You’re offline. This is a read only version of the page.
Online Help Center
Search
Support
For Home
For Business
English (US)
Bahasa Indonesia (Indonesian)
Dansk (Danish)
Deutsch (German)
English (Australia)
English (US)
Español (Spanish)
Français (French)
Français Canadien
(Canadian French)
Italiano (Italian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português - Brasil
(Portuguese - Brazil)
Português - Portugal
(Portuguese - Portugal)
Svenska (Swedish)
ภาษาไทย (Thai)
Tiếng Việt (Vietnamese)
Türkçe (Turkish)
Čeština (Czech)
Ελληνικά (Greek)
Български (Bulgarian)
Русский (Russian)
עברית (Hebrew)
اللغة العربية (Arabic)
日本語 (Japanese)
简体中文
(Simplified Chinese)
繁體中文
(Traditional Chinese)
繁體中文 HK
(Traditional Chinese)
한국어 (Korean)
Cancel
This website uses cookies for website functionality and traffic analytics. Our Cookie Notice provides more information and explains how to amend your cookie settings.
Learn More
Yes, I agree
Table of Contents
The page you're looking for can't be found or is under maintenance
Try again later or go to the home page
Go to home page
Introducing Worry-Free Business Security Standard and Advanced
Overview of Trend Micro Worry-Free Business Security
New in this Release
Key Features and Benefits
Trend Micro Smart Protection Network
File Reputation Services
Web Reputation Services
Email Reputation (Advanced only)
Smart Feedback
URL Filtering
Benefits of Protection
Understanding Threats
Viruses and Malware
Spyware and Grayware
Spam
Intrusions
Malicious Behavior
Fake Access Points
Phishing Incidents
Mass Mailing Attacks
Web Threats
Getting Started
The Worry-Free Business Security Network
Security Server
Scan Server
Agents
Web Console
Opening the Web Console
Web Console Navigation
Web Console Icons
Installing Agents
Security Agent Installation
Security Agent Installation Requirements
Security Agent Installation Considerations
Available Security Agent Features
Security Agent Installation and IPv6 Support
Security Agent Installation Methods
Installing from the Internal Web Page
Installing with Login Script Setup
Installing with Client Packager
Installing with Remote Install
Installing with Vulnerability Scanner
Running a Manual Vulnerability Scan
Running a DHCP Scan
Configuring a Scheduled Vulnerability Scan
Vulnerability Scan Settings
Installing with Email Notification
Migrating to the Security Agent
Performing Post-installation Tasks on Security Agents
Messaging Security Agent Installation
Messaging Security Agent Installation Requirements
Installing the Messaging Security Agent (Advanced only)
Removing Agents
Removing Agents from the Web Console
Uninstalling Agents from the Web Console
Uninstalling the Security Agent from the Endpoint
Uninstalling the Messaging Security Agent from the Microsoft Exchange Server (Advanced Only)
Managing Devices
Using the Device Tree
Using the Device Commands
Adding Agents to Groups
Adding Groups
Customizing Device List Columns
Moving Agents
Moving Security Agents Between Groups
Moving Agents Between Security Servers Using the Web Console
Moving a Security Agent Between Security Servers Using Client Mover
Replicating Settings
Replicating Security Agent Group Settings
Replicating Messaging Security Agent Settings (Advanced Only)
Importing and Exporting the Settings of Security Agent Groups
Exporting Settings
Importing Settings
Managing Basic Security Settings for Security Agents
Summary of Basic Security Settings for Security Agents
Scan Methods
Configuring Scan Methods
Real-time Scan for Security Agents
Configuring Real-time Scan for Security Agents
Predictive Machine Learning
Configuring Predictive Machine Learning
Behavior Monitoring
Configuring Behavior Monitoring
Supported Environment Variables
Trusted Program
Configuring Trusted Program
Quarantine Directory
Configuring the Quarantine Directory
Web Reputation
Configuring Web Reputation for Security Agents
URL Filtering
Configuring URL Filtering
Approved/Blocked URLs
Configuring Approved/Blocked URLs
Firewall
Configuring the Firewall
Working with Firewall Exceptions
Disabling the Firewall on a Group of Agents
Disabling the Firewall on All Agents
Device Control
Configuring Device Control
User Tools
Configuring User Tools
Agent Privileges
Configuring Agent Privileges
Managing Basic Security Settings for Messaging Security Agents (Advanced Only)
Messaging Security Agents
How the Messaging Security Agent Scans Email Messages
Default Messaging Security Agent Settings
Real-Time Scan for Messaging Security Agents
Configuring Real-time Scan for Messaging Security Agents
Anti-Spam
Email Reputation
Configuring Email Reputation
Content Scanning
Configuring Content Scanning
Approved and Blocked Senders Lists
Content Filtering
Managing Content Filtering Rules
Types of Content Filtering Rules
Adding a Content Filtering Rule for All Matching Conditions
Adding a Content Filtering Rule for Any Matching Condition
Adding a Content Filtering Monitoring Rule
Creating Exceptions to Content Filtering Rules
Data Loss Prevention
Preparatory Work
Managing Data Loss Prevention Rules
Default Data Loss Prevention Rules
Adding Data Loss Prevention Rules
Attachment Blocking
Configuring Attachment Blocking
Web Reputation
Configuring Web Reputation for Messaging Security Agents
Mobile Security
Mobile Security Support
Configuring Device Access Control
Cancelling a Pending Device Wipe
Manually Wiping Devices
Configuring Security Policies
Password Complexity Requirements
Quarantine for Messaging Security Agents
Querying Quarantine Directories
Viewing Query Results and Taking Action
Maintaining Quarantine Directories
Configuring Quarantine Directories
Notification Settings for Messaging Security Agents
Configuring Notification Settings for Messaging Security Agents
Configuring Spam Maintenance
Managing the End User Quarantine
Trend Micro Support/Debugger
Generating System Debugger Reports
Real-time Monitor
Working with Real-time Monitor
Adding a Disclaimer to Outbound Email Messages
Managing Scans
About Scans
Real-time Scan
Manual Scan
Running Manual Scans
Scheduled Scan
Configuring Scheduled Scans
Scan Targets and Actions for Security Agents
Scan Targets and Actions for Messaging Security Agents
Managing Updates
Update Overview
Updatable Components
Hot Fixes, Patches, and Service Packs
Security Server Updates
Configuring the Security Server Update Source
Updating the Security Server Manually
Configuring Scheduled Updates for the Security Server
Rolling Back Components
Security Agent and Messaging Security Agent Updates
Automatic Updates
Running a Manual Update
Agent Update Reminders and Tips
Update Agents
Configuring Update Agents
Using Live Status
Live Status
Action Center
Antivirus: Threats Unresolved
Antivirus: Real-time Scan Disabled on Endpoints
Antivirus: Real-time Scan Disabled on Exchange Server(s)
Anti-spyware: Detections Requiring Device Restart
Resource Shortage - Remaining Disk Space
Update: Outdated Agents
Update - Outdated Messaging Security Agents
Security Risk Detections Over Time
Security Risk Detections: Virus/Malware
Security Risk Detections: Spyware/Grayware
Security Risk Detections: Web Reputation
Security Risk Detections: Network Virus
Security Risk Detections: Behavior Monitoring
Security Risk Detections: Predictive Machine Learning
Security Risk Detections: Predictive Machine Learning Details
Security Risk Detections: URL Filtering
Security Risk Detections: Device Control
Ransomware Summary
Ransomware Summary Logs
Ransomware: Behavior Monitoring Log Details
Ransomware: URL Filtering Log Details
Ransomware: Virus Log Details
Ransomware: Web Reputation Log Details
License Status
Exchange Server Summary
Agent Status
Managing Notifications
Using Notifications
Configuring Events for Notifications
Token Variables
Managing Global Settings
Global Settings
Configuring Internet Proxy Settings
Configuring SMTP Server Settings
Configuring Desktop/Server Settings
Configuring System Settings
Configuring Exception List Settings
Using Logs and Reports
Logs
Using Log Query
Reports
Working with One-time Reports
Working with Scheduled Reports
Interpreting Reports
Performing Maintenance Tasks for Reports and Logs
Performing Administrative Tasks
Changing the Web Console Password
Working with Plug-in Manager
Managing the Product License
Configuring Product Update Settings
Configuring Product Update Notifications
Participating in the Smart Feedback Program
Changing the Agent’s Interface Language
Saving and Restoring Program Settings
Uninstalling the Security Server
Using Management Tools
Tool Types
Trend Micro Remote Manager Agent
Installing the Trend Micro Remote Manager Agent (Customer Licensing Portal Users)
Installing the Trend Micro Remote Manager Agent (Licensing Management Platform Users)
Managing Agents from the Managed Server
Agent Status Messages
Changing the Agent GUID on the Managed Server
Using the Agent Configuration Tool
Agent Configuration
Backing Up and Restoring Agent Settings
Backing Up Settings
Restoring Settings
Saving Disk Space
Running Disk Cleaner on the Security Server
Running Disk Cleaner on the Security Server Using the Command Line Interface
Saving Disk Space on Clients
Moving the Scan Server Database
Restoring Encrypted Files
Decrypting and Restoring Files on the Security Agent
Decrypting and Restoring Files on the Security Server, Custom Quarantine Directory, or Messaging Security Agent
Restoring Transport Neutral Encapsulation Format Email Messages
Using the ReGenID Tool
Managing SBS and EBS Add-ins
Installing the SBS and EBS Add-ins Manually
Using the SBS or EBS Add-ins
Security Agent Icons
Checking the Security Agent Status
Viewing Security Agent Icons on the Windows Task Bar
Accessing the Console Flyover
IPv6 Support in Worry-Free Business Security
IPv6 Support for Worry-Free Business Security and Security Agents
Security Server IPv6 Requirements
Messaging Security Agent Requirements
Pure IPv6 Server Limitations
Pure IPv6 Security Agent Limitations
Configuring IPv6 Addresses
Screens That Display IP Addresses
Technical support
Troubleshooting resources
Using the support portal
Threat encyclopedia
Contacting Trend Micro
Speeding up the support call
Sending suspicious content to Trend Micro
Email Reputation Services
File Reputation Services
Web Reputation Services
Other resources
Download center
Product Terminology and Concepts
Critical Patch
Hot Fix
IntelliScan
IntelliTrap
Intrusion Detection System
Keywords
Patch
Regular Expressions
Scan Exclusion Lists
Service Pack
Trojan Port
Uncleanable Files
Using Live Status
Live Status
Table of Contents
Introducing Worry-Free Business Security Standard and Advanced
Overview of Trend Micro Worry-Free Business Security
New in this Release
Key Features and Benefits
Trend Micro Smart Protection Network
File Reputation Services
Web Reputation Services
Email Reputation (Advanced only)
Smart Feedback
URL Filtering
Benefits of Protection
Understanding Threats
Viruses and Malware
Spyware and Grayware
Spam
Intrusions
Malicious Behavior
Fake Access Points
Phishing Incidents
Mass Mailing Attacks
Web Threats
Getting Started
The Worry-Free Business Security Network
Security Server
Scan Server
Agents
Web Console
Opening the Web Console
Web Console Navigation
Web Console Icons
Installing Agents
Security Agent Installation
Security Agent Installation Requirements
Security Agent Installation Considerations
Available Security Agent Features
Security Agent Installation and IPv6 Support
Security Agent Installation Methods
Installing from the Internal Web Page
Installing with Login Script Setup
Installing with Client Packager
Installing with Remote Install
Installing with Vulnerability Scanner
Running a Manual Vulnerability Scan
Running a DHCP Scan
Configuring a Scheduled Vulnerability Scan
Vulnerability Scan Settings
Installing with Email Notification
Migrating to the Security Agent
Performing Post-installation Tasks on Security Agents
Messaging Security Agent Installation
Messaging Security Agent Installation Requirements
Installing the Messaging Security Agent (Advanced only)
Removing Agents
Removing Agents from the Web Console
Uninstalling Agents from the Web Console
Uninstalling the Security Agent from the Endpoint
Uninstalling the Messaging Security Agent from the Microsoft Exchange Server (Advanced Only)
Managing Devices
Using the Device Tree
Using the Device Commands
Adding Agents to Groups
Adding Groups
Customizing Device List Columns
Moving Agents
Moving Security Agents Between Groups
Moving Agents Between Security Servers Using the Web Console
Moving a Security Agent Between Security Servers Using Client Mover
Replicating Settings
Replicating Security Agent Group Settings
Replicating Messaging Security Agent Settings (Advanced Only)
Importing and Exporting the Settings of Security Agent Groups
Exporting Settings
Importing Settings
Managing Basic Security Settings for Security Agents
Summary of Basic Security Settings for Security Agents
Scan Methods
Configuring Scan Methods
Real-time Scan for Security Agents
Configuring Real-time Scan for Security Agents
Predictive Machine Learning
Configuring Predictive Machine Learning
Behavior Monitoring
Configuring Behavior Monitoring
Supported Environment Variables
Trusted Program
Configuring Trusted Program
Quarantine Directory
Configuring the Quarantine Directory
Web Reputation
Configuring Web Reputation for Security Agents
URL Filtering
Configuring URL Filtering
Approved/Blocked URLs
Configuring Approved/Blocked URLs
Firewall
Configuring the Firewall
Working with Firewall Exceptions
Disabling the Firewall on a Group of Agents
Disabling the Firewall on All Agents
Device Control
Configuring Device Control
User Tools
Configuring User Tools
Agent Privileges
Configuring Agent Privileges
Managing Basic Security Settings for Messaging Security Agents (Advanced Only)
Messaging Security Agents
How the Messaging Security Agent Scans Email Messages
Default Messaging Security Agent Settings
Real-Time Scan for Messaging Security Agents
Configuring Real-time Scan for Messaging Security Agents
Anti-Spam
Email Reputation
Configuring Email Reputation
Content Scanning
Configuring Content Scanning
Approved and Blocked Senders Lists
Content Filtering
Managing Content Filtering Rules
Types of Content Filtering Rules
Adding a Content Filtering Rule for All Matching Conditions
Adding a Content Filtering Rule for Any Matching Condition
Adding a Content Filtering Monitoring Rule
Creating Exceptions to Content Filtering Rules
Data Loss Prevention
Preparatory Work
Managing Data Loss Prevention Rules
Default Data Loss Prevention Rules
Adding Data Loss Prevention Rules
Attachment Blocking
Configuring Attachment Blocking
Web Reputation
Configuring Web Reputation for Messaging Security Agents
Mobile Security
Mobile Security Support
Configuring Device Access Control
Cancelling a Pending Device Wipe
Manually Wiping Devices
Configuring Security Policies
Password Complexity Requirements
Quarantine for Messaging Security Agents
Querying Quarantine Directories
Viewing Query Results and Taking Action
Maintaining Quarantine Directories
Configuring Quarantine Directories
Notification Settings for Messaging Security Agents
Configuring Notification Settings for Messaging Security Agents
Configuring Spam Maintenance
Managing the End User Quarantine
Trend Micro Support/Debugger
Generating System Debugger Reports
Real-time Monitor
Working with Real-time Monitor
Adding a Disclaimer to Outbound Email Messages
Managing Scans
About Scans
Real-time Scan
Manual Scan
Running Manual Scans
Scheduled Scan
Configuring Scheduled Scans
Scan Targets and Actions for Security Agents
Scan Targets and Actions for Messaging Security Agents
Managing Updates
Update Overview
Updatable Components
Hot Fixes, Patches, and Service Packs
Security Server Updates
Configuring the Security Server Update Source
Updating the Security Server Manually
Configuring Scheduled Updates for the Security Server
Rolling Back Components
Security Agent and Messaging Security Agent Updates
Automatic Updates
Running a Manual Update
Agent Update Reminders and Tips
Update Agents
Configuring Update Agents
Using Live Status
Live Status
Action Center
Antivirus: Threats Unresolved
Antivirus: Real-time Scan Disabled on Endpoints
Antivirus: Real-time Scan Disabled on Exchange Server(s)
Anti-spyware: Detections Requiring Device Restart
Resource Shortage - Remaining Disk Space
Update: Outdated Agents
Update - Outdated Messaging Security Agents
Security Risk Detections Over Time
Security Risk Detections: Virus/Malware
Security Risk Detections: Spyware/Grayware
Security Risk Detections: Web Reputation
Security Risk Detections: Network Virus
Security Risk Detections: Behavior Monitoring
Security Risk Detections: Predictive Machine Learning
Security Risk Detections: Predictive Machine Learning Details
Security Risk Detections: URL Filtering
Security Risk Detections: Device Control
Ransomware Summary
Ransomware Summary Logs
Ransomware: Behavior Monitoring Log Details
Ransomware: URL Filtering Log Details
Ransomware: Virus Log Details
Ransomware: Web Reputation Log Details
License Status
Exchange Server Summary
Agent Status
Managing Notifications
Using Notifications
Configuring Events for Notifications
Token Variables
Managing Global Settings
Global Settings
Configuring Internet Proxy Settings
Configuring SMTP Server Settings
Configuring Desktop/Server Settings
Configuring System Settings
Configuring Exception List Settings
Using Logs and Reports
Logs
Using Log Query
Reports
Working with One-time Reports
Working with Scheduled Reports
Interpreting Reports
Performing Maintenance Tasks for Reports and Logs
Performing Administrative Tasks
Changing the Web Console Password
Working with Plug-in Manager
Managing the Product License
Configuring Product Update Settings
Configuring Product Update Notifications
Participating in the Smart Feedback Program
Changing the Agent’s Interface Language
Saving and Restoring Program Settings
Uninstalling the Security Server
Using Management Tools
Tool Types
Trend Micro Remote Manager Agent
Installing the Trend Micro Remote Manager Agent (Customer Licensing Portal Users)
Installing the Trend Micro Remote Manager Agent (Licensing Management Platform Users)
Managing Agents from the Managed Server
Agent Status Messages
Changing the Agent GUID on the Managed Server
Using the Agent Configuration Tool
Agent Configuration
Backing Up and Restoring Agent Settings
Backing Up Settings
Restoring Settings
Saving Disk Space
Running Disk Cleaner on the Security Server
Running Disk Cleaner on the Security Server Using the Command Line Interface
Saving Disk Space on Clients
Moving the Scan Server Database
Restoring Encrypted Files
Decrypting and Restoring Files on the Security Agent
Decrypting and Restoring Files on the Security Server, Custom Quarantine Directory, or Messaging Security Agent
Restoring Transport Neutral Encapsulation Format Email Messages
Using the ReGenID Tool
Managing SBS and EBS Add-ins
Installing the SBS and EBS Add-ins Manually
Using the SBS or EBS Add-ins
Security Agent Icons
Checking the Security Agent Status
Viewing Security Agent Icons on the Windows Task Bar
Accessing the Console Flyover
IPv6 Support in Worry-Free Business Security
IPv6 Support for Worry-Free Business Security and Security Agents
Security Server IPv6 Requirements
Messaging Security Agent Requirements
Pure IPv6 Server Limitations
Pure IPv6 Security Agent Limitations
Configuring IPv6 Addresses
Screens That Display IP Addresses
Technical support
Troubleshooting resources
Using the support portal
Threat encyclopedia
Contacting Trend Micro
Speeding up the support call
Sending suspicious content to Trend Micro
Email Reputation Services
File Reputation Services
Web Reputation Services
Other resources
Download center
Product Terminology and Concepts
Critical Patch
Hot Fix
IntelliScan
IntelliTrap
Intrusion Detection System
Keywords
Patch
Regular Expressions
Scan Exclusion Lists
Service Pack
Trojan Port
Uncleanable Files