use up to 50% of CPU resources.

7.3. Web Console

  1. To ensure you can access the web console properly, add it to the Trusted Sites list. By default, Internet Explorer applies Medium-low security levels for intranet sites and Medium security levels for sites in its Trusted Sites list.
  2. Trend Micro recommends setting Internet Explorer to Medium or lower security levels when accessing the web console. Higher security settings may block necessary ActiveX controls during Security Agent installation.
  3. Issue: When clicking a link that opens in a new browser window in Microsoft Edge, a certificate error occurs and displays a time-out message.

    Workaround: Use a different supported browser to access the web console, or see the following link for details on resolving the certificate issue:

7.4. Web Reputation/URL Filtering

  1. Browser Exploit Prevention supports Internet Explorer versions 9, 10, and 11.
  2. In an unstable network environment, the Trend Micro Web Reputation server may pass a website without filtering.
  3. If proxy settings are configured on Windows 10, HTTPS Web Threat Protection cannot work on Microsoft Edge.

7.5. Firewall

  1. When uninstalling the firewall driver, the Security Agent could temporarily lose the network connection. Some applications (such as Secure Shell (SSH), Terminal Services Client, or Remote Desktop) could be affected by the disconnection. If this occurs, restart the application after disabling the firewall. Note that restarting also completes the uninstallation process.
  2. The Security Agent firewall might conflict with other firewall applications. Trend Micro recommends uninstalling or disabling other firewall applications.
  3. On VMware clients, the Security Agent firewall may block all incoming packets. To address this issue, add the following value to the client's registry:

7.6. Messaging Security Agent

  1. The Messaging Security Agent only supports typical installations of Exchange Server 2010 and 2013 that include the Hub Transport, the Mailbox, and the Client Access server roles.
  2. Device Access Control for mobile devices is only supported for Exchange 2010 and 2013.
  3. During Messaging Security Agent installation, the installer may be unable to submit passwords that have special non-alphanumeric characters to the Exchange Server computer. As a result, you may be unable to install the Messaging Security Agent if the domain administrator account you are using has a complex password. To work around this issue, temporarily change the password for the domain administrator account.
  4. When installing the Messaging Security Agent remotely, you need to specify the built-in domain administrator account when using the web console or the Worry-Free Business Security Advanced installer on an endpoint running Windows Server 2008, SBS 2008, EBS 2008, SBS 2011 Standard, 2008 R2, 2012, or 2012 R2. This is due to User Access Control restrictions. Note that for endpoints running other operating systems, you need an account that is in the Exchange Organization Administrators group.

7.7 Mac Security

  1. Trend Micro Security (for Mac) does not support server installations on Windows Server 2012 or 2012 R2 with a domain controller role. This is due to a Microsoft limitation wherein you cannot run SQL Server services on a domain controller under a local service account or a network service account.

Back to top

8. Contact Information

A license to the Trend Micro software usually includes the right to product updates, pattern file updates, and basic technical support for one (1) year from the date of purchase only. After the first year, Maintenance must be renewed on an annual basis at Trend Micro's then-current Maintenance fees.

You can contact Trend Micro via fax, phone, and email, or visit us at

Evaluation copies of Trend Micro products can be downloaded from our Web site.

Global Mailing Address/Telephone numbers

For global contact information in the Asia/Pacific region, Australia and New Zealand, Europe, Latin America, and Canada, refer to

The Trend Micro "About Us" screen displays. Click the appropriate link in the "Contact Us" section of the screen.

Note: This information is subject to change without notice.

Back to top

9. About Trend Micro

Trend Micro Incorporated, a global leader in Internet content security and threat management, aims to create a world safe for the exchange of digital information for businesses and consumers. A pioneer in server-based antivirus with over 20 years experience, we deliver top-ranked security that fits our customers' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the Trend Micro™ Smart Protection Network™ infrastructure, our industry-leading cloud-computing security technology and products stop threats where they emerge, on the Internet, and are supported by 1,000+ threat intelligence experts around the globe. For additional information, visit

Copyright 2019, Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, TrendProtect, TrendSecure, Worry-Free, OfficeScan, ServerProtect, PC-cillin, InterScan, and ScanMail are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.

Back to top

10. License Agreement

Information about your license agreement with Trend Micro can be viewed at

Third-party licensing agreements can be viewed:

- By selecting the "About" option in the application user interface

- By referring to the "Legal" page of the Administrator's Guide

Back to top