Installing Worry-Free Business Security (WFBS) 7.0

Support
Solution ID Last Updated
1056742 Date : 2013/06/03 Time:4:08 AM , (PST)


Product/Version Platform
Worry-Free Business Security Standard/Advanced - 7.0;
Windows - 2003 Datacenter Server, 2003 Enterprise Server, 2003 Home Server, 2003 Small Business Server, 2003 Standard Server Edition, 2003 Storage Server, 2003 Web Server Edition, 2008 Datacenter Server, 2008 Enterprise Server, 2008 Essential Business Server, 2008 Small Business Server, 2008 Standard Server Edition, 2008 Storage Server, Vista 32-bit, Vista 64-bit, XP Professional

Problem Description

Note: This solution only applies to Worry-Free Business Security Standard/Advanced 7.0
This article shows you the procedure for installing WFBS.
Note: If you want to download or view this procedure via video streaming, refer to this solution: Worry-Free Business Security (WFBS) 7.0 Installation Walkthrough Videos

Solution

Do the following:
Note: Close any running applications before installing WFBS. If you install while other applications are running, the installation process may take longer to complete.
  1. Perform the pre-configuration tasks.
    Note: You can also download WFBS 7.0 using the downloader tool. Refer to this article: Downloader tool for WFBS 7.0.
    1. Do one of the following:
      • Insert the installation CD on a disk drive.
      • Download the installer file from the Trend Micro Update Center and extract the file.
    2. Double-click the SETUP.EXE file. The Trend Micro Installation screen appears.
    3. Click Next. The License Agreement screen appears.
    4. Read the license agreement. If you agree with the terms, select I accept the terms of the license agreement.
    5. Click Next. The Setup Type screen appears.
    6. From the Setup Type page, choose one of the following options:
      • Typical install (Recommended) - This provides an easy solution for installing WFBS using Trend Micro default values. This method is suitable for a small business using a single Trend Micro Security Server and up to ten clients.
      • Minimal Install
      • Custom install - This provides flexibility in implementing your network security strategy. This method is suitable if you have many computers and servers or multiple Exchange servers.
    7. Click Next. The Product Activation page appears
      Note: If you do not have an Activation Code, you may not have registered your copy of WFBS yet. Click Register Online to open a new browser window. Follow the instructions on the Registration page. You may also choose to click Next to install the evaluation version. If you upgrade to the full version before the 30-day evaluation period ends, all your program settings will remain.
    8. Click Next. The Setup Overview page appears.
      The Setup Overview page shows the components that you need configure in order to install the Trend Micro Security Server and the Security Agent (as well as the Messaging Security Agent [MSA] if you are using WFBS Advanced).
    9. Click Next.
      If you selected Custom Installation, the Select Target Folder page would appear.
      The default WFBS install folder is C:\Program Files\Trend Micro\Security Server. If you want to install WFBS in another folder, click Browse.
    10. Click Next. The Select Components page appears.
    11. Select the components that you want to install.
      For WFBS Advanced only:
      The Configure Security Server page now highlights the Security Server.
      • Security Server (default): The Security Server hosts the centralized web-based management console.
      • Security Agent (default): The agent protects desktops and servers.
      • Messaging Security Agent (optional): When installing the Security Server on a computer that has a Microsoft Exchange server installed on the same computer, Setup prompts you to install a local MSA.
      • Remote Messaging Security Agent (optional):When installing the Security Server on a computer that cannot detect the existence of local Microsoft Exchange servers, Setup prompts you to install the remote MSA to remote servers.
        Note: If there is an Exchange server on the same computer on which you are installing the Security Server, the remote MSA will not show on the Select Components screen; only the local MSA will show.
  2. Configure the Security Server.
    The Security Server configuration tasks consist of pre-scanning the server for malware as well as configuring the web server and the proxy server.
    1. Click Next. The Computer Prescan page appears.
    2. Choose whether or not to pre-scan your computer for threats by selecting one of the following options:
      • Prescan my computer for threats- The prescan targets the most vulnerable areas of the computer, which include the following:
        • the boot area and boot directory (for boot sector viruses)
        • the Windows folder
        • the Program Files folder
      • Do not prescan my computer for threats - Trend Micro highly recommends pre-scanning your computer for security threats to ensure that the installation goes into a clean environment. Not pre-scanning the computer could prevent a successful installation.
    3. Click Next.
      If you selected Custom Installation, the Web Server page would appear.
      Select a web server to host the Security Server web console. Choose one of the following:
      • Internet Information Services (IIS) server
      • Apache Web server 2.0.xx
    4. Click Next. The Web Server Identification page appears.
    5. Choose from one of the following server identification options for client-server communication:
      Note: When using an IP address, ensure that the computer where you are installing the Security Server has a static IP address. If the server has multiple network interface cards (NICs), Trend Micro recommends using the domain name instead of the IP address.
      If all access to the Security Server will be done from within your network, you do not need to enable the SSL.
      • Server information - Choose domain name or IP address:
      • Fully Qualified Domain Name - Use the web server's domain name to ensure successful client-server communications.
      • IP address - Verify that the target server's IP address is correct.
    6. Click Next. The Administrator Account Password page appears.
    7. Specify different passwords for the Security Server web console and the Security Agent.
      Note: The password field holds 1-24 characters and is case sensitive.
      • Security Server web console - You will need a password to log on the web console. Provide the password and confirm the password.
      • Security Agents - You will need the password to uninstall Security Agents and remove them from your computer.
    8. Click Next. The SMTP Server and Notification Recipient(s) page appears.
    9. Enter the required information:
      Note: If the SMTP server is on the same computer as WFBS and uses port 25, the installation program detects the name of the SMTP server and updates the SMTP Server and Port fields. Refer to your ISP mail server settings. If you do not know these settings, proceed with the next step. You can update the SMTP settings after installation. Refer to the Administrator's Guide for instructions.
      • SMTP server - the IP address of your email server
      • Port - the port that the SMTP server uses for communications
      • Recipient(s) - the email address(es) that the SMTP server uses to send alert notifications. You can enter multiple email addresses when more than one person needs to receive notifications.
    10. Click Next. The Trend Micro Smart Protection Network page appears.
    11. Choose whether or not you want to participate in the Trend Micro Smart Protection Network feedback program.
    12. Click Next.
      If you selected Custom Installation, the General Proxy Settings page would appear.
      If a proxy server is required to access the Internet, select the Use a proxy server checkbox and provide the following information:
      The Configuring Security Agent page highlights the Security Agent.
      • Proxy server type
      • Server name or IP address
      • Port
      • User name and Password - Provide these only if the proxy server requires authentication.
  3. Configure the Security Agent.
    The Security Agent configuration tasks consist of setting the agent installation path, configuring the agent's server and desktop settings as well as the proxy server settings for additional services.
    1. Click Next.
      If you selected Custom Installation, the Security Agent Installation Path page would appear.
    2. Set the following items:
      • Installation Path - This is the destination folder where the Security Agent files are installed.
      • Security Agent Listening Port - This is the port number used for Security Agent and Security Server communications.
    3. Click Next.
      If you selected Custom Installation, the Configuring Security Agents Settings page would appear.
    4. You can configure Security Agent settings for Servers and Desktops:
      In each group, you can configure the following components:
      • Servers - Windows Server 2003/2008 computers will be added to the default Servers group when you first add them to the web console. You can enable different technologies for this group based on your particular needs.
      • Desktops - Windows XP/Vista/7 computers will be added to the default Desktops group when you first add them to the web console. You can enable different technologies for this group based on your particular needs.
      • Smart Scan - Smart Scan uses a central scan server on the network to take some of the burden of the scanning of clients.
      • Antivirus and Anti-Spyware - This scans files for malicious code as they are accessed or created.
      • Firewall - This protects clients against malware attacks and network viruses by creating a barrier between the clients and the network.
      • Web Reputation - This blocks malicious websites through the credibility of web domains and assigning a reputation score based on several identifying factors.
      • URL Filtering - This blocks specified categories of websites (for example, pornographic sites and social networking) according to your company's policy.
      • Behavior Monitoring - This analyzes program behavior to proactively detect known and unknown threats.
      • Device Control - This regulates access to external storage devices and network resources.
    5. Click Next.
      If you selected Custom Installation, the Proxy Setting for Additional Services page would appear.
      The Smart Scan, Web Reputation, and Behavior Monitoring services use the proxy server address and port used by Internet Explorer on client computers. If that proxy server requires authentication, use this page to specify logon credentials.
  4. For WFBS Advanced only: Configure the MSA.
    You will be prompted to install the MSA at one of the following points:
    Note: This procedure applies to both local and remote MSA installation.
    The Configuring Messaging Security Agent page highlights the local MSA.
    • When installing the Security Server on a computer that has Microsoft Exchange server installed on the same computer, Setup prompts you to install a local Messaging Security Agent.
    • When installing the Security Server on a computer that cannot detect the existence of local Microsoft Exchange servers, Setup prompts you to install the remote Messaging Security Agent to remote servers.
    1. Click Next. The Install Messaging Security Agent page appears.
    2. Provide the following information:
      • Exchange Server
      • Domain Administrator Account
      • Password
    3. Click Next.
      If you selected Custom Installation, the Messaging Security Agent Settings page would appear.
    4. Configure the following:
      • Target Folder - This is the folder where the MSA files are installed.
      • Temp Folder - This is the system root folder for MSA Agent installation.
      • Spam management
        • End User Quarantine - If selected, WFBS creates a separate spam folder on Microsoft Outlook in addition to the Junk E-mail folder.
        • Outlook Junk Email folder - If selected, WFBS stores spam mail into this folder. Since Outlook typically moves spam mail in the End User Quarantine (EUQ) folder to the Junk E-mail folder, Trend Micro recommends to select this option.
        Note: The option to select between EUQ and the Junk E-mail folder is only available if the computer is running Exchange Server 2003. On Exchange Server 2007 and 2010, the EUQ option is disabled by default. To enable EUQ, refer to this solution article: How to enable EUQ or the Junk Email integration on Exchange Server 2003 and 2007.
        For remote installation of the MSA, the Remote Messaging Security Agent Status page will reappear upon completion. Repeat the above process to install the Remote Messaging Security Agents on other Exchange servers.
  5. Proceed with the installation process.
    The Start Copying Files page shows a summary of all the parameters that will be used during the installation of WFBS
    1. Do one of the following:
      • If you wish to verify previous installation settings, click Back.
      • Click Nextto proceed with the actual installation.
        The Install Third Party Components page appears. This page informs you which third party components will be installed.
    2. Click Next to start installing the selected components. The entire installation process may take some time to complete. During the installation, a status page will show the progress being made.
    3. When the Setup Wizard Complete screen appears, click Finish.
If you need technical assistance, contact Trend Micro Technical Support.


Rate this Solution
Did this article help you?

Please provide your comments to help us improve this solution.

 
  *This form is an automated system. General questions, technical, sales and product-related issues submitted through this form will not be answered.
 
 

Connect with us on