TMMS Best Practice Guide 9.8 Rev1.0
TMMS Best Practice Guide 9.8 Rev1.0
TMMS Best Practice Guide 9.8 Rev1.0
Table of Contents
Table of Contents ....................................................................................... 1
About this guide ......................................................................................... 3
This document contains ............................................................................ 4
Acknowledgements .................................................................................... 4
Chapter 1: Environment ............................................................................. 5
Operating Systems .................................................................................................. 5
Database Systems ................................................................................................... 5
Internet Information Services ................................................................................... 5
Web Browser ........................................................................................................... 6
Agents ...................................................................................................................... 6
Chapter 2: Sizing Considerations ............................................................. 7
Server Sizing............................................................................................................ 7
Recommendation ..................................................................................................... 7
Chapter 3: Installation and Deployment ................................................... 8
Database Server ...................................................................................................... 8
Deployment Type ..................................................................................................... 8
Network Ports ........................................................................................................12
Certificates .............................................................................................................12
3.4.1.1 Apple Push Notification Services .....................................................................12
3.4.2.1 Public SSL Certificate ......................................................................................13
3.4.3.1 Private SSL Certificate .....................................................................................13
3.4.4.1 TMMS related certificates. ...............................................................................13
3.4.5.1 Changing SSL Certificate after Installation (CertConfigTool.exe) ...................14
Devices..................................................................................................................14
3.5.1 Android Device ............................................. 14
3.5.2 Apple Device ............................................... 15
Chapter 4: Configuration ......................................................................... 16
UI ...........................................................................................................................16
Dashboard .............................................................................................................16
Devices ..................................................................................................................17
4.3.1 Mobile Device Groups ....................................... 17
4.3.2 Mobile Device Agent Tasks .................................. 17
Policies ...................................................................................................................18
Notifications ...........................................................................................................18
SCEP and TMMS built-in SCEP schema ..............................................................20
Microsoft Exchange ActiveSync ............................................................................21
Deployment Settings ..............................................................................................21
Chapter 5: Bandwidth Utilization ............................................................ 22
Agent ......................................................................................................................22
BestPractice Guide
Examples and considerations in this document provide guidance only and do not represent restrict
design requirements. The guidelines in this document do not apply to every environment but wil l
help guide you through the decisions that you need to configure Trend Micro Mobile Security for
optimum performance.
Trend Micro Incorporated reserves the right to make changes to this document and to the products
described herein without notice. Before installing and using the software, please review the readme
file and the latest version of the applicable user documentation.
This document is designed to be used in conjunction with the following guides, all of which provide
more detail about Trend Micro Mobile Security than are given here:
Trend Micro Mobile Security 9.8 SP3 for Enterprise Installation and Deployment Guideline
http://docs.trendmicro.com/all/ent/tmms-ee/v9.8_sp3/en-us/tmms-ee_9.8_sp3_idg.pdf
Trend Micro Mobile Security 9.8 SP3 for Enterprise Administrator’s Guide
http://docs.trendmicro.com/all/ent/tmms-ee/v9.8_sp3/en-us/tmms-ee_9.8_sp3_fvdm_ag.pdf
The latest IDG and AG version can be found in downloadcenter.trendmicro.com
BestPractice Guide
Acknowledgements
This guide was made possible by the following individuals who volunteered their time and
expertise to this project.
<Author/s>
Second Chen, Annie Ye, April Xu
Chapter 1: Environment
Operating Systems
Component Requirements
• Windows 2012 Server Family
• Windows 2012 R2 Server Family
• Windows Server 2016
• Windows Server 2019
Management Server
Hardware
And
Communication Server • 1-GHz Intel™ Pentium™ processor or equivalent
• At least 1 GB of RAM
• At least 40 MB of available disk space
• A monitor that supports 800 x 600 resolution at 256
colors or higher
Microsoft Exchange • Microsoft Exchange 2007
Server • Microsoft Exchange 2010
• Microsoft Exchange 2013
Mobile Security Platform
Exchange Connector • Windows 2008 R2 Server (64-bit)
• Windows 2012
• Windows 2012R2
Hardware
• 1-GHz Intel™ Pentium™ processor or equivalent
• At least 1 GB of RAM
• At least 200 MB of available disk space
Software
• .Net 3.5sp1
Database Systems
Component Requirements
• Microsoft SQL Server 2012/2012 Express Edition
Microsoft SQL Server • Microsoft SQL Server 2016/2016 Express Edition
• Microsoft SQL Server 2017/2017 Express Edition
Web Browser
Component Requirements
• Internet Explorer 9 or above
• Chrome 57 or above
• Firefox 54 or above
Web Browser • Safari 10 or above on Mac
ADOBE Flash Player is required for the Mobile
Security administration web console
Agents
Component Requirements
• Memory 28MB
Android • Storage 14MB
• Memory 17MB
IOS
• Storage 12MB
BestPractice Guide
Command queues:
10000 commands for
4 vCPU, 4GB 2 vCPU, 4GB 8 vCPU, 12GB Android occupy about
10000
RAM RAM RAM 3MB, for iOS occupy
about 30MB; 5
commands per day (for
Android about 1.5KB, for
iOS about 15KB)
Note: vCPU means a CPU Core with Intel 2GHZ+
Recommendation
• To have better UI performance and better request/command performance, please contain
limited devices (less than 2000) for each group.
• For policy sync, we suggest change policies by group; not by root group and apply all.
• After enrollment, one device will use less than 0.1 MB database storage but there will be
more and more data (mostly device logs) in the future.
• Please wait for at least 15 ~20 minutes to change different groups` policy if the number of
devices is large in groups.
• At least 50GB hard disk for database storage, it depends on the device volume
We also recommend the customer use a dedicate server to install TMMS 9.3 and later
versions.
Although TMMS 9.2 support installation with OfficeScan and TMCM, but it may cause some
potential issues. E.g. Install OfficeScan server with Apache, then install TMMS 9.2 on same
server, the PHP may only bind to Apache. When this issue happens, please migrate
OfficeScan from Apache to IIS, because TMMS 9.2 only support IIS. TMMS 9.3 and later
versions has resolved the problem.
BestPractice Guide
Deployment Type
Trend Micro recommends below deployment types that will help with the strategically distribution of
servers on the network environment to better facilitate mobile and security policy management as well
with the implementation of client to server communication.
Enhanced Security Model (Dual Server Installation) with Cloud Communication
Server
BestPractice Guide
Enhanced Security Model (Dual Server Installation) with Local Communication Server
BestPractice Guide
Enhanced Security Model (Dual Server Installation) with Cloud Communication Server
• Choose whether to install a Local server communication (LCS) or utilize Trend Micro’s cloud
communication server (CCS).
• For LCS deployment, you will need a valid SSL certificate or use self-signed certificate.
• Choose between the integrated or stand-alone SQL Server. Stand-alone SQL server is
recommended for production environment.
• APNs certificate is required if you want to manage IOS mobile devices.
BestPractice Guide
Network Ports
Please refer to the Installation and Deployment Guide, Appendix A Network Ports
Configurations for detailed information.
Certificates
A certificate is a document that your website shows a browser to contain proclaiming its
identity. It is basically, tells that who is what it says it is. It contains the organizations’ domain
name and identification such as company’s name, address and so forth. But in order to trust
a certificate, it has to be signed by a Certificate Authority.
For more information, please see this link:
http://en.wikipedia.org/wiki/Public_key_certificate
What are the needed certificates to make Trend Micro Mobile Security for Enterprise to
work?
For iOS, it is required to have an Apple Push Notification Services Certificate in order to
manage an iOS device. This has been Apple requirement which is NOT limited to Trend
Micro Mobile Security for Enterprise but to other 3rd party MDM applications as well.
Apple Push Notification Services Certificate
Public or Private SSL Certificate – Certification Authority Services
For Android, either a Public or Private SSL certificate will do. Although it does not really
required, since TMMS devices or MDAs can communicate through either HTTP or HTTPS.
https://developer.apple.com/library/ios/documentation/NetworkingInternet/Conceptual/
RemoteNotificationsPG/Chapters/ApplePushService.html
Here is a basic push notification from a provider (MDM server – Trend Micro Mobile Security
for Enterprise) to a client (Mobile Device Agent / MDA) application.
BestPractice Guide
• The external Certificate Authority (CA) is responsible of the security and accountability of
the Public Key Infrastructure or PKI.
• External parties trust a digital certificate signed by a trusted Certificate Authority (CA)
such as Verisign, Thawte, Comodo, Godaddy, etc.
• The organization has to pay for the certificate when you are using the service of an
external Certification Authority (CA).
• An internal or private Certificate Authority can be integrated with Active Directory which
make ease of the Certificate Authority structure.
• The auto-enrollment feature of Windows Server 2003 and later versions further simplifies
the certificate issuing process.
What are the disadvantages of using an internal or private Certificate Authority (CA)?
• The security and accountability of Public Key Infrastructure (PKI) is completely on the
organization.
• External parties will not trust a certificate signed by an internal Certificate Authority (CA).
The first one is APNS certificate, this certificate is used for LCS/CCS server to communicate
with Apple Push Network Service. The expired date of this certificate is 1 year.
Please refer to the Installation and Deployment Guide for detailed apply and renew
instructions.
Most public certificates will be issued by an intermediate authority that has been issued by a
root authority. To make LCS support the certificate, you need to include root CA and
intermediate CA in the PFX certificate for LCS
For details, please refer http://esupport.trendmicro.com/solution/en-us/1106466.aspx
If the network environment contains NAT, please give the public IP address or the public
FQDN while create the certificate.
Devices
3.5.1 Android Device
You can install the MDA for Android mobile devices using one of the following methods:
⚫ Installation Method I—Download and install the MDA from google play.
Open the mobile device, open “Google play store”
BestPractice Guide
Search for Trend Micro Enterprise Mobile Security, and tap Enterprise Mobile
Security from the search results.
Tap Install, and then tap Accept to start the installation process.
After the installation process completes, tap the Open to start the application.
NOTE: The default invitation email message sent to the users instruct the users to
download and install the MDA app from Google Play store (Method I). If you want to use
another method for users to install the app, modify the invitation email message sent to
the users. Refer to the topic Configuring Installation Message in IDG document.
Chapter 4: Configuration
UI
Web console (Internet Explorer 8.0 or above, Chrome 17 or above, Firefox 14 or above, Safari 6
or above on Mac)
-Using Internet Explorer, make sure to:
a. Turned off Compatibility View for Web Sites
b. The JavaScript is enabled in browser
c. Disable Enhanced Protected Mode is using Windows 2012 and Windows 2012 R2
Dashboard
The Dashboard screen displays first when you access the Management Server. This screen
provides an overview of the mobile device registration status and component details.
The dashboard screen is divided into five tabs:
• Summary—shows the device health status and device’s operating system summary.
• Health—shows the components and policy update and mobile device health status. In this
category, you can:
o View mobile devices’ status:
▪ Healthy—shows that the device is enrolled to the Mobile Security server and
the components and policies on the mobile device are up-to-date.
▪ Non-Compliant—shows that the device is enrolled to the Mobile Security
server, but does not comply with the server policies.
▪ Out of Sync—shows that the device is enrolled to the Mobile Security server,
but either the components or the polices are out-of-date.
▪ Inactive—shows that the device is not yet enrolled to the Mobile Security
server.
o View the total number of enrolled and unregistered mobile devices managed by
Mobile Security.
Devices
4.3.1 Mobile Device Groups
Mobile Security server automatically creates a root group Mobile Devices with the following two sub-
groups:
• default—this group contains Mobile Device Agents that do not belong to any other group. You
cannot delete or rename the default group in the Mobile Security device tree.
• unauthorized—Mobile Security server automatically creates this group if Device
Authentication is enabled in Device Enrollment Settings, and a list of mobile devices is
used to authenticate. If there is an enrolled mobile device that is not in the list of mobile
devices, Mobile Security moves such mobile device to the unauthorized group. Mobile
Security also creates other groups and regroups all mobile devices according to the list that
you use.
Note: Please don’t add more than 3000+ devices to a group, this will cause performance
issue while expand the group
Policies
You can configure security policies for a Mobile Security group on the Management Server. These
policies apply to all mobile devices in the group. You can apply security policies to all Mobile Security
groups by selecting the Mobile Devices group (the root group). The following table lists the security
policies available in Mobile Security.
Notifications
TMMS will send different System Error Notification Events to the Administrator.
BestPractice Guide
The protocol is designed to make the issuing and revocation of digital certificates as scalable
as possible. The idea is that any standard network user should be able to request their digital
certificate electronically and as simply as possible. These processes have usually required
intensive input from network administrators, and so have not been suited to large scale
deployments.
SCEP is the most popular, widely available and most tested certificate enrollment protocol. It
has several advantages over competing protocols [citation needed], such as Certificate
Management Protocol.
See reference link below to know more (about SCEP, CA, NDES, etc.)
http://en.wikipedia.org/wiki/Simple_Certificate_Enrollment_Protocol
http://technet.microsoft.com/en-us/library/cc755071.aspx
Trend Micro Mobile Security for Enterprise has a feature where you can use Microsoft SCEP
(an option if the company would like to manage and distribute their own SSL certificate).
What is the role of MS SCEP to Trend Micro Mobile Security for Enterprise?
BestPractice Guide
The sync protocol is the language spoken between the mobile device and messaging server
to synchronize objects. The device will have its own e-mail, contacts, calendar and task (PIM
– Personal Information Manager) application, which provides a user interface and data
storage. Syncing is the process of reconciling differences between data stored on the mobile
device and stored on the Exchange Server.
Both the mobile device and the Exchange Server maintain their own collections of objects
and track changes made since the last sync. The mobile device may initiate a new sync by
sending a set of updates to the Exchange Server and requesting the Exchange Server
respond with its own updates. The Exchange server processes updates it receives, resolves
any conflicts, and sends its list of changes back to the mobile device.
In Trend Micro Mobile Security for Enterprise, it provides integration with the Microsoft
Exchange Server which supports iOS, Android and Windows Phone mobile devices that uses
Exchange ActiveSync service. Trend Micro Mobile Security Exchange Connector connects to
Microsoft Exchange server easing the hassles of managing multiple tools and consoles.
Once configured and enabled, Exchange ActiveSync feature can send invitation and
unmanaged devices, allow or block access to Exchange ActiveSync server, on-demand
remote wipe, cancel remote wipe command remove mobile devices from the list.
Deployment Settings
Refer to the following Knowledge Base article about switching from Full Version deployment
mode to Security Scan deployment mode:
BestPractice Guide
MDM Server
Recommend data: 0. 1MB * Device Number* factor
Factor: This depends on the peak time, how many mobile agents will connect MDM server at
the same time,
Including following major traffics
MDM->CCS, HTTP connection Keep Alive 4K bytes / 90 seconds
MDM<->CCS, MDM Agent register 100K bytes /Depends on how many devices will be
registered at same time
MDM<->CCS, Log collection, 0.2K bytes, 5 logs per device per day
MDM->CCS, Push APNS certificate to CCS server 5K bytes
MDM->CCS, Policy Push, 20K bytes
MDM->CCS, File transfer, E.g. pattern file, application files that customer upload to the "App
Store", Depends on application size.
BestPractice Guide
Each time an auto-growth event is performed, SQL Server holds up database processing.
This means that processing against that database will be held up until the auto-growth event
completed. This could equate to slower response time for other SQL commands that are
being processed against the database that is growing
Monitor and perform Database maintenance jobs to ensure things are working normally and
to prevent having large fragmented database which could lead to performance issues.
The Command Queue table will become large while use the TMMS for long time.
TMMS 9.x provide a schedule maintenance database option, this feature will automatically
remove the successfully executed Command
Please enable this option
Administration > Command Queue Management > Command Queue Maintenance >
Enable scheduled deletion of commands
Database indexing
It’s recommended to periodically rebuild the index of the database to improve performance.
Indexes are specialized data structures that operate on tables (and sometimes views) in the
database engine used to aid in the searching for and sorting of data. Indexes are vital to the
database engine returning results quickly.
As data is modified in the underlying tables that the indexes operate on, the indexes become
fragmented. As the indexes become more and more fragmented, query times can begin to
suffer. The remedy to this situation is to either reorganize or rebuild the index in MS SQL.
Below are some useful links with additional information on how to do this:
7.1.1 Pre-Migration
You must have TMMS 8.0/8.0 SP1 installed before upgrading to TMMS 9.0 Patch 1. You must have
TMMS 9.0 Patch 1 freshly installed for migration.
• The current version does not support migration from TMMS 8.0 to TMMS 9.0 Patch 1 using
Cloud Communication Server. If you use Local Communication Server in TMMS 9.0, you
need to install the Local Communication Server on the computer that has the same server
address and port with Communication Server 8.0, refer to Step 4: Restoration Of Database
And Configuration.
• After migration, take note of the following:
o All Android devices will receive a notification to upgrade the agent to 9.0 Patch 1.
After the upgrade, the device can be managed by the server through the new agent.
o All iOS devices whose OS version is lower than 7.0 will receive a notification to
download the new iOS agent from the app store. An application icon named TMMS
upgrade will be provisioned to the home screen. When the agent is installed, you
need to click the icon in order for the agent to communicate with the server. The
TMMS upgrade icon will be deleted automatically after the agents connect to the
server.
There is no need to re-enroll the device and remove or re-install any profile.
o All iOS devices whose OS version is 7.0 or higher will also receive a notification to
download the new iOS agent from the app store; and an application icon named
TMMS upgrade will be provisioned to the home screen. When the agent is installed,
however, you may get error or be prompted to re-install the mdm enrollment profile
when clicking the icon (the profile install will simply fail although, since it has already
been installed).
You need to wait for up to 24 hours when the TMMS 9 server will provision another
application icon named TMMS update on the home screen. You need to click this
icon in order for the agent to communicate with the server. The two application icons
will be deleted automatically after the agents connect to the server. There is no need
to re-enroll the device again and remove or re-install any profile.
o For iOS devices whose OS version is 6.0 or higher on TMMS 8.0 GM version, there
is a known issue: the required application push for uploaded IPA app or external app
from Apple Store cannot work due to insufficient rights of the installed MDM profiles.
This known issue is fixed in TMMS 8.0 SP1 for new enrolled devices. Due to this
BestPractice Guide
known issue, take note of the following impact if the iOS devices are originally
enrolled on TMMS 8.0 GM build (even though the TMMS server is already upgraded
to TMMS 8.0 SP1):
▪ When migrating to TMMS 9 Patch 1, the notification for new agent install will
not be prompted on these iOS devices. Instead, you need to manually install
it from the Apple Store.
▪ After migration, the required application push for uploaded IPA app or
external app from Apple Store will not work on these iOS devices (however,
the devices can still install any application from TMMS enterprise app store).
To resolve this known issue, you need to re-enroll the devices need to be re-
enrolled and re-install the profiles.
Do not uninstall TMMS 8.0 before backing up the data on the server. Otherwise, all data will be lost.
A. Back up TMMS 8.0 SP1.
1. Download the migration tool on the computer where the TMMS 8.0 Management Server is
installed.
Example: C:\migration\migration.exe
2. Run migration.exe.
3. On the migration tool UI, go the Backup current version section.
4. Select 8.0 on the Version dropdown.
The server’s installation path will appear in the Path field, as shown in the image below:
5. Set the backup path for the database:
1. Log on to the computer where the database server is installed.
2. Create a new folder in the C:\ directory. For example: C:\bak.
This will be used as the backup path for the database file.
3. Go back to the migration tool and input the backup path in the Database Path field.
4. Click the Backup button.
When the backup is finished, all the configuration files will be stored in the C:\migration\bak directory.
The database backup file will be stored in the path you specified in Step 5.
BestPractice Guide
• The C:\migration directory is the folder of the migration tool. The bak folder is generated
automatically in the same path as the migration.exe file.
• Do not change the name of the database backup file.
You need to copy the TMMS 8.0 backup files to the computer where TMMS 9.0 Patch 1 will be
installed, so you can restore them later on.
If you will use a different SQL server for TMMS 9.0 Patch 1, you need to manually copy the
backup file to the computer where the SQL server for TMMS 9.0 Patch 1 is installed.
There is no need to manually copy the database file if you will use the same SQL server for
TMMS 9.0 Patch 1.
Trend Micro recommends using the same SQL server version for TMMS 8.0 and 9.0 Patch 1.
If you use different versions, make sure that the database backup file could be restored from
TMMS 8.0 to TMMS 9.0 Patch 1.
TMMS versions 8.0 and 9.0 Patch 1 cannot be installed on the same computer at the same time. If
you want to install version 9.0 Patch 1 on the same computer where version 8.0 is installed, you
should uninstall version 8.0 and OfficeScan before installing version 9.0 Patch 1.
• If you are using the same SQL server, you need to create a new database name during the
installation. Do not connect the database that you used for version 8.0.
• If you are using a different SQL server, make sure you are connected to the new server
during the version 9.0 Patch 1 installation.
• If you will transfer the database/configuration to another TMMS 9.0 Patch 1 server, create a
new database on the new TMMS 9.0 Patch 1 server so that the records on the current
database will not be overwritten after migration.
Install the Blackberry tool on the machine of the Management Server 9.0 Patch 1. The installation
path should be the same as the installation path of the Blackberry tool on Management Server 8.0.
If you will install the Local Communication Server on the same computer that hosts the TMMS 8.0
Communication Server, uninstall the TMMS 8.0 Communication Server first.
Install the Local Communication Server on a computer that has the same server address and port as
the TMMS 8.0 Communication Server. This will allow TMMS 9.0 Patch 1 to recognize and manage
the existing devices enrolled in TMMS 8.0.
TMMS does not support migration using a Cloud Communication Server. If you want to use a Cloud
Communication Server, you will need to re-enroll all registered mobile devices.
If you are using public or private SSL certificates in version 8.0, import the SSL certificates that you
exported in Pre-Migration Step C.
For the steps on installing the Local Communication Server and importing the SSL certificates, refer
to “Installing the Local Communication Server” section of the TMMS 9.0 Patch 1 Installation and
Deployment Guide (Chapter 3, Page 3-14).
1. Run the migration tool on the computer where the TMMS 9.0 Patch 1 Management Server is
installed.
2. Go to the Migrate data to destination section and select 9.0 from the Version dropdown.
A correctly installed server will show the installation path “C:\Program Files\Trend
Micro\Mobile Security” in the Path field.
3. In the Database Path field, do one the following:
o If you are using the same SQL server, input the path where you saved the backup
file.
o If you are using a different SQL server, input the path on the target SQL server where
you had copied the backup file. This was done in the Database and Configuration
Backup Step B.
4. Click the Restore button.
A database backup file of the TMMS 9.0 Patch 1 Management Server will be generated on
the database server for exception and rollback.
After the migration, a dialog window will show the result. If the migration is successful, proceed to the
next step. If the migration failed, check the logs in the migration tool directory to get detailed
information, and then try to migrate again.
BestPractice Guide
7.1.5 Uploading the End User License Agreement (EULA) and upgrading the devices
End User License Agreement
When the migration is finished, upload the customized End User License Agreement (EULA)
manually. For the procedure, refer to the “Customizing Mobile Security Terms of Use” section of the
TMMS 9.0 Patch 1 Installation and Deployment Guide (Chapter 4, Page 4-14).
Device Agents
Android devices will receive a notification to upgrade the agent to 9.0 Patch 1. After the upgrade, the
device can be managed by the server through the new agent.
iOS devices will receive a notification to download the new iOS agent from the app store, and then an
application icon named “TMMS upgrade” will be provisioned to the home screen. When the agent is
installed, users need to click the icon in order for the agent to communicate with the server. The
TMMS upgrade icon will be deleted automatically after the agents connect to the server. There is no
need to re-enroll the device, nor to remove or re-install any profile.
7.1.6 FAQ
Q: Before doing restoration, do we need to copy any file from TMMS 8.0?
Q: Can we migrate from TMMS 8.0 using SQL Server 2008 to TMMS Mobile Device Management
(MDM) 9.0 using SQL Server 2005?
A: No. Trend Micro recommends using the same version of SQL Server for TMMS 8.0 and TMMS
9.0. If you use different versions, make sure that the database backup file could be restored from
TMMS 8.0 to TMMS 9.0 Patch 1.
7.2.1 Pre-Backup
The following terms will be used in this article:
Source Server (Source Management Server): The management server to back up
Target Server (Target Management Server): The management server to restore the settings
BestPractice Guide
Source Database Server: The database server used by the source management server
Target Database Server: The database server used by the target management server
Do not uninstall the source management server before backing up the data on the
server. Otherwise, all data will be lost.
1. Copy the the TMMS Backup and Restore tool on the machine where the source management
server is installed.
Example: C:\Backup_and_Restore\Backup_and_Restore.exe
2. Run Backup_and_Restore.
3. On the tool’s UI, go to the Backup Current Data section.
BestPractice Guide
4. Select 9.0 on the Version dropdown list. The installation path will automatically be shown in
the Installation Path field.
This will be used as the backup path for the database file.
BestPractice Guide
3. Go back to the Backup and Restore tool and enter the backup path in the Database
Path field.
When the backup is finished, all the configuration files will be stored in the
[Backup_and_Restore_Tool_Folder]\bak. For example, C:\Backup_and_Restore\bak
directory.
BestPractice Guide
The database backup file will be stored in the path you specified in Step 5.
You need to copy the backup files to the machine where the target management server will be
installed.
If you use a different database server for the target management server, you need to manually copy
the database backup file to the machine where the target database server is installed.
Do NOT change the filename when copying the database backup file.
BestPractice Guide
There is no need to copy the database file if you will use the same database server for the source
and target management servers.
Trend Micro recommends using the same version of database server for the source and target
management servers. If you use different versions, make sure that the database backup files can be
restored between these two versions.
If you try to restore the old settings to the same management server (i.e. the source management
server is also the target management server), there is no need to copy the configuration files.
Otherwise, do the following:
1. Copy the folder containing the Backup and Restore tool to the machine where the target
management server is installed.
2. Copy the folder [Backup_and_Restore_Tool_Folder]\bak (for example,
C:\Backup_and_Restore\bak) from the source management server, and put it to the folder
containing the tool on the target management server.
If you use the same database server for the target management server, you need to create a new
database during the installation. Do not use the database used by the source server. If the target
management server is not freshly installed, you need configure it to use a new database before the
restoration.
BestPractice Guide
1. Run the TMMS Backup and Restore tool on the machine where the target management
server is installed.
2. Go to the Restore Data section and select 9.0 from the Version dropdown. The installation
path will be shown in the Installation Path field.
3. Select one configuration file path you have backed up. The folder name contains the
timestamp.
4. In the Database Path field, do one the following:
o If you use the same database server as the source server, enter the path where you
saved the backup file.
o If you use a different database server from the source server, enter the path on the
target database server where you had copied the backup file. This was done in
Database and Configuration Backup.
5. Click the Restore button. When the restoration is complete, the result will prompt.
If the restoration fails, check the logs in the tool folder to get detailed information.
7.2.5 Post-Restore
1. After restoration, check the Configuration and Verification page to validate the settings.
2. If the target management server is different from the source server, make sure the source
management server is uninstalled or stopped after the restoration. Otherwise, both the two
management servers may manage the devices at the same time.
BestPractice Guide
3. Try to remote lock a device on the management web console to simply check whether the
devices can be managed.
7.2.6 FAQ
Q: Before doing restoration, do we need to copy any files from the source server?
A: Yes. You need to copy the following files:
Q: Can we restore from TMMS server using SQL Server 2008 to TMMS server using SQL Server
2005?
A: No. Trend Micro recommends using the same version of database server for the source and target
management servers. If you use different versions, make sure that the database backup files can be
restored between the two versions.
BestPractice Guide
http://esupport.trendmicro.com/en-us/business/pages/technical-support/mobile-security-
for-enterprise.aspx
http://esupport.trendmicro.com/en-us/business/pages/about-support.aspx
debug logs to your email box.click send button to send the debug logs to your mail-box.
BestPractice Guide
Chapter 9: Miscellaneous
Changing Web Console Timeout Period
1. Open the TmOMSM.ini from...\Trend Micro\Mobile Security\
2. Modify the 'SessionTimeout' value; the default value is 900 seconds.
3. Save
Note: The minimum value is "60", if the value is set lower than "60" it will be "60"
2. If you want to regenerate a new self-signed certificate, select “Create a new self-signed
certificate”; if you want to import existing certificates, select “Import an existing .pfx or .p12
certificate file”. Then click next.
3. Enter required information according to your choice (regenerate a new certificate or import an
existing certificate).
Input the IP address or public domain name as the common name, enter the password, and click
next.
4. Click Finish.
BestPractice Guide
3. Open the Apple Push Certificates Portal click ‘Renew’ and upload the signed CSR
(CertSigningRequest)
Note: If you click “Create a Certificate”, it will generate a new APNs certificate. Then you will
need to enroll all iOS mobile device again to the Mobile Security server.
BestPractice Guide
4. Download the certificate signed by Trend and Apple (.PEM) from the Apple Portal and complete
the Certificate Request from the IIS
• Go to Start > Administrative Tools > Internet Information Services (IIS) Manager, select the
server name, and then double-click Server Certificates
• From the Actions pane on the right, click Complete Certificate Request. The Complete
Certificate Request wizard appears.
5. Select the .cer certificate file that you downloaded from the Apple Portal, and type Trend Micro
Note: You must manually change the .pem file extension to .cer
BestPractice Guide
Note: The friendly name is not a part of the certificate itself, but is used by the server administrator to
easily distinguish the certificate.
7. Right-click on the certificate in the Server Certificates list, and then click Export.
BestPractice Guide
8. Select the location where you want to save the file, choose a password for exporting, and then click
OK.
After completing all these steps, you should have the following items:
• APNs certificate (.pfx format, not .cer format)
• The password that you set when exporting the certificate
You are now ready to upload your certificate to Trend Micro Mobile Security server.
10. Logon to the MDM Console
Click Administration > Certificate Management, click Add, browse the APNs certificate (.pfx
format) with password, the click Save.
Click Administration > Communication Server Settings, click iOS Settings tab, and then select
the Apple Push Notification Server certificate you uploaded from the Certificate Management > click
Save
Troubleshooting Guide
This section provides tips for dealing with issues you may encounter when using Mobile Security.
• User cannot input nanoscale passwords on their devices.
BestPractice Guide
Mobile device keypads can only support a certain set of characters. Mobile Security recommends that
the administrator compile a list of characters supported by the devices. After compiling the list of
supported characters, the administrator can then set the uninstall protection password from the
management console using the list of supported characters.
This may occur if the downloading of encrypted files is disabled in the Internet Explorer. Perform the
following steps to enable the encrypted files download:
1. On your Internet Explorer, go to Tools > Internet options, and then clicks the Advanced tab on the
Internet Options window.
2. Under Security section, clear do not save encrypted pages to disk.
3. Click OK.
This is because the Mobile Security device administrator is not activated on that mobile device. If the
user not activates Mobile Security in the Device administrators list, then the Mobile security cannot
synchronize server policies with the mobile device, and displays its status as Out of Sync.
• The content on the Policy pop-up window does not display and is blocked by Internet Explorer.
This happens if your Internet Explorer is configured to use a .pac automatic configuration file. In that
case, the Internet Explorer will block the access to a secure Web site that contains multiple frames.
To resolve this issue, add the Mobile security server address to the trusted sites security zone in the
Internet Explorer. To do this, perform the following steps:
5. Click OK.