Trend Micro, Incorporated.

                      December, 2010

Trend Micro™ Client/Server Security Agent for
Worry-Free Business Security Services 3.5 SP2

This Readme file was current as of the date above. All customers are advised to check the Trend Micro download page for documentation updates at:

http://www.trendmicro.com/download/

 

Contents

1.     About Client/Server Security Agent

2.     What's New

3.     Documentation Set

4.     System Requirements

5.     Installation

6.     Post-Installation Configuration

7.     Known Issues

8.     Release History

9.     Contact Information

10.  About Trend Micro

11.  License Agreement

1. About Client/Server Security Agent

The Trend Micro Client/Server Security Agent (CSA) is the endpoint component for the "Services" edition of the Trend Micro Worry-Free Business Security package. It provides desktop and server computers with centrally manageable protection against all kinds of web threats, including viruses, spyware, data theft, messaging spam, intrusions, and harmful Web sites.

2. What's New

·         The Trend Micro Client/Server Security Agent (CSA) now uses the new version of the virus scan engine (VSAPI 9.205).

3. Documentation Set

In addition to this Readme, the documentation set for this product includes the following:

o    Quick Start Guide: Provides instructions to install/upgrade the product and get started. It provides a description of the basic features and default settings.

o    User Guide: A comprehensive guide for configuring and maintaining the product.

o    Online Help: Provides help topics for performing tasks.

o    Knowledge Base: A searchable database of known product issues, including specific problem-solving and troubleshooting topics.

http://esupport.trendmicro.com

Electronic versions of the printed manuals are available at:

http://www.trendmicro.com/download/

4. System Requirements

The following table describes the minimum requirements for the Client/Server Security Agent (CSA).

Note: Client/Server Security Agent supports Citrix Presentation Server™ 4.0/4.5/5.0 and Remote Desktop.

Client/Server Security Agent supports VMware© ESX™ 3.0/3.5, VMware Server 1.0.3/2.0.1, VMware Workstation 6.0/6.5, and Microsoft Hyper-V™ Server 2008

Requirement

Minimum Specifications

Processor

o    Intel™ Pentium™ x86 or compatible processor

o    x64 processor supporting AMD64 and Intel EM64T technologies

Clock speed requirements vary depending on the operating system:

o    Windows Server 2008, SBS 2008, or EBS 2008: 1GHz

o    Windows Vista, Windows 7: 800MHz

o    Windows 2000, SBS 2000, XP, Server 2003, SBS 2003, or Home Server: 450MHz

Memory

o    Windows SBS 2008, EBS 2008: 4GB

o    Windows Server 2008, SBS 2000 or 2003: 1GB minimum; 2GB recommended

o    Windows 2000 Server, Server 2003, Home Server, Windows Vista, Windows 7: 512MB minimum; 1GB recommended

o    Windows 2000, Windows XP: 256MB minimum; 512MB recommended

Disk space

600 MB

Operating system

Series or Family

Supported Service Packs or Releases

Windows 2000

SP3 or SP4

Windows Small Business Server (SBS) 2000

No service pack or SP1a

Windows XP Home

SP2 or SP3

Windows XP Tablet PC

SP2 or SP3

Windows XP

SP2 or SP3

Windows Server 2003 R2 (with Storage Server 2003)

SP1 or SP2

Windows Server 2003 (with Storage Server 2003)

SP1 or SP2

Windows SBS 2003 R2

SP1 or SP2

Windows SBS 2003

SP1 or SP2

Windows Vista

SP1 or SP2

Windows Home Server

No service pack

Windows Server 2008 R2

No service pack

Windows Server 2008

SP1 or SP2

Windows SBS 2008

SP1 or SP2

Windows 2008 Foundation

SP1 or SP2

Windows Essential Business Server (EBS) 2008

SP1 or SP2

Windows 7

No service pack

Note: All major editions and 64-bit versions of these operating systems are supported unless noted otherwise.

Web browser (for downloading the Agent Installer)

Internet Explorer 7.0 or later

Display

256-color display or higher with resolution of 800x600 pixels or higher

5. Installation

Refer to the User Guide for information about deploying the CSA.

6. Post-Installation Configuration

Trend Micro recommends performing an update immediately after installation.

7. Known Issues

The following issues have been identified in this release:

7.1. Client Deployment and Upgrade

7.1.1. To completely reinstall or upgrade the CSA, you will need to restart the computer. A restart will also be necessary when updating some components including the firewall and the proxy drivers.

7.1.2. After installing the CSA on a computer with IIS 7.0, you must restart the IIS service. IIS 7.0 may not work as expected with the CSA, which uses the Windows Filtering Platform, until IIS is restarted. This issue only occurs on Microsoft Windows 2008 without service pack 2.

7.1.3. Some CSA components, such as the Trend Micro Web Protection Add-On or the TrendProtect Toolbar, can be installed without the CSA. These components may conflict with the CSA installation and must be removed before the CSA is installed.

7.1.4. Real-time scan on CSA can prevent Hyper-V Manager from creating virtual machines. If you encounter this issue, configure real-time scan to exclude the storage folder for your virtual machines from scanning. Hyper-V Manager uses "C:\ProgramData\Microsoft\Windows\Hyper-V" as the default storage folder, but a different folder may be specified during virtual machine creation.

7.1.5. In environments such as distributed file systems, scanning offline files causes unnecessary file recalls and can eventually lead to performance issues. To avoid scanning offline files:

1.    Open the Windows registry and navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\tmfilter\Parameters.

2.    Set the registry keys SkipOffLineFile and SkipSparseFile to 1.

For more information, refer to http://esupport.trendmicro.com/Pages/How-to-skip-offline-files-from-being-scanned.aspx

7.1.6. The WFBS-SVC_Downloader.exe file can only be run on the computer on which the user downloads it. If a user copies the file to another computer and runs it there, an error results.

7.1.7. Computer loses network connection temporarily during installation.

7.1.8. Users cannot successfully uninstall if the software Dropbox is installed on the same computer.

7.2. Client Security Agent

7.2.1. On Windows Vista/2008/7 guest operating systems running VMWare ESX 3.5 servers, PccNTmon cannot render the CSA console correctly. The system hangs and eventually crashes.

To prevent this issue:

1.     Click Start > Control Panel > Performance Information and Tools > Visual Effects.

2.      Select Adjust for best performance.

7.2.2. CSA self-protection for Process and Registry Keys does not work on 64-bit platforms.

7.2.3. If Client Security is set to High and a malware program resides in the CSA folder before real-time scan starts, CSA cannot restrict that malware from updating the registry.

7.2.4. If virus pattern or spyware active-monitoring pattern files are not available to the CSA, the CSA will keep its current scan method until the pattern is delivered.

7.3. Firewall

7.3.1. During CSA installation or firewall driver uninstallation, the computer may temporarily lose its network connection. Some applications, such as Secure Shell (SSH), Terminal Services Client, or Remote Desktop could be affected by the disconnection. If the network connection is lost, restart the application after installing the CSA or after disabling the firewall.

7.3.2. The CSA firewall may conflict with other firewall applications. Trend Micro recommends uninstalling or disabling other firewall applications.

7.3.3. On VMWare clients, the CSA firewall may block all incoming packets.

To address this issue, add the following value to the client's registry:

o    Key: HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro\PC-cillinNTCorp\CurrentVersion\PFW

o    Name: EnableBypassRule

o    Type: REG_DWORD

o    Data: 1

7.3.4. The firewall does not support IP version 6.

7.3.5. On Windows Vista, Windows 7, Windows Server 2008, and Windows Server 2008 R2 computers, if the firewall is disabled and then re-enabled, Firewall patterns fail to load. To fix this problem, restart the affected computer.

7.4. Transaction Protector

7.4.1. After Transaction Protector scans a wireless access point, it shows the "unchecked" status if a timeout occurs while trying to connect to the access point.

7.4.2. Transaction Protector supports only:

o    Windows XP SP2 32-bit

o    Windows Vista and Vista SP1 (32-bit and 64-bit)

7.4.3. Transaction Protector does not support remote administration software, such as Remote Desktop.

7.5. TrendProtect™

7.5.1. TrendProtect cannot start automatically when installed for the first time on a computer with Internet Explorer 7.0 and Windows XP. To manually enable TrendProtect, in Internet Explorer click View > Toolbars > TrendProtect.

7.5.2. TrendProtect supports only:

o    Windows 2000 Professional

o    Windows XP SP2 32-bit

o    Windows Vista and Vista SP1 (32-bit and 64-bit)

7.6. Behavior Monitoring

Behavior Monitoring supports only 32-bit operating systems; 64-bit operating systems are not supported.

7.7. Trend Micro Anti-Spam Toolbar

The Trend Micro Anti-Spam Toolbar supports only:

o    Windows XP SP2 32-bit

o    Windows Vista and Vista SP1 (32-bit and 64-bit)

7.8. Location Awareness

In WFBS-SVC 3.5, the Client/Server Security Agent (CSA) does not support the location awareness function; the “Current Location” information in “Security Protection Status” on the Client console does not work.

7.9. Plug-in Manager

In WFBS-SVC 3.5, the Client/Server Security Agent (CSA) does not support the Plug-in Manager function.

8. Release History

Previous releases include the following:

Release

Date

WFBS-H v2.5

September 2008

WFBS-H v2.5 Sp1

February 2009

WFBS-H v2.5 Sp2

April 2009

WFBS-SVC v3.0

December 2009

WFBS-SVC v3.5

September 2010

WFBS-SVC v3.5 Sp1

November 2010

9. Contact Information

A license to the Trend Micro software usually includes the right to product updates, pattern file updates, and basic technical support for one (1) year from the date of purchase only. After the first year, Maintenance must be renewed on an annual basis at Trend Micro's then-current Maintenance fees.

You can contact Trend Micro via fax, phone, and email, or visit us at:

http://www.trendmicro.com

Evaluation copies of Trend Micro products can be downloaded from our Web site.

Global Mailing Address/Telephone Numbers

   For global contact information in the Asia/Pacific region, Australia and New Zealand, Europe, Latin America, and Canada, refer to:

   http://www.trendmicro.com/en/about/overview.htm

   The Trend Micro "About Us" screen displays. Click the appropriate link in the "Contact Us" section of the screen.

Note: This information is subject to change without notice.

10. About Trend Micro

Trend Micro Incorporated, a global leader in Internet content security and threat management, aims to create a world safe for the exchange of digital information for businesses and consumers. A pioneer in server-based antivirus with over 20 years experience, we deliver top-ranked security that fits our customers’ needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the Trend Micro Smart Protection Network(TM) infrastructure, our industry-leading cloud-computing security technology and products stop threats where they emerge, on the Internet, and are supported by 1,000+ threat intelligence experts around the globe. For additional information, visit:

http://www.trendmicro.com

Copyright 2010, Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, Worry-Free, TrendProtect, and InterScan are trademarks of Trend Micro Incorporated and are registered in some jurisdictions. All other marks are the trademarks or registered trademarks of their respective companies.

11. License Agreement

Information about your license agreement with Trend Micro can be viewed at:

http://us.trendmicro.com/us/about/company/user_license_agreements/

Third-party licensing agreements can be viewed:

·         By selecting the "About" option in the application user interface

·         By referring to the "Legal" page of the Getting Started Guide or Administrator's Guide