Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Enabling Web Reputation in Worry-Free Business Security Services (WFBS-SVC)

    • Updated:
    • 23 Aug 2019
    • Product/Version:
    • Worry-Free Business Security Services 5.7
    • Worry-Free Business Security Services 6.1
    • Worry-Free Business Security Services 6.2
    • Worry-Free Business Security Services 6.3
    • Worry-Free Business Security Services 6.6
    • Worry-Free Business Security Services for Dell 5.6
    • Platform:
    • N/A N/A
Summary

Learn how to set up the Web Reputation feature in WFBS-SVC. 

Details
Public

Web Reputation enhances protection against malicious web sites. Web Reputation leverages Trend Micro's extensive web security database to check the reputation of URLs that clients are attempting to access or URLs embedded in email messages that are contacting web sites.

To enable Web Reputation:

  1. Log on to the WFBS-SVC console.
  2. Click Security Agents.
  3. Select the group that you want to configure.
  4. Click Configure Policy.
  5. Click on the Windows logo then click Web Reputation.

    Windows logo

  6. To enable Web Reputation, toggle the Web Reputation slider.

    Enable Web Reputation

  7. From the Web Reputation screen, update the following as required:

    SECURITY LEVELDEFINITION
    High

    Blocks the following pages:

    • Dangerous: Verified to be fraudulent or known sources of threats
    • Highly suspicious: Suspected to be fraudulent or possible sources of threats
    • Suspicious: Associated with spam or possibly compromised
    Medium

    Blocks the following pages:

    • Dangerous: Verified to be fraudulent or known sources of threats
    • Highly suspicious: Suspected to be fraudulent or possible sources of threats
    Low

    Blocks the following page:

    • Dangerous: Verified to be fraudulent or known sources of threats
  8. Click Save.
  1. Log on to the WFBS-SVC console.
  2. Click Security Agents.
  3. Select the group that you want to configure.
  4. Click Configure Policy.
  5. Click on the Apple logo then click Web Reputation.

    Apple logo

  6. To enable Web Reputation, toggle the Web Reputation slider.

    Enable Web Reputation

  7. From the Web Reputation screen, update the following as required:

    SECURITY LEVELDEFINITION
    High

    Blocks the following pages:

    • Dangerous: Verified to be fraudulent or known sources of threats
    • Highly suspicious: Suspected to be fraudulent or possible sources of threats
    • Suspicious: Associated with spam or possibly compromised
    Medium

    Blocks the following pages:

    • Dangerous: Verified to be fraudulent or known sources of threats
    • Highly suspicious: Suspected to be fraudulent or possible sources of threats
    Low

    Blocks the following page:

    • Dangerous: Verified to be fraudulent or known sources of threats
  1. Log on to the WFBS-SVC console.
  2. Click Security Agents.
  3. Select the group that you want to configure.
  4. Click Configure Policy.
  5. Click on the Android logo then click Web Reputation.

    Android logo

  6. To enable Web Reputation, toggle the Web Reputation slider.

    Enable Web Reputation

  7. From the Web Reputation screen, update the following as required:

    SECURITY LEVELDEFINITION
    High

    Blocks the following pages:

    • Dangerous: Verified to be fraudulent or known sources of threats
    • Highly suspicious: Suspected to be fraudulent or possible sources of threats
    • Suspicious: Associated with spam or possibly compromised
    Medium

    Blocks the following pages:

    • Dangerous: Verified to be fraudulent or known sources of threats
    • Highly suspicious: Suspected to be fraudulent or possible sources of threats
    Low

    Blocks the following page:

    • Dangerous: Verified to be fraudulent or known sources of threats
  8. Click Save.
 
To define approved and blocked lists for the group (and ignore the global lists), click Approved/Blocked URLs on the left panel, choose “Specify exceptions” and then configure the list in the screen that appears. For complete guide, you may refer to this document: Configuring the Approved/Blocked URL Lists.
Premium
Internal
Rating:
Category:
Configure
Solution Id:
1099175
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.