WFBS70 Advanced EN IG
WFBS70 Advanced EN IG
WFBS70 Advanced EN IG
Business Security
Standard and Advanced Editions
7 TM
Administrator’s Guide
Installation Guide
Trend Micro Incorporated reserves the right to make changes to this document and to
the products described herein without notice. Before installing and using the software,
please review the readme files, release notes, and the latest version of the applicable user
documentation, which are available from the Trend Micro website at:
http://www.trendmicro.com/download
Trend Micro, the Trend Micro t-ball logo, TrendProtect, TrendSecure, Worry-Free,
OfficeScan, ServerProtect, PC-cillin, InterScan, and ScanMail are trademarks or
registered trademarks of Trend Micro, Incorporated. All other product or company
names may be trademarks or registered trademarks of their owners.
Copyright© 2010. Trend Micro Incorporated. All rights reserved.
Document Part Number: WBEM74599/100819
Release Date: October 2010
Product Name and Version No.: Trend Micro™ Worry-Free™ Business Security 7.0
Document Version No.: 1.02
Protected by U.S. Patent Nos. 5,951,698 and 7,188,369
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
The user documentation for Trend Micro™ Worry-Free™ Business Security is intended
to introduce the main features of the software and installation instructions for your
production environment. You should read through it prior to installing or using the
software.
Detailed information about how to use specific features within the software are available
in the online help file and the Knowledge Base at Trend Micro website.
Trend Micro is always seeking to improve its documentation. Your feedback is always
welcome. Please evaluate this documentation on the following site:
http://www.trendmicro.com/download/documentation/rating.asp
Contents
Contents
Chapter 1: Introducing Trend Micro™
Worry-Free™Business Security Standard and
Advanced
Overview of Trend Micro Worry-Free Business Security ........................ 1-2
What's New ...................................................................................................... 1-2
Version 7.0 .................................................................................................. 1-2
Key Features .................................................................................................... 1-3
The Trend Micro Smart Protection Network ....................................... 1-3
Smart Feedback .......................................................................................... 1-3
Web Reputation ......................................................................................... 1-4
Email Reputation (Advanced only) ......................................................... 1-4
File Reputation ........................................................................................... 1-4
Smart Scan ................................................................................................... 1-5
URL Filtering .............................................................................................. 1-5
Benefits of Protection .................................................................................... 1-5
Defense Components ..................................................................................... 1-6
Understanding Threats ................................................................................. 1-10
Network Components ................................................................................. 1-15
Sending Trend Micro Your Viruses ........................................................... 1-16
i
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
ii
Contents
iii
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
iv
Contents
Appendix C: Glossary
Glossary ............................................................................................................C-1
Index
v
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
vi
Chapter 1
1-1
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Note: This document provides information for both Worry-Free Business Security Standard
and Worry-Free Business Security Advanced. Sections and chapters relevant to the
Advanced version only are marked as: “(Advanced only)”.
What's New
Version 7.0
Version 7.0 of Worry-Free Business Security provides the following new features and
enhancements:
• Mac Client Protection (Advanced only)
• Data Loss Prevention via email (Advanced only): data loss prevention content
filtering policies prevent sensitive information from being distributed outside the
network
• Enhanced ScanMail for Exchange Support (Advanced only): supports
Microsoft Exchange Server 2010
• Device Control: regulates access to USB devices and network resources
1-2
Introducing Trend Micro™ Worry-Free™Business Security Standard and Advanced
Key Features
Product features for this version include better integration with the Trend Micro Smart
Protection Network.
Smart Feedback
Trend Micro Smart Feedback provides continuous communication between Trend
Micro products as well as the company’s 24/7 threat research centers and technologies.
Each new threat identified via a single customer's routine reputation check automatically
updates all of the Trend Micro threat databases, blocking any subsequent customer
1-3
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Web Reputation
With one of the largest domain-reputation databases in the world, the Trend Micro Web
Reputation technology tracks the credibility of Web domains by assigning a reputation
score based on factors such as a website's age, historical location changes and
indications of suspicious activities discovered through malware behavior analysis. It will
then continue to scan sites and block users from accessing infected ones. To increase
accuracy and reduce false positives, Trend Micro Web reputation technology assigns
reputation scores to specific pages or links within sites instead of classifying or blocking
entire sites since, often, only portions of legitimate sites are hacked and reputations can
change dynamically over time.
File Reputation
Trend Micro file reputation technology checks the reputation of each file against an
extensive in-the-cloud database before permitting user access. Since the malware
information is stored in the cloud, it is available instantly to all users. High performance
content delivery networks and local caching servers ensure minimum latency during the
1-4
Introducing Trend Micro™ Worry-Free™Business Security Standard and Advanced
checking process. The cloud-client architecture offers more immediate protection and
eliminates the burden of pattern deployment besides significantly reducing the overall
client footprint.
Smart Scan
Trend Micro Worry-Free Business Security uses a new technology called Smart Scan. In
the past, WFBS clients used Conventional Scan, which involved each client downloading
scan-related components to perform scans. With Smart Scan, the client uses the pattern
file on the Smart Scan server instead. Only the Scan Server’s resources are used for
scanning files.
URL Filtering
URL filtering helps you control access to websites to reduce unproductive employee
time, decrease Internet bandwidth usage, and create a safer Internet environment. You
can choose a level of URL filtering protection or customize which types of websites you
want to screen.
Benefits of Protection
The following table describes how the different components of WFBS protect your
computers from threats.
T HREAT P ROTECTION
1-5
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
T HREAT P ROTECTION
Defense Components
Antivirus/Anti-spyware
• Virus Scan Engine (32-bit/64-bit) for the Security Agent and Messaging
Security Agent: The scan engine uses the virus pattern file to detect virus/malware
and other security risks on files that your users are opening and/or saving.
The scan engine works together with the virus pattern file to perform the first level
of detection using a process called pattern matching. Since each virus contains a
unique “signature” or string of tell-tale characters that distinguish it from any other
code, Trend Micro captures inert snippets of this code in the pattern file. The engine
then compares certain parts of each scanned file to patterns in the virus pattern file,
searching for a match.
1-6
Introducing Trend Micro™ Worry-Free™Business Security Standard and Advanced
• Virus pattern: A file that helps Security Agents identify virus signatures, unique
patterns of bits and bytes that signal the presence of a virus.
• Damage Cleanup Template: Used by the Damage Cleanup Engine, this template
helps identify Trojan files and Trojan processes, worms, and spyware/grayware so
the engine can eliminate them.
• Damage Cleanup Engine (32-bit/64-bit): The engine that Cleanup Services uses
to scan for and remove Trojan files and Trojan processes, worms, and
spyware/grayware.
• IntelliTrap exception pattern: The exception pattern used by IntelliTrap and the
scan engines to scan for malicious code in compressed files.
• IntelliTrap pattern: The pattern used by IntelliTrap and the scan engines to scan
for malicious code in compressed files.
• Smart Scan Agent Pattern: The pattern file that the client uses to identify threats.
This pattern file is stored on the Agent machine.
• Smart Feedback Engine (32-bit and 64-bit): The engine for sending feedback to
the Trend Micro Smart Protection Network.
• Smart Scan Pattern: The pattern file containing data specific to the files on your
client’s computers.
• Spyware scan engine (32-bit/64-bit): A separate scan engine that scans for,
detects, and removes spyware/grayware from infected computers and servers
running on i386 (32-bit) and x64 (64-bit) operating systems.
• Spyware/Grayware Pattern v.6: Contains known spyware signatures and is used
by the spyware scan engines (both 32-bit and 64-bit) to detect spyware/grayware on
computers and servers for Manual and Scheduled Scans.
• Spyware/Grayware Pattern: Similar to the Spyware/Grayware Pattern v.6, but is
used by the scan engine for anti-spyware scanning.
Anti-spam
• Anti-spam engine (32-bit/64-bit): Detects unsolicited commercial email
messages (UCEs) or unsolicited bulk email messages (UBEs), otherwise known as
spam.
• Anti-spam pattern: Contains spam definitions to enable the anti-spam engine to
detect spam in email messages.
1-7
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
• Email Reputation Services (ERS): Stops a large amount of spam before it hits
the gateway and floods the messaging infrastructure.
Outbreak Defense
Outbreak Defense provides early warning of Internet threats and/or other world-wide
outbreak conditions. Outbreak Defense automatically responds with preventative
measures to keep your computers and network safe, followed by protection measures to
identify the problem and repair the damage.
• Vulnerability Assessment Pattern: A file that includes the database for all
vulnerabilities. The Vulnerability Assessment Pattern provides instructions for the
scan engine to scan for known vulnerabilities.
Network Virus
• Firewall Driver (Windows XP, 32-bit/64-bit): The Firewall uses this engine,
together with the network virus pattern file, to protect computers from hacker
attacks and network viruses.
• Firewall Pattern: Like the virus pattern file, this file helps WFBS identify network
virus signatures.
• Transport Driver Interface (TDI) (32-bit/64-bit): The module that redirects
network traffic to the scan modules.
• Firewall Driver (Windows Vista/7, 32-bit/64-bit): For Windows™ Vista clients,
the Firewall uses this driver with the network virus pattern file to scan for network
viruses.
Web Reputation
• Trend Micro Security database: Web Reputation evaluates the potential security
risk of the requested Web page before displaying it. Depending on the rating
returned by the database and the security level configured, the Security Agent will
either block or approve the request.
• URL Filtering Engine (32-bit/64-bit): The engine that queries the Trend Micro
Security database to evaluate the page.
1-8
Introducing Trend Micro™ Worry-Free™Business Security Standard and Advanced
Software Protection
• Software Protection List: Protected program files (EXE and DLL) cannot be
modified or deleted. To uninstall, update, or upgrade a program, temporarily remove
the protection from the folder.
Behavior Monitoring
• Behavior Monitoring Core Driver: This driver detects process behavior on clients.
• Behavior Monitoring Core Library : SA uses this service to handle the Behavior
Monitor Core Drivers.
• Policy Enforcement Pattern: The list of policies configured on the Security Server
that must be enforced by Agents.
• Digital Signature Pattern: List of Trend Micro-accepted companies whose
software is safe to use.
• Behavior Monitoring Configuration Pattern: This pattern stores the default
Behavior Monitoring Policies. Files in this pattern will be skipped by all policy
matches.
• Behavior Monitoring Detection Pattern: A pattern containing the rules for
detecting suspicious threat behavior.
Wi-Fi Advisor
• Wi-Fi Advisor: Checks the safety of wireless networks based on the validity of their
SSIDs, authentication methods, and encryption requirements.
Content Filtering
• Restricted Words/Phrases List: The Restricted Words/Phrases List comprises
words/phrases that cannot be transmitted through instant messaging applications.
1-9
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Understanding Threats
The following is a discussion of these terms and their meanings as used in this
document.
Virus/Malware
A computer virus/malware is a program – a piece of executable code – that has the
unique ability to replicate. Virus/malware can attach themselves to just about any type
of executable file and are spread as files that are copied and sent from individual to
individual.
In addition to replication, some computer virus/malware share another commonality: a
routine that delivers the virus payload. While some payloads can only display messages
or images, some can also destroy files, reformat your hard drive, or cause other damage.
• Malware: A malware is a program that performs unexpected or unauthorized
actions. It is a general term used to refer to viruses, Trojans, and worms. Malware,
depending on their type, may or may not include replicating and non-replicating
malicious code.
• Trojans: Trojans are not viruses. They do not infect files, and they do not replicate.
They are malicious programs that masquerades as harmless applications.
An application that claims to rid your computer of virus/malware when it actually
introduces virus/malware into your computer is an example of a Trojan. It may
open a port in the background and let malicious hackers take control of the
computer. One common scheme is to hijack the computer to distribute spam.
Because a Trojan does not infect a file, there is nothing to clean, though the scan
engine may report the file as “uncleanable” and delete or quarantine it.
1-10
Introducing Trend Micro™ Worry-Free™Business Security Standard and Advanced
With Trojans, however, simply deleting or quarantining is often not enough. You
must also clean up after it; that is, remove any programs that may have been copied
to the machine, close ports, and remove registry entries.
• Worms: A computer worm is a self-contained program (or set of programs) that is
able to spread functional copies of itself or its segments to other computer systems.
The propagation usually takes place through network connections or email
attachments. Unlike virus/malware, worms do not need to attach themselves to host
programs.
• Backdoors: A backdoor is a method of bypassing normal authentication, securing
remote access to a computer, and/or obtaining access to information, while
attempting to remain undetected.
• Rootkit: A rootkit is a set of programs designed to corrupt the legitimate control of
an operating system by its users. Usually, a rootkit will obscure its installation and
attempt to prevent its removal through a subversion of standard system security.
• Macro Viruses: Macro viruses are application-specific. The viruses reside within
files for applications such as Microsoft Word (.doc) and Microsoft Excel (.xls).
Therefore, they can be detected in files with extensions common to macro capable
applications such as .doc, .xls, and .ppt. Macro viruses travel amongst data files in
the application and can eventually infect hundreds of files if undeterred.
• Mixed Threat Attack: Mixed threat attacks take advantage of multiple entry points
and vulnerabilities in enterprise networks, such as the "Nimda" or "Code Red"
threats.
The Agent programs on the client computers, referred to as the Security Agents and
Messaging Security Agents, can detect virus/malware during Antivirus scanning. The
Trend Micro recommended action for virus/malware is clean.
Spyware/Grayware
Grayware is a program that performs unexpected or unauthorized actions. It is a general
term used to refer to spyware, adware, dialers, joke programs, remote access tools, and
any other unwelcome files and programs. Depending on its type, it may or may not
include replicating and non-replicating malicious code.
• Spyware: Spyware is computer software that is installed on a computer without the
user’s consent or knowledge and collects and transmits personal information.
1-11
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Network Viruses
A virus spreading over a network is not, strictly speaking, a network virus. Only some of
the threats mentioned in this section, such as worms, qualify as network viruses.
Specifically, network viruses use network protocols, such as TCP, FTP, UDP, HTTP, and
email protocols to replicate.
Firewall works with a network virus pattern file to identify and block network viruses.
Spam
Spam consists of unsolicited email messages (junk email messages), often of a
commercial nature, sent indiscriminately to multiple mailing lists, individuals, or
newsgroups. There are two kinds of spam: Unsolicited commercial email messages
(UCEs) or unsolicited bulk email messages (UBEs).
1-12
Introducing Trend Micro™ Worry-Free™Business Security Standard and Advanced
Intrusions
Intrusions refer to entry into a network or a computer either by force or without
permission. It could also mean bypassing the security of a network or computer.
Malicious Behavior
Malicious Behavior refers to unauthorized changes by software to the operating system,
registry entries, other software, or files and folders.
Packers
Packers are tools to compress executable programs. Compressing an executable makes
the code contained in the executable more difficult for traditional Antivirus scanning
products to detect. A Packer can conceal a Trojan or worm.
The Trend Micro scan engine can detect packed files and the recommended action for
packed files is quarantine.
1-13
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
personal information such as passwords, social security numbers, and credit card
numbers in an attempt to trick a recipient into providing private information that may
be used for identity theft.
Messaging Security Agents use Anti-spam to detect phishing incidents. The Trend Micro
recommended action for phishing incidents is delete entire message in which it detected the
phish.
1-14
Introducing Trend Micro™ Worry-Free™Business Security Standard and Advanced
Network Components
Worry-Free Business Security uses the following components:
CONVENTION/TERM DESCRIPTION
Security Server The Security Server hosts the Web Console, the
centralized Web-based management console for
the entire Trend Micro™ Worry-Free™ Business
Security solution.
Web Console The Web Console is a centralized, management
console that manages all the Agents. The Web
Console resides on the Security Server.
Agent/SA /MSA The Security Agent or Messaging Security Agent
(Advanced only). Agents protect the Client it is
installed on.
Clients Clients are Microsoft Exchange servers, desktops,
portable computers, and servers where a
Messaging Security Agent or a Security Agent is
installed.
Scan Server A Scan Server helps scan clients that are
configured for Smart Scan. By default, a Scan
Server is installed on the Security Server.
1-15
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Please include in the message text a brief description of the symptoms you are
experiencing. The team of antivirus engineers will analyze the file to identify and
characterize any viruses it may contain, usually the same day it is received.
1-16
Chapter 2
2-1
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Tip: Refer to the System Checklists section of the WFBS Administrator’s Guide for
details.
2-2
Preparing for Installation
2-3
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Security
Server
Processor • Conventional scan mode: Intel™ Pentium™ 4 or higher
• Smart Scan mode: Multiple processors or multi-core
processor
Disk space 6GB total disk space (excludes SA and MSA disk usage)
• 3GB for installation
• 3GB for operation
2-4
Preparing for Installation
2-5
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
2-6
Preparing for Installation
Notes:
• Windows Server 2008 and 2008 R2 installations that use the
Server Core option are not supported.
• All major editions and 64-bit versions of the listed operating
systems are supported unless noted otherwise.
• Basic coverage in Windows SBS 7 and Windows Home
Server V2, full support to be released in WFBS7 Service
Pack.
2-7
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Web server • IIS 6.0 (Windows Server 2003, SBS 2003, or Home Server)
• IIS 7.0 (Windows Server 2008, SBS 2008, or EBS 2008)
• IIS 7.5 (Windows Server 2008 R2)
• Apache™ HTTP Server 2.0.63 or later
Management Console
Web browser Internet Explorer 6.0 SP2 or later (32-bit only)
Security Agent
Processor • Intel™ Pentium™ x86 or compatible processor
• x64 processor supporting AMD64 and Intel EM64T
technologies
• Clock speed requirements vary depending on the operating
system:
• 1GHz (Windows Server 2008, SBS 2008, or EBS 2008)
• 800MHz (Windows Vista, Windows 7)
• 450MHz (Windows XP, Server 2003, SBS 2003, or Home
Server)
2-8
Preparing for Installation
Conventional Scan
1GB total disk space
• 400MB for installation
• 600MB for operation
2-9
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Memory 1GB
2-10
Preparing for Installation
Web server • IIS 6.0 (Windows Server 2003, SBS 2003, or Home Server)
• IIS 7.0 (Window Server 2008, SBS 2008, or EBS 2008)
• IIS 7.5 (Windows Server 2008 R2)
Mail server Exchange Server 2003 SP2 or above. Exchange 2007 SP1 or
above, and Exchange 2010
Notes
• Security Agents support Citrix Presentation Server™ 4.0/4.5/5.0 and Remote
Desktop
• Security Agents support Gigabit network interface cards (NICs)
• WFBS 7.0 supports VMware® ESX™ 3.0/3.5, VMware Server 1.0.3/2.0.1,
VMware Workstation 6.0/6.5, and Microsoft Hyper-V™ Server 2008
Other Requirements
• Clients that use Smart Scan must be in online mode. Offline clients cannot use
Smart Scan
• Administrator or Domain Administrator access on the computer hosting the
Security Server
• File and printer sharing for Microsoft Networks installed
• Transmission Control Protocol/Internet Protocol (TCP/IP) support installed
2-11
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
• If Microsoft ISA Server or a proxy product is installed on the network, you need to
open the HTTP port (8059 by default) and the SSL port (4343 by default) to allow
access to the Web Console and to enable client-server communications
Note: The 30-day evaluation version is installed by default when you do not provide an
Activation Code. You can also install an evaluation version without a Registration Key
or Activation Code. To find out more information, contact your Trend Micro sales
representative (see Contacting Trend Micro on page B-4).
2-12
Preparing for Installation
Note: If you purchase the Trend Micro SMB Solution CD, you can find an evaluation
Registration Key on the packing. Use this key to register online and obtain your
personal Activation Code via email.
Activation Code
After registering, you will receive a personal Activation Code via email. An
Activation Code has 37 characters (including the hyphens) and looks like this:
xx-xxxx-xxxxx-xxxxx-xxxxx-xxxxx-xxxxx
You automatically receive an evaluation Activation Code if you download
Worry-Free Business Security 7.0 from the Trend Micro website.
During the installation program, you need to provide your activation code to
validate WFBS 7.0.
Note: When the evaluation period ends, the Security Server no longer receives updated
components unless you key in your personal Activation Code in the Web Console.
2-13
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
organization and Trend Micro regarding your right to receive technical support and
product updates in consideration for the payment of applicable fees.
A license to the Trend Micro software usually includes the right to product updates,
pattern file updates, and basic technical support for one (1) year from the date of
purchase. After the first year, you must renew the Maintenance Agreement annually
against then-current Trend Micro maintenance fees.
Note: The Maintenance Agreement expires, but your License Agreement does not. If
the Maintenance Agreement expires, scanning can still occur, but you will not be
able to update the malware/virus pattern files, scan engine, or program files
(even manually). Nor will you be entitled to receive technical support from Trend
Micro.
Sixty (60) days before your Maintenance Agreement expires, the Live Status screen
on the Web Console will display a message, warning you to renew your license. You
can update your Maintenance Agreement by purchasing renewal maintenance from
your reseller, Trend Micro sales person, or on the Trend Micro website at:
https://olr.trendmicro.com/registration/
Note: If you have questions about the registration process, please consult the Trend
Micro support website at:
http://esupport.trendmicro.com/support/viewxml.do?ContentID=en-11
6326
2-14
Preparing for Installation
WORRY -F REE
WORRY -F REE B USINESS
F EATURES B USINESS S ECURITY
S ECURITY A DVANCED
2-15
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
The following table lists the features supported for each type of license.
TABLE 2-3. License Status Consequences
2-16
Preparing for Installation
Note: In the WFBS implementation of the Smart Scan, the same computer acts as both
the Security Server and the Smart Scan server.
The following figure illustrates how the WFBS components are installed on a typical
network.
2-17
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Internet
Firewall
Gateway
Local Network
S YMBOL D ESCRIPTION
2-18
Preparing for Installation
Security Server
At the center of WFBS is the Security Server (indicated by SS in Figure 2-1). The Security
Server hosts the Web-based management console for WFBS. The Security Server installs
Security Agents on clients on the network and creates a client-server relationship. The
Security Server enables viewing security status information, viewing Security Agents,
configuring system security, and downloading components from a centralized location.
The Security Server also contains a database where it stores logs of detected Internet
threats being reported to it by the Security Agents.
2-19
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Internet
Web Console
Trend Micro Security
Server with HTTP
Web server
Clients
Security Agent
The Security Agent (indicated by A in Figure 2-1) reports to the Trend Micro Security
Server from which it was installed. To provide the Security Server with the very latest
client information, the Security Agent sends event status information in real-time.
Security Agents report events such as threat detection, Agent startup, Agent shutdown,
start of a scan, and completion of an update.
The Security Agent provides three methods of scanning: Real-time Scan, Scheduled
Scan, and Manual Scan.
You can configure scan settings on Security Agents from the Web Console. To enforce
uniform desktop protection across the network, choose not to grant user privileges to
modify the scan settings or to remove the Security Agent.
2-20
Preparing for Installation
Scan Server
As part of the Smart Protection Network, WFBS 7.0 now provides the ability to scan
your clients with a Scan Server. This takes the burden of downloading components and
scanning clients off your client computers and puts it on a Scan Server.
There are two types of Scan Servers:
• Scan Server: A Scan Server is automatically installed with the Security Server. This
allows your server to act as a both centralized control center for your Security
Agents and as a security scanner.
• Trend Micro Global Smart Scan Server: Trend Micro provides a Scan Server for
all clients as a backup. If the Scan Server on your network fails for any reason, Trend
Micro provides you with the necessary protection.
2-21
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Smart Scan:
Clients send file information to the Scan Server for
analysis, and the Scan Server tells the client which
files pose security risks .
Note: The Scan Server is automatically installed with the Security Server. After installation,
you can specify which computers will use the Scan Server.
2-22
Preparing for Installation
Installation Overview
The setup program will prompt you for the following information during installation:
• Security Server details: The domain/hostname or the IP address of the Security
Server and the target folder where WFBS installs the Security Server files
• Proxy server details: If a proxy server handles Internet traffic on your network,
you must configure proxy server information (if required, the user name and
password too). This information is necessary to download the latest components
from the Trend Micro update server. You can enter proxy server information during
or after installation. Use the Web Console to enter information after installation.
• SMTP server: If using an SMTP server to send notifications, enter the name of the
SMTP server, the port number, and the sender’s and recipients’ email addresses.
Note: If the SMTP server is on the same computer as WFBS and is using port 25, the
installation program detects the name of the SMTP server and updates the
SMTP Server and Port fields.
WARNING! If you are installing the Messaging Security Agent on a server that is run-
ning lockdown tools, remove the lockdown tool so that it does not disable
the IIS service and causes the installation to fail.
2-23
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Ports
WFBS uses two types of ports:
• Server listening port (HTTP port): Used to access the Trend Micro Security
Server. By default, WFBS uses one of the following:
• IIS server default website: The same port number as your HTTP server’s
TCP port.
• IIS server virtual website: 8059
• Apache server: 8059
• Client listening port: A randomly generated port number through which the
Client receives commands from the Trend Micro Security Server.
• Scan Server ports: Used to scan your agents. See Table 2-5:
P RE -I NSTALLED N EW A PACHE
IIS DEFAULT IIS V IRTUAL A PACHE I NSTALLATION
2-24
Preparing for Installation
You can modify the listening ports only during the installation.
WARNING! Today’s cyber criminals use HTTP and direct their attacks at ports 80
and/or 8080 – commonly used in most organizations as the default Trans-
mission Control Protocol (TCP) ports for HTTP communications. If your
organization is currently using one of these ports as the HTTP port,
Trend Micro recommends using another port number.
Note: To find out which port your Security Agents are using to connect to the Scan Server,
open SSCFG.ini in the folder where the server is installed.
2-25
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
WARNING! Make sure that you do not install the Security Server on a computer that is
running applications that might lock IIS. This could prevent successful
installation. See your IIS documentation for more information.
Tip: Trend Micro recommends installing WFBS during non-peak hours to minimize the
impact on your network.
If a non-supported version of the Apache Web server is already installed on the Security
Server, use IIS instead of Apache. If two Web server applications are running at the
same time, verify that the port numbers do not conflict, and that the computer has
enough memory, CPU power, and disk resources.
2-26
Preparing for Installation
Compatibility Issues
This section explains compatibility issues that may arise with certain third-party
applications. Always refer to the documentation of all third-party applications that are
installed on the same computer on which you will install the Security Server and other
components.
Note: WFBS cannot uninstall the server component of any third-party antivirus product but
can uninstall the client component (see Migrating from Other Anti-Malware
Applications on page 4-4 for instructions and for a list of third-party applications
WFBS can remove).
2-27
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Databases
Scanning databases may decrease the performance of applications that access the
databases. Trend Micro recommends excluding databases and their backup folders from
Real-time Scan. If you need to scan a database, perform a Manual Scan or schedule a
scan during off-peak hours to minimize the impact.
Deployment Checklist
Look over the following before you deploy WFBS.
Note: If a firewall is located between the Trend Micro Security Server and its clients, you
must configure the firewall to allow traffic between the client listening port and Trend
Micro Security Server’s listening port.
2-28
Preparing for Installation
Note: A single Security Server installation can manage up to 2.500 clients. If you have more
clients, Trend Micro suggests installing more than one Security Server.
2-29
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Note: Apart from updates, all the other actions generate a small amount of traffic.
2-30
Preparing for Installation
A WFBS security group is different from a Windows domain. You can create multiple
security groups within a single Windows domain. You may also assign computers from
different Windows domains to the same security group. The only requirement is that all
the clients in a group must be registered to the same Security Server.
2-31
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
You can group clients based on the departments they belong to or the functions they
perform. Alternatively, you can group clients that are at a greater risk of infection and
apply a more secure configuration than you may wish to apply to other clients. You will
need at least one group for every unique client configuration that you wish to create.
Note: Remote install works only with Windows 7/Vista/XP (Professional Edition only) and
Windows Server 2003/2008
In organizations where IT policies are less strictly enforced, Trend Micro recommends
to install Security Agents using the internal Web page. The administrator sends out an
email message instructing users to visit an internal Web page where they can install the
Security Agent. Using this method, however, requires that end users who will install the
Security Agent have administrator privileges.
WFBS includes a tool called the Vulnerability Scanner, which can help to detect
computers that are not protected by WFBS. Once the Vulnerability Scanner detects an
unprotected computer, it deploys the Security Agent to it. When you enter a range of IP
2-32
Preparing for Installation
addresses, the Vulnerability Scanner checks every computer within the specified range
and reports the current antivirus software version (including third-party software)
installed on each computer.
Note: To install the Security Agent using Vulnerability Scanner, you must have administrator
rights. To bypass this problem, you can provide administrator-level login credentials
that the Vulnerability Scanner will then use to install the Security Agent.
Client Packager, a WFBS tool, can compress setup and update files into a
self-extracting file to simplify delivery through an email message, CD-ROM, or internal
FTP. When users receive the package, they have to double-click the file to start the setup
program.
Tip: Remote Install is efficient for networks with Active Directory. If your network does not
use Active Directory, use Web installation.
For more information about the installation methods, refer to the WFBS Administrator’s
Guide.
Ports Checklist
WFBS uses the following default ports.
SMTP 25
Proxy Administrator
Defined
Security Server: Non-SSL Port 8059
Security Server: SSL Port 4343
2-33
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
IP address 192.168.1.1
IP address 192.168.1.1
2-34
Preparing for Installation
IP address 192.168.1.1
IP address 192.168.1.1
IP address 192.168.1.1
2-35
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
2-36
Chapter 3
3-1
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Installation Overview
There are three methods for installing WFBS:
• Typical (Recommended): Provides an easy solution for installing WFBS using
Trend Micro default values. This method is suitable for a small business using a
single Trend Micro Security Server and up to ten clients.
• Minimal Install: Provides an entry-level configuration of WFBS that offers robust
prevention, threat detection, and remediation using Trend Micro Smart Scan
technology that minimizes the impact on system and network resources
• Custom: Provides flexibility in implementing your network security strategy. This
method is suitable if you have many computers and servers or multiple Exchange
servers.
• Silent: Performing a Silent installation creates a record file that you can use to
perform identical installations on other computers or networks
Tip: You can preserve your client settings when you upgrade to this version of WFBS or if
you need to reinstall this version of WFBS. See Upgrading the Security Agent on page 4-8.
Note: If information from a previous Messaging Security Agent (MSA) installation exists on
the client, you will be unable to install MSA successfully. Use the Windows Installer
Cleanup Utility to clean up remnants of the previous installation. To download the
Windows Installer Cleanup Utility, visit
http://support.microsoft.com/kb/290301/en-us
3-2
Installing the Server
Note: If the Security Server (including the Smart Scan service) is installed on Windows
XP, Microsoft IIS can support only a maximum of 10 client connections to the
Smart Scan service. If clients will use Smart Scan and the Security Server is
installed on Windows XP, select the Apache web server instead of IIS.
3-3
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Tip: Close any running applications before installing WFBS. If you install while other
applications are running, the installation process may take longer to complete.
3-4
Installing the Server
5. From the Setup Type screen, choose one of the following options:
• Typical install (Recommended)
• Minimal Install
• Custom install
Refer to Installation Overview on page 3-2 for the differences.
Note: The default parameters for the Typical and Custom installation are the same.
3-5
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Note: If you do not have an Activation Code, you may not have registered your copy of
WFBS yet. Click the Register Online button to open a new browser window.
Follow the instructions on the Registration screen.
Alternatively, click Next to install the evaluation version. If you upgrade to the
full version before the 30-day evaluation period ends, all your program settings
will remain.
3-6
Installing the Server
The Setup Overview screen shows the components that you need configure in
order to install the Trend Micro Security Server, the Security Agent, and the
Messaging Security Agent.
3-7
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Note: This screen will not appear if you choose the Typical installation method.
3-8
Installing the Server
3-9
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Note: If there is an Exchange server on the same computer to which you are
installing the Security Server, the remote Messaging Security Agent will not
show on the Select Components screen; only the local Messaging Security
Agent will show
3-10
Installing the Server
3. Choose whether to prescan your computer for threats by selecting one of the
following options:
• Prescan my computer for threats: The prescan targets the most vulnerable
areas of the computer, which include the following:
• the Boot area and boot directory (for boot sector viruses)
• the Windows folder
• the Program Files folder
• Do not prescan my computer for threats
Trend Micro highly recommends to prescanning your computer for security threats
to ensure that the installation goes into a clean environment. Not prescanning the
computer could prevent a successful installation.
3-11
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Note: This screen will not appear if you choose the Typical installation method.
5. From the Web Server screen, select a Web server to host the Security Server Web
Console. Choose one of the following servers:
• Internet Information Services (IIS) server
• Apache Web server 2.0.xx
3-12
Installing the Server
7. Choose from one of the following server identification options for client-server
communication:
• Server information: Choose domain name or IP address:
• Fully Qualified Domain Name: Use the Web server’s domain name to
ensure successful client-server communications
• IP address: Verify that the target server’s IP address is correct
Tip: When using an IP address, ensure that the computer where you are installing the
Security Server has a static IP address. If the server has multiple network
interface cards (NICs), Trend Micro recommends using the domain name
instead of the IP address.
3-13
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Note: If all access to the Security Server will be done from within your
network, you do not need to enable the SSL.
3-14
Installing the Server
• Security Agents: Required to uninstall Security Agents and remove them from
your computer.
• Password
• Confirm password
Note: The password field holds 1 –24 characters and is case sensitive.
10. Click Next. The SMTP Server and Notification Recipient(s) screen appears.
11. The Simple Mail Transfer Protocol (SMTP) Server and Notification Recipient(s)
screen requires the following information:
• SMTP server: The IP address of your email server
• Port: The port that the SMTP server uses for communications
3-15
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
• Recipient(s): The email address(es) that the SMTP server uses to send alert
notifications. You can enter multiple email addresses when more than one
person needs to receive notifications
Note: If the SMTP server is on the same computer as WFBS and uses port 25, the
installation program detects the name of the SMTP server and updates the
SMTP Server and Port fields.
Tip: Refer to your ISP mail server settings. If you do not know these settings,
proceed with the next step. You can update the SMTP settings after installation.
Refer to the Administrator’s Guide for instructions.
12. Click Next. The Trend Micro Smart Protection Network screen appears.
3-16
Installing the Server
13. Choose whether you want to participate in the Trend Micro Smart Protection
Network feedback program. This optional feature provides feedback to Trend
Micro about malware infections that your WFBS 7.0 installation detects. Trend
Micro recommends leaving the default value enabled as it uses WFBS feedback data
across the world to increase the effectiveness of its anti-malware solutions. You can
choose to cancel participation through the Security Server Web Console later.
14. Click Next. The General Proxy Settings screen appears.
Note: This screen will not appear if you choose the Typical installation method.
15. If a proxy server is required to access the Internet, select the Use a proxy server
check box and provide the following information:
• Proxy server type
• Server name or IP address
3-17
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
• Port
• User name and Password: To provide only if the proxy server requires
authentication
Note: This screen will not appear if you choose the Typical installation method.
3-18
Installing the Server
Note: This screen will not appear if you choose the Typical installation method.
3-19
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Note: This screen will not appear if you choose the Typical installation method.
5. You can configure Security Agent settings for Servers and Desktops:
• Servers: Windows Server 2003/2008 computers will be added to the default
Servers group when you first add them to the Web Console. You can enable
different technologies for this group based on your particular needs
• Desktops: Windows XP/Vista/7 computers will be added to the default
Desktops group when you first add them to the Web Console. You can enable
different technologies for this group based on you particular needs.
In each group, you can configure the following components:
• Smart Scan: Smart Scan uses a central scan server on the network to take
some of the burden of the scanning of clients.
3-20
Installing the Server
• Antivirus and Anti-Spyware: Scans files for malicious code as they are
accessed of created
• Firewall: Protects clients against malware attacks and network viruses by
creating a barrier between the clients and the network
• Web Reputation: Blocks malicious websites through the credibility of
Web domains and assigning a reputation score based on several identifying
factors
• URL Filtering: Blocks specified categories of websites (for example,
pornographic, social networking) according to your company’s policy
• Behavior Monitoring: Analyzes program behavior to proactively detect
known and unknown threats
• Device Control: Regulates access to external storage devices and network
resources
3-21
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
6. Click Next. The Proxy Setting for Additional Services screen appears.
Note: This screen will not appear if you choose the Typical installation method.
7. The Smart Scan, Web Reputation, and Behavior Monitoring services use the
proxy server address and port used by Internet Explorer on client computers. If
that proxy server requires authentication, use this screen to specify logon
credentials.
3-22
Installing the Server
Refer to Figure 3-5. Select Components screen on page 3-9 for a Security Server
components overview.
Method 2: Install the Messaging Security Agent from the Web Console after installation
is complete.
3-23
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
3-24
Installing the Server
Note: The installation program will automatically detect the name of the local
Exchange server and fill in the Exchange Server field if the Exchange server is
on the same computer as the Security Server. If you have an Exchange Server
installed on same computer, but the Exchange Server Name is not automatically
filled in, check if the environment meets the Messaging Security Agent system
requirements.
3-25
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Note: This screen will not appear if you choose the Typical installation method.
3-26
Installing the Server
Note: The option to select between EUQ and the Junk E-mail folder is only
available if the computer is running Exchange Server 2003. On Exchange
Server 2007 and 2010, the EUQ option is disabled by default. To enable
EUQ, read the instructions in this knowledge base article
http://esupport.trendmicro.com/pages/How-to-activate-EUQ-in-an-installe
d-SMEX-10.aspx
3-27
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
2. Click Next. The Install Remote Messaging Security Agent screen appears.
Note: The installer may be unable to pass passwords with special, non-alphanumeric
characters to the Exchange Server computer. This will prevent installation of the
Messaging Security Agent. To workaround this issue, either temporarily change
the password to the built-in domain administrator account or install the
Messaging Security Agent directly on the Exchange server.
3-28
Installing the Server
4. Click Next. The Remote Messaging Security Agent Settings screen appears.
Note: This screen will not appear if you choose the Typical installation method.
3-29
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
• Outlook Junk Email folder: If selected, WFBS stores spam mail into this
folder. Since Microsoft Outlook typically moves spam mail in the End
User Quarantine (EUQ) folder to the Junk E-mail folder, Trend Micro
recommends to select this option
Note: The option to select between EUQ and the Junk E-mail folder is only
available if the computer is running Exchange Server 2003. On Exchange
Server 2007 and 2010, the EUQ option is disabled by default. To enable
EUQ, read the instructions in this knowledge base article
http://esupport.trendmicro.com/pages/How-to-activate-EUQ-in-an-installe
d-SMEX-10.aspx
6. Click Next. The program begins installing the Remote Messaging Security Agent
on the remote Exchange server.
7. Upon completion, the Remote Messaging Security Agent Status screen
re-appears. Repeat the above process to install the Remote Messaging Security
Agents on other Exchange servers.
3-30
Installing the Server
1. Click Back if you wish to verify previous installation settings, or click Next to
proceed with the actual installation. The Install Third Party Components screen
appears.
3-31
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
2. This screen informs you which third party components will be installed. Click Next
to start installing the selected components. The entire installation process may take
some time to complete. During the installation, a status screen will show the
progress being made.
3. Once setup is complete, the Setup Wizard Complete screen appears. Click Finish
to close the install procedure.
3-32
Installing the Server
2. In command prompt mode, navigate to the directory where the extracted WFBS
setup files are located, for example: C:\Extract\WBS70\CSM
3. At the prompt, type Setup.exe /r /f1”c:\silent-install.iss”. Click
Enter. The Setup Wizard will start again. Your input will be recorded in the
silent-install.iss file on drive C.
3-33
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
4. Follow the instructions on you screen. The instructions are the same as described in
Typical Installation Walkthrough on page 3-3 and Custom Installation Walkthrough on page
3-3
5. At the end of the recording session the following confirmation screen appears.
Click Finish to end the recording session and return to the command prompt
mode.
3-34
Installing the Server
3. The silent WFBS installation will automatically start and will take the same amount
of time as a normal installation.
Note: During Silent installation, no progess indicators will be shown on your screen.
Note: If you are not using a Security Socket Layer (SSL), type http instead of https.
3-35
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
3-36
Installing the Server
WARNING! If the customer already exists on the WFRM Console and you use the
option above to associate with a new customer, this will result in two
duplicate customers with the same name appearing on the WFRM
network tree. To avoid this, use the method below:
3-37
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
3-38
Chapter 4
4-1
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Note: All previous settings will be retained after upgrading to this version 7.0.
Trend Micro offers two similar products to protect your computers and network:
Worry-Free Business Security and Worry-Free Business Security Advanced.
TABLE 4-1. Product Versions
You can upgrade from Worry-Free Business Security to Worry-Free Business Security
Advanced by typing the appropriate Activation Code in the Product License screen of
the Web Console.
Supported Upgrades
WFBS 7.0 supports upgrades from any of the following versions:
• Upgrade from Worry-Free Business Security or Worry-Free Business Security
Advanced versions 5.0, 5.1, and 6.0.
4-2
Upgrading and Migrating
Unsupported Upgrades
WFBS 7.0 does not support upgrades from the following program versions:
• All upgrades that supported Windows 2000
• Upgrade form Client/Server Messaging Security 3.6
• Upgrade from Client/Server Messaging Security 3.5
• Upgrade from Client/Server/Messaging Security 3.0
• Upgrade from Client/Server Security 3.0
• Upgrade from Client/Server Suite 2.0
• Upgrade from Client/Server/Messaging Suite 2.0
• Upgrade from OfficeScan or ScanMail for Microsoft Exchange
• Upgrade from one language to another
4-3
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Upgrading Walkthrough
When your evaluation version is about to expire, a notification message displays on the
Live Status screen on the WFBS Web Console. You can upgrade from an evaluation
version to the fully licensed version using the Web Console. Your configuration settings
will be saved. When you purchase a fully licensed version, you will receive a Registration
Key or an Activation Code.
To upgrade from an evaluation version:
1. Open the WFBS Web Console.
2. On the main menu, under License, click view Product License details. The
License Information screen appears.
3. If you have an Activation Code, click Enter a new code, type it in the New
Activation Code field, and click Activate.
Note: If you do not have a personal Activation Code, go to the Trend Micro website at
http://olr.trendmicro.com to register online and obtain your Activation Code.
Note: WFBS 7.0 can automatically migrate the client software, but cannot uninstall the
server application.
Migrating from antivirus software to WFBS is a two-step process: the installation of the
Trend Micro Security Server, followed by the automatic migration of the clients.
Automatic client migration refers to replacing existing client antivirus software with the
4-4
Upgrading and Migrating
Security Agent program. The client setup program automatically removes the other
antivirus software on your client computers and replaces it with the Security Agent.
Refer to Table 4-2 for a list of client applications that WFBS can automatically remove.
Note: WFBS only removes the following client installations, not server installations.
TREND M ICRO ™
S YMANTEC ™
4-5
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
M C A FEE ™
LAND ESK ™
LANDesk VirusProtect5.0
C OMPUTER A SSOCIATES ™
A HNLAB ™
P ANDA S OFTWARE ™
4-6
Upgrading and Migrating
F-S ECURE ™
K ASPERSKY ™
M ICROSOFT ™
4-7
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
S OPHOS ™
Sophos Anti-Virus 9X
Sophos Anti-Virus NT 5.0/7.0
Sophos Anti-Virus NT 7.0
A UTHENTIUM ™
Command AV 4.64 9x
A MREIN ™
G RISOFT ™
O THERS
4-8
Upgrading and Migrating
Note: These clients will not be upgraded to the next version, but will still receive
component updates (such as the malware/virus pattern files) to keep their
protection up to date.
3. When ready to upgrade these clients, clear the same check box, save your settings,
and perform agent installation for these clients using the installation method of
your choice.
4-9
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
4-10
Chapter 5
Getting Started
This chapter tells you how to get WFBS up and running. Topics discussed in this chapter
include:
Registering on page 5-2
Introducing the Web Console on page 5-2
Live Status on page 5-7
Viewing Computers on page 5-11
Key Components on page 5-13
5-1
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Registering
You need to register and activate your product to enable pattern file and scan engine
updates. When you purchase the product, you will receive licensing and registration
information from Trend Micro, including a Registration Key that you must use during
the product registration process.
During the installation, the installation program will prompt you to enter your
Registration Key and Activation Code. If you do not have a Registration Key, contact
your Trend Micro sales representative. If you do not have the Activation Code(s), use
the Registration Key that came with your product to register on the Trend Micro website
and receive the Activation Code(s).
A Registration Key is 37characters in length, including hyphens, in the following format:
XX-XXXX-XXXXX-XXXXX-XXXXX-XXXXX-XXXXX
Most Trend Micro products use a Registration Key. When you are ready to register, go
to the following Trend Micro website:
http://olr.trendmicro.com
5-2
Getting Started
• Security Settings:
• Customize security settings for the Security Agent
• Customize security settings for Microsoft Exchange servers
• Replicate settings from one group of clients to another group of clients
• Outbreak Defense: provides alerts to current status and guides you through an
outbreak cycle.
• Scans:
• Scan clients for viruses and other malware
• Schedule scanning for clients
• Vulnerability Assessment
• Updates:
• Checks the Trend Micro ActiveUpdate server for the latest updated
components, including updates to the virus pattern, scan engine, Cleanup
components, and the program itself
• Configure update source
• Designate Security Agents as Update Agents
• Reports
• Preferences:
• Set up notifications for abnormal threat-related or system-related events
• Set up global settings for ease of maintenance
• Use Client and Administrative tools to help manage security for the network
and clients
• View product license information, maintain the administrator password, and
help keep the business environment safe for the exchange of digital
information by joining the World Virus Tracking program
• Help
5-3
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
F EATURE D ESCRIPTION
Main menu Along the top of the Web Console is the main menu. This
menu is always available.
Configuration Below the main menu items is the configuration area. Use this
area area to select options according to the menu item you
selected.
Menu sidebar When you choose a client or group from the Security
Settings screen and click Configure, a menu sidebar
displays. Use the sidebar to configure security settings and
scans for your desktops and servers. When you choose a
Microsoft Exchange server from the Security Settings
screen (Advanced only), you can use the sidebar to configure
security settings and scans for your Microsoft Exchange
servers.
Security When you open the Security Settings screen, you can see a
Settings toolbar containing a number of icons. When you click a client
toolbar or group from the Security Settings screen and click an icon
on the toolbar, the Security Server performs the associated
task.
5-4
Getting Started
http://my-test-server:8059/SMB
http://192.168.0.10:8059/SMB
If you are NOT using SSL, type http instead of https. The default port for
HTTP connections is 8059 and for HTTPS connections is 4343.
2. The browser displays the Trend Micro Worry-Free Business Security logon
screen.
3. Type your password and click Log on. The browser displays the Live Status
screen.
5-5
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
I CON D ESCRIPTION
5-6
Getting Started
Live Status
Use the Live Status screen to manage WFBS.
The refresh rate for information displayed on the Live Status screen varies per section.
In general, the refresh rate is between 1 to 10 minutes. To manually refresh the screen
information, click Refresh.
5-7
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Understanding Icons
Icons warn you if any action is necessary. Expand a section to view more information.
You can also click the items in the table to view specific details. To find more
information about specific clients, click the number links that appear in the tables.
I CON D ESCRIPTION
Normal
Only a few clients require patching. The virus, spyware, and other
malware activity on your computers and network represents an
insignificant risk.
Warning
Take action to prevent further risk to your network. Typically, a warning
icon means that you have a number of vulnerable computers that are
reporting too many virus or other malware incidents. When a Yellow
Alert is issued by Trend Micro, the warning displays for Outbreak
Defense.
Action required
A warning icon means that the administrator must take action to solve
a security issue.
The information displayed on the Live Status screen is generated by the Security Server
and based on data collected from clients.
Threat Status
Displays information about the following:
• Antivirus: starting from the 5th incident, the status icon changes to display the
Warning. If you must take action:
• The Security Agent did not successfully perform the action it was set up to
perform. Click the numbered link to view detailed information about
computers on which the Security Agent was unable to perform and take an
action.
5-8
Getting Started
System Status
Information regarding the updated components and free space on computers where
Agents are installed.
• Component Updates: the status of component updates for the Security Server or
the deployment of updated components to Agents.
• Unusual system events: disk space information about clients that are functioning
as servers (running server operating systems).
5-9
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
• Smart Scan: the clients that cannot connect to their assigned scan server.
Tip: You can customize the parameters that trigger the Web Console to display a
Warning or Action Required icon from Preferences > Notifications.
License Status
Information regarding the license status.
• License: information about the status of your product license, specifically
expiration information.
5-10
Getting Started
Viewing Computers
Navigation Path: Security Settings {tab}
The Security Settings screen allows you to manage all the computers on which you
installed Agents. When you select a group from the Security Groups Tree, the
computers in that group display in a table to the right.
The Security Settings screen is divided into two (2) main sections:
Configuration Area
The configuration area includes the Security Server information bar, the configuration
toolbar, and below the toolbar, the Security Groups Tree and Security Agent
information table.
Security Server information bar: Displays information about the Security Server such
as Domain name, port number, and number of desktops and servers managed.
Toolbar:
• Configure: The Configure tool is only available when one of the items in the
Security Groups Tree is selected. The Configure tool allows you to configure
settings for all Agents within that group. All computers in a group must share the
same configuration. You can configure the following:
5-11
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Note: (Advanced only) If you are using Internet Explorer 8 and you click
Configure for a Messaging Security Agent, a message appears asking you if
you want to view only secure Web page content. You must click No to
view the MSA settings page.
• Replicate Settings: The Replicate Settings tool is only available when one of the
items in the Security Groups Tree is selected and there is at least one other item of
the same type in the Security Groups Tree.
• Import/Export Settings: Save your configuration settings or import settings that
you have already saved.
• Add Group: The Add Group tool allows you to add new desktop or server groups.
• Add: The Add tool allows you to add computers to specific groups by deploying
Security Agents to computers you specify.
• Remove: The Remove tool will remove the Agent from the computers that you
specify.
• Move: The Move tool allows you to move selected computer or servers from one
Security Server to another.
• Reset Counters: The Reset Counters tool works on all computers within a group.
When clicked, the value in the Viruses Detected and Spyware Detected columns of
the Security Agent information table will be reset to zero.
• Security Groups Tree: Select a group from the Security Groups Tree to display a
list of computers in that group to the right.
• Security Agent information table: When you select a client and click a tool from
the toolbar, the Web Console displays a new configurations area.
5-12
Getting Started
Key Components
The following are the major, key components of Worry-Free™ Business Security:
Security Server
At the center of Worry-Free Business Security is the Security Server. The Security Server
hosts the Web Console, the centralized Web-based management console for Worry-Free
Business Security. The Security Server installs Agents to Clients on the network and
along with the Agents, forms a client-server relationship. The Security Server enables
viewing security status information, viewing Agents, configuring system security,
and downloading components from a centralized location. The Security Server also
contains the database where it stores logs of detected Internet threats being reported to
it by the Security Agents.
The Security Server performs these important functions:
• Installs, monitors, and manages Agents on the network
• Downloads virus pattern files, Spyware/Grayware Pattern v.6 files, scan engines, and
program updates from the Trend Micro update server, and then distributes them to
Agents
Security Agent
The Security Agent reports to the Security Server from which it was installed. To
provide the server with the very latest Client information, the Agent sends event status
information in real time. Agents report events such as threat detection, Agent startup,
Agent shutdown, start of a scan, and completion of an update.
The Security Agent provides three methods of scanning: Real-time Scan, Scheduled
Scan, Manual Scan.
Configure scan settings on Agents from the Web Console. To enforce uniform desktop
protection across the network, choose not to grant users privileges to modify the scan
settings or to remove the Agent.
5-13
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Web Console
The Web Console is a centralized, Web-based, management console. Use the Web
Console to configure Agents. The Web Console is installed when you install the Trend
Micro Security Server and uses Internet technologies such as ActiveX, CGI, HTML, and
HTTP/HTTPS.
Also use the Web Console to:
• Deploy the Agents to servers, desktops, and portable computers.
• Combine desktops and portable computers and servers into logical groups for
simultaneous configuration and management.
• Set antivirus and anti-spyware scan configurations and start Manual Scan on a single
group or on multiple groups.
• Receive notifications and view log reports for virus activities.
• Receive notifications and send outbreak alerts through email messages, SNMP Trap,
or Windows Event Log when threats are detected on Clients.
Control outbreaks by configuring and enabling Outbreak Prevention.
Clients
Clients are all the desktops, laptops, and servers where the Security Agent (SA) is
installed. Microsoft Exchange servers protected by Messaging Security Agents (MSA)
(Advanced only) are also considered to be Clients. SAs perform virus and spyware
scanning and Firewall configurations on Clients. MSAs (Advanced only) perform virus
scanning, spam filtering, email content filtering, and attachment blocking on Microsoft
Exchange servers.
5-14
Getting Started
• Known and controlled: Controlled viruses not in circulation, but that are developed
and used for research
Rather than scan every byte of every file, the engine and pattern file work together to
identify not only tell-tale characteristics of the virus code, but the precise location within
a file where a virus would hide. If Worry-Free Business Security detects a virus, it can
remove it and restore the integrity of the file. The scan engine receives incrementally
updated pattern files (to reduce bandwidth) from Trend Micro.
The scan engine is able to decrypt all major encryption formats (including MIME and
BinHex). It recognizes and scans common compression formats, including ZIP, ARJ,
and CAB. If Worry-Free Business Security can also scan multiple layers of compression
within a file (maximum of six).
It is important that the scan engine remain current with new threats. Trend Micro
ensures this in two ways:
• Frequent updates to the virus pattern file
• Upgrades to the engine software prompted by a change in the nature of virus
threats, such as a rise in mixed threats like SQL Slammer
The Trend Micro scan engine is certified annually by international computer security
organizations, including ICSA (International Computer Security Association)
5-15
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
5-16
Chapter 6
6-1
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
6-2
Managing Basic Security Settings
The following items can be accessed by selecting a group from the Security Settings
screen and clicking Configure:
6-3
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Note: Other client settings apply to all clients and are accessible through the
Desktop/Server tab on the Preferences > Global Settings screen.
Tip: Trend Micro recommends uninstalling other software-based firewalls before deploying
and enabling the Trend Micro Firewall.
Note: By default, WFBS disables the Firewall on all new Groups and clients.
6-4
Managing Basic Security Settings
S ETTINGS S TATUS
Intrusion Disabled
Detection System
Alert Message Disabled
(send)
6-5
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
In Office Off
Out of Office Off
Traffic Filtering
The Firewall monitors all incoming and outgoing traffic; providing the ability to block
certain types of traffic based on the following criteria:
• Direction (incoming or outgoing)
• Protocol (TCP/UDP/ICMP)
• Destination ports
• Destination computer
Stateful Inspection
The Firewall is a stateful inspection firewall; it monitors all connections to the client
making sure the transactions are valid. It can identify specific conditions in a transaction,
predict what transaction should follow, and detect when normal conditions are violated.
Filtering decisions, therefore, are based not only on profiles and policies, but also on the
context established by analyzing connections and filtering packets that have already
passed through the firewall.
6-6
Managing Basic Security Settings
Note: Configure the Firewall for In Office and Out of Office. If Location Awareness is
disabled, In Office settings will be used for Out of Office connections. See Location
Awareness on page 11-7.
Navigation Path: Security Settings > {group} > Configure > Firewall > In
Office/Out of Office
6-7
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
6-8
Managing Basic Security Settings
Adding/Editing Exceptions
Navigation Path: Security Settings > {Group} > Configure > Firewall > In
Office or Out of Office > Advanced Mode > Exceptions > Add or
{checkbox} Edit
To add an Exception:
1. From the Firewall Configuration screen, click Add
2. See 3 below
To edit an Exception:
1. From the Firewall Configuration screen, select the Exceptions that you want to
modify.
2. Click Edit. The Edit Exception screen opens.
3. Change the name for the exception.
4. Next to Action, click one of the following:
• Allow all network traffic
• Deny all network traffic
5. Next to Direction, click Inbound or Outbound to select the type of traffic to which
to apply the exception settings.
6-9
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Editing Exceptions
Navigation Path: Security Settings > {Group} > Configure > Firewall > In
Office or Out of Office > Advanced Mode > Exceptions > {checkbox} >
Edit
To edit an exception:
1. From the Firewall - Advanced Mode screen in the Exceptions section, select the
exclusion you want to edit.
2. Click Edit.
6-10
Managing Basic Security Settings
Removing Exceptions
To remove an exception:
1. From the Firewall - Advanced Mode screen, in the Exceptions section, select the
exclusion you want to delete.
2. Click Remove.
Note: To disable the Firewall on all clients, go to Preferences > Global Settings >
Desktop/Server and select Disable Firewall and uninstall drivers under Firewall
Settings. Disabling the Firewall will also uninstall the Firewall driver.
6-11
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
6-12
Managing Basic Security Settings
Stateful Inspection
The Firewall is a stateful inspection firewall; it monitors all connections to the client
making sure the transactions are valid. It can identify specific conditions in a transaction,
predict what transaction should follow, and detect when normal conditions are violated.
Filtering decisions, therefore, are based not only on profiles and policies, but also on the
context established by analyzing connections and filtering packets that have already
passed through the Firewall.
Web Reputation
Navigation Path: Security Settings > {Group} > Configure > Web
Reputation > In Office/Out of Office
or, for Advanced:
Navigation Path: Security Settings > {MSA} Configure > Web Reputation
Web Reputation helps prevent access to URLs on the Web or embedded in email
messages (Advanced only) that pose security risks by checking the URL against the
Trend Micro Web Security database. Depending on the location (In Office/Out of
Office) of the client (Standard Only), configure a different level of security.
Depending on the security level that has been set, it can block access to websites that are
known or suspected to be a Web threat or unrated on the reputation database. Web
Reputation provides both email notification to the administrator and inline notification
to the user for detections.
If Web Reputation blocks a URL and you feel the URL is safe, add the URL to the
Approved URLs list. See URL Filtering on page 11-9.
Reputation Score
A URL's “reputation score” determines whether it is a Web threat or not. Trend Micro
calculates the score using proprietary metrics.
• Trend Micro considers a URL “a Web threat”, “very likely to be a Web threat”, or
“likely to be a Web threat” if its score falls within the range set for one of these
categories.
• Trend Micro considers a URL safe to access if its score exceeds a defined threshold.
6-13
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
There are three security levels that determine whether the SA will allow or block access
to a URL.
• High: Blocks pages that are:
• Dangerous:Verified to be fraudulent or known sources of threats
• Highly suspicious: Suspected to be fraudulent or possible sources of threats
• Suspicious: Associated with spam or possibly compromised
• Medium: Blocks pages that are:
• Dangerous:Verified to be fraudulent or known sources of threats
• Highly suspicious: Suspected to be fraudulent or possible sources of threats
• Low: Blocks pages that are:
• Dangerous:Verified to be fraudulent or known sources of threats
Navigation Path: Security Settings > {MSA} Configure > Web Reputation
Web Reputation evaluates the potential security risk of all requested URLs by querying
the Trend Micro Security database at the time of each HTTP request.
Note: (Standard Only) Configure the Web Reputation settings for In Office and Out of
Office. If Location Awareness is disabled, In Office settings will be used for Out of
Office connections. See Location Awareness on page 11-7.
6-14
Managing Basic Security Settings
6-15
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
URL Filtering
Navigation Path: Security Settings > {Group} > Configure > URL Filtering
URL Filtering blocks unwanted content from the Internet. You can select specific types
of websites to block during different times of the day by selecting Custom.
6-16
Managing Basic Security Settings
Note: To modify the list of globally approved URLs, click Global Approved URLs at
the bottom of the screen.
4. Business Hours: Any days or hours that are not defined under Business Hours are
considered Leisure hours.
5. Global Approved URL(s): Clicking this link will take you to the Preferences >
Global Settings screen (see Desktop/Server Options on page 11-6).
6. Click Save.
Behavior Monitoring
Agents constantly monitor clients for unusual modifications to the operating system or
on installed software. Administrators (or users) can create exception lists that allow
certain programs to start while violating a monitored change, or completely block
certain programs. In addition, programs with a valid digital signature are always allowed
to start.
Another feature of Behavior Monitoring is to protect EXE and DLL files from being
deleted or modified. Users with this privilege can protect specific folders. In addition,
users can select to collectively protect all Intuit QuickBooks programs.
Navigation Path: Security Settings > {group} > Configure > Behavior
Monitoring
Behavior Monitoring protects clients from unauthorized changes to the operating
system, registry entries, other software, files and folders.
6-17
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
6-18
Managing Basic Security Settings
6-19
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Environment Variables
WFBS supports environment variables to specify specific folders on the client. Use
these variables to create exceptions for specific folders. The following table describes
the available variables:
Device Control
Navigation Path: Security Settings > {group} > Configure > Device
Control
Device Control regulates access to external storage devices and network resources
connected to computers.
Set the following as required:
• Enable Device Control
• Enable USB Autorun Prevention
• Permissions: set for both USB devices and network resources. For both, set:
6-20
Managing Basic Security Settings
P ERMISSIONS
• Exceptions: If a user is not given read permission for a particular device, the user
will still be allowed to run or open any file or program in the Approved List.
However, if AutoRun prevention is enabled, even if a file is included in the
Approved List, it will still not be allowed to run.
To add an exception to the Approved List, enter the file name including the path or
the digital signature and click Add to the Approved List
6-21
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
User Tools
User Tools comprises a set of client tools that enable users to surf the Web securely:
• Wi-Fi Advisor: Determines the safety of a wireless connection by checking the
authenticity of access points based on the validity of their SSIDs, authentication
methods, and encryption requirements. A pop-up warning will show if a connection
is unsafe.
• Trend Micro Toolbar: Uses Page Ratings to determine the safety of web pages.
Warns users about malicious and Phishing websites. Ratings will appear in
Google/Yahoo/Bing search results.
• Anti-Spam Toolbar: Filters spam in Microsoft Outlook, gives statistics, and allows
you to change certain settings.
6-22
Managing Basic Security Settings
Note: Toolbars can only be made available to Agents from the Web Console. Users have to
install or uninstall the tools from the Agent’s console.
Tip: To enforce a regulated security policy throughout your organization, Trend Micro
recommends granting limited privileges to users. This ensures users do not modify scan
settings or unload the Security Agent.
6-23
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
6-24
Managing Basic Security Settings
• Firewall
• Firewall Settings
• Web Reputation
• Will show a link that allows users to continue browsing a particular
malicious URL until the computer is restarted. Warnings will still show on
other malicious URLs.
• URL Filtering
• Will show a link that allows users to continue browsing a particular
restricted URL until the computer is restarted. Warnings will still show on
other restricted URLs.
• Behavior Monitoring
• Allow users to modify Behavior Monitor settings.
• Proxy Settings
• Allow users to configure proxy settings. Disabling this feature will reset
the proxy settings to their default.
• Update Privileges
• Allow users to perform manual Update
• Use Trend Micro ActiveUpdate as a secondary update source
• Client Security
• Prevent users or other processes from modifying Trend Micro
program files, registries and processes.
2. Click Save.
6-25
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Note: If the SA is unable to send the file to the Security Server for any reason, such as a
network connection problem, the file remains in the client suspect folder. The Agent
attempts to resend the file when it reconnects to the Security Server.
6-26
Appendix A
A-1
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Troubleshooting
This section helps you troubleshoot issues that may arise while installing or using
WFBS.
A-2
Troubleshooting and Frequently Asked Questions
A-3
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
WARNING! Incorrectly editing the registry may severely damage your system.
Before making changes to the registry, you should back up any val-
ued data on your computer.
A-4
Troubleshooting and Frequently Asked Questions
2. Manually copy the following files and folders from the folder to an alternate
location:
A-5
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Note: If you change the Security Server installation path, you will have to update the
path info in the backup files ofcscan.ini and
\private\ofcserver.ini
7. With the backups you created, overwrite the WFBS database and the relevant files
and folders on the target machine in the PCCSRV folder.
8. Restart the Trend Micro Security Server Master Service.
Browser Cache
If you upgraded from a previous version of WFBS, Web browser and proxy server cache
files may prevent the Web Console from loading. Clear the cache memory on your
browser and on any proxy servers located between the Trend Micro Security Server and
the computer you use to access the Web Console.
A-6
Troubleshooting and Frequently Asked Questions
SSL Certificate
Also, verify that your Web server is functioning properly. If you are using SSL, verify that
the SSL certificate is still valid. See your Web server documentation for details.
A-7
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
A-8
Troubleshooting and Frequently Asked Questions
A-9
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
A-10
Troubleshooting and Frequently Asked Questions
A-11
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Registration
I have several questions on registering WFBS. Where can I find the answers?
See the following website for frequently asked questions about registration:
http://esupport.trendmicro.com/support/viewxml.do?ContentID=en-116326
Yes. A scaled down version of the Security Agent is available for the x64 platform.
However, no support is currently available for the IA-64 platform.
Can I upgrade to WFBS from Trend Micro™ ServerProtect?
No. ServerProtect will have to be first uninstalled and then WFBS can be installed.
Can I use a pre-existing installation of an Apache Web server on computer
where I am installing the Security Server?
Trend Micro recommends that you do not use a pre-existing installation of Apache. The
correct version will be installed at the same time that you install the Security Server.
A-12
Troubleshooting and Frequently Asked Questions
WARNING! Remember to remove the program from the exception list after the
update.
Configuring Settings
I have several questions on configuring WFBS settings. Where can I find the
answers?
You can download all WFBS documentation from the following site:
http://www.trendmicro.com/download/
What folders should I exclude for Antivirus software with SBS 2003?
See the following tables for the SBS 2003 exclusions:
A-13
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
A-14
Troubleshooting and Frequently Asked Questions
A-15
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Smart Scan
What is Smart Scan?
Smart Scan is a new technology from Trend Micro that uses a central scan server on the
network to take some of the burden of scanning off clients.
Is Smart Scan reliable?
Yes. Smart Scan simply allows another computer, the Smart Scan Server, to help scan
your clients. If your clients are configured for Smart Scan but cannot connect to the
Smart Scan Server, they will attempt to connect to the Trend Micro Global Smart Scan
Server.
How do I know if the Smart Scan Server is running properly?
Verify that the following service is running on the Security Server:
TMiCRCScanService
Can I uninstall the Scan Server or choose not to install it?
No. If you do not want to use Smart Scan, disable the Smart Scan service, which
switches all clients to Conventional Scan and stops the Smart Scan service on the
Security Server. This can also help improve the performance of the Security Server. See
General Scan Settings on page 11-8 for instructions.
A-16
Troubleshooting and Frequently Asked Questions
Known Issues
Known issues are features in WFBS software that may temporarily require a
workaround. Known issues are typically documented in the Readme document you
received with your product. Readme files for Trend Micro products can also be found in
the Trend Micro Update Center:
http://www.trendmicro.com/download/
Known issues can be found in the technical support Knowledge Base:
http://esupport.trendmicro.com/support/
Trend Micro recommends that you always check the Readme text for information on
known issues that could affect installation or performance, as well as a description of
what is new in a particular release, system requirements, and other tips.
A-17
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
A-18
Appendix B
Getting Help
This appendix shows you how to get help, find additional information, and contact
Trend Micro.
The topics discussed in this appendix include:
• Product Documentation starting on page B-2
• Knowledge Base starting on page B-3
• Technical Support starting on page B-3
• Contacting Trend Micro starting on page B-4
• Virus Threat Enclyclopedia starting on page B-6
B-1
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Product Documentation
The documentation for WFBS consists of the following:
• Online Help
Web-based documentation accessible from the Web Console.
The WFBS Online Help describes the product features and gives instructions on their
use. It contains detailed information about customizing your settings and running
security tasks. Click the icon to open context-sensitive help.
Who should use the online help?
WFBS Administrators who need help with a particular screen.
• Installation Guide
The Installation Guide provides instructions to install/upgrade the product and get
started. It provides a description of the basic features and default settings of WFBS.
The Installation Guide is accessible from the Trend Micro SMB CD or can be
downloaded from the Trend Micro Update Center:
http://www.trendmicro.com/download
Who should read this guide?
WFBS Administrators who want to install and get started with WFBS.
• Administrator’s Guide
The Administrator’s Guide provides a comprehensive guide for configuring and
maintaining the product.
The Administrator’s Guide is accessible from the Trend Micro SMB CD or can be
downloaded from the Trend Micro Update Center:
http://www.trendmicro.com/download
Who should read this guide?
WFBS Administrators who need to customize, maintain, or use WFBS.
• Readme file
The Readme file contains late-breaking product information that is not found in the
online or printed documentation. Topics include a description of new features,
installation tips, known issues, license information, and so on.
• Knowledge Base
B-2
Getting Help
Knowledge Base
The Trend Micro Knowledge Base is an online resource that contains thousands of
do-it-yourself technical support procedures for Trend Micro products. Use the
Knowledge Base, for example, if you are getting an error message and want to find out
what to do. New solutions are added daily.
Also available in the Knowledge Base are product FAQs, tips, advice on preventing
virus/malware infections, and regional contact information for support and sales.
The Knowledge Base can be accessed by all Trend Micro customers as well as anyone
using an evaluation version of a product. Visit:
http://esupport.trendmicro.com/support/smb/search.do
Technical Support
When you contact Trend Micro Technical Support, to speed up your problem
resolution, run the Case Diagnostic Tool (refer Using the Case Diagnostic Tool on page B-4)
or ensure that you have the following details available:
• Operating system
• Network type
• Brand and model of the computer and connected hardware
• Amount of memory and free hard disk space on your machine
• Detailed description of the installation environment
B-3
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
B-4
Getting Help
Trend Micro provides technical support, virus pattern downloads, and program updates
for one year to all registered users, after which you must purchase renewal maintenance.
If you need help or just have a question, please feel free to contact us. We also welcome
your comments.
Trend Micro Incorporated provides worldwide support to all of our registered users.
Get a list of the worldwide support offices:
http://www.trendmicro.com/support
Get the latest Trend Micro product documentation:
http://www.trendmicro.com/download
In the United States, you can reach the Trend Micro representatives via phone, fax,
or email:
Trend Micro, Inc.
10101 North De Anza Blvd.
Cupertino, CA 95014
Toll free: +1 (800) 228-5651 (sales)
Voice: +1 (408) 257-1500 (main)
Fax: +1 (408) 257-2003
Web address: www.trendmicro.com
Email: [email protected]
B-5
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
Click the link under the type of submission you want to make.
Note: Submissions made through the submission wizard/virus doctor are addressed
promptly and are not subject to the policies and restrictions set forth as part of the
Trend Micro Virus Response Service Level Agreement.
When you submit your case, an acknowledgement screen displays. This screen also
displays a case number. Make note of the case number for tracking purposes.
B-6
Getting Help
• Subscribe to Trend Micro Virus Alert service to learn about outbreaks as they
happen and the Weekly Virus Report
• Learn about free virus/malware update tools available to Web masters.
• Read about TrendLabsSM, the Trend Micro global antivirus research and support
center
TrendLabs
TrendLabs is the Trend Micro global infrastructure of antivirus research and product
support centers that provide up-to-the minute security information to Trend Micro
customers.
The “virus doctors” at TrendLabs monitor potential security risks around the world to
ensure that Trend Micro products remain secure against emerging threats. The daily
culmination of these efforts are shared with customers through frequent virus pattern
file updates and scan engine refinements.
TrendLabs is staffed by a team of several hundred engineers and certified support
personnel that provide a wide range of product and technical support services.
Dedicated service centers and rapid-response teams are located in Tokyo, Manila, Taipei,
Munich, Paris, and Lake Forest, CA, to mitigate virus outbreaks and provide urgent
support 24x7.
TrendLabs’ modern headquarters, in a major Metro Manila IT park, has earned ISO
9002 certification for its quality management procedures in 2000—one of the first
antivirus research and support facilities to be so accredited. Trend Micro believes
TrendLabs is the leading service and support team in the antivirus industry.
B-7
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
B-8
Appendix C
Glossary
The Glossary provides descriptions of important terms and concepts used in this
document. For information on security threats, see:
http://threatinfo.trendmicro.com/vinfo/
For information about how the Trend Micro Smart Protection Network protects you,
see:
http://itw.trendmicro.com/smart-protection-network
C-1
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
TERM D ESCRIPTION
configuration Selecting options for how your Trend Micro product will
function, for example, selecting whether to quarantine or
delete a virus-infected email message.
C-2
Glossary
TERM D ESCRIPTION
Conventional A local scan engine on the client scans the client computer.
Scan
Domain Name The full name of a system, consisting of its local host name
and its domain name, for example, tellsitall.com. A domain
name should be sufficient to determine a unique Internet
address for any host on the Internet. This process, called
"name resolution", uses the Domain Name System (DNS).
C-3
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
TERM D ESCRIPTION
Listening Port A listening port is utilized for client connection requests for
data exchange. The default Trend Micro Security listening
port is 61617. If a firewall application is running on the server
computer, ensure that the firewall does not block the
listening port to ensure uninterrupted communication
between the server and clients.
Live Status The main screen of the Web Console. The Live Status screen
gives you an at-a-glance security status for Outbreak
Defense, Antivirus, Anti-spyware, and Network Viruses.
C-4
Glossary
TERM D ESCRIPTION
Proxy Server A proxy server is a World Wide Web server which accepts
URLs with a special prefix, used to fetch documents from
either a local cache or a remote server, and then returns the
URL to the requester.
privileges From the Web Console, Administrators can set privileges for
(client the Security Agents. End users can then set the Security
privileges) Agents to scan their clients according to the privileges you
allowed. Use client privileges to enforce a uniform antivirus
policy throughout your organization.
C-5
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
TERM D ESCRIPTION
C-6
Glossary
TERM D ESCRIPTION
True File Type Files can be easily renamed to disguise their actual type.
Programs such as Microsoft Word are “extension
independent” -- they will recognize and open “their”
documents regardless of the file name. This poses a danger,
for example, if a Word document containing a macro virus
has been named “benefits form.pdf”. Word will open the file,
but the file may not have been scanned if the Security Agent
or the Messaging Security Agent is not set to check the true
file type.
Update Agent Agents that act as update sources for other Agents.
C-7
Trend Micro™ Worry-Free™ Business Security 7.0 Installation Guide
C-8
Index
A Bots 12
Account Privileges 23 Browser Cache 6
Activation Code 11 C
Administrator’s Guide 2
Adware 12 Case Diagnostic Tool 4
Agent 16 Citrix Support 11
Agent Installation Client 16
preventing agent upgrade 9 Citrix support 11
Agent, Client/Server Security Agent 20 communication with server 20
Alerts listening port 24
firewall violation on client 8 Microsoft Windows Live OneCare 27
Allowing Programs 19 password to unload 23
Anti-Spam privileges 23
components 7 protection from USB Threats 17
viewing threat status 9 requirements 8
Anti-Spyware Client Server Security Agent 16
components 6 Compatibility 12
viewing threat status 9 Components
Antivirus anti-spam 7
components 6 anti-spyware 6
viewing threat status 8 antivirus 6
Approved List of Programs 19 Behavior Monitoring 9
Autorun Files 17 Content Filtering 9
network viruses 8
B Outbreak Defense 8
Backdoor Programs 11 software protection 9
Behavior Monitoring 17 Transaction Protector 9
components 9 TrendProtect 9
protection from USB threats 17 Web Reputation 8
viewing threat status 9 Computers 11
Benefits of Protection 5 Configure Settings 13
Blocked Conflicting ARP 12
Programs List 19 Contacting Trend Micro 4
Blocking Content Filtering
Programs 19 components 9
Unwanted Web Content 16
Web Threats 15
Boot Area Scan 25, 11
IX-1
Trend Micro™ Worry-Free™ Business Security Advanced 6.0 Installation Guide
D I
Databases 28 Icons
Default Settings 3 Live Status screen 8
Deployment Planning 2 Web Console 6
Device Control 20 Installation Guide 2
Dialers 12 Installing Agents 3
Disk Space Requirements configuration during server installation 18, 23
for clients 9 deployment options 32
for Messaging Security Agents 10 number of 29
for Security Server 4 preventing agent upgrade 9
Documentation 2 program file location 31
Remote Messaging Security agent 24, 27
E selecting agent type during server installation
Email Reputation 4 8, 9
Environment Variables 20 Installing the Server 2
Exceptions compatibility issues 27
Behavior Monitoring 19 computer restart 26
firewall 8, 9 custom installation 3
using environment variables 20 default URL 3
domain name 13
F IIS considerations 26
Fake Access Points 13 installation directory 14
Features 2 installation walkthrough 33
Features of Product 3 IP address 13
File Reputation 4 location on the network 28
Filtering notes 26
spam from known spammers 4 other antivirus applications 27
Firewall 4 overview 23, 2
default settings 5 path 23
enable or disable 8 pre-configuration tasks 4
exceptions 8, 9 prescan 11
Intrusion Detection System 11 proxy server settings 17
mode 8 selecting setup type 5
network viruses 6 selecting the Web server 12
security level 8 Smart Protection Network 16
settings 8 SMTP server settings 15
stateful inspection 6 typical installation 3
traffic filtering 6 verifying the installation 35
Fragmented IGMP 12 Web server settings 20
Instant Messenger
G threats 13
Getting Help 6 Intrusion Detection System 11
Groups Intuit Software 13
determining number of 31
K
H Keyloggers 12
Hacking Tools 12 Knowledge Base 2, 3
Help Files 2
Help Icon 6
IX-2
Index
IX-3
Trend Micro™ Worry-Free™ Business Security Advanced 6.0 Installation Guide
S in messenger programs 13
Scan Server 17, 21 intrusions 13
definition 15 keyloggers 12
installing 2 LAND Attack 12
ports 24 macro viruses 11
Scanning malicious behavior 13
prescan 11 malware 10
prescan before installation 25 mass-mailing attacks 14
Smart Scan 5 Mixed Threat Attack 11
Security Server 16, 19 network viruses 12
Security Server Settings 10 online keystroke listeners 13
Server Overlapping Fragment 12
address checklist 34 Oversized Fragment 11
communication with agent 20 packers 13
HTTP port 24 phishing 13
requirements 4 Ping of Death 12
Services rootkits 11
restarting 23 spam 12
Smart Feedback 3 spyware 11
Smart Protection Network 3 SYN flood 12
Smart Scan 5 Teardrop Attack 12
how it works 22 Tiny Fragment Attack 12
server installation 2 Trojans 10
server ports 24 viruses 10
viewing system status 10 Web threats 4
SMTP Server 23 worms 11
Software Protection Tiny Fragment Attack 12
components 9 Traffic Filtering 6
Spam 12 Transaction Protector
blocking known spammers 4 components 9
SSCFG.ini 25 Trend Micro contact URL 4
SSL certificate 7 TrendLabs 7
Stateful Inspection 6 definition 6
Support 3 TrendProtect
SYN flood 12 components 9
System Requirements 4, 8, 10 Trojans 10
others 11 Troubleshooting 2
Activation Code and Registration Key 11
T client icons 8
Teardrop Attack 12 Client Packager 2
Technical Support 3 clients on Management Console 8
Threats 10 components 6
adware 12 program settings 4
backdoor programs 11 resending a quarantined message 3
bots 12 spam folder 3
Conflicting ARP 12 Web Console 6
dialers 12
fake access points 13
Fragmented IGMP 12
hacking tools 12
IX-4
Index
U
UNC paths 19
Unusual System Events
viewing system status 9
Update Agent 30
Updates
network traffic 30
viewing system status 9
URL Filtering 5
settings 16
viewing threat status 9
USB Devices
threats 17
User Tools 22
settings 22
V
Variables 20
Verifying Server Installation 35
Virtual Directory Settings 7
Virus Threat Enclyclopedia 6
W
Web Browser Requirements
for clients 9
for Security Server 8
Web Console 16, 19
default URL 3
icons 6
opening 4
URL 4
Web Reputation 4
components 8
filter strength 16
security level 15
viewing threat status 9
Web Server Requirements
for Messaging Security Agents 11
for Security Server 8
Web Threats 4
using Web Reputation 15
What’s New 2
Worms 11
IX-5
Trend Micro™ Worry-Free™ Business Security Advanced 6.0 Installation Guide
IX-6