Trend Micro, Incorporated. |
December, 2010 |
This Readme file was current
as of the date above. All customers are advised to check the Trend Micro
download page for documentation updates at:
http://www.trendmicro.com/download/
1. About Client/Server Security Agent
2. What's New
5. Installation
6. Post-Installation Configuration
7. Known Issues
The Trend Micro Client/Server
Security Agent (CSA) is the endpoint component for the "Services"
edition of the Trend Micro Worry-Free Business Security package. It provides
desktop and server computers with centrally manageable protection against all
kinds of web threats, including viruses, spyware, data theft, messaging spam,
intrusions, and harmful Web sites.
· The Trend Micro Client/Server Security Agent (CSA) now uses the new version of the virus scan engine (VSAPI 9.205).
In addition to
this Readme, the documentation set for this product includes the following:
o Quick Start
Guide: Provides instructions to install/upgrade the
product and get started. It provides a description of the basic features and
default settings.
o User Guide: A comprehensive guide for configuring and maintaining the product.
o Online Help: Provides help topics for performing tasks.
o Knowledge Base: A searchable database of known product issues, including specific
problem-solving and troubleshooting topics.
http://esupport.trendmicro.com
Electronic
versions of the printed manuals are available at:
The following
table describes the minimum requirements for the Client/Server Security Agent
(CSA).
Note: Client/Server Security Agent supports Citrix Presentation
Server™ 4.0/4.5/5.0 and Remote Desktop.
Client/Server Security Agent supports VMware© ESX™ 3.0/3.5, VMware Server 1.0.3/2.0.1, VMware Workstation 6.0/6.5, and Microsoft Hyper-V™ Server 2008
Requirement |
Minimum Specifications |
|
Processor |
o Intel™ Pentium™ x86 or compatible processor o x64 processor supporting AMD64 and Intel EM64T technologies Clock speed requirements vary depending on the operating system: o Windows Server 2008, SBS 2008, or EBS 2008: 1GHz o Windows Vista, Windows 7: 800MHz o Windows 2000, SBS 2000, XP, Server 2003, SBS 2003, or Home Server: 450MHz |
|
Memory |
o Windows SBS 2008, EBS 2008: 4GB o Windows Server 2008, SBS 2000 or 2003: 1GB minimum; 2GB recommended o Windows 2000 Server, Server 2003, Home Server, Windows Vista, Windows 7: 512MB minimum; 1GB recommended o Windows 2000, Windows XP: 256MB minimum; 512MB recommended |
|
Disk space |
600 MB |
|
Operating system |
Series or Family |
Supported Service Packs or Releases |
Windows 2000 |
SP3 or SP4 |
|
Windows Small Business Server (SBS) 2000 |
No service pack or SP1a |
|
Windows XP Home |
SP2 or SP3 |
|
Windows XP Tablet PC |
SP2 or SP3 |
|
Windows XP |
SP2 or SP3 |
|
Windows Server 2003 R2 (with Storage Server 2003) |
SP1 or SP2 |
|
Windows Server 2003 (with Storage Server 2003) |
SP1 or SP2 |
|
Windows SBS 2003 R2 |
SP1 or SP2 |
|
Windows SBS 2003 |
SP1 or SP2 |
|
Windows Vista |
SP1 or SP2 |
|
Windows Home Server |
No service pack |
|
Windows Server 2008 R2 |
No service pack |
|
Windows Server 2008 |
SP1 or SP2 |
|
Windows SBS 2008 |
SP1 or SP2 |
|
Windows 2008 Foundation |
SP1 or SP2 |
|
Windows Essential Business Server (EBS) 2008 |
SP1 or SP2 |
|
Windows 7 |
No service pack |
|
Note: All major editions and 64-bit versions of these operating systems are supported unless noted otherwise. |
||
Web browser (for downloading the Agent Installer) |
Internet Explorer 7.0 or later |
|
Display |
256-color display or higher with resolution of 800x600 pixels or higher |
Trend Micro
recommends performing an update immediately after installation.
The following
issues have been identified in this release:
7.1.1. To completely reinstall or upgrade the CSA, you
will need to restart the computer. A restart will also be necessary when
updating some components including the firewall and the proxy drivers.
7.1.2. After installing the CSA on a computer with IIS
7.0, you must restart the IIS service. IIS 7.0 may not work as expected with
the CSA, which uses the Windows Filtering Platform, until IIS is restarted.
This issue only occurs on Microsoft Windows 2008 without service pack 2.
7.1.3. Some CSA components, such as the Trend Micro Web
Protection Add-On or the TrendProtect Toolbar, can be installed without the
CSA. These components may conflict with the CSA installation and must be
removed before the CSA is installed.
7.1.4. Real-time scan on CSA can prevent Hyper-V Manager
from creating virtual machines. If you encounter this issue, configure
real-time scan to exclude the storage folder for your virtual machines from
scanning. Hyper-V Manager uses "C:\ProgramData\Microsoft\Windows\Hyper-V" as the default storage folder, but a different folder may be
specified during virtual machine creation.
7.1.5. In environments such as distributed file systems,
scanning offline files causes unnecessary file recalls and can eventually lead
to performance issues. To avoid scanning offline files:
1.
Open the Windows registry
and navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\tmfilter\Parameters.
2.
Set the registry keys SkipOffLineFile and SkipSparseFile to 1.
For more information, refer to http://esupport.trendmicro.com/Pages/How-to-skip-offline-files-from-being-scanned.aspx
7.1.6. The WFBS-SVC_Downloader.exe file can only be run on the computer on which the
user downloads it. If a user copies the file to another computer and runs it
there, an error results.
7.1.7. Computer
loses network connection temporarily during installation.
7.1.8. Users cannot
successfully uninstall if the software Dropbox is installed on the same
computer.
7.2.1. On Windows
Vista/2008/7 guest operating systems running VMWare ESX 3.5 servers, PccNTmon
cannot render the CSA console correctly. The system hangs and eventually
crashes.
To prevent this issue:
1.
Click Start > Control Panel > Performance Information and Tools > Visual Effects.
2. Select Adjust
for best performance.
7.2.2. CSA self-protection
for Process and Registry Keys does not work on 64-bit platforms.
7.2.3. If Client
Security is set to High and a malware program resides in the CSA folder before
real-time scan starts, CSA cannot restrict that malware from updating the
registry.
7.2.4. If virus pattern or spyware active-monitoring pattern files are not
available to the CSA, the CSA will keep its current scan method until the
pattern is delivered.
7.3.1. During CSA installation or firewall driver
uninstallation, the computer may temporarily lose its network connection. Some
applications, such as Secure Shell (SSH), Terminal Services Client, or Remote
Desktop could be affected by the disconnection. If the network connection is
lost, restart the application after installing the CSA or after disabling the
firewall.
7.3.2. The CSA firewall may conflict with other firewall
applications. Trend Micro recommends uninstalling or disabling other firewall
applications.
7.3.3. On VMWare clients, the CSA firewall may block all
incoming packets.
To address
this issue, add the following value to the client's registry:
o Key: HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro\PC-cillinNTCorp\CurrentVersion\PFW
o Name: EnableBypassRule
o Type: REG_DWORD
o Data: 1
7.3.4. The firewall does not support IP version 6.
7.3.5. On Windows Vista, Windows 7, Windows Server 2008,
and Windows Server 2008 R2 computers, if the firewall is disabled and then
re-enabled, Firewall patterns fail to load. To fix this problem, restart the
affected computer.
7.4.1. After Transaction Protector scans a wireless access
point, it shows the "unchecked" status if a timeout occurs while
trying to connect to the access point.
7.4.2. Transaction Protector supports only:
o Windows XP SP2 32-bit
o Windows Vista and Vista SP1 (32-bit and 64-bit)
7.4.3. Transaction Protector does not support remote
administration software, such as Remote Desktop.
7.5.1. TrendProtect cannot start automatically when
installed for the first time on a computer with Internet Explorer 7.0 and
Windows XP. To manually enable TrendProtect, in Internet Explorer click View > Toolbars > TrendProtect.
7.5.2. TrendProtect supports only:
o Windows 2000 Professional
o Windows XP SP2 32-bit
o Windows Vista and Vista SP1 (32-bit and 64-bit)
Behavior
Monitoring supports only 32-bit operating systems; 64-bit operating systems are
not supported.
The Trend
Micro Anti-Spam Toolbar supports only:
o Windows XP SP2 32-bit
o Windows Vista and Vista SP1 (32-bit and 64-bit)
In
WFBS-SVC 3.5, the Client/Server Security Agent (CSA) does not support the
location awareness function; the “Current Location” information in “Security
Protection Status” on the Client console does not work.
In
WFBS-SVC 3.5, the Client/Server Security Agent (CSA) does not support the
Plug-in Manager function.
Previous
releases include the following:
Release |
Date |
WFBS-H v2.5 |
September 2008 |
WFBS-H v2.5 Sp1 |
February 2009 |
WFBS-H v2.5 Sp2 |
April 2009 |
WFBS-SVC v3.0 |
December 2009 |
WFBS-SVC v3.5 |
September 2010 |
WFBS-SVC v3.5 Sp1 |
November 2010 |
A license to the
Trend Micro software usually includes the right to product updates, pattern
file updates, and basic technical support for one (1) year from the date of
purchase only. After the first year, Maintenance must be renewed on an annual
basis at Trend Micro's then-current Maintenance fees.
You can contact
Trend Micro via fax, phone, and email, or visit us at:
Evaluation
copies of Trend Micro products can be downloaded from our Web site.
For global contact information in the
Asia/Pacific region, Australia and New Zealand, Europe, Latin America, and
Canada, refer to:
http://www.trendmicro.com/en/about/overview.htm
The Trend Micro "About Us" screen
displays. Click the appropriate link in the "Contact Us" section of
the screen.
Note: This information
is subject to change without notice.
Trend Micro
Incorporated, a global leader in Internet content security and threat
management, aims to create a world safe for the exchange of digital information
for businesses and consumers. A pioneer in server-based antivirus with over 20
years experience, we deliver top-ranked security that fits our customers’
needs, stops new threats faster, and protects data in physical, virtualized and
cloud environments. Powered by the Trend Micro Smart Protection Network(TM)
infrastructure, our industry-leading cloud-computing security technology and
products stop threats where they emerge, on the Internet, and are supported by
1,000+ threat intelligence experts around the globe. For additional
information, visit:
Copyright 2010,
Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro
t-ball logo, Worry-Free, TrendProtect, and InterScan are trademarks of Trend
Micro Incorporated and are registered in some jurisdictions. All other marks
are the trademarks or registered trademarks of their respective companies.
Information
about your license agreement with Trend Micro can be viewed at:
http://us.trendmicro.com/us/about/company/user_license_agreements/
Third-party
licensing agreements can be viewed:
·
By selecting the "About" option in the
application user interface
·
By referring to the "Legal" page of the
Getting Started Guide or Administrator's Guide