User`s guide

i
Contents
Preface
Trend Micro Web Protection Module Documentation ...............................iv
Audience ..............................................................................................................iv
Document Conventions ....................................................................................v
Supported Client Operating Systems ...............................................................v
Hardware Requirements ...................................................................................vi
Compatible Software .........................................................................................vi
Incompatible Software .....................................................................................vii
Process Overview .............................................................................................vii
Chapter 1: Installing Trend Micro Web Protection Module
Checking for Incompatible Software ...................................................... 1-2
Deploying Trend Micro Web Protection Module Agents ................... 1-4
Uninstalling Trend Micro Web Protection Module Agents ................ 1-5
Configuring Log Maintenance ................................................................. 1-6
Configuring Proxy Settings ..................................................................... 1-10
Chapter 2: Using Trend Micro Web Protection Module
Blacklist and Whitelist Policies ................................................................ 2-2
FAQs .......................................................................................................... 2-34
Support ...................................................................................................... 2-35