Trend Micro INternet Security Pro

Posted on 2009-02-23
Last Modified: 2012-05-06
Ok so i have someone using Trend micro internet security pro. He is using himachi vpn which is via
The only way he can connect via vpn is if he disables the firewall. What do i need to add as an exception so the vpn will work?

Question by:emilbus20
    LVL 11

    Accepted Solution

    I've summarized the instructions for you here:

    To set the Personal Firewall to allow or block connections from specific programs, do the following:

       1. Open the Trend Micro Internet Security main console by doing any of the following:
              * Click Start > Programs or All Programs > Trend Micro Internet Security > Trend Micro Internet Security.
              * Double-click the Trend Micro Internet Security icon on the lower right corner of your screen.
       2. Click Home Network & Firewall Controls on the left panel.
       3. Under Personal Firewall, click Settings.
       4. On the Personal Firewall Settings screen, make sure there is a checkmark in the Activate the Personal Firewall checkbox.
       5. Click Advanced Settings.
       6. Click the Program Control tab.

    For some diagrams demonstrating this, you can follow this link at Trend Micro itself:

    Hope this helps
    LVL 11

    Expert Comment

    Can I answer any further questions for you?


    Featured Post

    Network it in WD Red

    There's an industry-leading WD Red drive for every compatible NAS system to help fulfill your data storage needs. With drives up to 8TB, WD Red offers a wide array of solutions for customers looking to build the biggest, best-performing NAS storage solution.  

    Join & Write a Comment

    Are you one of those front-line IT Service Desk staff fielding calls, replying to emails, all-the-while working to resolve end-user technological nightmares? I am! That's why I have put together this brief overview of tools and techniques I use in o…
    It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
    Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…

    732 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    18 Experts available now in Live!

    Get 1:1 Help Now