Published by: Trend Micro, Incorporated
Published on: March. 2014
This readme file was current as of the date above. All customers are advised to check the Trend Micro Online Help Center for updates (docs.trendmicro.com).
The Trend Micro Client/Server Security Agent (CSA) is the endpoint component for the "Services" edition of the Trend Micro Worry-Free Business Security package. CSA is installed on client devices and protects your Windows, Mac, and Android devices from Internet threats. It is managed through the console. CSA provides real-time, scheduled, and manual threat scanning capabilities along with other protection.
Mac Security Agent Support: The Security Agent supports installation on Mac OS X 10.9 “Mavericks”.
In addition to this readme file, Worry-Free Business Security Services documentation includes the following:
Documentation |
Description |
---|---|
Help |
HTML files compiled in WebHelp or CHM format that provide "how to's", usage advice, and field-specific information |
Quick Start Guide |
Provides instructions to install/upgrade the product and get started. It provides a description of the basic features and default settings. |
Knowledge Base |
An online database of problem-solving and troubleshooting information. It provides the latest information about known product issues. To access the Knowledge Base, go to the following website: http://esupport.trendmicro.com/en-us/business/default.aspx |
Visit the following website to view the latest content:
http://docs.trendmicro.com/en-us/smb/worry-free-business-security-services.aspx
Visit the following website to view the latest content:
There are several ways to install the Agent. The Worry-Free Business Security Services administrator can help choose the most suitable installation method for your device. Contact the administrator for installation recommendations and instructions.
Trend Micro recommends performing an update immediately after installation.
To completely reinstall or upgrade the CSA, you will need to restart the computer. A restart will also be necessary when updating some components including the firewall and the proxy drivers.
After installing the CSA on a computer with IIS 7.0, you must restart the IIS service. IIS 7.0 may not work as expected with the CSA, which uses the Windows Filtering Platform, until IIS is restarted. This issue only occurs on Microsoft Windows 2008 without service pack 2.
Real-time scan on CSA can prevent Hyper-V Manager from creating virtual machines. If you encounter this issue, configure real-time scan to exclude the storage folder for your virtual machines from scanning. Hyper-V Manager uses "C:\ProgramData\Microsoft\Windows\Hyper-V" as the default storage folder, but a different folder may be specified during virtual machine creation.
In environments such as distributed file systems, scanning offline files causes unnecessary file recalls and can eventually lead to performance issues. To avoid scanning offline files:
Open the Windows registry and navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\tmfilter\Parameters.
Set the registry keys SkipOffLineFile and SkipSparseFile to 1.
For more information, refer to http://esupport.trendmicro.com/Pages/How-to-skip-offline-files-from-being-scanned.aspx
The WFBS-SVC_Downloader.exe file can only be run on the computer on which the user downloads it. If a user copies the file to another computer and runs it there, an error results.
Computer loses network connection temporarily during installation.
Users cannot successfully uninstall the agent if Dropbox is installed on the same computer. Uninstall Dropbox before uninstalling the agent.
Users cannot deploy agent program when Internet Explorer 10 running in Windows UI mode on Windows 8.
In a Terminal Services environment, administrators can decide whether to show or hide the CSA icon in the Windows task bar. This setting applies to all or none of the active user sessions. It is not possible to apply the setting to individual user sessions.
If the icon shows on all active user sessions, memory usage may increase. To prevent this issue from occurring:
There will be no PccNTMon instances created when its value is set to 202.
On Windows Vista/2008/7 guest operating systems running VMware ESX 3.5 servers, PccNTmon cannot render the CSA console correctly. The system hangs and eventually crashes.
To prevent this issue:
Click
.Select Adjust for best performance.
CSA self-protection for Process and Registry Keys works supports all 32-bit operating systems and only on the following 64-bit platforms: Windows Vista SP1 x64 and Windows Server 2008 SP1 x64 and above.
If the "Client Security" setting on the web console (in Devices> {group} > Configure Policy > Windows tab > Client Privileges) is enabled and a malware program resides in the CSA folder before real-time scan starts, CSA cannot restrict that malware from updating the registry.
If virus pattern or spyware pattern files are not available to the CSA, the CSA will keep its current scan method until the pattern is delivered.
During CSA installation or firewall driver uninstallation, the computer may temporarily lose its network connection. Some applications, such as Secure Shell (SSH), Terminal Services Client, or Remote Desktop could be affected by the disconnection. If the network connection is lost, restart the application after installing the CSA or after disabling the firewall.
The CSA firewall may conflict with other firewall applications. Trend Micro recommends uninstalling or disabling other firewall applications.
On VMware clients, the CSA firewall may block all incoming packets.
To address this issue, add the following value to the client's registry:
Key: HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro\PC-cillinNTCorp\CurrentVersion\PFW
Name: EnableBypassRule
Type: REG_DWORD
Data: 1
The firewall does not support IPV6.
On Windows Vista, Windows 7, Windows 8, Windows Server 2008, Windows Server 2008 R2 and Windows Server 2012 computers, if the firewall is disabled and then re-enabled, Firewall patterns fail to load sometimes. To fix this problem, restart the affected computer
Behavior Monitoring supports all 32-bit operating systems and only the following 64-bit platforms: Windows Vista SP1 x64 and Windows Server 2008 SP1 x64 and above.
Device Control supports all 32-bit operating systems and only the following 64-bit platforms: Windows Vista SP1 x64 and Windows Server 2008 SP1 x64 and above.
When running Internet Explorer 9 with IE Enhanced Security Configuration, the Web Reputation plug-in module (TmIEPlugInBHO Class) cannot be automatically applied. Risky URLs using SSL cannot be blocked.
Web Reputation Services and URL Filtering are not supported when Internet Explorer 10 is running in Windows UI mode on Windows 8.
When Internet Explorer 9 is installed under Windows Small Business Server 2011 Essentials, a popup window concerning unused windows appears when closing the Dashboard console.
SBS Dashboard Add-in is not compatible with Internet Explorer Enhanced Security Configuration. Ensure this option is disabled before opening the Dashboard.
Pinning or "freezing" table headers on the Device screen is not supported on Windows Small Business Server 2011 Essentials.
Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Vista, Windows 7, and Windows 8 computers with UAC enabled prohibit automatic installation.
The Agent does not support root accounts.
When TMMS is installed on a device running Android 2.x, the system proxy is not updated as this version of the operating system does not support system proxies. This could also prevent the device from connecting to the server to receive updates.
TMMS will not be installed on rooted Android devices.
If the user goes to Settings > Applications > Manage Applications > TMMS and taps Clear Data, TMMS might not be able to connect to the server to receive updates. The user would need to re-enroll the device.
If other installed apps interfere with the device’s network connection, TMMS might not be able to connect to the server to receive updates.
Clicking the installation link from an email opens a web browser window. On the default browser of Android 2.x devices, if users click the "Home" button to leave the browser window and then click the installation link again, the installation process stops and the browser window stops responding.
To avoid this issue, users must close the browser window opened from installation links before clicking the link again.
Release |
Date |
---|---|
WFBS-H v2.5 |
September 2008 |
WFBS-H v2.5 SP1 |
February 2009 |
WFBS-H v2.5 SP2 |
April 2009 |
WFBS-SVC v3.0 |
December 2009 |
WFBS-SVC v3.5 |
September 2010 |
WFBS-SVC v3.5 SP1 |
November 2010 |
WFBS-SVC v3.5 SP2 |
December 2010 |
WFBS-SVC v3.5 SP3 |
April 2011 |
WFBS-SVC v3.6 |
September 2011 |
WFBS-SVC v3.6 SP1 |
January 2012 |
WFBS-SVC v3.7 |
February 2012 |
WFBS-SVC v5.0 |
August 2012 |
WFBS-SVC v5.1 | January 2013 |
WFBS-SVC v5.2 | June 2013 |
WFBS-SVC v5.3 | September 2013 |
Trend Micro has sales and corporate offices in many cities around the globe. For global contact information, visit the Trend Micro Worldwide site:
http://esupport.trendmicro.com/support/srf/questionentry.do
The information on this website is subject to change without notice.
Trend Micro Incorporated, a global leader in Internet content security and threat management, aims to create a world safe for the exchange of digital information for businesses and consumers. A pioneer in server-based antivirus with over 20 years experience, we deliver top-ranked security that fits our customers’ needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the Trend Micro Smart Protection Network(TM) infrastructure, our industry-leading cloud-computing security technology and products stop threats where they emerge, on the Internet, and are supported by 1,000+ threat intelligence experts around the globe. For additional information, visit http://www.trendmicro.com/.
Copyright 2014, Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, Worry-Free, TrendProtect, and InterScan are trademarks of Trend Micro Incorporated and are registered in some jurisdictions. All other marks are the trademarks or registered trademarks of their respective companies.
Information about your license agreement with Trend Micro can be viewed at:
http://us.trendmicro.com/us/about/company/user_license_agreements
Third-party licensing agreements can be viewed by selecting the About option in the application user interface.