<> Trend Micro, Inc. Jan 2024 ---------------------------------------------------------------------- Trend Micro(TM) IM Security for Microsoft(TM) Skype for Business 1.6.5 ---------------------------------------------------------------------- Notes: This readme file was current as of the date above. However, all customers are advised to check the Trend Micro website for documentation updates at: http://docs.trendmicro.com/ Register online with Trend Micro within 30 days of installation to continue downloading new pattern files and product updates from the Trend Micro website. Register during installation or online at: http://olr.trendmicro.com Contents ===================================================================== 1. About Trend Micro IM Security 2. What's New 2.1 New Features and Enhancements in 1.6.5 Repack 1 2.2 New Features and Enhancements in 1.6.5 3. Documentation Set 4. System Requirements 5. Installation/Uninstallation 5.1 Installing Trend Micro IM Security 5.2 Uninstalling Trend Micro IM Security 6. Post-installation Configuration 7. Known Issues 8. Release History 9. Contact Information 10. About Trend Micro 11. License Agreement ===================================================================== 1. About Trend Micro IM Security ======================================================================== Instant Messaging (IM) can mean instant exposure to fast-moving attacks designed to spread malware, lure victims to malicious sites, and steal data. Trend Micro IM Security for Microsoft Skype for Business 1.6.5 secures your Microsoft Skype for Business Server 2015 and Lync Server 2013 environments. Use the IM Security installation program to quickly install IM Security to one or more, local or remote front end servers. Once installed, IM Security can protect your servers in real time against viruses/malware, Trojans, worms, and spyware/grayware. 1.1 Overview of this Release ===================================================================== IM Security sustains business and network integrity by screening out instant messages and files containing undesirable or unwanted content. IM Security monitors and protects sensitive information that is travelling across your network. IM Security also adds the ability to support Microsoft SQL Server AlwaysOn Availability Groups, which provides a rich set of options that improve database availability and resource usage. 1.2 Who Should Install this Release ===================================================================== Administrators currently running Microsoft Skype for Business Server 2015 or Lync Server 2013 can install this release. This version supports upgrading from IM Security 1.6 for Lync Server 2013. 2. What's New ======================================================================== 2.1 New Features and Enhancements in 1.6.5 Repack 1 ===================================================================== This release includes the following new features and enhancement: - Resolved DLL Hijacking in Installer File =================================================================== While launching the installation file, this version of IM Security makes sure that the correct system DLL file is loaded instead of a fake DLL file. 2.2 New Features and Enhancements in 1.6.5 ===================================================================== This version of Trend Micro IM Security provides the following new functionalities: - Microsoft Skype for Business Server 2015 support ------------------------------------------------------------------- This version of IM Security provides full support for Microsoft Skype for Business Server 2015. - Installation enhancement ------------------------------------------------------------------- The installation program includes installation for SQL Server 2014 Express to let you install a local database. - SQL Server AlwaysOn Availability Groups support ------------------------------------------------------------------- This version of IM Security supports SQL Server AlwaysOn Availability Groups feature of database, and supports both default SQL port and customized listening port. In addition, Windows authentication and SQL Server authentication are both supported in this version of IM Security. - Data Leakage Prevention (DLP) enhancement ------------------------------------------------------------------- This version of IM Security uses the latest pre-defined DLP policy and templates. - Sends Data Leakage Prevention (DLP) match data to Trend Micro Control Manager ------------------------------------------------------------------- IM Security sends the DLP match data to Trend Micro Control Manager, and enables you to query the Incident ID in logs and DLP Incident Investigation page. - Unscannable files data is separated and visible ------------------------------------------------------------------- Unscannable files are password protected files, encrypted files, or files that exceed the user defined scanning restrictions. This version of IM Security separates unscannable files data from virus scan data and shows it on Summary and Real-time monitor screens. User can also display unscannable files logs nd generate unscannable files reports. - Secure access to management console ------------------------------------------------------------------- IM Security now only supports SSL type to access management console. The HTTP access to management console will no longer be supported. 3. Documentation Set ======================================================================== In addition to this readme.txt, the documentation set for this product includes the following: - Online help -- Context-sensitive help screens that provide guidance for performing a task. - Administrator's Guide -- product overview, configuration instructions, and detailed information for managing the product environment. - Installation Guide -- A PDF document containing product requirements, deployment planning, installation instructions and other information intended to get you "up and running." 4. System Requirements ======================================================================== Processor --------- x64 architecture-based processor that supports Intel(TM) Extended Memory 64 Technology (Intel EM64T) Memory ------ 512MB RAM (minimum) 1GB RAM (recommended) (Exclusively for IM Security) Disk Space ---------- 1GB free disk space (minimum) 1.5GB free disk space (recommended) Operating System ---------------- Microsoft Windows Server 2008 with Service Pack 2 (64-bit) Microsoft Windows Server 2008 R2 (64-bit) Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows Server 2016 Microsoft Windows Server 2019 Note: Only Standard, Enterprise and Datacenter Editions are supported. Install the following features in Web Server Roles: - CGI role service - Default Document - Static Content - IIS 6 Management Compatibility Microsoft Lync(TM) Server -------------------------------------- - Microsoft Lync Server 2013 (Front End Server), Standard or Enterprise - Microsoft Skype for Business Server 2015 (Front End Server), Standard or Enterprise - Cumulative Update 5 for Microsoft Skype for Business Server 2015 (Front End Server), Standard or Enterprise Web Server ---------- - Microsoft Internet Information Services (IIS) 7.0, 7.5, 8.0, 8.5 Browser ------- A web browser that supports frames, such as: - Microsoft Internet Explorer(TM) 7.0 or later (Compatibility view is suggested) - Mozilla Firefox 3.0 or later Database ------------------ For SQL server authentication, ensure the SQL account meets the following authentication requirements: - Database roles: "dbcreator" For Windows authentication, ensure that the user logged on the target servers meets the following authentication requirements: - Database roles: "dbcreator" - Groups: domain users and local administrators .NET Framework -------------- - .NET framework 3.5 SP1 required To integrate with Trend Micro Products: Trend Micro Control Manager(TM) ------------------------------- - Trend Micro Control Manager 5.5 or later 5. Installation/Uninstallation ======================================================================== 5.1 Installing Trend Micro IM Security ===================================================================== This section explains key steps for installing the software. Notes: To install/uninstall this release, the minimum privilege required is local administrator and domain user. 5.1.1 Performing a Normal Installation --------------------------------------------------------------------- To perform a normal installation: a. Set the product installation folder and specify SQL database configurations. b. Configure the web server and proxy server settings. c. Activate IM Security. d. Register IM Security to Control Manager server, if needed. e. Refer to Section 6, "Post-installation Configuration", for a list of recommended tasks to perform after installation. 5.2 Uninstalling Trend Micro IM Security ===================================================================== To uninstall this release, run Setup.exe and select uninstall. The framework automatically performs an uninstallation until the setup screen displays that the uninstallation was successful. Alternatively, uninstall the IM Security from Windows Control Panel > Add/Remove Programs. The uninstallation process removes the following components: - All program files, folders, and the product console shortcut - Performance counter objects - Virtual website - WMI instance - Registry entries - IM Security created database instance and databases 6. Post-installation Configuration ======================================================================== Trend Micro recommends performing the following tasks after installing IM Security. 1. Setup other antivirus applications running on the IM Security server by excluding IM Security's "archive", "quarantine", "backup", "download", and "temp" directories. For example, if you have the Trend Micro OfficeScan(TM) agent running, exclude the IM Security "archive", "backup", "quarantine", "download", and "temp" directories from its Real- time, Manual, and Scheduled Scans. Refer to your server-based antivirus product's documentation for instructions on how to configure the exclusion lists. 2. Verify that the installation was successful by transferring the EICAR test virus using a file transfer session. You can download the EICAR test virus from the following site: http://www.eicar.org/ 3. Update components manually to ensure that your instant messaging and Lync Server environments are protected with the latest antivirus and content security protection. 4. The Microsoft Firewall may block the connection between the IM Security server and Lync clients by default. After installation, add a firewall rule to allow the IM Security host service to communicate with Lync clients using the port range: 6891 - 6900. 5. To use single sign-on from Control Manager, add the IM Security website port to the firewall exceptions. 7. Known Issues ======================================================================== Here are the known issues in this release: 7.1 Certain files are still blocked even if the IM Security file-blocking rules are disabled. ================================================================= By default, Lync Server 2013, Skype for Business Server 2015 File Filter blocks files with the following file extensions: ade, adp, app, asp, bas, bat, cer, chm, cmd, com, cpl, crt, csh, exe, fxp, grp, hlp, hta, inf, ins, isp, its, js, jse, ksh, lnk, mad, maf, mag, mam, maq, mar, mas, mat, mau, mav, maw, mda, mdb, mde, mdt, mdw, mdz, msc, msi, msp, mst, ocx, ops, pcd, pif, pl, pnp, prf, prg, ps1, ps2, ps1xml, ps2xml, psc1, psc2, pst, reg, scf, scr, sct, shb, shs, tmp, url, vb, vbe, vbs, vsd, vsmacros, vss, vst, vsw, ws, wsc, wsf, wsh Refer the Lync Server documentation for more information. In addition, usually a group policy is applied by default to prevent users from receiving files with the following file extensions: ade, adp, app, asp, bas, bat, cer, chm, cmd, com, cpl, crt, csh, exe, fxp, hlp, hta, inf, ins, isp, its, js, jse, ksh, lnk, mad, maf, mag, mam, maq, mar, mas, mat, mau, mav, maw, mda, mdb, mde, mdt, mdw, mdz, msc, msi, msp, mst, ops, pcd, pif, prf, prg, pst, reg, scf, scr, sct, shb, shs, tmp, url, vb, vbe, vbs, vsmacros, vss, vst, vsw, ws, wsc, wsf, wsh Refer to the Microsoft Group Policy Guide for more information. 7.2 For the user who initiates an instant message session, the disclaimer to the recipient can only be seen after the initiator sends a second message. 8. Release History ======================================================================== - IM Security 1.0 for Microsoft Live Communications Server 2003/2005, April 2005 - IM Security 1.5 for Microsoft Office Communications Server 2007 (repacked package for Microsoft Lync Server 2010), March, 2011 - IM Security 1.5.1 for Microsoft Office Communications Server 2007, Lync server 2010 January, 2012 - IM Security 1.6 for Microsoft Lync server 2010, Lync Server 2013 June, 2014 9. Contact Information ======================================================================== A license to the Trend Micro software usually includes the right to product updates, pattern file updates, and basic technical support for one (1) year from the date of purchase only. After the first year, Maintenance must be renewed on an annual basis at Trend Micro's then-current Maintenance fees. You can contact Trend Micro via fax, phone, and email, or visit us at: http://www.trendmicro.com Evaluation copies of Trend Micro products can be downloaded from our website. Global Mailing Address/Telephone Numbers ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ For global contact information in the Asia/Pacific region, Australia and New Zealand, Europe, Latin America, and Canada, refer to: http://www.trendmicro.com/en/about/overview.htm The Trend Micro "About Us" screen displays. Click the appropriate link in the "Contact Us" section of the screen. Note: This information is subject to change without notice. 10. About Trend Micro ======================================================================== Trend Micro Incorporated, a global leader in Internet content security and threat management, aims to create a world safe for the exchange of digital information for businesses and consumers. A pioneer in server-based antivirus with over 20 years experience, we deliver top-ranked security that fits our customers' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the Trend Micro Smart Protection Network(TM) infrastructure, our industry-leading cloud-computing security technology and products stop threats where they emerge, on the Internet, and are supported by 1,000+ threat intelligence experts around the globe. For additional information, visit www.trendmicro.com. Copyright 2019, Trend Micro Incorporated. All rights reserved. Trend Micro, the t-ball logo, Smart Protection Network, OfficeScan, and Control Manager are trademarks of Trend Micro Incorporated and are registered in some jurisdictions. All other marks are the trademarks or registered trademarks of their respective companies. 11. License Agreement ======================================================================== Information about your license agreement with Trend Micro can be viewed at: http://us.trendmicro.com/us/about/company/user_license_agreements/ Third-party licensing agreements can be viewed: - By referring to the file "Third-party_licensing_agreements.doc"