[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Trend Micro INternet Security Pro

Posted on 2009-02-23
2
Medium Priority
?
3,194 Views
Last Modified: 2012-05-06
Ok so i have someone using Trend micro internet security pro. He is using himachi vpn which is via logmein.com
The only way he can connect via vpn is if he disables the firewall. What do i need to add as an exception so the vpn will work?

THanks
0
Comment
Question by:emilbus20
  • 2
2 Comments
 
LVL 11

Accepted Solution

by:
billwharton earned 2000 total points
ID: 23722769
I've summarized the instructions for you here:

To set the Personal Firewall to allow or block connections from specific programs, do the following:

   1. Open the Trend Micro Internet Security main console by doing any of the following:
          * Click Start > Programs or All Programs > Trend Micro Internet Security > Trend Micro Internet Security.
          * Double-click the Trend Micro Internet Security icon on the lower right corner of your screen.
   2. Click Home Network & Firewall Controls on the left panel.
   3. Under Personal Firewall, click Settings.
   4. On the Personal Firewall Settings screen, make sure there is a checkmark in the Activate the Personal Firewall checkbox.
   5. Click Advanced Settings.
   6. Click the Program Control tab.


For some diagrams demonstrating this, you can follow this link at Trend Micro itself:
http://esupport.trendmicro.com/Pages/How-do-I-set-the-Personal-Firewall-of-Trend-Micro-Internet-Security-20.aspx

Hope this helps
Thanks
0
 
LVL 11

Expert Comment

by:billwharton
ID: 23750208
emilbus20
Can I answer any further questions for you?

Thanks
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Measuring Server's processing rate with a simple powershell command. The differences in processing rate also was recorded in different use-cases, when a server in free and busy states.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses
Course of the Month19 days, 18 hours left to enroll

873 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question