Trend Micro, Inc.

May 2017

Trend Micro™ Worry-Free™ Business Security Server

Version 9.5

This readme file is current as of the date above. However, all customers are advised to check Trend Micro's Web site for documentation updates at

This readme is for both Trend Micro Worry-Free Business Security (WFBS) Standard and Advanced. Sections for the Advanced version are labeled "Advanced Only".

Register online with Trend Micro within 30 days of installation to continue downloading new pattern files and product updates from the Trend Micro Web site. Register during installation, or online at

Trend Micro always seeks to improve its documentation. Your feedback is always welcome. Please evaluate this documentation on the following site:


  1. About Worry-Free Business Security
  2. What's New
  3. Document Set
  4. System Requirements
  5. Installation
  6. Post-installation Configuration
  7. Known Issues
  8. Contact Information
  9. About Trend Micro
  10. License Agreement

1. About Worry-Free Business Security

Trend Micro Worry-Free Business Security (WFBS) protects small business users and assets from data theft, identity theft, risky Web sites, and spam (Advanced Only).

Back to top

2. What's New

Worry-Free Business Security 9.5 has the following new features:

Back to top

3. Document Set

The Worry-Free Business Security Standard solution consists of an on-premise server (Security Server) and desktop protection software (Security Agent).

The Worry-Free Business Security Advanced solution consists of an on-premise server (Security Server), desktop protection software (Security Agent), and email protection software (Messaging Security Agent).

The documents for the Worry-Free Business Security Server include:

The latest versions of the documents are available at

Back to top

4. System Requirements

Visit the following website for a complete list of installation and upgrade requirements:

Back to top

5. Installation

See the Installation and Upgrade Guide for instructions on:

For instructions on installing the Security Agent, see the Administrator's Guide.


5.1. Inserting Contact Information (for Resellers and Partners)

Resellers and partners can add their contact information to the Security Server web console by performing the following steps:

  1. On the endpoint where the Security Server is installed, navigate to {Security Server installation folder}\PCCSRV\Private.

    {Security Server installation folder} is typically C:\Program Files\Trend Micro\Security Server.

  2. Open contact_info.ini using a text editor such as Notepad and then type the relevant contact information. Save the file.
  3. Log on to the Security Server web console and navigate to Preferences > Product License. A Reseller Information section is added to the Product License screen.

Back to top

6. Post-installation Configuration

See the post-installation tasks in the Installation and Upgrade Guide if you:

If you installed the Security Agent, see the agent post-installation tasks in the Administrator's Guide.

Back to top

7. Known Issues

The following are the known issues in this release:

Security Agent Deployment, Upgrade, and Usage

Note: For details about installation limitations on certain operating systems, see Security Agent Installation Methods in the Online Help.

  1. To completely reinstall or upgrade the Security Agent, you will need to restart the computer. A restart will also be necessary when updating some components, including the firewall and the proxy drivers.
  2. WFBS supports Remote Desktop, Remote Web Workplace, and Citrix server terminal applications.

    In a Terminal Services environment, administrators can decide whether to show or hide the Security Agent icon in the Windows task bar. This setting applies to all or none of the active user sessions. It is not possible to apply the setting to individual user sessions.

    If the icon shows on all active user sessions, memory usage may increase. To prevent this issue from occurring:

    1. On the Security Agent host, open the registry.
    2. Create/modify the following REG name/value pair:
  3. The manual scan process bar is not fully synchronized to Files scanned count based scan mechanism.

Security Server

  1. The following default Security Server and Scan Server ports must not be used or blocked by other applications, such as Microsoft ISA Server and other firewalls:
  2. If an Internet connection problem occurs during the Security Server installation, the installer will keep trying to validate the Activation Code without indicating any problem or the installer might freeze. A stable Internet connection is required during installation.
  3. During Security Server install/upgrade, Setup.exe or TrustedInstaller.exe may use up to 50% of CPU resources.

Web Console

  1. Trend Micro recommends setting Internet Explorer to Medium or lower security levels when accessing the web console. Higher security settings may block necessary ActiveX controls.

    By default, Internet Explorer applies Medium-low security levels for intranet sites and Medium security levels for sites in its Trusted Sites list. To help ensure you can access the console properly, add it to the Trusted Sites list.

  2. When opening the web console on certain platforms, the ActiveX publisher might appear as unknown because the signature of the certificate cannot be verified. Users can still click OK to proceed with the installation of ActiveX.

Web Reputation/URL Filtering

  1. Browser Exploit Prevention supports Internet Explorer versions 9, 10, and 11.
  2. In an unstable network environment, the Trend Micro Web Reputation server may pass a website without filtering.


  1. When uninstalling the firewall driver, the Security Agent could temporarily lose the network connection. Some applications, such as Secure Shell (SSH), Terminal Services Client, or Remote Desktop, could be affected by the disconnection. If this occurs, restart the application after disabling the firewall (which also completes the uninstallation process).
  2. The Security Agent firewall might conflict with other firewall applications. Trend Micro recommends uninstalling or disabling other firewall applications.
  3. On VMware clients, the Security Agent firewall may block all incoming packets. To address this issue, add the following value to the client's registry:

Messaging Security Agent

  1. The Messaging Security Agent only supports typical installations of Exchange Server 2010 and 2013 that include the Hub Transport, the Mailbox, and the Client Access server roles.
  2. Device Access Control for mobile devices is only supported for Exchange 2010 and 2013.
  3. During Messaging Security Agent installation, the installer may be unable to submit passwords that have special, non-alphanumeric characters to the Exchange Server computer. As a result, you may be unable to install the Messaging Security Agent if the domain administrator account you are using has a complex password. To work around this issue, temporarily change the password for the domain administrator account.
  4. When installing the Messaging Security Agent remotely, using the web console or the Worry-Free Business Security Advanced installer on an endpoint running Windows Server 2008, SBS 2008, EBS 2008, SBS 2011 Standard, 2008 R2, 2012, or 2012 R2, you need to specify the built-in domain administrator account because of User Access Control restrictions. Note that for endpoints running other operating systems, you need an account that is in the Exchange Organization Administrators group.

Mac Security

  1. Trend Micro Security (for Mac) becomes inaccessible after upgrading the Security Server from version 8.0 SP1 to 9.5.
  2. Trend Micro Security (for Mac) does not support server installations on Windows Server 2012 or 2012 R2 with domain controller role. This is due to a Microsoft limitation wherein you cannot run SQL Server services on a domain controller under a local service account or a network service account.

Note: For a list of all Trend Micro Security (for Mac) known issues, refer to the readme:

Back to top

8. Contact Information

A license to the Trend Micro software usually includes the right to product updates, pattern file updates, and basic technical support for one (1) year from the date of purchase only. After the first year, Maintenance must be renewed on an annual basis at Trend Micro's then-current Maintenance fees.

You can contact Trend Micro via fax, phone, and email, or visit us at

Evaluation copies of Trend Micro products can be downloaded from our Web site.

Global Mailing Address/Telephone numbers

For global contact information in the Asia/Pacific region, Australia and New Zealand, Europe, Latin America, and Canada, refer to

The Trend Micro "About Us" screen displays. Click the appropriate link in the "Contact Us" section of the screen.

Note: This information is subject to change without notice.

Back to top

9. About Trend Micro

Trend Micro Incorporated, a global leader in Internet content security and threat management, aims to create a world safe for the exchange of digital information for businesses and consumers. A pioneer in server-based antivirus with over 20 years experience, we deliver top-ranked security that fits our customers' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the Trend Micro™ Smart Protection Network™ infrastructure, our industry-leading cloud-computing security technology and products stop threats where they emerge, on the Internet, and are supported by 1,000+ threat intelligence experts around the globe. For additional information, visit

Copyright 2017, Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, TrendProtect, TrendSecure, Worry-Free, OfficeScan, ServerProtect, PC-cillin, InterScan, and ScanMail are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.

Back to top

10. License Agreement

Information about your license agreement with Trend Micro can be viewed at

Click here to view license attributions for this product.

Back to top