XGen Endpoint Security™, now active in scans conducted by Trend Micro Antivirus for Mac, is always adapting to identify and defeat new ransomware and other unknown threats. Essential Protection.
Worry-Free Business Security Services Documentation Documentation Description Help HTML files compiled in WebHelp or CHM format that provide 'how to's', usage advice, and field-specific information Quick Start Guide Provides instructions to install/upgrade the product and get started. It provides a description of the basic features and default settings. Knowledge Base An online database of problem-solving and troubleshooting information. It provides the latest information about known product issues. To access the Knowledge Base, go to the following website: Visit the following website to view the latest content.
Client Deployment and Upgrade. To completely reinstall or upgrade the CSA, you will need to restart the computer. A restart will also be necessary when updating some components including the firewall and the proxy drivers. After installing the CSA on a computer with IIS 7.0, you must restart the IIS service. IIS 7.0 may not work as expected with the CSA, which uses the Windows Filtering Platform, until IIS is restarted. This issue only occurs on Microsoft Windows 2008 without service pack 2. Real-time scan on CSA can prevent Hyper-V Manager from creating virtual machines.
If you encounter this issue, configure real-time scan to exclude the storage folder for your virtual machines from scanning. Hyper-V Manager uses 'C: ProgramData Microsoft Windows Hyper-V' as the default storage folder, but a different folder may be specified during virtual machine creation. In environments such as distributed file systems, scanning offline files causes unnecessary file recalls and can eventually lead to performance issues. To avoid scanning offline files:.
Open the Windows registry and navigate to HKEYLOCALMACHINE SYSTEM CurrentControlSet Services tmfilter Parameters. Set the registry keys SkipOffLineFile and SkipSparseFile to 1. For more information, refer to. The WFBS-SVCDownloader.exe file can only be run on the computer on which the user downloads it. If a user copies the file to another computer and runs it there, an error results.
Computer loses network connection temporarily during installation. Users cannot successfully uninstall the agent if Dropbox is installed on the same computer.
Uninstall Dropbox before uninstalling the agent. Users cannot deploy agent program when Internet Explorer 10 running in Windows UI mode on Windows 8. CSA supports Remote Desktop, Remote Web Workplace, and Citrix server terminal applications. In a Terminal Services environment, administrators can decide whether to show or hide the CSA icon in the Windows task bar. This setting applies to all or none of the active user sessions. It is not possible to apply the setting to individual user sessions.
If the icon shows on all active user sessions, memory usage may increase. To prevent this issue from occurring:. On the CSA host, open the registry. Create/modify the following REG name/value pair:. Key: HKLM SOFTWARE TrendMicro PCcillinNTCorp CurrentVersion Misc. RCS. Type: DWORD.
Value: 202 There will be no PccNTMon instances created when its value is set to 202. Firewall.
During CSA installation or firewall driver uninstallation, the computer may temporarily lose its network connection. Some applications, such as Secure Shell (SSH), Terminal Services Client, or Remote Desktop could be affected by the disconnection. If the network connection is lost, restart the application after installing the CSA or after disabling the firewall. The CSA firewall may conflict with other firewall applications. Trend Micro recommends uninstalling or disabling other firewall applications. On VMware clients, the CSA firewall may block all incoming packets. To address this issue, add the following value to the client's registry:.
Key: HKEYLOCALMACHINE SOFTWARE TrendMicro PC-cillinNTCorp CurrentVersion PFW. Name: EnableBypassRule. Type: REGDWORD. Data: 1. The firewall does not support IPV6. On Windows Vista, Windows 7, Windows 8, Windows Server 2008, Windows Server 2008 R2 and Windows Server 2012 computers, if the firewall is disabled and then re-enabled, Firewall patterns fail to load sometimes. To fix this problem, restart the affected computer.
Web Reputation and URL Filtering. When running Internet Explorer 9 with IE Enhanced Security Configuration, the Web Reputation plug-in module (TmIEPlugInBHO Class) cannot be automatically applied. Risky URLs using SSL cannot be blocked. Web Reputation Services and URL Filtering are not supported when Internet Explorer 10 is running in Windows UI mode on Windows 8. In an unstable network environment, the Trend Micro Web Reputation server may allow access to a website without validating the website's reputation. When TMMS is installed on a device running Android 2.x, the system proxy is not updated as this version of the operating system does not support system proxies. This could also prevent the device from connecting to the server to receive updates.
TMMS will not be installed on rooted Android devices. If the user goes to Settings Applications Manage Applications TMMS and taps Clear Data, TMMS might not be able to connect to the server to receive updates. The user would need to re-enroll the device.
If other installed apps interfere with the device’s network connection, TMMS might not be able to connect to the server to receive updates. Clicking the installation link from an email opens a web browser window. On the default browser of Android 2.x devices, if users click the 'Home' button to leave the browser window and then click the installation link again, the installation process stops and the browser window stops responding. To avoid this issue, users must close the browser window opened from installation links before clicking the link again. Trend Micro Incorporated, a global leader in Internet content security and threat management, aims to create a world safe for the exchange of digital information for businesses and consumers. A pioneer in server-based antivirus with over 20 years experience, we deliver top-ranked security that fits our customers’ needs, stops new threats faster, and protects data in physical, virtualized and cloud environments.
Powered by the Trend Micro Smart Protection Network(TM) infrastructure, our industry-leading cloud-computing security technology and products stop threats where they emerge, on the Internet, and are supported by 1,000+ threat intelligence experts around the globe. For additional information, visit. Copyright 2014, Trend Micro Incorporated.
All rights reserved. Trend Micro, the Trend Micro t-ball logo, Worry-Free, TrendProtect, and InterScan are trademarks of Trend Micro Incorporated and are registered in some jurisdictions. All other marks are the trademarks or registered trademarks of their respective companies.