Views:

To see the default configurations for Desktop and Server Groups in the WFBS console, go to Security Settings, select a group, and then click Configure. For more information, click any of the following:

Recommendations
Scan compressed filesEnabled
Add compressed files or file extensions you do not want scanned to the scan exclusion list.
CPU usageLow
This setting helps minimize computer slowdown when scanning occurs during peak hours. To improve performance, consider running Manual Scan during off-peak hours.
ActionUse Active Action
Recommendations
User activity on filesScan files being created, modified, retrieved, or executed.
This option ensures that files introduced to and originating from the computer are safe to access.
CPU usageLow
This setting helps minimize computer slowdown when scanning occurs during peak hours. To improve performance, consider running Manual Scan during off-peak hours.
Scan compressed filesEnabled
Add compressed files or file extensions you do not want scanned to the scan exclusion list.
ActionUse Active Action
Display a notification message when a security risk is detectedEnabled
Notifications allow users to take immediate action. Consider disabling only if the notifications are generating a large number of support calls.
Recommendations
Scheduled ScanEnabled
Weekly

Schedule the scan during off-peak hours to improve the scanning performance and avoid potential computer slowdown.

Scan targetFile types scanned by IntelliScan
IntelliScan improves performance by only scanning types known to potentially carry malicious code. Using this setting also allows you to utilize true file-type scanning.
Scan compressed filesEnabled
Add compressed files or file extensions you do not want scanned to the scan exclusion list.
CPU usageLow
This setting helps minimize computer slowdown when scanning occurs during peak hours.
ActionUse ActiveAction
Allow users to postpone or cancel Scheduled ScanDisabled users may cancel the scan if this setting is enabled. Consider enabling only on selected computers. For example, enable the option on a shared computer used for presentations. This allows the user to cancel the scan if scanning will occur during a presentation.
Recommendations
Scan exclusionsEnabled
Database and encrypted files should generally be excluded from scanning to avoid performance and functionality issues. Also add files that are causing false-positives and files that many users are reporting as safe.
Recommendations
Web Reputation PolicyEnabled
This setting ensures that clients are protected from web-based threats even if they are outside the corporate network
Security levelMedium
Recommendations
Web Reputation PolicyEnabled
Security LevelMedium
Allow clients to send logs to the Trend Micro Security ServerEnabled if you want to monitor websites that users are accessing. This setting generates traffic between the server and clients.
Recommendations
Approved URL list

Add URLs that you or users think are safe to access.

You may also access the Site Safety Center if you think a URL has been misclassified.

Recommendations
Update scheduleDaily or Hourly
Update sourceSetting up the Trend Micro ActiveUpdate server and maintaining a custom update source may be a tedious process and requires additional computing resources.
Recommendations
CriteriaSend a notification only when the scan action was not performed successfully. Select this option to limit the amount of email notifications you receive and focus only on security events that require your attention.
EmailAdd all Trend Micro Security and Worry-Free Business Security administrators in your organization as email recipients.
Recommendations
CriteriaUse the default settings:
  • Unique sources: 1
  • Detections: 100
  • Time period: 24 hours
EmailAdd all Trend Micro Security and Worry-Free Business Security administrators in your organization as email recipients.
Recommendations
Server name and listening portAvoid changing when clients have been registered to the server or clients will have to be redeployed.
Proxy settingsDisabled
Clients do not typically communicate with the server through an intranet proxy. Also avoid changing when clients have been registered to the server or clients will have to be redeployed.
Recommendations
Proxy settingsEnabled if the Trend Micro Security Server connects to the Trend Micro ActiveUpdate server through a proxy server
Recommendations
Scheduled deletion of logsEnabled
Logs to deleteLogs older than 7 days
Log deletion scheduleWeekly
Schedule the deletion during off-peak hours.