Worry-Free Business Security Services 6.7 Server Help > Security Agent Installation > Preparation
        • Online Help Center Home

        • Privacy and Personal Data Collection Disclosure
          • Pre-release Disclaimer
        • Worry-Free Business Security Services Data Privacy, Security, and Compliance
        • Release Notes
        • Product Overview
          • Overview of Trend Micro Worry-Free Business Security Services
            • Features and Benefits
              • Protecting Your Network
                • Web Console
                • Worry-Free Services Server
                • Worry-Free Business Security Services Security Agent
            • Comparing Features of Worry-Free Editions
            • License Status Consequences
            • Choosing your Edition
            • Special Licensing
        • Security Agent Installation
          • Preparation
            • System Requirements
              • Web Console
              • Windows Security Agent Minimum Requirements
              • Mac Security Agent Minimum Requirements
              • Android Security Agent Minimum Requirements
              • iOS Profile Minimum Requirements
              • Chrome Extension System Requirements
            • Licenses, Registration, and Activation
            • Deployment Checklist
              • Conflicting 3rd Party Applications
              • Identifying the Number of Clients
              • Planning for Network Traffic
              • Network Traffic During Pattern File Updates
              • Determining the Number of Groups
              • Security Agent Deployment Options
            • Ports Checklist
          • Installation
            • Security Agent Installation Methods
              • Security Agent Installation — Send Installation Invitation
                • Installing the Agent on a Windows Computer, after Receiving the Email
                • Installing the Agent on a Mac, after Receiving the Email
                • Installing the Profile on an iOS Device, after Receiving the Email
                • Installing the Agent on an Android Device, after Receiving the Email
              • Security Agent Installation — Download Installer
                • Download Installer — Same Group and Account Installation
                • Download Installer — Different Group and Account Installation
              • Security Agent Installation — Install on This Endpoint
              • Chrome Extension Mass Deployment for Chromebooks
            • Removing Security Agents
              • Removing the Security Agent from the Web Console
              • Removing the Security Agent from Windows
              • Removing the Security Agent from Mac
              • Removing the Security Agent from Android Devices
              • Removing the Security Profile from iOS Devices
          • Migrating and Upgrading
            • Migrating from Trend Micro Anti-Spyware
            • Migrating from Other Antivirus Applications
            • Comparison of Security Agent and Trend Micro Anti-Spyware Settings
            • Preventing Upgrade for Selected Security Agents
              • Disabling Upgrades on Mac Security Agents
          • Security Agent Information
            • Viewing Security Agent Icons in the Windows System Tray
            • Shortcuts
        • Security Agent Management
          • Security Agent Tree Management
            • Security Agent Tree
            • Security Agent Tree Commands
              • Adding Manual Groups
              • Adding New Filters
              • Replicating Group Settings
              • Restoring Endpoints from Manual to Active Directory Domain Groups
          • Security Agent List Management
            • Security Agent List Commands and Tasks
              • Security Agent Statuses
              • Using Advanced Search
              • Managing Full Disk Encryption
                • Full Disk Encryption System Requirements
                • Encryption Statuses
                • Resolving Encryption Issues
                • Getting Recovery Keys
            • Endpoint Details
              • Endpoint Commands and Information: Windows
              • Endpoint Commands and Information: Mac
              • Endpoint Commands and Information: Android
              • Endpoint Commands and Information: iOS
          • Updates
            • About Updates
            • About ActiveUpdate
            • Component Updates
              • Components
              • Scan Engine
                • Scan Engine Updates
            • Manual Updates
        • Policies
          • Policy Settings
            • Scan Methods
            • Scan Types
              • IntelliScan
              • IntelliTrap
              • ActiveAction
              • Recommended Manual Scan Settings
            • Behavior Monitoring
            • Predictive Machine Learning
            • Web Reputation Services
            • Firewall
              • Intrusion Detection System
            • Device Control
            • URL Filtering
            • Data Loss Prevention (DLP)
              • Data Loss Prevention Policies
              • Predefined DLP Templates
              • Data Loss Prevention Channels
            • Application Control
          • Policy Management
            • Comparison between Classic and Advanced Modes
            • Policy Management in Classic Mode
            • Policy Management in Advanced Mode
              • Policy List Data
            • Configuring Policy
            • Switching Policy Management Modes
          • Windows Policy Settings
            • Configuring Scan Settings
              • Real-Time Scan: Target Tab
              • Real-Time Scan: Action Tab
              • Scheduled Scan: Target Tab
              • Scheduled Scan: Action Tab
              • Manual Scan: Target Tab
              • Manual Scan: Action Tab
            • Configuring Behavior Monitoring
              • Event Monitoring
            • Configuring Predictive Machine Learning Settings
            • Enabling Vulnerability Protection
            • Configuring Web Reputation
            • Configuring the Firewall
              • Configuring Firewall Exceptions
            • Enabling Endpoint Sensor
            • Enabling Sample Submission
            • Configuring Device Control
              • Configuring Device Control Exceptions
                • Configuring the Allowed Program List
                  • Specifying a Digital Signature Provider
                  • Wildcard Support for the Device Control Allowed Programs List
            • Configuring Data Loss Prevention
              • Configuring Data Loss Prevention Exceptions
              • Running the Device List Tool
              • Decompression Rules
                • Rule 1: Maximum Size of a Decompressed File
                • Rule 2: Maximum Compression Layers
                • Rule 3: Maximum Number of Files to Scan
              • Blocking Access to Data Recorders (CD/DVD)
            • Configuring URL Filtering
            • Configuring Application Control Settings
            • Configuring Scan Exclusions
              • Excluding Files, Folders, and File Extensions from Scans
                • Supported System Variables for File and Folder Exceptions
                • Wildcard Exceptions
              • Configuring the Spyware/Grayware Approved List
              • Configuring the Behavior Monitoring Exception List
                • Behavior Monitoring Exception List Wildcard Support
                • Supported Environment Variables
            • Configuring the Approved/Blocked URL Lists
            • Configuring Privileges and Other Settings
              • Configuring Agent Privileges
              • Configuring Agent Alert Settings
              • Configuring Other Agent Settings
          • Mac Policy Settings
            • Configuring Scan Settings
              • Configuring Real-Time Scan Settings
              • Configuring Scheduled Scan Settings
              • Configuring Manual Scan Settings
            • Enabling Predictive Machine Learning
            • Configuring Web Reputation
            • Configuring Device Control
            • Configuring URL Filtering
            • Configuring the Approved URL List
            • Excluding Files and File Extensions from Scans
              • Wildcard Support for Mac File Exclusions
            • Configuring Agent Privileges
          • Android Policy Settings
            • Configuring Scan Settings
            • Configuring Web Reputation
            • Configuring Android Password Settings
            • Configuring the Approved/Blocked URL Lists
            • Configuring Privileges and Other Settings
          • iOS Policy Settings
            • Configuring iOS Passcode Settings
          • Global Security Agent Settings
            • Configuring Security Settings
            • Configuring Agent Control Settings
            • Configuring Isolated Endpoints Settings
          • Global Exception Lists
            • Configuring the Global Approved URL List
            • Configuring the Global Blocked URL List
            • Configuring the Global Approved IP Address List for Web Reputation and URL Filtering
            • Configuring the Global Allowed Process List
            • Configuring the Global Windows Trusted Program List
            • Configuring the Global Mac Trusted Program List
            • Configuring the Global Predictive Machine Learning Exception List
            • Configuring the Global Allowed USB Device List
              • Adding Exceptions to the Allowed USB Device List
                • Running the Device List Tool
                • Getting Device Information on Mac
              • Adding Exceptions from Detected Devices
              • Importing Device Information to the Allowed USB Device List
              • Editing the Allowed USB Device List
            • Configuring the Global Approved IP Address List for Vulnerability Protection
          • Suspicious Object Lists
            • User-Defined Suspicious Object List
              • Adding Objects to the User-Defined Suspicious Object List
            • Virtual Analyzer Suspicious Object List
              • Virtual Analyzer Suspicious Object Exception List
          • Application Control Rules
            • Application Control Rules
              • Configuring Application Control Rules
                • Unallowed Application Control Paths
                • Supported System Variables for Application Control Rules
                • Using the Hash Generator Tool
                • Network Bandwidth Consumption Resulted from Application Reputation List Updates
        • Monitoring and Notifications
          • Dashboard
            • Dashboard Overview
              • Action Center
                • Antivirus - Threats Unresolved
                • Antivirus - Real-Time Scan Disabled
                • Antispyware - Threats Unresolved
                • Mobile Device Management Commands - Incomplete
                • Mobile Device Management Commands - Pending
                • Smart Protection Services - Agents Disconnected
                • Update - Outdated Agents
              • Detections by Infection Channel
                • Clicking the Enable Ransomware Protection Button
              • Noteworthy Events
              • Security Risk Detections Over Time
              • Security Agent Status
            • Dashboard - Cloud App Security
              • Overall Threat Detections
              • Internal User Risk Insights Widgets
              • Business Email Compromise (BEC) Widgets
                • Top 5 BEC Email Recipients Widget
                • Top 5 Writing Style Analysis Violations by Recipient Widget
                • Top 5 Targeted High Profile Users Widget
              • Credential Phishing Detections
          • Users
            • Users Overview
            • User Details
          • Reports and Logs
            • Report Overview
              • Report Content
              • Configuring Report Settings
            • Logs Overview
              • Security Risk Detection Logs
              • Web Console Event Logs
              • Component Update Logs
              • Security Agent Event Logs
          • Notifications
            • Notifications Overview
            • Configuring Notification Settings
            • Customizing Notifications
        • Administration
          • General Settings
            • Configuring General Settings
          • Mobile Device Enrollment Settings
            • Configuring Mobile Device Enrollment Settings
          • User Accounts
            • User Account Management
              • Features Affected by Managed Groups
          • Active Directory Settings
            • Configuring Azure Active Directory Integration
            • Configuring Active Directory Server Integration
              • Resolving Synchronization Issues
              • Common Active Directory Synchronization Tool System Requirements
              • Updating Common Active Directory Synchronization Tool
            • Importing Active Directory Structure Manually
              • Specifying Active Directory Export Settings
              • Exporting Active Directory Structure
              • Importing the LDIF File
              • Removing the Active Directory Structure
          • Smart Protection Network
            • Smart Protection Network Participation
            • Participating in Smart Protection Network
          • Cloud App Security Settings
            • Enabling Email Metadata Collection
          • Recovery Key Password
            • Configuring Recovery Key Password
          • Tools
            • Login Script Setup Tool
            • Example Deployment Script
            • Uninstaller for Mac
            • Image Cloning Setup Tool
            • On-Premises Server Migration Tool
              • OfficeScan Migration System Requirements
              • Worry-Free Business Security Migration System Requirements
              • Migrated Policy Setting Mapping for OfficeScan
                • Mapping: Manual Scan Settings
                • Mapping: Real-Time Scan Settings
                • Mapping: Scheduled Scan Settings
                • Mapping: Web Reputation Settings
                • Mapping: Predictive Machine Learning Settings
                • Mapping: Behavior Monitoring Settings
                • Mapping: Device Control Settings
                • Mapping: Data Loss Prevention Settings
                • Mapping: Sample Submission Settings
                • Mapping: Privileges and Other Settings
                • Mapping: Additional Service Settings
                • Mapping: Spyware/Grayware Approved List
                • Mapping: Trusted Program List
            • Restore Infected Files
              • Excluding Folders from Scans
              • Restoring an Encrypted File Using the Graphical Interface
              • Restoring an Encrypted File Using the Command Line Interface
                • Encrypting or Decrypting Files in Other Locations
          • License
            • Viewing Product License Details
          • Trend Micro Remote Manager
            • About Trend Micro Remote Manager
          • Web Console Settings
            • Changing Web Console Themes
            • Changing the Web Console Password
        • Detection & Response
          • Noteworthy Events
            • Noteworthy Events Overview
            • Analysis Chains
              • Object Details Tab
              • Email Message Correlation
              • Navigating the Analysis Chain
              • Noteworthy Event Icons
          • Threat Investigation
            • Threat Investigation Overview
            • Using Custom Criteria for Threat Investigation
              • Supported Formats for Custom Criteria
            • Using OpenIOC Files for Threat Investigation
              • Supported IOC Indicators
            • Threat Investigation - Email Assessment
        • Appendices
          • Best Practices
          • Troubleshooting and FAQs
            • Troubleshooting
              • Incorrect Number of Endpoints on the Web Console
              • Security Agent Does Not Appear on the Web Console After Installation
              • Issues During Migration from Other Antivirus Software
            • Frequently Asked Questions (FAQs)
              • I have several questions about using Worry-Free Services to protect me from ransomware. Where can I find the answers?
                • What happens when I click the Enable Ransomware Protection button?
                • How can I verify that all ransomware-related settings are enabled?
                • What are the risks of enabling Ransomware Protection?
                • What should I do when Behavior Monitoring and Ransomware Protection are not working?
              • Where can I find my registration information?
              • I have several questions on registering Worry-Free Services. Where can I find the answers?
              • Which Agent installation method is best for my network environment?
              • What should I do if I am unable to connect to the server while installing the Security Agent?
              • Does Worry-Free Services support 64-bit platforms?
              • How can I recover a lost or forgotten password?
              • What happens when an attempted Intuit update is blocked?
              • Can other programs be allowed to update Intuit files? Can I bypass Trend Micro protection on a case-to-case basis?
              • Do I have the latest pattern file?
              • What is the maximum number of devices and groups that Worry-Free Services can support?
              • How can I perform a mass deployment to Mac?
              • How do I copy the Identifier information?
              • How can I enable Web Reputation on Android 6.0 or later?
            • Product Exclusion List
          • Getting Help
            • The Trend Micro Knowledge Base
            • Trend Community
            • Contacting Support
              • Using the Support Portal
              • Speeding Up the Support Call
            • Sending Suspicious Content to Trend Micro
              • File Reputation Services
              • Web Reputation Services
            • Troubleshooting Resources
              • Threat Encyclopedia
              • Download Center
              • Documentation Feedback
          • Glossary

        Preparation

        • System Requirements
        • Licenses, Registration, and Activation
        • Deployment Checklist
        • Ports Checklist
        Parent topic: Security Agent Installation