SMB Technical Product Marketing

Size: px
Start display at page:

Download "SMB Technical Product Marketing"

Transcription

1 TREND MICRO Worry Free Business Security 6.0 Best Practices Guide Trend Micro, Inc N. De Anza Blvd. Cupertino, CA T / F SMB Technical Product Marketing

2 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide provides best practice guidelines to resellers and customers deploying and Worry Free Business Security. Detailed information about how to use specific features in the software is available in the Online Help and in the Trend Micro Worry-Free Business Security 6.0 Getting Started Guide and Trend- Micro Worry-Free Business Security 6.0 Administrator s Guide. DOCUMENT PROFILE: Product: Trend Micro Worry-Free Business Security 6.0 Document Title: Trend Micro Worry-Free Business Security 6.0 Best Practices Guide Document Filename: BP - Worry-Free Business Security 6.0 Best Practices v1.1 Document Release Date: July 17, 2009 Team: SMB Technical Product Marketing Author: Randy Jeff N. Licsi, CISSP, Senior Technical Product Engineer 2

3 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Contents Preface... 5 Chapter 1: Introduction... 6 What is Worry-Free Business Security 6.0?... 6 What s New in Worry-Free Business Security 6.0?... 6 The Worry-Free Business Security Client/Server Architecture... 7 Chapter 2: Understanding SMB Requirements... 9 Define the Company s Security Needs: Small or Medium-Sized... 9 Small Companies... 9 Medium-Sized Companies... 9 Inventory the Systems to be Protected... 9 Chapter 3: Deployment Planning Planning Guide Questions Protection Component Considerations Security Server Messaging Security Agent Client/Server Security Agent Client/Server Security Agent deployment options Network Topology Design Updating Multi-Site Environments Displacement Previous WFBS/CSM installations Chapter 4: Deployment Execution Installing the Security Server Pre-installation Checklist During Installation Post installation Installing the Messaging Security Agent Pre-installation Post installation Installing the Client/Server Security Agent Pre-installation Post installation Other Considerations Patches and Support Certificates Patches Knowledge Base Chapter 5: Post Installation Management Tasks Trend Micro Vulnerability Assessment

4 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Trend Micro Vulnerability Scanner Behavior Monitoring Firewall Smart Scan FAQ Deployment Key Points Summary About Trend Micro

5 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Preface Welcome to the Trend Micro Worry Free Business Security 6.0 Best Practices Guide. This document is designed to help resellers and customers develop a set of best practices when deploying and managing Worry Free Business Security. The document is also designed to be used in conjunction with the following guides: Trend Micro Worry Free Business Security 6.0 Getting Started Guide Trend Micro Worry Free Business Security 6.0 Administrator s Guide The SMB Technical Product Marketing 5

6 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Chapter 1: Introduction This chapter introduces you to the features and functions of Trend Micro Worry-Free Business Security 6.0. It covers the following topics: What is Worry-Free Business Security? What s New in Worry-Free Business Security 6.0? The Worry-Free Business Security 6.0 Client/Server Architecture What is Worry-Free Business Security 6.0? Designed to suit the needs of small- to medium-sized businesses, Trend Micro Worry- Free Business Security (WFBS) 6.0 provides network-wide desktop and server protection. Client/Server Security Agents (CSAs), a component of Worry-Free Business Security, protect an organization s Windows Vista/2000/XP computers and servers running Server 2003 or Server 2008 from a wide range of threats and potential nuisances, such as virus/malware, spyware/grayware, spam, Web threats, unauthorized changes, macro virus, malicious Java applets, and malicious ActiveX controls. The CSAs report and receive the latest updates from the Security Server. Seamless integration with Microsoft Windows makes Worry-Free Business Security a powerful, multi-layered defense against Internet threats. Centralized management tools and intelligent scanning offers excellent anti-spam, antivirus and content security in a scalable, high-performance software architecture. What s New in Worry-Free Business Security 6.0? Cloud-client File Reputation and Smart Scan: Cloud-client File Reputation and Smart Scan move sizable anti-malware and anti-spyware pattern functionality to a scan server. They help keep client footprints small and reduce the need for clients to constantly download pattern updates, while defending against the unprecedented rates at which threats are now being released, since servers can be updated more frequently than clients were in the past. By delivering rapid solutions to local or global scan servers instead of laboriously distributing them to individual clients, the new File Reputation and Smart Scan technologies can provide the latest protection almost instantly. URL Web Content Filtering: Rely on Trend Micro to block Web sites that contain inappropriate content. URL filtering can help improve employee productivity, secure network resources, and protect proprietary information. Smart Protection Network Integration: The Trend Micro Smart Protection Network is a collection of technologies that gather a wide variety of threat-related information from across the Internet to provide up-to-date protection from the latest threats. Core module feedback loops, URL Filtering, Web Reputation, and Smart Scan are all integral parts of the Trend Micro Smart Protection Network. 6

7 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Simpler and Easier Live Status: The Live Status dashboard is now even easier to read than before. Collapsible panels and threat indicators that float to the top of the list make it easy for administrators to monitor the status of the network. Integrated Installation with Worry-Free Remote Manager 2.1: Resellers now have the option to install a Worry-Free Remote Manager Agent during setup, enabling the resellers to remotely manage the WFBS-A Security Server and clients of multiple customers. New graphical interface for Quarantine Tool: Provides easier quarantine management. Variable Scanning Based on CPU Consumption: Provides added flexibility for scanning when the CPU usage is high. WFBS-A is now CPU-sensitive and can be configured to pause during high CPU consumption. Protection from USB autorun threats: Prevents autorun files on USB drives from executing when the drive is inserted in the USB port of a client. The Worry-Free Business Security Client/Server Architecture Worry-Free Business Security is comprised of the following components, as shown in Figure 1 following: 1. Web Console Used to configure the settings of Client/Server Security Agents and Messaging Security Agents, which protect the Exchange servers, desktops, and servers on the network. 2. Security Server Hosts the centralized Web-based management console for the entire Worry-Free Business Security solution. The Security Server installs the Client/Server Security Agents to the client computers on your network, forming a client-server relationship. 3. Client/Server Security Agent (CSA) Reports to the Trend Micro Security Server from which it was installed. To provide the server with the very latest Client information, the Client sends event status information in real time. Clients report events such as virus and spyware detection, Client startup, Client shutdown, start of a scan, and completion of an update. CSAs have their own client Console, 4. Messaging Security Agent (MSA) Worry-Free Business Security Advanced protects the Exchange Server against viruses, Trojans, worms, and other malware. It also provides spam blocking, content filtering, and attachment blocking for added security. 5. Smart Scanning If CSAs do not find all that they need during a Smart Scan to obtain the reputation of a file, they ll execute Smart Scan Queries to the local Smart Scan Services in the Security Server (in-office) or to the global Smart Scan Services in the Trend Micro Data Centers (out-of-office) to obtain any patterns they need to complete the file reputation process. 7

8 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Figure 1 - Worry Free Business Security Architecture 8

9 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Chapter 2: Understanding SMB Requirements Before you begin a deployment of Worry-Free Business Security, it s important to understand the security needs of small versus medium-sized companies. For guidance on defining SMB needs, review the following sections in this chapter: Define the Company s Security Needs: Small or Medium-Sized? Inventory the Systems to be Protected Define the Company s Security Needs: Small or Medium-Sized WFBS companies are defined as small or medium-sized. When deploying WFBS, a full description or mapping of the company s profile is highly recommended. Small Companies The typical small company is defined by the following size and needs: seats (average) 90% of WFBS users fit this category Power User maintains the systems These companies will have a single domain and network. Single Exchange or SMTP Server Medium-Sized Companies The typical medium-sized company is defined by the following size and needs: seats Only 10% of WFBS users fit this category IT Manager/Reseller maintains the systems Domains may be divided by department and subnets. Multiple Exchange/SMTP servers Inventory the Systems to be Protected Inventory all the computer assets in the company that will be protected by WFBS: i.e., servers, Exchange Servers, workstations, laptops, networks, etc. Build ID lists to keep track of the assets. 9

10 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Chapter 3: Deployment Planning Planning is vital for a successful installation and deployment of Trend Micro Worry Free Business Security. This section discusses the following: Planning Guide Questions Protection Component Considerations Network Topology Designs Displacement/Previous CS/CSM/WFBS installations Planning Guide Questions These are basic key questions that need to be answered prior to the actual deployment: What are the existing company policies that need to be considered prior to migration/deployment? Identify these to guide the deployment process according to the company policies. Are there any remote networks that are dependent on the main corporate network? What is the network bandwidth for these remote connections? Remote networks with low bandwidth can influence the Client/Server Security Agent deployment method. Client packages can be used in order to deploy Client/Server Security Agents to remote clients. How many clients are situated in the main office and the remote offices? This will identify the location and number of update agents on the main and remote office. Is there an existing desktop antivirus solution on the network? Is there a previous version of Client/Server Security or Client/Server Messaging Security installed on the network? Migration from 3rd party antivirus solutions and previous Client/Server Security and Client/Server Messaging Security (CS and CSM) solutions should be carefully planned. 10

11 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Are there any other antivirus programs installed on the server where Worry-Free Business Security will be installed? 3rd party antivirus management programs may create errors in the Worry-Free Business Security 6.0 installation. On which server will Worry Free Business Security 6.0 Server be installed? What is this server s current role in the network? What are the applications that run on this server? Knowing server performance is vital in order to decide if Worry-Free Business Security 6.0 server should be hosted on an existing or a new server. Protection Component Considerations In order to have a successful implementation of WFBS, there are several things you need to consider regarding the components that will be protected. IMPORTANT! Make sure that all Hardware/Software requirements are met. Check the minimum requirements found in the Getting Started Guide and the Administrator Guide, or in the readme file that comes with the installation package. Security Server New Server or an existing multi-role server? A new server would primarily need to meet the basic hardware/software requirements. An existing multi-role server will need a performance evaluation before Worry-Free Business Security Server is installed. Server Role: Microsoft SBS or member server? Microsoft SBS has Microsoft Exchange on the same server as the SBS Server. Trend Micro Worry-Free Business Security 6.0 automatically detects Microsoft Exchange when it is installed on the same box. For member servers, administrators need to select and add Microsoft Exchange servers during or after the Security Server installation in order to install the Messaging Security Agent. 11

12 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Displacement: Migration from a 3rd party Antivirus You need a migration plan for existing 3rd party antivirus solutions. Although WFBS 6.0 supports automatic 3rd party client protection uninstallation, administrators need to manually uninstall 3rd party antivirus management server. To determine the list of Antivirus products that can be uninstalled, open tmuninst.ptn on the Security Server installation. This file can be opened by any text editor e.g. notepad at \Trend Micro\Security Server\PCCSRV\Admin. Migration from a previous CSM version Like 3rd party antivirus solutions, previous CS/CSM versions need a migration/upgrade process. Worry-Free Business Security Advanced supports upgrades from any of the following versions: 1. Client/Server or Client/Server Messaging Security 3.6 to Worry-Free Business Security Advanced Client/Server or Client/Server Messaging Security 5.x to Worry-Free Business Security Advanced 6.0 If you are using Client/Server or Client/Server Messaging Security 2.0 or 3.0 (CS or CSM), you can either remove the Security Server and Client/Server Security Agents and then install Worry-Free Business Security 6.0; or you can upgrade these unsupported versions to Client/Server and Client/Server Messaging Security 3.6 first, then do an upgrade to Worry- Free Business Security 6.0. A lot of new and exciting features were added from CSM 3.6 to WFBS 6.0. After upgrading to the latest version, make sure you revisit all security settings and enable the feature you want for the WFBS security groups. Messaging Security Agent Is Microsoft Exchange on the same server as the Security Server? Worry-Free Business Security 6.0 installation automatically detects Microsoft Exchange installation on the same box. 12

13 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Is there an existing messaging protection solution for Microsoft Exchange? 3rd party antivirus solutions for Microsoft Exchange need to be removed prior to the Messaging Security Agent installation. Client/Server Security Agent Displacement: Is there an existing 3rd party Antivirus? Migrate clients by stages. First, migrate several clients and then continue by department or by a designated number of PCs. Then uninstall the 3rd party antivirus management server. This method will have minimum impact on business operations. Scheduling Deployment Schedule migration/installation and deployment during off-peak hours. A long weekend/holiday is the best time for migrating and deploying Worry Free Business Security 6.0. Client types: Mobile and non-mobile Administrators can have a different set of privileges for mobile and non-mobile clients. This will allow mobile clients the flexibility that they need, such as for scheduled updates and update from the Internet. Client/Server Security Agent deployment options Worry-Free Business Security 6.0 has different Client/Server Security Agent deployment options, one to suit every network. Client Packages can be made for remote/mobile clients, Windows Remote Install can be used for local PCs that need Client/Server Security Agents, Web Install allows administrators and users remote installation access and Trend Micro Vulnerability Scanner automatically installs Client/Server Security Agents to unprotected PCs. For recommendations, see the table below. 13

14 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Table 1 - WFBS Client/Server Security Agent Deployment Options Criteria Web Page Login Script Client Packager Windows Remote Install Trend Micro Vulnerability Scanner Microsoft SMS/GPO Recommended for WAN Deployment No No Yes Yes No Yes Recommended for centralized administration and No Yes No Yes No Yes Management Requires client User Intervention Yes No Yes No Yes Yes Requires IT resource No Yes Yes Yes Yes Yes Suitable for Mass Deployment No Yes Yes No Yes Yes Bandwidth Consumption Low if Scheduled Low if Scheduled Low if Scheduled Low if Scheduled Low if Scheduled Low if Scheduled Web Page Install Suitable for deploying Client/Server Security Agents on a client in the local network. This option needs user intervention. The Web Page installation can also be initiated through . An notification can be initiated from the Security Server to the user that contains a link to install the Client/Server Security agent. This is useful for mobile clients that log into the local network. Login Script Suitable for mass deployment in the local network. No user intervention needed. Client Packager Suitable for installing Client/Server Security Agents on low-bandwidth, remote clients, which may include mobile clients. This requires user intervention. Windows Remote Install Suitable for on-demand, mass or selective deployment in the local network. This is used by administrators to deploy Client/Server Security Agents through the WFBS Web Console. 14

15 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Trend Micro Vulnerability Scanner Suitable for deploying Client/Server Security Agents on unprotected clients in the local network. This also serves as an unprotected client discovery tool for administrators. Microsoft Group Policy Object Microsoft Installer (MSI) packages can be created through the client packager. These MSI installation packages can be deployed through 3rd party deployment applications like Microsoft Systems Management Server. Microsoft Group Policy Objects can also be used for deploying MSI client packages. 15

16 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Network Topology Design Screened Host Figure 2 - Screened Host Firewall Configuration This topology guarantees that the Worry-Free Business Security Server is protected by the Firewall and avoids any communication problems between the Client/Server Security Agent, the Messaging Security Agent, and the Security Server. Trend Micro recommends this setup. Administrators don t need to open ports on the Firewall, which may cause vulnerabilities from the Internet. Screened Subnet (DMZ) Figure 3 - Screened Subnet Firewall Configuration 16

17 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 With this design, Administrators need to open ports on the Firewall to allow Client/Server Security Agent Security Server communication. Note: Publishing WFBS Web Page Publish only the WFBS secured web console if needed. Dynamic Network Address Translations can cause failure of client/server agentto-security server communication. 17

18 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Updating Multi-Site Environments Trend Micro Worry-Free Business Security allows administrators to assign Update Agents. These Update Agents distribute pattern and engine updates to remote clients. This and incremental updates help minimize bandwidth consumption for the scan engine and pattern updates. Main Internet Remote Site Remote Site Update Client/Server Agent Figure 4 - Deployment on remote sites Note: Assign at least one Update Agent in each Remote Site. Select machines which are always online. 18

19 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Displacement Trend Micro Worry-Free Business Security 6.0 CANNOT uninstall 3rd party antivirus management servers. Trend Micro Worry-Free Business Security 6.0 CAN automatically uninstall 3rd party antivirus client protection components. Installing WFBS 6.0 Security Server on the same server as with 3rd Party AV: 1. Uninstall 3rd party Client/Server protection component. 2. Uninstall 3rd party management server 3. Install WFBS 6.0 Installing WFBS 6.0 Security Server on a separate server (other than the 3rd Party AV): 1. Install WFBS 6.0 on the other server 2. Deploy Client/Server Security Agent on selected clients. 3. Uninstall 3rd party antivirus management server. Note: It is recommended that you migrate a few clients before proceeding to the whole migration. This will confirm the migration process. A Pilot deployment is also recommended for a large-size migration. 19

20 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Previous WFBS/CSM installations MUST: Before any migration process, back up licenses, log files, quarantined items and system state data. Supported upgrade paths Supported client upgrade paths allow automatic detection and migration of previous Client/Server Messaging Security versions. Worry Free Business Security 6.0 Trial version to Full version Upgrade from Client Server Messaging Security 3.6 to Worry-Free Business Security 6.0 Upgrade from Client Server Messaging Security 5.x to Worry-Free Business Security 6.0 Unsupported Upgrades Worry-Free Business Security 6.0 does not support direct upgrades under the following conditions: Upgrade from Client/Server Suite 2.0 Upgrade from Client/Server/Messaging Suite 2.0 Upgrade from Client/Server/Messaging Suite 3.5 Upgrade from OfficeScan Enterprise Edition or ScanMail for Microsoft Exchange Upgrade from Client/Server Security 3.0 Upgrade from Client/Server Messaging Security 3.0 Upgrade from one language to another If you have Client/Server Messaging Security 2.0/3.0, you need to upgrade to Client/Server Messaging Security 3.6 first before migrating to 6.0. You only need to upgrade the Security Server. After this upgrade, wait for the clients to get upgraded to v3.6 before upgrading to v6.0. As an alternative, you can uninstall 2.0/3.0, then install WFBS 6.0 fresh. This is the best upgrade option as it would take less time compared with upgrading to a supported upgrade version. 20

21 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Chapter 4: Deployment Execution This chapter describes the actual installation/deployment process. Topics discussed in this chapter include the pre- and post-installation tasks for: Installing the Security Server Installing the Messaging Security Agent on the Exchange Server Installing the Client/Server Security Agents Checking the Success of the Installations Installing the Security Server Pre-installation Checklist Schedule the installation off peak hours, preferably after a system backup so that in the event of any possible failure, all system settings can be recovered. Uninstall any 3rd Party antivirus management component on the server that will host the Worry-Free Business Security Server. If this server is also a Microsoft Exchange Server, uninstall any 3rd party antivirus solution for Exchange. Close all running applications during Worry-Free Business Security installation. During Installation During the Security Server installation process, there are options which should be chosen: Pre-scanning This basic pre-scan is recommended. However, it is also recommended that you initiate a scan after the pattern and engine files have been updated. Fully Qualified Domain Name (FQDN) vs. IP Address Use FQDN for Internal servers which have one network interface Use IP Address for servers which are multi-homed Target Directory 21

22 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Choose a directory with more than 1200 MB of free space Internet Information Services vs. Apache Use IIS for integrated Windows Authentication - Recommended. Use Apache when IIS is not available on the hosting server. Note: Using Apache requires that you create new account to run the Web server. By default, Apache only assigns a root account that has full access rights on the Web site. Post installation Internet Explorer Enhanced Security Configuration Internet Explorer s Enhanced Security Configuration can cause the Worry-Free Business Security Web Console to be inaccessible. Add the URL: as an allowed site in order to access the Worry-Free Business Security Web Console. Important: Update the scan engine and pattern files immediately. This should be done prior to Client/Server Security Agent deployment. Check installation success - Access the WFBS 6.0 Web Console - Download the eicar test file from: Security Server and Messaging Security Agent Configuration Configure the settings for the Security Server and Messaging Security Agent after installation. Create Client/Server Groupings Create different Client/Server agent groups and customize settings such as Client privileges, scan settings, directory exclusions etc. Management Console publishing (Optional) Publish the secured Web Console on the Firewall. This will allow users secure Web access to the Worry-Free Business Security Web Console. 22

23 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Installing the Messaging Security Agent Pre-installation MUST: Uninstall any 3rd Party Microsoft Exchange antivirus solution prior to the Messaging Security Agent installation. Post installation Configure Messaging Security Settings according to the company s security policy Exclude directories Exclude Microsoft Exchange Directories from being scanned by the Client/Server Security Agent. This will increase scanning performance. Figure 5 - Exclusion Menu Microsoft SQL databases should also be excluded from Client/Server Security Agent scanning. 23

24 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Check installation success Download and attach eicar.com test file to an . Send this message to any mailbox hosted at the Microsoft Exchange server. Installing the Client/Server Security Agent Pre-installation 3rd Party Client Firewall applications 3rd Party Client Firewall applications may conflict with Client/Server. Disable/uninstall 3rd Party Client Firewall applications prior to Client/Server Agent installation. Deploy Client/Server Agents Deploy Client/Server Agents to several clients before mass deployment. This will confirm the migration process. For Mobile Clients: Configure settings and copy ofcscan.ini located in the Trend Micro\Security Server\PCCSRV\ directory. Use this ofcscan.ini in order to create client packages. Supported 3rd Party antivirus auto uninstall Check tmuninst.ptn on the Security Server installation. This file can be opened by any text editor e.g. notepad \Trend Micro\Security Server\PCCSRV\Admin Post installation Check installation success Check the Client/Server Security Agent icon on the task bar. Download the eicar test file from: 24

25 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Move clients and servers to the appropriate domain/group Move clients to the proper Groups through the Worry Free Business Security management console. Notify clients so that settings take effect. Replicate settings from one group for efficiency. Assign Update Agents on remote sites. - Assign Update sources to groups of clients. This will reduce WAN bandwidth consumption. Administrators can also use this strategy in order to deploy updates by network segments. This method used in conjunction with scheduled updates will effectively distribute update traffic. To assign other update sources: 1. Open Worry-Free Business Security Management Console > Updates > Source > Security Agents Tab. Figure 6 - Update Source Configuration 2. Add Update Agents. 25

26 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Figure 7 - Add Update Agent Screen 3. Enable Alternative Update Sources. Figure 8 - Enable Alternative Update Source Screen 4. Add Client/Server Security Agent IP address range to Update Agents. Figure 9 - Add an Alternate Update Source Screen 26

27 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v Reorder Update Sources if necessary. Figure 10 - Reorder Update Source 27

28 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Other Considerations Patches and Support Certificates If you are using Internet Explorer 7, you will get a certificate error when first opening the WFBS console. You can go ahead and click Continue to this Website or to prevent the browser error from appearing again, you can install the Security Server certificate. To install the server certificate: 1. On the Certificate Error message, click Continue to this website. 2. Click the Certificate Error bar on the right side of the IE7 address bar. The Untrusted Certificate message window displays. Figure 11 - Untrusted Certificate Popup 3. Click View Certificates to open the Certificate window. 28

29 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Figure 12 - Certificate Import Wizard 4. Click Install Certificate > Next > Next > Finish. 5. Click Yes to the Security Warning prompt. Figure 13 - Security Warning 29

30 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Patches Most Trend Micro patches are applied to the Security Server. The Security Server then automatically updates the Client/Server Security Agents. Monitor and update to the latest Trend Micro Worry-Free Business Security patches. Knowledge Base To access the Knowledge Base, go to: 30

31 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Chapter 5: Post Installation Management Tasks This chapter describes the actual post installation tasks. Topics discussed in this chapter include: Trend Micro Vulnerability Assessment Trend Micro Vulnerability Scanner Deployment Key Points Summary Trend Micro Vulnerability Assessment Trend Micro Vulnerability Assessment offers threat virus correlation and maps vulnerabilities to Microsoft patches. Scan and perform actions periodically in order to mitigate threats. Figure 14 - Potential Threat Screens 1. Open Worry-Free Business Security 6.0 Management Console > Outbreak Defense > Settings > Vulnerability Assessment. 2. Set the schedule for Vulnerability Scans and click Save. 31

32 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Figure 15 - Vulnerability Assessment Settings Trend Micro Vulnerability Scanner Trend Micro Vulnerability Scanner (TMVS) tracks unprotected servers and clients and offers protection component installation option. This helps administrators detect and take actions on unprotected hosts. An account with administrative privilege on the target PCs is needed to run TMVS. Warning: DO NOT run Trend Micro Vulnerability Scanner (TMVS) on servers with Terminal Services. TMVS may trigger false alerts from Intrusion Detection Systems. 32

33 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 To run/schedule a Vulnerability Scan: 1. On the local server, execute: Program Files\Trend Micro\Security Server\PCCSRV\Admin\Utility\TMVS\TMVS.exe Figure 16 TMVS Window 2. An on-demand Vulnerability Scan can be initiated. Set and schedule vulnerability scans. 3. Under the Settings Menu, you can specify additional configuration options. Note that the security server is automatically detected by the tool. 33

34 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Figure 17 - TMVS Settings The Auto-install Client/Server Security Agent installation needs an account that has administrative rights on the target PCs. Trend Micro Vulnerability Scanner can even scan other 3rd party antivirus protection components. 34

35 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Deploying CSA via TMVS with Windows Firewall Enabled If the Install CSA option doesn t work, ensure that the File and Print Sharing Exception under Windows Firewall is checked. This can be configured on the client computer s Windows Firewall settings. Figure 18 - File and Print Sharing Exception If the customer has an Active Directory domain, Firewall settings can be configured using a Group Policy Object to multiple computers. This allows you to enable the firewall exception without having to visit each of the client computers. Refer to this Microsoft KnowledgeBase on how to do this: You need to enable the Allow File and Print Exception Setting, under Computer Configuration Administrative Templates Network Network Connections Windows Firewall. 35

36 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Behavior Monitoring Starting with v6.0, Behavior Monitoring is enabled by default. If you encounter any performance issues, such as application launch delays, ensure that you have the latest Behavior Monitoring Core Service component. You can verify this in WFBS 6.0 management console and clicking Updates Manual Behavior Monitoring. The update package contains performance fixes and optimizations for the Behavior Monitoring component of WBFS 6.0. If some trusted applications are taking time to launch, consider adding them to the Exception list. This can be configured in the Security Settings page. Firewall If you enabled the WFBS 6.0 Firewall Component on Windows 2008/Vista systems and encounter network disconnection issues, please apply the hot fix documented in the following Microsoft Knowledgebase article: US; Smart Scan FAQ What is Smart Scan? Smart Scan is a new technology from Trend Micro that utilizes a central scan service on your network to ease the burden of hosting all of the anti-malware signatures on your clients. It immunizes them against the Threat of Volume, where the growth of malware drives the growth of antimalware pattern size on clients. Enable Smart Scan to let the Security Server host all the necessary Smart Scan Service components on the server and to automatically download all the complimentary Smart Scan components to the clients. The Smart Scan Service is installed automatically with the WFBS 6.0 Security Server. You do not need to install it separately. Is Smart Scan reliable? Yes. Smart Scan simply provides a Smart Scan Service on the Security Server to help scan your clients. If your clients are configured for Smart Scan but cannot connect to the local Security Server, they will attempt to connect to the Trend Micro Global Smart Scan Server. How do I know if the Smart Scan Service is running properly? On the WFBS console, check the System Status to see if any of your clients are connected to the Smart Scan Service. If none of your clients can connect, then your Smart Scan Service has a problem. Verify that the port used by the Security Server is not blocked by your firewall. 36

37 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Also verify that the Trend Micro Smart Scan Service is running on the Security Server. What are the ports used by Smart Scan Service on the Security Server? The following ports are used by Smart Scan Service on the Security Server: HTTP HTTPS Can I uninstall the Smart Scan Service or choose not to install it? No, but there s no need to. You can simply switch to Conventional Scan by clicking a radio button in the Console if you do not want to use Smart Scan. Smart Scan and Conventional Scan radio buttons do not appear in the Mail Scan window after upgrading to Worry-Free Business Security (WFBS) Standard / Advanced 6.0 When you upgrade to WFBS 6.0, the Smart Scan feature will be disabled by default. This is a normal behavior because WFBS 3.6 and 5.0/5.1 only used the equivalent of Conventional Scan. To resolve the issue, you need to undo the Smart Scan disable function. Do the following: 1. Log in to the Worry Free Business Security Management console. 2. Go to Preferences > Global Settings > Desktop/Server tab. 3. Under General Scan Settings section, uncheck Disable Smart Scanning. 4. Click Save. The Conventional Scan and Smart Scan radio buttons will now appear in the Mail Scan window, with Conventional Scan preselected. Figure 19 - Smart Scan and Conventional Scan 37

38 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v Select Smart Scan if you wish to switch to Smart Scan and click Save. 38

39 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 Deployment Key Points Summary 1. Plan Deployment Schedule Trend Micro Client Server Messaging Security 3.6 deployment Secure backups before installation and deployment. 2. Install Security Server The Security Server cannot uninstall 3rd party antivirus management applications. Uninstall 3rd party antivirus management applications Update the scan engine and pattern files immediately 3. Install Messaging Security Agent Uninstall any existing 3rd party Microsoft Exchange antivirus solution before installing Messaging Security Agent 4. Configure Security Server and Messaging Security Agent Configure the Security Server before deploying Client Security Agents 5. Deploy clients Client/Security Agent can uninstall 3rd Party Antivirus applications 6. Post Deployment Checks Run Trend Micro Vulnerability Assessment tool to ensure that clients are protected. Schedule Trend Micro Vulnerability scans. 39

40 Trend Micro Worry-Free Business Security 6.0 Best Practices Guide v1.1 About Trend Micro Trend Micro, Incorporated is a global leader in network antivirus and Internet content security software and services, focused on helping customers prevent and minimize the impact of network viruses and mixed-threat attacks through its award-winning Trend Micro Enterprise Protection Strategy. Trend Micro has worldwide operations and trades stock on the Tokyo Stock Exchange and NASDAQ. Copyright by Trend Micro Incorporated. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the prior written consent of Trend Micro Incorporated. Trend Micro, the t-ball logo, and Worry-Free are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice. Legal Notice: Trend Micro licenses this product in accordance with terms and conditions set forth in the License Agreement inside the product package. If you wish to review the License Agreement prior to purchase, visit: If you (or the company you represent) do not agree to these terms and conditions, promptly return the product and package to your place of purchase for a full refund. 40

Worry-FreeTM. Business Security Standard and Advanced Editions. Installation and Upgrade Guide. Administrator s Guide

Worry-FreeTM. Business Security Standard and Advanced Editions. Installation and Upgrade Guide. Administrator s Guide 8 Worry-FreeTM Business Security Standard and Advanced Editions Securing Your Journey to the Cloud Administrator s Guide Installation and Upgrade Guide Trend Micro Incorporated reserves the right to make

More information

http://docs.trendmicro.com/en-us/smb/worry-free-business-security.aspx

http://docs.trendmicro.com/en-us/smb/worry-free-business-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Client Server Messaging Security3

Client Server Messaging Security3 Client Server Messaging Security3 for Small and Medium Business Getting Started Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without

More information

Trend Micro Worry-Free Business Security 8.0. Best Practice Guide

Trend Micro Worry-Free Business Security 8.0. Best Practice Guide Trend Micro Worry-Free Business Security 8.0 Best Practice Guide Best Practice Guide Book Information in this document is subject to change without notice. The names of companies, products, people, characters,

More information

Worry-Free TM Remote Manager TM 1

Worry-Free TM Remote Manager TM 1 Worry-Free TM Remote Manager TM 1 for Small and Medium Business Getting Started Guide for Resellers Trend Micro Incorporated reserves the right to make changes to this document and to the products described

More information

OfficeScan. Client/Server Edition 8 for Enterprise and Medium Business

OfficeScan. Client/Server Edition 8 for Enterprise and Medium Business OfficeScan TM Client/Server Edition 8 for Enterprise and Medium Business TM TM for Windows Vista Installation and Deployment Guide es Endpoint Security Trend Micro Incorporated reserves the right to make

More information

for Small and Medium Business Quick Start Guide

for Small and Medium Business Quick Start Guide for Small and Medium Business Quick Start Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products/services described herein without notice. Before using

More information

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned

More information

Client Server Security3

Client Server Security3 Client Server Security3 for Small and Medium Business Getting Started Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

More information

Volume Technical Product Marketing TREND MICRO. Worry-Free Business Security Services v3.5 Best Practices Guide

Volume Technical Product Marketing TREND MICRO. Worry-Free Business Security Services v3.5 Best Practices Guide TREND MICRO Worry-Free Business Security Services v3.5 Best Practices Guide Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com

More information

OfficeScan. Client/Server Edition 8 for Enterprise and Medium Business

OfficeScan. Client/Server Edition 8 for Enterprise and Medium Business OfficeScan TM Client/Server Edition 8 for Enterprise and Medium Business TM TM for Windows Vista Installation and Deployment Guide es Endpoint Security Trend Micro Incorporated reserves the right to make

More information

Best Practice Configurations for OfficeScan (OSCE) 10.6

Best Practice Configurations for OfficeScan (OSCE) 10.6 Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan

More information

Trend Micro Worry-Free Business Security 9.0 Best Practice Guide

Trend Micro Worry-Free Business Security 9.0 Best Practice Guide gus Trend Micro Worry-Free Business Security 9.0 Best Practice Guide Worry-Free Business Security 9.0 Best Practice Guide Information in this document is subject to change without notice. The names of

More information

Worry-Free TM Business Security Standard6

Worry-Free TM Business Security Standard6 Worry-Free TM Business Security Standard6 #1 for Small Business Security Administrator s Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described

More information

Trend Micro Hosted Email Security. Best Practice Guide

Trend Micro Hosted Email Security. Best Practice Guide Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described

More information

Client Server Messaging Security 3.5 for Small and Medium Business. Administrator s Guide

Client Server Messaging Security 3.5 for Small and Medium Business. Administrator s Guide Client Server Messaging Security 3.5 for Small and Medium Business Administrator s Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein

More information

Worry-Free TM Remote Manager

Worry-Free TM Remote Manager Worry-Free TM Remote Manager for Small and Medium Business Agent Installation Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products/services described

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Worry-Free TM Business Security Advanced6

Worry-Free TM Business Security Advanced6 Worry-Free TM Business Security Advanced6 #1 for Small Business Security Administrator s Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described

More information

Copyright 2015 Trend Micro Incorporated. All rights reserved.

Copyright 2015 Trend Micro Incorporated. All rights reserved. gus Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned herein are fictitious and are in no way intended to represent

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the product/service described herein without notice. Before installing and using the product/service, review the readme

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before using this service, please review the latest version of the applicable

More information

Worry-Free Business Security 6.0. External FAQ

Worry-Free Business Security 6.0. External FAQ Worry-Free Business Security 6.0 External FAQ May 2009 Page 1 Contents Introducing Worry-Free Business Security...3 What is Worry-Free Business Security?... 3 When is Worry-Free Business Security available?...

More information

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document ESET CYBER SECURITY PRO for Mac Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against

More information

for Small and Medium Business Getting Started Guide for Resellers

for Small and Medium Business Getting Started Guide for Resellers for Small and Medium Business Getting Started Guide for Resellers Trend Micro Incorporated reserves the right to make changes to this document and to the products/services described herein without notice.

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Trend Micro Worry- Free Business Security 8.0. 1 st time setup Tips & Tricks

Trend Micro Worry- Free Business Security 8.0. 1 st time setup Tips & Tricks Trend Micro Worry- Free Business Security 8.0 WFBS installation best practise, preparations and how to Preparation for 2008 Server IIS: Configuring the required Internet Information Services (IIS) roles

More information

ESET SMART SECURITY 6

ESET SMART SECURITY 6 ESET SMART SECURITY 6 Microsoft Windows 8 / 7 / Vista / XP / Home Server Quick Start Guide Click here to download the most recent version of this document ESET Smart Security provides state-of-the-art

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Upgrading Client Security and Policy Manager in 4 easy steps

Upgrading Client Security and Policy Manager in 4 easy steps Page 1 of 13 F-Secure White Paper Upgrading Client Security and Policy Manager in 4 easy steps Purpose This white paper describes how to easily upgrade your existing environment running Client Security

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of

More information

Sophos Computer Security Scan startup guide

Sophos Computer Security Scan startup guide Sophos Computer Security Scan startup guide Product version: 1.0 Document date: February 2010 Contents 1 About the software...3 2 What do I need to do?...3 3 Prepare for scanning...3 4 Install the software...4

More information

Worry-Free TM Business Security Standard6

Worry-Free TM Business Security Standard6 Worry-Free TM Business Security Standard6 #1 for Small Business Security Installation Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein

More information

Volume Technical Product Marketing. TREND MICRO Worry-Free Business Security Services 3.5 Reviewer s Guide

Volume Technical Product Marketing. TREND MICRO Worry-Free Business Security Services 3.5 Reviewer s Guide H TREND MICRO Worry-Free Business Security Services 3.5 Reviewer s Guide Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com Volume

More information

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is

More information

Version 3.8. Installation Guide

Version 3.8. Installation Guide Version 3.8 Installation Guide Copyright 2007 Jetro Platforms, Ltd. All rights reserved. This document is being furnished by Jetro Platforms for information purposes only to licensed users of the Jetro

More information

Symantec Mail Security for Domino

Symantec Mail Security for Domino Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database

More information

Managed Antivirus Quick Start Guide

Managed Antivirus Quick Start Guide Quick Start Guide Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt

More information

GWAVA 5. Migration Guide for Netware GWAVA 4 to Linux GWAVA 5

GWAVA 5. Migration Guide for Netware GWAVA 4 to Linux GWAVA 5 GWAVA 5 Migration Guide for Netware GWAVA 4 to Linux GWAVA 5 Copyright 2010 GWAVA, Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com Overview While GWAVA

More information

Worry-Free TM Business Security Standard6

Worry-Free TM Business Security Standard6 Worry-Free TM Business Security Standard6 #1 for Small Business Security Installation Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

Best Practice Configurations for OfficeScan 10.0

Best Practice Configurations for OfficeScan 10.0 Best Practice Configurations for OfficeScan 10.0 Applying Latest Patch(es) for OSCE 10.0 To find out the latest patches, refer to http://www.trendmicro.com/download/product.asp?productid=5 NOTE : There

More information

Trend ScanMail. for Microsoft Exchange. Quick Start Guide

Trend ScanMail. for Microsoft Exchange. Quick Start Guide Trend ScanMail for Microsoft Exchange Quick Start Guide Trend ScanMail for Microsoft Exchange ScanMail for Exchange This Quick Start Guide provides a step-by-step guide to installing ScanMail for Exchange,

More information

Basic Setup Guide. Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition

Basic Setup Guide. Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition Basic Setup Guide Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition Contents Getting started...1 Software components...1 Section 1: Purchasing and downloading

More information

T E C H N I C A L S A L E S S O L U T I O N

T E C H N I C A L S A L E S S O L U T I O N Trend Micro Email Encryption Gateway 5.0 Deployment Guide January 2009 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 USA T +1.800.228.5651 / +1.408.257.1500 F +1.408.257.2003 www.trendmicro.com

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

Getting started. Symantec AntiVirus Business Pack. About Symantec AntiVirus. Where to find information

Getting started. Symantec AntiVirus Business Pack. About Symantec AntiVirus. Where to find information Getting started Symantec AntiVirus Business Pack Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 Symantec and the Symantec logo are U.S. registered trademarks of Symantec

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Trend Micro OfficeScan 11.0 SP1. Best Practice Guide for Malware

Trend Micro OfficeScan 11.0 SP1. Best Practice Guide for Malware Trend Micro OfficeScan 11.0 SP1 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned

More information

SMB Technical Product Marketing. TREND MICRO Worry-Free Business Security Services v5.0 Best Practices Guide

SMB Technical Product Marketing. TREND MICRO Worry-Free Business Security Services v5.0 Best Practices Guide TREND MICRO Worry-Free Business Security Services v5.0 Best Practices Guide Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE

CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE Quick Start Guide for Partners Cloud Security for Endpoints powered by GravityZone Quick Start Guide for Partners Publication date 2013.10.28 Copyright

More information

Send technical support questions to tmss@support.trendmicro.com. In the United States, call the technical support team toll-free at 1-866-787-TMSS

Send technical support questions to tmss@support.trendmicro.com. In the United States, call the technical support team toll-free at 1-866-787-TMSS Quick Start Guide Send technical support questions to tmss@support.trendmicro.com. In the United States, call the technical support team toll-free at 1-866-787-TMSS (1-866-787-8677). For online support

More information

HoneyBOT User Guide A Windows based honeypot solution

HoneyBOT User Guide A Windows based honeypot solution HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Quickstart Guide. First Edition, Published September 2009. Remote Administrator / NOD32 Antivirus 4 Business Edition

Quickstart Guide. First Edition, Published September 2009. Remote Administrator / NOD32 Antivirus 4 Business Edition Quickstart Guide First Edition, Published September 2009 Remote Administrator / NOD32 Antivirus 4 Business Edition Contents Getting started...1 Software components...1 Section 1: Purchasing and downloading

More information

Worry-Free TM Business Security Services

Worry-Free TM Business Security Services Worry-Free TM Business Security Services For Small Business Security User s Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without

More information

AV Management Dashboard

AV Management Dashboard LabTech AV Management Dashboard AV MANAGEMENT DASHBOARD... 1 Overview... 1 Requirements... 1 Dashboard Overview... 2 Clients/Groups... 2 Offline AV Agents... 3 Threats... 3 AV Product... 4 Sync Agent Data

More information

Worry-Free TM Business Security Advanced6

Worry-Free TM Business Security Advanced6 Worry-Free TM Business Security Advanced6 #1 for Small Business Security Installation Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein

More information

Sage 100 ERP. Installation and System Administrator s Guide

Sage 100 ERP. Installation and System Administrator s Guide Sage 100 ERP Installation and System Administrator s Guide This is a publication of Sage Software, Inc. Version 2014 Copyright 2013 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the

More information

IM Security for Microsoft Office Communications Server 1 Instant Protection for Instant Messaging

IM Security for Microsoft Office Communications Server 1 Instant Protection for Instant Messaging TM IM Security for Microsoft Office Communications Server 1 Instant Protection for Instant Messaging Installation and Deployment Guide m s Messaging Security Trend Micro Incorporated reserves the right

More information

Trend Micro Worry-Free Remote Manager Agent Installation Guide

Trend Micro Worry-Free Remote Manager Agent Installation Guide Trend Micro Worry-Free Remote Manager Agent Installation Guide Agent Installation Guide The Agent Installation Guide contains information about the Worry-Free Remote Manager (WFRM) agent installation process

More information

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main

More information

Copyright 2013 Trend Micro Incorporated. All rights reserved.

Copyright 2013 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Remote Console Installation & Setup Guide. November 2009

Remote Console Installation & Setup Guide. November 2009 Remote Console Installation & Setup Guide November 2009 Legal Information All rights reserved. No part of this document shall be reproduced or transmitted by any means or otherwise, without written permission

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Comodo Endpoint Security Manager SME Software Version 2.1

Comodo Endpoint Security Manager SME Software Version 2.1 Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Symantec AntiVirus Corporate Edition Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 10223881 Symantec and the Symantec logo are U.S. registered trademarks

More information

SOS Suite Installation Guide

SOS Suite Installation Guide SOS Suite Installation Guide rev. 8/31/2010 Contents Overview Upgrading from SOS 2009 and Older Pre-Installation Recommendations Network Installations System Requirements Preparing for Installation Installing

More information

DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO

DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO Contents Overview...1 System requirements...1 Enterprise Server:...1 Client PCs:...1 Section 1: Before installing...1 Section 2: Download

More information

ControlPoint. Advanced Installation Guide. Publication Date: January 12, 2016. Metalogix International GmbH., 2008-2016 All Rights Reserved.

ControlPoint. Advanced Installation Guide. Publication Date: January 12, 2016. Metalogix International GmbH., 2008-2016 All Rights Reserved. ControlPoint Publication Date: January 12, 2016 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this software,

More information

escan SBS 2008 Installation Guide

escan SBS 2008 Installation Guide escan SBS 2008 Installation Guide Following things are required before starting the installation 1. On SBS 2008 server make sure you deinstall One Care before proceeding with installation of escan. 2.

More information

Best Practice Configurations for OfficeScan (OSCE) 10.6

Best Practice Configurations for OfficeScan (OSCE) 10.6 Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches, refer to http://www.trendmicro.com/download/product.asp?productid=5 Enable

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

Sage 200 Web Time & Expenses Guide

Sage 200 Web Time & Expenses Guide Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than

More information

Worry-Free TM Business Security Services

Worry-Free TM Business Security Services Worry-Free TM Business Security Services For Small Business Security User s Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

SMB Technical Product Marketing. TREND MICRO Worry-Free Business Security Services 5.0 Reviewer s Guide

SMB Technical Product Marketing. TREND MICRO Worry-Free Business Security Services 5.0 Reviewer s Guide H SMB Technical Product Marketing TREND MICRO Worry-Free Business Security Services 5.0 Reviewer s Guide Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003

More information

ESET SMART SECURITY 9

ESET SMART SECURITY 9 ESET SMART SECURITY 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET Smart Security is all-in-one Internet security

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx

http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Sophos Cloud Migration Tool Help. Product version: 1.0

Sophos Cloud Migration Tool Help. Product version: 1.0 Sophos Cloud Migration Tool Help Product version: 1.0 Document date: June 2015 Contents 1 About the Sophos Cloud Migration Tool...4 2 How does Sophos Cloud differ from on-premise management?...5 3 How

More information

Sophos for Microsoft SharePoint Help

Sophos for Microsoft SharePoint Help Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: March 2011 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 4 Reports...27 5 Search...28

More information

Novell ZENworks 10 Configuration Management SP3

Novell ZENworks 10 Configuration Management SP3 AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties

More information

SMART Vantage. Installation guide

SMART Vantage. Installation guide SMART Vantage Installation guide Product registration If you register your SMART product, we ll notify you of new features and software upgrades. Register online at smarttech.com/registration. Keep the

More information

Nexio Connectus with Nexio G-Scribe

Nexio Connectus with Nexio G-Scribe Nexio Connectus with Nexio G-Scribe 2.1.2 3/20/2014 Edition: A 2.1.2 Publication Information 2014 Imagine Communications. Proprietary and Confidential. Imagine Communications considers this document and

More information

Product Guide. McAfee Endpoint Protection for Mac 2.1.0

Product Guide. McAfee Endpoint Protection for Mac 2.1.0 Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

Client Manager for Endpoint Protection (CMEP) User s Guide

Client Manager for Endpoint Protection (CMEP) User s Guide Client Manager for Endpoint Protection (CMEP) July, 2010 All rights reserved. BigFix, Fixlet, Relevance Engine, Powered by BigFix and related BigFix logos are trademarks of BigFix, Inc. All other product

More information

ViRobot Desktop 5.5. User s Guide

ViRobot Desktop 5.5. User s Guide ViRobot Desktop 5.5 User s Guide ViRobot Desktop 5.5 User s Guide Copyright Notice Copyright 2007 by HAURI Inc. All rights reserved worldwide. No part of this publication or software may be reproduced,

More information

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems

More information