You’re offline. This is a read only version of the page.
Online Help Center
Search
Support
For Home
For Business
English (US)
Bahasa Indonesia (Indonesian)
Dansk (Danish)
Deutsch (German)
English (Australia)
English (US)
Español (Spanish)
Français (French)
Français Canadien
(Canadian French)
Italiano (Italian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português - Brasil
(Portuguese - Brazil)
Português - Portugal
(Portuguese - Portugal)
Svenska (Swedish)
ภาษาไทย (Thai)
Tiếng Việt (Vietnamese)
Türkçe (Turkish)
Čeština (Czech)
Ελληνικά (Greek)
Български (Bulgarian)
Русский (Russian)
עברית (Hebrew)
اللغة العربية (Arabic)
日本語 (Japanese)
简体中文
(Simplified Chinese)
繁體中文
(Traditional Chinese)
繁體中文 HK
(Traditional Chinese)
한국어 (Korean)
Cancel
This website uses cookies for website functionality and traffic analytics. Our Cookie Notice provides more information and explains how to amend your cookie settings.
Learn More
Yes, I agree
Table of Contents
The page you're looking for can't be found or is under maintenance
Try again later or go to the home page
Go to home page
Privacy and Personal Data Collection Disclosure
Pre-release disclaimer
Worry-Free Business Security Services Data Privacy, Security, and Compliance
Release Notes
Product Overview
Overview of Trend Micro Worry-Free Business Security Services
Features and Benefits
Protecting Your Network
Web Console
Worry-Free Services Server
Worry-Free Business Security Services Security Agent
Comparing Features of Worry-Free Editions
License Status Consequences
Choosing your Edition
Special Licensing
Security Agent Installation
Preparation
System Requirements
Web Console
Windows Security Agent Minimum Requirements
Mac Security Agent Minimum Requirements
Android Security Agent Minimum Requirements
iOS Security Agent Minimum Requirements
Chrome Extension System Requirements
Licenses, Registration, and Activation
Deployment Checklist
Conflicting 3rd Party Applications
Identifying the Number of Clients
Planning for Network Traffic
Network Traffic During Pattern File Updates
Determining the Number of Groups
Security Agent Deployment Options
Ports Checklist
Installation
Security Agent Installation Methods
Security Agent Installation — Send Installation Invitation
Installing the Agent on a Windows Computer, after Receiving the Email
Installing the Agent on a Mac, after Receiving the Email
Installing the Profile on an iOS Device, after Receiving the Email
Installing the Agent on an Android Device, after Receiving the Email
Security Agent Installation — Download Installer
Download Installer — Same Group and Account Installation
Download Installer — Different Group and Account Installation
Security Agent Installation — Install on This Endpoint
Deploying the Security Agent on Android Devices using Microsoft Intune
Chrome Extension Mass Deployment for Chromebooks
Removing Security Agents
Removing the Security Agent from the Web Console
Removing the Security Agent from Windows
Removing the Security Agent from Mac
Removing the Security Agent from Android Devices
Removing the Security Profile from iOS Devices
Migrating and Upgrading
Migrating from Trend Micro Anti-Spyware
Migrating from Other Antivirus Applications
Comparison of Security Agent and Trend Micro Anti-Spyware Settings
Preventing Upgrade for Selected Security Agents
Disabling Upgrades on Mac Security Agents
Security Agent Information
Viewing Security Agent Icons in the Windows System Tray
Shortcuts
Security Agent Management
Security Agent Tree Management
Security Agent Tree
Security Agent Tree Commands
Adding Manual Groups
Adding New Filters
Replicating Group Settings
Restoring Endpoints from Manual to Active Directory Domain Groups
Security Agent List Management
Security Agent List Commands and Tasks
Security Agent Statuses
Using Advanced Search
Managing Full Disk Encryption
Full Disk Encryption System Requirements
Encryption Statuses
Resolving Encryption Issues
Getting Recovery Keys
Endpoint Details
Endpoint Commands and Information: Windows
Endpoint Commands and Information: Mac
Endpoint Commands and Information: Android
Endpoint Commands and Information: iOS
Updates
About Updates
About ActiveUpdate
Component Updates
Components
Scan Engine
Scan Engine Updates
Manual Updates
Policies
Policy Settings
Scan Methods
Scan Types
IntelliScan
IntelliTrap
ActiveAction
Recommended Manual Scan Settings
Behavior Monitoring
Predictive Machine Learning
Web Reputation Services
Firewall
Intrusion Detection System
Device Control
URL Filtering
Data Loss Prevention (DLP)
Data Loss Prevention Policies
Predefined DLP Templates
Data Loss Prevention Channels
Application Control
Policy Management
Comparison between Classic and Advanced Modes
Policy Management in Classic Mode
Policy Management in Advanced Mode
Policy List Data
Configuring Policy
Switching Policy Management Modes
Windows Policy Settings
Configuring Scan Settings
Real-Time Scan: Target Tab
Real-Time Scan: Action Tab
Scheduled Scan: Target Tab
Scheduled Scan: Action Tab
Manual Scan: Target Tab
Manual Scan: Action Tab
Configuring Behavior Monitoring
Event Monitoring
Configuring Predictive Machine Learning Settings
Enabling Vulnerability Protection
Configuring Web Reputation
Configuring the Firewall
Configuring Firewall Exceptions
Enabling Endpoint Sensor
Enabling Sample Submission
Configuring Device Control
Configuring Device Control Exceptions
Configuring the Allowed Program List
Specifying a Digital Signature Provider
Wildcard Support for the Device Control Allowed Programs List
Configuring Data Loss Prevention
Configuring Data Loss Prevention Exceptions
Running the Device List Tool
Decompression Rules
Rule 1: Maximum Size of a Decompressed File
Rule 2: Maximum Compression Layers
Rule 3: Maximum Number of Files to Scan
Blocking Access to Data Recorders (CD/DVD)
Configuring URL Filtering
Configuring Application Control Settings
Configuring Scan Exclusions
Excluding Files, Folders, and File Extensions from Scans
Supported System Variables for File and Folder Exceptions
Wildcard Exceptions
Configuring the Spyware/Grayware Approved List
Configuring the Behavior Monitoring Exception List
Behavior Monitoring Exception List Wildcard Support
Supported Environment Variables
Configuring the Approved/Blocked URL Lists
Configuring Privileges and Other Settings
Configuring Agent Privileges
Configuring Agent Alert Settings
Configuring Other Agent Settings
Mac Policy Settings
Configuring Scan Settings
Configuring Real-Time Scan Settings
Configuring Scheduled Scan Settings
Configuring Manual Scan Settings
Enabling Predictive Machine Learning
Configuring Web Reputation
Enabling Endpoint Sensor
Configuring Device Control
Configuring URL Filtering
Configuring the Approved URL List
Excluding Files and File Extensions from Scans
Wildcard Support for Mac File Exclusions
Configuring Agent Privileges
Android Policy Settings
Configuring Scan Settings
Configuring Web Reputation
Configuring Android Password Settings
Configuring the Approved/Blocked URL Lists
Configuring Privileges and Other Settings
iOS Policy Settings
Configuring iOS Passcode Settings
Configuring Web Reputation
Configuring Configuration Manager Settings
Configuring Wi-Fi Protection Settings
Configuring the Approved/Blocked URL Lists
Global Security Agent Settings
Configuring Security Settings
Configuring Agent Control Settings
Configuring Isolated Endpoints Settings
Global Exception Lists
Configuring the Global Approved URL List
Configuring the Global Blocked URL List
Configuring the Global Approved IP Address List for Web Reputation and URL Filtering
Configuring the Global Allowed Process List
Configuring the Global Windows Trusted Program List
Configuring the Global Mac Trusted Program List
Configuring the Global Predictive Machine Learning Exception List
Configuring the Global Allowed USB Device List
Adding Exceptions to the Allowed USB Device List
Running the Device List Tool
Getting Device Information on Mac
Adding Exceptions from Detected Devices
Importing Device Information to the Allowed USB Device List
Editing the Allowed USB Device List
Configuring the Global Approved IP Address List for Vulnerability Protection
Suspicious Object Lists
User-Defined Suspicious Object List
Adding Objects to the User-Defined Suspicious Object List
Virtual Analyzer Suspicious Object List
Virtual Analyzer Suspicious Object Exception List
Application Control Rules
Application Control Rules
Configuring Application Control Rules
Unallowed Application Control Paths
Supported System Variables for Application Control Rules
Using the Hash Generator Tool
Network Bandwidth Consumption Resulted from Application Reputation List Updates
Monitoring and Notifications
Dashboard
Dashboard Overview
Action Center
Antivirus - Threats Unresolved
Antivirus - Real-Time Scan Disabled
Antispyware - Threats Unresolved
Mobile Device Management Commands - Incomplete
Mobile Device Management Commands - Pending
Smart Protection Services - Agents Disconnected
Update - Outdated Agents
Detections by Infection Channel
Clicking the Enable Ransomware Protection Button
Noteworthy Events
Security Risk Detections Over Time
Security Agent Status
Dashboard - Cloud App Security
Overall Threat Detections
Internal User Risk Insights Widgets
Business email compromise (BEC) widgets
Top 5 BEC email recipients widget
Top 5 writing style analysis violations by recipient widget
Top 5 targeted high profile users widget
Credential Phishing Detections
Users
Users Overview
User Details
Reports and Logs
Report Overview
Report Content
Configuring Report Settings
Logs Overview
Security Risk Detection Logs
Web Console Event Logs
Component Update Logs
Security Agent Event Logs
Notifications
Notifications Overview
Configuring Notification Settings
Customizing Notifications
Administration
General Settings
Configuring General Settings
Mobile Device Enrollment Settings
Configuring Mobile Device Enrollment Settings
User Accounts
User Account Management
Features Affected by Managed Groups
Active Directory Settings
Configuring Microsoft Entra ID Integration
Configuring Active Directory Server Integration
Resolving Synchronization Issues
Common Active Directory Synchronization Tool System Requirements
Updating Common Active Directory Synchronization Tool
Importing Active Directory Structure Manually
Specifying Active Directory Export Settings
Exporting Active Directory Structure
Importing the LDIF File
Removing the Active Directory Structure
Smart Protection Network
Smart Protection Network Participation
Participating in Smart Protection Network
Cloud App Security Settings
Enabling Email Metadata Collection
Recovery Key Password
Configuring Recovery Key Password
Tools
Login Script Setup Tool
Example Deployment Script
Uninstaller for Mac
Image Cloning Setup Tool
On-Premises Server Migration Tool
OfficeScan Migration System Requirements
Worry-Free Business Security Migration System Requirements
Migrated Policy Setting Mapping for OfficeScan
Mapping: Manual Scan Settings
Mapping: Real-Time Scan Settings
Mapping: Scheduled Scan Settings
Mapping: Web Reputation Settings
Mapping: Predictive Machine Learning Settings
Mapping: Behavior Monitoring Settings
Mapping: Device Control Settings
Mapping: Data Loss Prevention Settings
Mapping: Sample Submission Settings
Mapping: Privileges and Other Settings
Mapping: Additional Service Settings
Mapping: Spyware/Grayware Approved List
Mapping: Trusted Program List
Restore Infected Files
Excluding Folders from Scans
Restoring an Encrypted File Using the Graphical Interface
Restoring an Encrypted File Using the Command Line Interface
Encrypting or Decrypting Files in Other Locations
License
Viewing Product License Details
Trend Micro Remote Manager
About Trend Micro Remote Manager
Web Console Settings
Configuring Web Console Settings
Changing the Web Console Password
Trend Vision One
Trend Vision One
Integrating Worry-Free Services with Trend Vision One
Detection & Response
Noteworthy Events
Noteworthy Events Overview
Analysis Chains
Object Details Tab
Email Message Correlation
Navigating the Analysis Chain
Noteworthy Event Icons
Threat Investigation
Threat Investigation Overview
Using Custom Criteria for Threat Investigation
Supported Formats for Custom Criteria
Using OpenIOC Files for Threat Investigation
Supported IOC Indicators
Threat Investigation - Email Assessment
Appendices
Best Practices
Troubleshooting and FAQs
Troubleshooting
Incorrect Number of Endpoints on the Web Console
Security Agent Does Not Appear on the Web Console After Installation
Issues During Migration from Other Antivirus Software
Frequently Asked Questions (FAQs)
I have several questions about using Worry-Free Services to protect me from ransomware. Where can I find the answers?
What happens when I click the Enable Ransomware Protection button?
How can I verify that all ransomware-related settings are enabled?
What are the risks of enabling Ransomware Protection?
What should I do when Behavior Monitoring and Ransomware Protection are not working?
Where can I find my registration information?
I have several questions on registering Worry-Free Services. Where can I find the answers?
Which Agent installation method is best for my network environment?
What should I do if I am unable to connect to the server while installing the Security Agent?
Does Worry-Free Services support 64-bit platforms?
How can I recover a lost or forgotten password?
What happens when an attempted Intuit update is blocked?
Can other programs be allowed to update Intuit files? Can I bypass Trend Micro protection on a case-to-case basis?
Do I have the latest pattern file?
What is the maximum number of devices and groups that Worry-Free Services can support?
How can I perform a mass deployment to Mac?
How do I copy the Identifier information?
How can I enable Web Reputation on Android 6.0 or later?
Product Exclusion List
Getting Help
The Trend Micro knowledge base
Trend community
Contacting support
Using the support portal
Speeding up the support call
Sending suspicious content to Trend Micro
File Reputation Services
Web Reputation Services
Troubleshooting resources
Threat encyclopedia
Download center
Documentation feedback
Glossary
Trend Vision One
Related information
Trend Vision One
Table of Contents
Privacy and Personal Data Collection Disclosure
Pre-release disclaimer
Worry-Free Business Security Services Data Privacy, Security, and Compliance
Release Notes
Product Overview
Overview of Trend Micro Worry-Free Business Security Services
Features and Benefits
Protecting Your Network
Web Console
Worry-Free Services Server
Worry-Free Business Security Services Security Agent
Comparing Features of Worry-Free Editions
License Status Consequences
Choosing your Edition
Special Licensing
Security Agent Installation
Preparation
System Requirements
Web Console
Windows Security Agent Minimum Requirements
Mac Security Agent Minimum Requirements
Android Security Agent Minimum Requirements
iOS Security Agent Minimum Requirements
Chrome Extension System Requirements
Licenses, Registration, and Activation
Deployment Checklist
Conflicting 3rd Party Applications
Identifying the Number of Clients
Planning for Network Traffic
Network Traffic During Pattern File Updates
Determining the Number of Groups
Security Agent Deployment Options
Ports Checklist
Installation
Security Agent Installation Methods
Security Agent Installation — Send Installation Invitation
Installing the Agent on a Windows Computer, after Receiving the Email
Installing the Agent on a Mac, after Receiving the Email
Installing the Profile on an iOS Device, after Receiving the Email
Installing the Agent on an Android Device, after Receiving the Email
Security Agent Installation — Download Installer
Download Installer — Same Group and Account Installation
Download Installer — Different Group and Account Installation
Security Agent Installation — Install on This Endpoint
Deploying the Security Agent on Android Devices using Microsoft Intune
Chrome Extension Mass Deployment for Chromebooks
Removing Security Agents
Removing the Security Agent from the Web Console
Removing the Security Agent from Windows
Removing the Security Agent from Mac
Removing the Security Agent from Android Devices
Removing the Security Profile from iOS Devices
Migrating and Upgrading
Migrating from Trend Micro Anti-Spyware
Migrating from Other Antivirus Applications
Comparison of Security Agent and Trend Micro Anti-Spyware Settings
Preventing Upgrade for Selected Security Agents
Disabling Upgrades on Mac Security Agents
Security Agent Information
Viewing Security Agent Icons in the Windows System Tray
Shortcuts
Security Agent Management
Security Agent Tree Management
Security Agent Tree
Security Agent Tree Commands
Adding Manual Groups
Adding New Filters
Replicating Group Settings
Restoring Endpoints from Manual to Active Directory Domain Groups
Security Agent List Management
Security Agent List Commands and Tasks
Security Agent Statuses
Using Advanced Search
Managing Full Disk Encryption
Full Disk Encryption System Requirements
Encryption Statuses
Resolving Encryption Issues
Getting Recovery Keys
Endpoint Details
Endpoint Commands and Information: Windows
Endpoint Commands and Information: Mac
Endpoint Commands and Information: Android
Endpoint Commands and Information: iOS
Updates
About Updates
About ActiveUpdate
Component Updates
Components
Scan Engine
Scan Engine Updates
Manual Updates
Policies
Policy Settings
Scan Methods
Scan Types
IntelliScan
IntelliTrap
ActiveAction
Recommended Manual Scan Settings
Behavior Monitoring
Predictive Machine Learning
Web Reputation Services
Firewall
Intrusion Detection System
Device Control
URL Filtering
Data Loss Prevention (DLP)
Data Loss Prevention Policies
Predefined DLP Templates
Data Loss Prevention Channels
Application Control
Policy Management
Comparison between Classic and Advanced Modes
Policy Management in Classic Mode
Policy Management in Advanced Mode
Policy List Data
Configuring Policy
Switching Policy Management Modes
Windows Policy Settings
Configuring Scan Settings
Real-Time Scan: Target Tab
Real-Time Scan: Action Tab
Scheduled Scan: Target Tab
Scheduled Scan: Action Tab
Manual Scan: Target Tab
Manual Scan: Action Tab
Configuring Behavior Monitoring
Event Monitoring
Configuring Predictive Machine Learning Settings
Enabling Vulnerability Protection
Configuring Web Reputation
Configuring the Firewall
Configuring Firewall Exceptions
Enabling Endpoint Sensor
Enabling Sample Submission
Configuring Device Control
Configuring Device Control Exceptions
Configuring the Allowed Program List
Specifying a Digital Signature Provider
Wildcard Support for the Device Control Allowed Programs List
Configuring Data Loss Prevention
Configuring Data Loss Prevention Exceptions
Running the Device List Tool
Decompression Rules
Rule 1: Maximum Size of a Decompressed File
Rule 2: Maximum Compression Layers
Rule 3: Maximum Number of Files to Scan
Blocking Access to Data Recorders (CD/DVD)
Configuring URL Filtering
Configuring Application Control Settings
Configuring Scan Exclusions
Excluding Files, Folders, and File Extensions from Scans
Supported System Variables for File and Folder Exceptions
Wildcard Exceptions
Configuring the Spyware/Grayware Approved List
Configuring the Behavior Monitoring Exception List
Behavior Monitoring Exception List Wildcard Support
Supported Environment Variables
Configuring the Approved/Blocked URL Lists
Configuring Privileges and Other Settings
Configuring Agent Privileges
Configuring Agent Alert Settings
Configuring Other Agent Settings
Mac Policy Settings
Configuring Scan Settings
Configuring Real-Time Scan Settings
Configuring Scheduled Scan Settings
Configuring Manual Scan Settings
Enabling Predictive Machine Learning
Configuring Web Reputation
Enabling Endpoint Sensor
Configuring Device Control
Configuring URL Filtering
Configuring the Approved URL List
Excluding Files and File Extensions from Scans
Wildcard Support for Mac File Exclusions
Configuring Agent Privileges
Android Policy Settings
Configuring Scan Settings
Configuring Web Reputation
Configuring Android Password Settings
Configuring the Approved/Blocked URL Lists
Configuring Privileges and Other Settings
iOS Policy Settings
Configuring iOS Passcode Settings
Configuring Web Reputation
Configuring Configuration Manager Settings
Configuring Wi-Fi Protection Settings
Configuring the Approved/Blocked URL Lists
Global Security Agent Settings
Configuring Security Settings
Configuring Agent Control Settings
Configuring Isolated Endpoints Settings
Global Exception Lists
Configuring the Global Approved URL List
Configuring the Global Blocked URL List
Configuring the Global Approved IP Address List for Web Reputation and URL Filtering
Configuring the Global Allowed Process List
Configuring the Global Windows Trusted Program List
Configuring the Global Mac Trusted Program List
Configuring the Global Predictive Machine Learning Exception List
Configuring the Global Allowed USB Device List
Adding Exceptions to the Allowed USB Device List
Running the Device List Tool
Getting Device Information on Mac
Adding Exceptions from Detected Devices
Importing Device Information to the Allowed USB Device List
Editing the Allowed USB Device List
Configuring the Global Approved IP Address List for Vulnerability Protection
Suspicious Object Lists
User-Defined Suspicious Object List
Adding Objects to the User-Defined Suspicious Object List
Virtual Analyzer Suspicious Object List
Virtual Analyzer Suspicious Object Exception List
Application Control Rules
Application Control Rules
Configuring Application Control Rules
Unallowed Application Control Paths
Supported System Variables for Application Control Rules
Using the Hash Generator Tool
Network Bandwidth Consumption Resulted from Application Reputation List Updates
Monitoring and Notifications
Dashboard
Dashboard Overview
Action Center
Antivirus - Threats Unresolved
Antivirus - Real-Time Scan Disabled
Antispyware - Threats Unresolved
Mobile Device Management Commands - Incomplete
Mobile Device Management Commands - Pending
Smart Protection Services - Agents Disconnected
Update - Outdated Agents
Detections by Infection Channel
Clicking the Enable Ransomware Protection Button
Noteworthy Events
Security Risk Detections Over Time
Security Agent Status
Dashboard - Cloud App Security
Overall Threat Detections
Internal User Risk Insights Widgets
Business email compromise (BEC) widgets
Top 5 BEC email recipients widget
Top 5 writing style analysis violations by recipient widget
Top 5 targeted high profile users widget
Credential Phishing Detections
Users
Users Overview
User Details
Reports and Logs
Report Overview
Report Content
Configuring Report Settings
Logs Overview
Security Risk Detection Logs
Web Console Event Logs
Component Update Logs
Security Agent Event Logs
Notifications
Notifications Overview
Configuring Notification Settings
Customizing Notifications
Administration
General Settings
Configuring General Settings
Mobile Device Enrollment Settings
Configuring Mobile Device Enrollment Settings
User Accounts
User Account Management
Features Affected by Managed Groups
Active Directory Settings
Configuring Microsoft Entra ID Integration
Configuring Active Directory Server Integration
Resolving Synchronization Issues
Common Active Directory Synchronization Tool System Requirements
Updating Common Active Directory Synchronization Tool
Importing Active Directory Structure Manually
Specifying Active Directory Export Settings
Exporting Active Directory Structure
Importing the LDIF File
Removing the Active Directory Structure
Smart Protection Network
Smart Protection Network Participation
Participating in Smart Protection Network
Cloud App Security Settings
Enabling Email Metadata Collection
Recovery Key Password
Configuring Recovery Key Password
Tools
Login Script Setup Tool
Example Deployment Script
Uninstaller for Mac
Image Cloning Setup Tool
On-Premises Server Migration Tool
OfficeScan Migration System Requirements
Worry-Free Business Security Migration System Requirements
Migrated Policy Setting Mapping for OfficeScan
Mapping: Manual Scan Settings
Mapping: Real-Time Scan Settings
Mapping: Scheduled Scan Settings
Mapping: Web Reputation Settings
Mapping: Predictive Machine Learning Settings
Mapping: Behavior Monitoring Settings
Mapping: Device Control Settings
Mapping: Data Loss Prevention Settings
Mapping: Sample Submission Settings
Mapping: Privileges and Other Settings
Mapping: Additional Service Settings
Mapping: Spyware/Grayware Approved List
Mapping: Trusted Program List
Restore Infected Files
Excluding Folders from Scans
Restoring an Encrypted File Using the Graphical Interface
Restoring an Encrypted File Using the Command Line Interface
Encrypting or Decrypting Files in Other Locations
License
Viewing Product License Details
Trend Micro Remote Manager
About Trend Micro Remote Manager
Web Console Settings
Configuring Web Console Settings
Changing the Web Console Password
Trend Vision One
Trend Vision One
Integrating Worry-Free Services with Trend Vision One
Detection & Response
Noteworthy Events
Noteworthy Events Overview
Analysis Chains
Object Details Tab
Email Message Correlation
Navigating the Analysis Chain
Noteworthy Event Icons
Threat Investigation
Threat Investigation Overview
Using Custom Criteria for Threat Investigation
Supported Formats for Custom Criteria
Using OpenIOC Files for Threat Investigation
Supported IOC Indicators
Threat Investigation - Email Assessment
Appendices
Best Practices
Troubleshooting and FAQs
Troubleshooting
Incorrect Number of Endpoints on the Web Console
Security Agent Does Not Appear on the Web Console After Installation
Issues During Migration from Other Antivirus Software
Frequently Asked Questions (FAQs)
I have several questions about using Worry-Free Services to protect me from ransomware. Where can I find the answers?
What happens when I click the Enable Ransomware Protection button?
How can I verify that all ransomware-related settings are enabled?
What are the risks of enabling Ransomware Protection?
What should I do when Behavior Monitoring and Ransomware Protection are not working?
Where can I find my registration information?
I have several questions on registering Worry-Free Services. Where can I find the answers?
Which Agent installation method is best for my network environment?
What should I do if I am unable to connect to the server while installing the Security Agent?
Does Worry-Free Services support 64-bit platforms?
How can I recover a lost or forgotten password?
What happens when an attempted Intuit update is blocked?
Can other programs be allowed to update Intuit files? Can I bypass Trend Micro protection on a case-to-case basis?
Do I have the latest pattern file?
What is the maximum number of devices and groups that Worry-Free Services can support?
How can I perform a mass deployment to Mac?
How do I copy the Identifier information?
How can I enable Web Reputation on Android 6.0 or later?
Product Exclusion List
Getting Help
The Trend Micro knowledge base
Trend community
Contacting support
Using the support portal
Speeding up the support call
Sending suspicious content to Trend Micro
File Reputation Services
Web Reputation Services
Troubleshooting resources
Threat encyclopedia
Download center
Documentation feedback
Glossary