Solved

Upgrade TrendMicro WFBS

Posted on 2010-11-18
5
767 Views
Last Modified: 2012-05-10
Hi,

Can anyone help me, or someone do this upgrade?
I have trendmicro WFBS 5.0 installed, but this version is incompatible with windows7, the version compatible is the WFBS 6.0 and above, my question it's only necessary install the new one and it's assume the licence i have?

Thanks.

Best regards,
Telmo Latas
0
Comment
Question by:telmolatas
  • 2
5 Comments
 
LVL 4

Accepted Solution

by:
Jsblanton earned 500 total points
Comment Utility
0
 

Author Comment

by:telmolatas
Comment Utility
Hi,

Thanks for your replu, i'll tried that when i arrived to the office.
I've receive an email from trendmicro regarding Hosted Email Security (HES) Notification, asking to:

«Configure your firewall to accept emails from the following IP address range of our mail server so that Trend Micro Hosted Email Security service can deliver email to your business.

You may already have these configured:

•         216.104.20.0/24

•         216.104.4.0/24

•         150.70.149.32/27

 

You must add these:

•         150.70.224.0/20

•         150.70.160.0/20

•         150.70.176.0/20
More information is also available http://esupport.trendmicro.com/Pages/How-to-accept-emails-coming-from-Hosted-Email-Security-servers-only.aspx
»
My question is what is this?
I have a relay configured to my isp provider that is Vodafone.
What it's necessary configure on ISA server, which is my firewall?
If it's necessary create a new question, let me know.

Best regards,
Telmo Latas
0
 
LVL 4

Expert Comment

by:Jsblanton
Comment Utility
This is exactly what it sounds like. Trend micro's hosted email solution. If you aren't using it, disable it via the control panel. It sounds like you are already using a hosted email solution, so that's what I would do. Please don't forget to accept an answer and close the question. Thanks.
0
 
LVL 38

Expert Comment

by:younghv
Comment Utility
This question has been classified as abandoned and is being closed as part of the Cleanup Program.  See my comment at the end of the question for more details.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Redirected folders in a windows domain can be quite useful for a number of reasons, one of them being that with redirected application data, you can give users more seamless experience when logging into different workstations.  For example, if a use…
New Windows 7 Installations take days for Windows-Updates to show up and install. This can easily be fixed. I have finally decided to write an article because this seems to get asked several times a day lately. This Article and the Links apply to…
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now