You’re offline. This is a read only version of the page.
Online Help Center
Search
Support
For Home
For Business
English (US)
Bahasa Indonesia (Indonesian)
Dansk (Danish)
Deutsch (German)
English (Australia)
English (US)
Español (Spanish)
Français (French)
Français Canadien
(Canadian French)
Italiano (Italian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português - Brasil
(Portuguese - Brazil)
Português - Portugal
(Portuguese - Portugal)
Svenska (Swedish)
ภาษาไทย (Thai)
Tiếng Việt (Vietnamese)
Türkçe (Turkish)
Čeština (Czech)
Ελληνικά (Greek)
Български (Bulgarian)
Русский (Russian)
עברית (Hebrew)
اللغة العربية (Arabic)
日本語 (Japanese)
简体中文
(Simplified Chinese)
繁體中文
(Traditional Chinese)
繁體中文 HK
(Traditional Chinese)
한국어 (Korean)
Cancel
This website uses cookies for website functionality and traffic analytics. Our Cookie Notice provides more information and explains how to amend your cookie settings.
Learn More
Yes, I agree
Table of Contents
The page you're looking for can't be found or is under maintenance
Try again later or go to the home page
Go to home page
Preface
IM Security Documentation
Audience
Document Conventions
Introducing Trend Micro IM Security
IM Security Overview
Features and Benefits
File and Instant Messaging Protection
Communication Control
Virus Scan
File Blocking
Content Filtering
Web Reputation
Data Loss Prevention
Reports and Logs
Alerts and Notifications
Protection Strategy
IM Security and Lync/Skype for Business Server Deployment Scenarios
Standard Edition Configuration
Enterprise Edition: Consolidated Configuration
Enterprise Edition: Expanded Configuration
Pre-Installation Tasks
Planning for Deployment
Phase 1: Plan the Deployment
Phase 2: Install IM Security
Phase 3: Manage IM Security
Deployment Considerations
Conducting a Pilot Deployment
Choosing a Pilot Site
Creating a Contingency Plan
Deploying and Evaluating a Pilot Deployment
Redefining the Deployment Strategy
System Requirements
Pre-Installation Tasks
Installing and Upgrading IM Security
Installing IM Security
Upgrading IM Security
Silent Installation
About Silent Installation
Silent Installation Limitations
Performing Silent Installation
Using an Existing Pre-Configured File
Post-Installation Tasks
Verify Server Changes
Prepare Other Antivirus Applications
About the IM Security Management Pack
Verifying a Successful Installation
Checking Default Settings
About IM Security Updates
Updating IM Security - Prerequisite Tasks
Configuring Proxy Settings
Configuring Manual Updates
Configuring Scheduled Update
Configuring the Download Source
Removing IM Security
IM Security Uninstallation
Using the Enterprise Solution DVD
Using the Windows Control Panel
Technical Support
Troubleshooting Resources
Using the Support Portal
Threat Encyclopedia
Contacting Trend Micro
Speeding Up the Support Call
Sending Suspicious Content to Trend Micro
Email Reputation Services
File Reputation Services
Web Reputation Services
Other Resources
Download Center
Documentation Feedback
Deployment Checklist
Pre-Installation Tasks Checklist
Installation Checklist
Ports Checklist
Glossary
Troubleshooting Resources
Before contacting technical support, consider visiting the following Trend Micro online resources.
Related information
Using the Support Portal
Threat Encyclopedia
Table of Contents
Preface
IM Security Documentation
Audience
Document Conventions
Introducing Trend Micro IM Security
IM Security Overview
Features and Benefits
File and Instant Messaging Protection
Communication Control
Virus Scan
File Blocking
Content Filtering
Web Reputation
Data Loss Prevention
Reports and Logs
Alerts and Notifications
Protection Strategy
IM Security and Lync/Skype for Business Server Deployment Scenarios
Standard Edition Configuration
Enterprise Edition: Consolidated Configuration
Enterprise Edition: Expanded Configuration
Pre-Installation Tasks
Planning for Deployment
Phase 1: Plan the Deployment
Phase 2: Install IM Security
Phase 3: Manage IM Security
Deployment Considerations
Conducting a Pilot Deployment
Choosing a Pilot Site
Creating a Contingency Plan
Deploying and Evaluating a Pilot Deployment
Redefining the Deployment Strategy
System Requirements
Pre-Installation Tasks
Installing and Upgrading IM Security
Installing IM Security
Upgrading IM Security
Silent Installation
About Silent Installation
Silent Installation Limitations
Performing Silent Installation
Using an Existing Pre-Configured File
Post-Installation Tasks
Verify Server Changes
Prepare Other Antivirus Applications
About the IM Security Management Pack
Verifying a Successful Installation
Checking Default Settings
About IM Security Updates
Updating IM Security - Prerequisite Tasks
Configuring Proxy Settings
Configuring Manual Updates
Configuring Scheduled Update
Configuring the Download Source
Removing IM Security
IM Security Uninstallation
Using the Enterprise Solution DVD
Using the Windows Control Panel
Technical Support
Troubleshooting Resources
Using the Support Portal
Threat Encyclopedia
Contacting Trend Micro
Speeding Up the Support Call
Sending Suspicious Content to Trend Micro
Email Reputation Services
File Reputation Services
Web Reputation Services
Other Resources
Download Center
Documentation Feedback
Deployment Checklist
Pre-Installation Tasks Checklist
Installation Checklist
Ports Checklist
Glossary