Best Practices

There are many steps you can take to protect your devices and network from Internet threats. Trend Micro recommends the following actions:

  • Use the Trend Micro recommended default settings.

  • Keep your operating systems and all software updated with the latest patches.

  • Make sure that agents have up-to-date patterns.

  • Use strong passwords and advise your end users to use strong passwords.

    A strong password should be at least eight characters long and use a combination of upper and lower case alphabets, numbers, and non-alphanumeric characters. It should never contain personal information. Change your passwords every 60 to 90 days.

  • Disable all unnecessary programs and services to reduce potential vulnerabilities.

  • Educate your end users to:

    • Read the End User License Agreement (EULA) and included documentation of applications they download and install on their devices.

    • Refuse any message asking for authorization to download and install software (unless the end users are certain that they can trust both the creator of the software they are downloading and the website source from where they are downloading the software).

    • Disregard unsolicited commercial email messages (spam), especially if the spam asks users to click a button or hyperlink.

  • Configure web browser settings that ensure a strict level of security.

    To increase the security level for Internet Explorer (IE), go to Tools > Internet Options > Security and move the slider to a higher level. If this setting causes problems with websites you want to visit, click Sites..., and add the sites you want to visit to the trusted sites list.

  • If using Microsoft Outlook, configure the security settings so that Outlook does not automatically download HTML items, such as pictures sent in spam messages.

  • Prohibit the use of peer-to-peer file-sharing services.

  • Periodically examine the installed software on the devices on your network. If you find an application or file that WFBS-SVC cannot detect as an Internet threat, send it to Trend Micro at: TrendLabs will analyze the files and applications you submit.

  • Use the Trend Micro Anti-Threat Toolkit to analyze malware issues and clean infections.

    For more information, see