Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Recommended and default configuration settings for Desktop and Server Groups in WFBS

    • Updated:
    • 2 Feb 2015
    • Product/Version:
    • Worry-Free Business Security Standard/Advanced 7.0
    • Worry-Free Business Security Standard/Advanced 8.0
    • Worry-Free Business Security Standard/Advanced 9.0
    • Platform:
    • Windows 2003 Datacenter Server
    • Windows 2003 Enterprise Server
    • Windows 2003 Home Server
    • Windows 2003 Small Business Server
    • Windows 2003 Standard Server Edition
    • Windows 2003 Storage Server
    • Windows 2003 Web Server Edition
    • Windows 2008 Datacenter Server
    • Windows 2008 Enterprise Server
    • Windows 2008 Essential Business Server
    • Windows 2008 Small Business Server
    • Windows 2008 Standard Server Edition
    • Windows 2008 Storage Server
    • Windows 7 32-bit
    • Windows 7 64-bit
    • Windows Vista 32-bit
    • Windows Vista 64-bit
    • Windows XP Professional
Summary

Learn the default and recommended configuration settings for Desktop and Server Groups in Worry-Free Business Security (WFBS).

Details
Public

To see the default configurations for Desktop and Server Groups in the WFBS console, go to Security Settings, select a group, and then click Configure. For more information, click any of the following:

Recommendations
Scan compressed filesEnabled
Add compressed files or file extensions you do not want scanned to the scan exclusion list.
CPU usageLow
This setting helps minimize computer slowdown when scanning occurs during peak hours. To improve performance, consider running Manual Scan during off-peak hours.
ActionUse Active Action
Recommendations
User activity on filesScan files being created, modified, retrieved, or executed.
This option ensures that files introduced to and originating from the computer are safe to access.
CPU usageLow
This setting helps minimize computer slowdown when scanning occurs during peak hours. To improve performance, consider running Manual Scan during off-peak hours.
Scan compressed filesEnabled
Add compressed files or file extensions you do not want scanned to the scan exclusion list.
ActionUse Active Action
Display a notification message when a security risk is detectedEnabled
Notifications allow users to take immediate action. Consider disabling only if the notifications are generating a large number of support calls.
Recommendations
Scheduled ScanEnabled
Weekly

Schedule the scan during off-peak hours to improve the scanning performance and avoid potential computer slowdown.

Scan targetFile types scanned by IntelliScan
IntelliScan improves performance by only scanning types known to potentially carry malicious code. Using this setting also allows you to utilize true file-type scanning.
Scan compressed filesEnabled
Add compressed files or file extensions you do not want scanned to the scan exclusion list.
CPU usageLow
This setting helps minimize computer slowdown when scanning occurs during peak hours.
ActionUse ActiveAction
Allow users to postpone or cancel Scheduled ScanDisabled users may cancel the scan if this setting is enabled. Consider enabling only on selected computers. For example, enable the option on a shared computer used for presentations. This allows the user to cancel the scan if scanning will occur during a presentation.
Recommendations
Scan exclusionsEnabled
Database and encrypted files should generally be excluded from scanning to avoid performance and functionality issues. Also add files that are causing false-positives and files that many users are reporting as safe.
Recommendations
Web Reputation PolicyEnabled
This setting ensures that clients are protected from web-based threats even if they are outside the corporate network
Security levelMedium
Recommendations
Web Reputation PolicyEnabled
Security LevelMedium
Allow clients to send logs to the Trend Micro Security ServerEnabled if you want to monitor websites that users are accessing. This setting generates traffic between the server and clients.
Recommendations
Approved URL list

Add URLs that you or users think are safe to access.

Also access the following page if you think a URL has been misclassified: http://reclassify.wrs.trendmicro.com/wrsonlinequery

Recommendations
Update scheduleDaily or Hourly
Update sourceSetting up the Trend Micro ActiveUpdate server and maintaining a custom update source may be a tedious process and requires additional computing resources.
Recommendations
CriteriaSend a notification only when the scan action was not performed successfully. Select this option to limit the amount of email notifications you receive and focus only on security events that require your attention.
EmailAdd all Trend Micro Security and Worry-Free Business Security administrators in your organization as email recipients.
Recommendations
CriteriaUse the default settings:
  • Unique sources: 1
  • Detections: 100
  • Time period: 24 hours
EmailAdd all Trend Micro Security and Worry-Free Business Security administrators in your organization as email recipients.
Recommendations
Server name and listening portAvoid changing when clients have been registered to the server or clients will have to be redeployed.
Proxy settingsDisabled
Clients do not typically communicate with the server through an intranet proxy. Also avoid changing when clients have been registered to the server or clients will have to be redeployed.
Recommendations
Proxy settingsEnabled if the Trend Micro Security Server connects to the Trend Micro ActiveUpdate server through a proxy server
Recommendations
Scheduled deletion of logsEnabled
Logs to deleteLogs older than 7 days
Log deletion scheduleWeekly
Schedule the deletion during off-peak hours.
Premium
Internal
Rating:
Category:
Configure
Solution Id:
1056750
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support


To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.


Need More Help?

Create a technical support case if you need further support.