Procedure

  1. Select a source for the Setup program:
    • Trend Micro website
      1. Download IM Security from the Trend Micro website.
      2. Unzip the file to a temporary directory.
      3. Run setup.exe to install IM Security.
    • Trend Micro Enterprise Solution DVD
      1. Insert the DVD and follow the online instructions.
    The Welcome to Trend Micro IM Security for Microsoft Skype for Business Setup screen appears.
    00001-welcome.jpg
  2. Click Next to continue the installation.
    The License Agreement screen appears.
    00002-eula.jpg
  3. Click I accept the terms in the license agreement to agree to the terms of the agreement and continue installation. Click Next to continue.
    Note
    Note
    If you do not accept the terms, click I do not accept the terms in the license agreement. This terminates the installation without modifying your operating system.
    The Select an Action screen appears.
    00003-select-action-.jpg
  4. Select Perform a fresh installation of IM Security for Microsoft Skype for Business Server 1.6.5 to perform a fresh install. Click Next to continue.
    The Select Target Server(s) screen appears.
    00004-target-server-.jpg
  5. Select the computers to which you want to install IM Security.
    1. Perform one of the following:
      • Type the name of the server to which you want to install in the Computer name field and click Add to add the computers to the list of servers.
      • Click Browse and browse the computers that are available on your network, then double-click the computers you want to add to the list.
      • Click Remove to remove a server from the list.
    2. Click Next to save your list of target servers and continue the installation.
    Note
    Note
    The Setup program can install IM Security to a number of single servers or to all the computers in a domain. Use an account with the appropriate privileges to access every target server. This version of IM Security supports IPv6.
    The Log On screen appears.
    00005-log-on-any-ins.bmp
  6. Log on to the target servers where you want to install IM Security. Use an account with Domain User and Local Administrator privileges. Type the user name and password to log on to the target server to install IM Security. Click Next to continue.
    The Configure Shared/Target Directory screen appears.
    00006-shared-directo.jpg
  7. Type the directory share name for which the specified user has access rights or keep the default temporary share directory, C$. The Setup program uses the shared directory to copy temporary files during installation and is only accessible to the administrator. Select Default path or Specify path and type the directory path on the target server where you will install IM Security. Click Next to continue.
    The Web Server Information screen appears.
    00007-web-server-any.bmp
  8. Select IIS Default Web Site or Virtual Web Site. Next to Port number type the port to use as a listening port for this server. You also have the option of enabling Secure Socket Layer (SSL) security. Select Enable SSL check box to use this feature. Click Next to continue.
    The Target Server System Requirements Checking screen appears.
    00008-target-req-fre.jpg
  9. Review the settings.
    1. To install IM Security on a remote SQL server, click the virtual server on which to install IM Security data files.
      The SQL Server Selection screen appears.
      00009-sql-any-instal.jpg
    2. Select one of the following:
      • Select Install SQL Server 2014 Express to install SQL Server 2014 Express on the local computer.
      • Select Specify an existing SQL server to use an existing database server. Type the SQL server name, SQL server account, and password.
        Note
        Note
        Using a centralized SQL server for IM Security data storage increases the risk of a single point of failure and reduction in performance. Ensure that steps are taken for a high-availability remote SQL server.
    3. Click OK.
      The Checking SQL Server Database screen appears.
    4. Check that the user name and password are correct. Click Next.
      The Connection Settings screen appears.
      00010-connection-set.jpg
  10. If a proxy server handles Internet traffic on your network, select Use a proxy server and then type the proxy hostname or address and port number that your proxy uses. By default, the proxy server is disabled. If you want to use SOCKS 5 for secure communication behind the proxy, select SOCKS 5. If your proxy requires authentication, type the user name and password used for authentication. Click Next to continue.
    The Product Activation screen appears.
    00011-prod-activatio.jpg
  11. Type the activation code. Click Next.
    Note
    Note
    You can copy an Activation Code and paste it in the input field of the Activation Code on this screen.
    The Control Manager Server Settings screen appears.
    00013-control-manage.jpg
  12. Specify the Control Manager server settings and specify the proxy server settings if you use a proxy server between your IM Security server and Control Manager server. Click Next to continue.
    The Email Notification Settings screen appears.
    00014-email-notific-.jpg
  13. Specify the SMTP server settings that IM Security uses when sending email-based notifications. Click Next to continue.
    Tip
    Tip
    You can configure the SMTP server settings after the installation completes through the web console on the Administrator Notification screen (AdministrationNotification Settings).
    The Review Settings screen appears.
    00015-review-fresh-i.bmp
  14. Review your settings and select the Update pattern files when installation is complete check box if you want to update pattern files immediately after installation. Click Next to continue.
    The Installation Progress screen appears.
    00016-progress-any-i.jpg
  15. Click View details to display a list of each computer to which you are installing IM Security and the status of each computer. Click Next when the installation completes.
    Note
    Note
    IM Security installs Microsoft™ SQL Server 2014 Express for logs and reports on 64-bit computers. IM Security sets the Microsoft SQL Server 2014 Express security level to the highest.
    The Installation Complete screen appears.
    00017-complete-fresh.jpg
  16. This screen informs you that the installation was successful. Click Finish to exit the Setup program and the Readme file displays.
  17. Use an administrator account with local administrator privileges to log on to the IM Security product console.