Trend Micro Worry-Free Business Security 9.0 SP1

Published by: Trend Micro, Incorporated

Published on: September 2014

This readme file was current as of the date above. All customers are advised to check the Trend Micro Online Help Center for updates (

About Worry-Free Business Security

Worry-Free Business Security protects small business users and assets from data theft, identity theft, risky Web sites, and spam (Advanced Only).

New in this Release (WFBS 9.0 SP1)

Worry-Free Business Security includes the following new features and enhancements.

Table 1. What's New in WFBS 9.0 SP1



Detection improvements

  • Outbreak prevention protection against compressed executable files (packers)

  • Improved Damage Cleanup Engine performance


Web reputation logs include running processes information

New in WFBS 9.0

Worry-Free Business Security includes the following new features and enhancements.

Table 2. What's New in WFBS 9.0



Windows support

  • WFBS now supports Microsoft Windows 8.1 and Windows Server 2012 R2.

Detection improvements

  • Memory Scan for real-time scan

  • Known and potential threat mode for Behavior Monitoring

  • Browser Exploit Prevention

  • Newly encountered program download detection

Performance enhancements

  • Decreased the time required to install and uninstall the Security Agent

  • Deferred Scan for Real-time Scan

Usability enhancements

  • Outlook 2013 and Windows Live Mail 2012 support for Trend Micro Anti-Spam Toolbar

  • Keep patterns when upgrading the Server and Agent

  • Help Link and Infection Source virus logs

Worry-Free Business Security Documentation

Worry-Free Business Security documentation includes the following:

Table 3. Worry-Free Business Security Documentation




HTML files compiled in WebHelp or CHM format that provide "how to's", usage advice, and field-specific information

Readme file

Contains a list of known issues and basic installation steps. It may also contain late-breaking product information not found in the Help or printed documentation

Knowledge Base

An online database of problem-solving and troubleshooting information. It provides the latest information about known product issues. To access the Knowledge Base, go to the following website:

Download the latest version of the PDF documents and readme at:

System Requirements

Visit the following website for a complete list of installation and upgrade requirements:


The WFBS administrator in your organization is responsible for installing and upgrading the Security Agent. Contact the administrator if you have questions or concerns about the installation or upgrade.

Post-Installation Configuration

The WFBS administrator will contact you if post-installation steps are required.

Known Issues

The following are the known issues in this release:

Windows Agent Known Issues

Security Agent Deployment, Upgrade, and Usage

For details about installation limitations on certain operating systems, see the Help topic:

  1. To completely reinstall or upgrade the Security Agent, you will need to restart the computer. A restart will also be necessary when updating some components, including the firewall and the proxy drivers.

  2. WFBS supports Remote Desktop, Remote Web Workplace, and Citrix server terminal applications.

    In a Terminal Services environment, administrators can decide whether to show or hide the Security Agent icon in the Windows task bar. This setting applies to all or none of the active user sessions. It is not possible to apply the setting to individual user sessions.

    If the icon shows on all active user sessions, memory usage may increase. To prevent this issue from occurring:

    1. On the Security Agent host, open the registry.

    2. Create or modify the following REG name or value pair:

      • Key:

        • For 32-bit: HKLM\SOFTWARE\TrendMicro\PCcillinNTCorp\CurrentVersion\Misc

        • For 64-bit: HKLM\SOFTWARE\Wow6432Node\TrendMicro\PCcillinNTCorp\CurrentVersion\Misc

      • Name: RCS

      • Type: DWORD

      • Value: 202 (in decimal format)

      There will be no PccNTMon instances created when its value is set to 202.

    3. The manual scan process bar is not fully synchronized to Files scanned count based scan mechanism

Behavior Monitoring/Device Control

  1. Behavior Monitoring fully supports 32-bit operating systems. On 64-bit operating systems, only Vista x64 SP1 and later are supported.

  2. Device Control full supports 32-bit operating systems. On 64-bit operating systems, only Vista x64 SP1 and later are supported.

Web Reputation and URL Filtering

  1. Browser Exploit Prevention supports Internet Explorer versions 6, 7, 8, 9, 10, and 11.

  2. In an unstable network environment, the Trend Micro Web Reputation server may pass a website without filtering.


  1. When uninstalling the firewall driver, the Client could temporarily lose the network connection. Some applications, such as Secure Shell (SSH), Terminal Services Client, or Remote Desktop, could be affected by the disconnection. If this occurs, restart the application after disabling the firewall (which also completes the uninstallation process).

  2. The Security Agent firewall might conflict with other firewall applications. Trend Micro recommends uninstalling or disabling other firewall applications.

  3. On VMware clients, the Security Agent firewall may block all incoming packets.

    To address this issue, add the following value to the client's registry:

    • Key:HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro\PC-cillinNTCorp\CurrentVersion\PFW

    • Name:EnableBypassRule

    • Type:REG_DWORD

    • Data:1

      1 means enable, 0 means disable

Contacting Trend Micro

A license to the Trend Micro software usually includes the right to product updates, pattern file updates, and basic technical support  for one (1) year from the date of purchase only. After the first year, Maintenance must be renewed on an annual basis at Trend Micro's then-current Maintenance fees.

You can contact Trend Micro via fax, phone, and email, or visit us at:

Evaluation copies of Trend Micro products can be downloaded from our Web site.

Global Mailing Address / Telephone Numbers

For global contact information in the Asia/Pacific region, Australia and New Zealand, Europe, Latin America, and Canada, refer to:

You can contact Trend Micro via fax, phone, and email, or visit us at:

The Trend Micro "About Us" screen displays. Click the appropriate link in the "Contact Us" section of the screen.


This information is subject to change without notice.

About Trend Micro

Trend Micro Incorporated, a global leader in Internet content security and threat management, aims to create a world safe for the exchange of digital information for businesses and consumers. A pioneer in server-based antivirus with over 20 years experience, we deliver top-ranked security that fits our customers' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the Trend Micro™ Smart Protection Network™ infrastructure, our industry-leading cloud-computing security technology and products stop threats where they emerge, on the Internet, and are supported by 1,000+ threat intelligence experts around the globe. For additional information, visit

Copyright 2014, Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, Worry-Free, TrendProtect, and InterScan are trademarks of Trend Micro Incorporated and are registered in some jurisdictions. All other marks are the trademarks or registered trademarks of their respective companies.

About the License Agreement

Information about your license agreement with Trend Micro can be viewed at

Click here to view license attributions for this product.