Interscan Web Security Virtual Appliance

End-of-Life Trend Micro Products/Versions
The following section lists all Trend Micro products and versions that have reached End-of-Life (EOL) status (formerly End-of-Support or EOS) in the last twelve (12) months and are no longer actively supported by Trend Micro. If the product/version you are looking for is not listed below, it is either still supported or is an older version that has been End-of-Life for more than 12 months.Please refer to Trend Micro’s latest End-of-Life Policy for more information on milestone definitions and standard timelines. 
Impact of 2020 LDAP Channel Binding and LDAP Signing Requirements for Windows on Trend Micro™ InterScan Web Security Virtual Appliance™ 6.5 SP2, SP3 and SP4
According to this Security Advisory, Microsoft provides recommendations for administrators to harden the configurations for LDAP channel binding and LDAP signing on Active Directory domain controllers.
"[ERROR]: connect_ntlm_type_1 return error: 91" appears in InterScan Web Security Virtual Appliance (IWSVA) 6.5
When the IP user cache is disabled in InterScan Web Security Virtual Appliance (IWSVA), users may experience occasional authentication pop-ups appear when browsing the internet and they are asked to provide their Active Directory credentials. At the same time, the log file of the Authentication Daemon (var/iwss/log/AuthDaemon.log.YYYYMMDD.XXXX) contains the following error message: [ERROR]: connect_ntlm_type_1 return error: 91
Enabling SOCKS5 proxy in Trend Micro™ InterScan Web Security Virtual Appliance™ 6.5 Service Pack 2
This article enumerates the steps on how to enable SOCKS5 proxy in InterScan Web Security Virtual Appliance 6.5 SP2.
URL Filtering Rule Actions in InterScan Web Security Virtual Appliance (IWSVA)
This article lists the priority of the Rule Actions in URL Filtering tab from highest to lowest.
Reclassifying URL or website in Trend Micro Site Safety Center
Individuals or site owners who feel that a website has a wrong rating or is classified incorrectly by Trend Micro can visit Site Safety Center to have the website reclassified. Site Safety Center allows you to verify the rating and category of a website and request for reclassification via the Give Feedback link. 
Retirement of Legacy Standalone Endpoint Network Patterns
Trend Micro is continually refining and enhancing its detection technology, and as a result will be consolidating and enhancing other patterns in the products.  As these patterns are integrated into other patterns, we will be retiring the updates of soon-to-be legacy standalone endpoint network patterns.Below is an outline of the pattern migrations .Pattern to be retiredDate of retirementNew pattern technology Global C&C IP ListRelevance Rule pattern September 15, 2023 Web Reputation Endpoint Patch PatternVulnerability Protection Pattern
How to Resolve Installation issues for InterScan Web Security Virtual Appliance 6.5 SP4 EN on a Generation 2 VM in Hyper-V
When installing InterScan Web Security Virtual Appliance 6.5 SP4 EN on a Generation 2 VM in Hyper-V , administrators may encounter the error message “Image hash and certificate is not allowed.
New Domain and Untested URL categories are not showing on the InterScan Web Security Virtual Appliance (IWSVA) Admin console
On the InterScan Web Security Virtual Appliance (IWSVA) Admin Console, the New Domain and Untested URL categories are not showing under the “Internet Security” and “General” sections: New Domain category is missing under HTTP > URL Filtering > Policies > Internet Security: Click the image to enlarge. Untested URL category is missing under HTTP > URL Filtering > Policies > General: Click the image to enlarge.
SECURITY BULLETIN: Trend Micro IWSVA XSS Privilege Escalation Vulnerability
Release Date: May 30, 2024CVE Identifier(s): CVE-2024-36359Platform(s): Virtual ApplianceCVSS 3.0 Score(s): 5.4Severity Rating(s): MediumTrend Micro has released a new critical patch (CP) for InterScan Web Security Virtual Appliance (IWSVA) 6.5 that resolves a cross-site scripting (XSS) privilege escalation vulnerability.
0 of rows(s) selected.
Page 1 of 23
Latest in Downloads
View all Downloads
Related Documentation
View all Documents