Worry-Free Business Security 9.0 SP3 Server Help > Managing Basic Security Settings for Security Agents
        • Online Help Center Home

        • Introducing Worry-Free Business Security Standard and Advanced
          • Overview of Trend Micro Worry-Free Business Security
          • New in this Release (WFBS 9.0 SP3)
            • What's New in WFBS 9.0 SP2
            • What's New in WFBS 9.0 SP1
            • What's New in WFBS 9.0
          • Key Features and Benefits
            • Trend Micro Smart Protection Network
            • File Reputation Services
            • Web Reputation Services
            • Email Reputation (Advanced only)
            • Smart Feedback
            • URL Filtering
          • Benefits of Protection
          • Understanding Threats
            • Viruses and Malware
            • Spyware and Grayware
            • Spam
            • Intrusions
            • Malicious Behavior
            • Fake Access Points
            • Phishing Incidents
            • Mass Mailing Attacks
            • Web Threats
        • Getting Started
          • The Worry-Free Business Security Network
          • Security Server
            • Scan Server
          • Agents
          • Web Console
            • Opening the Web Console
            • Web Console Navigation
            • Web Console Icons
            • Live Status
        • Installing Agents
          • Security Agent Installation
            • Security Agent Installation Requirements
            • Security Agent Installation Considerations
            • Available Security Agent Features
            • Security Agent Installation and IPv6 Support
          • Security Agent Installation Methods
            • Installing from the Internal Web Page
            • Installing with Login Script Setup
            • Installing with Client Packager
            • Installing with Remote Install
            • Installing with Vulnerability Scanner
              • Running a Manual Vulnerability Scan
              • Running a DHCP Scan
              • Configuring a Scheduled Vulnerability Scan
              • Vulnerability Scan Settings
            • Installing with Email Notification
            • Migrating to the Security Agent
            • Performing Post-installation Tasks on Security Agents
          • Messaging Security Agent Installation
            • Messaging Security Agent Installation Requirements
            • Installing the Messaging Security Agent (Advanced only)
          • Removing Agents
            • Removing Agents from the Web Console
            • Uninstalling Agents from the Web Console
            • Uninstalling the Security Agent from the Client
            • Using the SA Uninstall Tool
            • Uninstalling the Messaging Security Agent from the Microsoft Exchange Server (Advanced Only)
        • Managing Groups
          • Groups
          • Adding Groups
          • Adding Agents to Groups
          • Moving Agents
            • Moving Security Agents Between Groups
            • Moving Agents Between Security Servers Using the Web Console
            • Moving a Security Agent Between Security Servers Using Client Mover
          • Replicating Settings
            • Replicating Security Agent Group Settings
            • Replicating Messaging Security Agent Settings (Advanced only)
          • Importing and Exporting the Settings of Security Agent Groups
            • Exporting Settings
            • Importing Settings
        • Managing Basic Security Settings for Security Agents
          • Summary of Basic Security Settings for Security Agents
          • Scan Methods
            • Configuring Scan Methods
          • Real-time Scan for Security Agents
            • Configuring Real-time Scan for Security Agents
          • Firewall
            • Configuring the Firewall
            • Working with Firewall Exceptions
            • Disabling the Firewall on a Group of Agents
            • Disabling the Firewall on All Agents
          • Web Reputation
            • Configuring Web Reputation for Security Agents
          • URL Filtering
            • Configuring URL Filtering
          • Approved/Blocked URLs
            • Configuring Approved/Blocked URLs
          • Behavior Monitoring
            • Configuring Behavior Monitoring
          • Trusted Program
            • Configuring Trusted Program
          • Device Control
            • Configuring Device Control
          • User Tools
            • Configuring User Tools
          • Agent Privileges
            • Configuring Agent Privileges
          • Quarantine Directory
            • Configuring the Quarantine Directory
        • Managing Basic Security Settings for Messaging Security Agents (Advanced Only)
          • Messaging Security Agents
            • How the Messaging Security Agent Scans Email Messages
            • Default Messaging Security Agent Settings
          • Real-Time Scan for Messaging Security Agents
            • Configuring Real-time Scan for Messaging Security Agents
          • Anti-Spam
            • Email Reputation
              • Configuring Email Reputation
            • Content Scanning
              • Configuring Content Scanning
              • Approved and Blocked Senders Lists
          • Content Filtering
            • Managing Content Filtering Rules
            • Types of Content Filtering Rules
            • Adding a Content Filtering Rule for All Matching Conditions
            • Adding a Content Filtering Rule for Any Matching Condition
            • Adding a Content Filtering Monitoring Rule
            • Creating Exceptions to Content Filtering Rules
          • Data Loss Prevention
            • Preparatory Work
            • Managing Data Loss Prevention Rules
            • Default Data Loss Prevention Rules
            • Adding Data Loss Prevention Rules
          • Attachment Blocking
            • Configuring Attachment Blocking
          • Web Reputation
            • Configuring Web Reputation for Messaging Security Agents
          • Mobile Security
            • Mobile Security Support
            • Configuring Device Access Control
            • Cancelling a Pending Device Wipe
            • Manually Wiping Devices
            • Configuring Security Policies
              • Password Complexity Requirements
          • Quarantine for Messaging Security Agents
            • Querying Quarantine Directories
            • Viewing Query Results and Taking Action
            • Maintaining Quarantine Directories
            • Configuring Quarantine Directories
          • Notification Settings for Messaging Security Agents
            • Configuring Notification Settings for Messaging Security Agents
          • Configuring Spam Maintenance
            • Managing the End User Quarantine
          • Trend Micro Support/Debugger
            • Generating System Debugger Reports
          • Real-time Monitor
            • Working with Real-time Monitor
          • Adding a Disclaimer to Outbound Email Messages
        • Managing Scans
          • About Scans
          • Real-time Scan
          • Manual Scan
            • Running Manual Scans
          • Scheduled Scan
            • Configuring Scheduled Scans
          • Scan Targets and Actions for Security Agents
          • Scan Targets and Actions for Messaging Security Agents
        • Managing Updates
          • Update Overview
          • Updatable Components
            • Hot Fixes, Patches, and Service Packs
          • Security Server Updates
            • Configuring the Security Server Update Source
            • Updating the Security Server Manually
            • Configuring Scheduled Updates for the Security Server
            • Rolling Back Components
          • Security Agent and Messaging Security Agent Updates
            • Automatic Updates
            • Manual Updates
            • Agent Update Reminders and Tips
          • Update Agents
            • Configuring Update Agents
        • Managing Notifications
          • Notifications
          • Configuring Events for Notifications
            • Token Variables
        • Using Outbreak Defense
          • Outbreak Defense Strategy
            • Configuring Outbreak Defense
            • Outbreak Defense Current Status
          • Vulnerability Assessment
            • Configuring Vulnerability Assessment
            • Running On-Demand Vulnerability Assessments
          • Damage Cleanup
            • Running On-Demand Clean Up
        • Managing Global Settings
          • Global Settings
          • Configuring Internet Proxy Settings
          • Configuring SMTP Server Settings
          • Configuring Desktop/Server Settings
          • Configuring System Settings
        • Using Logs and Reports
          • Logs
            • Using Log Query
          • Reports
            • Working with One-time Reports
            • Working with Scheduled Reports
            • Interpreting Reports
          • Performing Maintenance Tasks for Reports and Logs
        • Performing Administrative Tasks
          • Changing the Web Console Password
          • Working with Plug-in Manager
          • Managing the Product License
          • Participating in the Smart Feedback Program
          • Changing the Agent’s Interface Language
          • Saving and Restoring Program Settings
          • Uninstalling the Security Server
        • Using Management Tools
          • Tool Types
          • Installing the Trend Micro Remote Manager Agent
          • Saving Disk Space
            • Running Disk Cleaner on the Security Server
            • Running Disk Cleaner on the Security Server Using the Command Line Interface
            • Saving Disk Space on Clients
          • Moving the Scan Server Database
          • Restoring Encrypted Files
            • Decrypting and Restoring Files on the Security Agent
            • Decrypting and Restoring Files on the Security Server, Custom Quarantine Directory, or Messaging Security Agent
            • Restoring Transport Neutral Encapsulation Format Email Messages
          • Using the ReGenID Tool
          • Managing SBS and EBS Add-ins
            • Installing the SBS and EBS Add-ins Manually
            • Using the SBS or EBS Add-ins
        • Security Agent Icons
          • Checking the Security Agent Status
          • Viewing Security Agent Icons on the Windows Task Bar
          • Accessing the Console Flyover
        • IPv6 Support in WFBS
          • IPv6 Support for WFBS and Security Agents
            • Security Server IPv6 Requirements
            • Security Agent Requirements
            • Messaging Security Agent Requirements
            • Pure IPv6 Server Limitations
            • Pure IPv6 Security Agent Limitations
          • Configuring IPv6 Addresses
          • Screens That Display IP Addresses
        • Getting Help
          • The Trend Micro Knowledge Base
          • Contacting Trend Micro
            • Case Diagnostic Tool
            • Speeding Up the Support Call
          • Sending Suspicious Content to Trend Micro
            • File Reputation Services
            • Email Reputation Services
            • Web Reputation Services
          • Threat Encyclopedia
          • TrendLabs
          • Documentation Feedback
        • Product Terminology and Concepts
          • Critical Patch
          • Hot Fix
          • IntelliScan
          • IntelliTrap
          • Intrusion Detection System
          • Keywords
          • Patch
          • Regular Expressions
          • Scan Exclusion Lists
          • Service Pack
          • Trojan Port
          • Uncleanable Files

        Managing Basic Security Settings for Security Agents

        This chapter explains how to configure basic security settings for Security Agents.

        • Summary of Basic Security Settings for Security Agents
        • Scan Methods
        • Real-time Scan for Security Agents
        • Firewall
        • Web Reputation
        • URL Filtering
        • Approved/Blocked URLs
        • Behavior Monitoring
        • Trusted Program
        • Device Control
        • User Tools
        • Agent Privileges
        • Quarantine Directory