Conflicting 3rd Party Applications

Conflicting 3rd Party Applications

Prior to installation, review the following conflicting applications:

  • Other Firewall Applications

    Trend Micro recommends removing or disabling any other firewall applications if you want to install the Worry-Free Business Security Services firewall.

Identifying the Number of Clients

A client is a computer/device where you plan to install a security agent or a profile. Windows desktops, servers, and portable computers, Mac, and Android devices install a security agent. iOS devices install a profile. It helps if you know how many clients the installation will support.

Planning for Network Traffic

When planning for deployment, consider the network traffic that Worry-Free Business Security Services will generate. Worry-Free Business Security Services generates network traffic when the Worry-Free Business Security Services Server and clients communicate with each other.

The Worry-Free Business Security Services Server/Scan Server generates traffic when:

  • Notifying clients about configuration changes

  • Notifying clients to download updated components

  • Connecting to the Trend Micro ActiveUpdate Server to check for and download updated components

  • Performing scans on the clients who are configured for Smart Scan

  • Sending feedback to the Trend Micro Smart Protection Network

Clients generate traffic when:

  • Starting up

  • Shutting down

  • Generating logs

  • Performing scheduled updates

  • Performing manual updates ("Update Now")

  • Connecting to the Scan Server for Smart Scan


Other than updates and log generation, all the other actions generate a small amount of traffic.

Network Traffic During Pattern File Updates

Network traffic is generated whenever Trend Micro releases an updated version of any product component.

To reduce network traffic generated during pattern file updates, Worry-Free Business Security Services uses a method called incremental update. Instead of downloading the full updated pattern file every time, new patterns that have been added since the last release are downloaded. The Security Agent also tries to update from another Security Agent on the same network to further reduce network traffic.

For more information on the update method, see About Updates.

Regularly updated Security Agents only have to download the incremental pattern, which is approximately 5KB to 200KB. The full pattern is substantially larger even when compressed and takes longer to download.

Trend Micro releases new pattern files daily. However, if a particularly damaging virus is actively circulating, Trend Micro releases a new pattern file as soon as a pattern for the threat is available.

Determining the Number of Groups

Every Security Agent must belong to a group in the Security Agent Tree. By organizing Security Agents in groups, you can simultaneously configure, manage, and apply a customized configuration to one group without affecting the configuration of other groups.

A Worry-Free Business Security Services group is different from a Windows domain. You can create multiple groups within a single Windows domain. You may also assign endpoints from different Windows domains to the same group.

You can group endpoints based on the departments they belong to or the functions they perform. Alternatively, you can group endpoints that are at a greater risk of infection and apply a more secure configuration than you may wish to apply to other endpoints. You will need at least one group for every unique endpoint configuration that you wish to create.

If you have a small office, you may only have one group.

Security Agent Deployment Options

Worry-Free Business Security Services provides multiple options to deploy Security Agents. Determine which ones are most suitable for your environment based on your current management practices and the account privileges that end users are assigned.

Operating System



  • For single-site deployment, IT administrators can choose to deploy using a Login Script Setup. The Agent is deployed in the background and the end user does not notice the installation process.

  • In organizations where IT policies are strictly enforced Login Script Setup is recommended. Login-script setups do not require administrative privileges to be assigned to the end user. Instead, the administrator configures the installation program itself with the password to an administrative account. You do not need to modify the end user’s permissions.

  • In organizations where IT policies are less strictly enforced, Agent/Profile installation using simple Agent download is recommended. The administrator sends out an email message instructing users to visit the download site where they can install the Agent. Using this method, however, requires that end users who will install the Agent have administrator privileges.


In organizations that also have Macs in the environment, Agent installation using the email link is recommended. The administrator sends out an email message instructing users to visit the download site where they can install Agent. Using this method, however, requires that end users who will install the Agent have administrator privileges.


The downloaded package is unique for each machine. The same package cannot be used on a different Mac.


In organizations also have Android devices in the environment, Agent installation using Worry-Free Business Security Services is recommended. Users download the Agent from Worry-Free Business Security Services and use the authentication code they receive from the administrator to enroll the device and activate the agent.

For more information about the installation methods, see Security Agent Installation Methods.


Before deploying Security Profiles to iOS devices, administrators must first create a valid Apple Push Notification Service (APNs) certificate. For more information about the certificate, go to ADMINISTRATION > Mobile Device Enrollment Settings.