Enabling the Firewall Booster feature of Trend Micro Security

  • Solution ID:1107553
  • Last Updated:Jul. 26, 2018 2:45 AM (PST)
  • Applies to:Antivirus+ Security - 2016, Antivirus+ Security - 2017, Antivirus+ Security - 2018;Internet Security - 2016, Internet Security - 2017;Internet Security - 2018;Maximum Security - 2016, 2017;2018;Premium Security - 2016, Premium Security - 2017;Premium Security - 2018;
  • Activating Firewall Booster | Trend Micro Security

Learn how to use the Firewall Booster feature of your Trend Micro Security software.


What is a Firewall Booster?


The Firewall Booster feature of Trend Micro Security is intended to provide network vulnerability detection and anti-botnet protection and has these key features:

  • Works with Windows Firewall, but runs independently

    Enabling Firewall Booster does not enable the Windows Firewall, and Firewall Booster does not register itself to Windows Security Center (WSC).

  • Link to Window Firewall provided within the configuration setting
  • Works with third-party firewalls
  • Intrusion Detection System (IDS)
  • Generic Stream Scan (GSS)
  • Botnet detection
  • Manually block incoming and outgoing connections of programs with your Trend Micro Security

The Firewall Booster is automatically activated for increased network security. This means that you do not have to deal with complicated settings. Trend Micro's latest version is simply security made easy!

 

How do I enable the Firewall Booster feature of Trend Micro Security?


To enable the Firewall Booster, follow the steps below:

  1. Open the main console of Trend Micro Security by doing any of the following:
    • Double-click the Trend Micro icon on your desktop.
    • Double-click the Trend Micro icon on your system tray (near the clock).
  2. Click Settings.

    Click Settings

  3. Click Internet and E-mail Controls, then click Network.
  4. Enable the tickbox for Activate the Firewall Booster to enhance the protection given by the Windows Firewall and detect botnet programs that can hijack your computer by remote control.

    Protection Settings

  5. Click Apply, then click OK.