Product FAQ

Browse through these FAQs to find answers to commonly raised questions

Endpoint Security

Seqrite Endpoint Security is the best endpoint protection security tool for small to mid-size organizations. This application security provides complete antivirus protection against malware, Trojans, and worms, network security against backdoors, hackers, and spyware, and web security against phishing, riskware and pornware.

It is a web-based IT security management application that includes the following features:

  • Manage clients in a small to mid-size network.
  • Group clients into domains for managing network security centrally.
  • Provides the latest information of all clients and keeps comprehensive logs about virus incidents, company security policies, and web security updates at a central location.
  • Coordinates automatic deploy antivirus security policies, signature pattern updates, and software updates on every client and server.

Yes. Seqrite Endpoint Security works on client/server architecture that ensures complete networking security.

  • Agent Server: runs on server where Seqrite EPS is installed.
  • Client Agent: runs on workstations
    • Default Port of Agent Server: 5047 (Administrator can change this default port)
    • Default Port of Client Agent: 62118 (If this port is used by any other application, Client Agent configures itself to some other port which is free. (E.g. 62118, 62119 etc.)

Agent Server is a service that runs on the Seqrite EPS Server system. It helps in sending various requests such as Client Settings, Scan Now, and Update Now to all the clients initiated by the Administrator. It also provides the latest information of the clients and keeps comprehensive logs about virus incidents, company security policies, and endpoint security updates at a central location.

This feature of network security runs on every Seqrite EPS Client system. It communicates with the Agent Server and performs various tasks such as Scan Now and Update Now initiated from the Admin Server by the Administrator. It also sends virus logs to the Admin Server when any infection is found and status information is changed.

Yes. Seqrite provides a tool called Update Manager integrated with Seqrite Endpoint Security that is centrally deployed to help download the latest updates from the server of Seqrite. This tool constantly monitors whether new updates are available from Seqrite and if available it automatically downloads them. It shares the latest downloaded updates with all the clients in the network. Thus you do not need to download the updates on all the clients separately. This feature provides complete application and computer data security against the latest threats.

Understanding the needs of today’s IT security management, Seqrite Endpoint Security has been designed to be deployed in various ways such as:

  • Synchronization with Active Directory
  • Remote install
  • Notify Install
  • Client Packager
  • Login script setup
  • Disk imaging

Possible causes are listed as follows:

  • The Client Agent is not able to download the build as the Endpoint Security site is not accessible from the remote system. This problem may occur in the case of domain-based network and improper DNS configuration.
  • URL or port is blocked in Firewall.
  • Insufficient free disk space on a remote system.
  • The Agent Server service is not started on the Endpoint Security server.
  • Internet connection is configured using Proxy Server.
  • Incorrect subnet mask is configured on the remote system.

You can resolve this problem in any of the following ways:

  • Check the system on which the Endpoint Security server is installed. Check whether it is getting 'ping' from the remote system.

Give the ping command in the following way:

  • If the Endpoint Security site has been configured on IP Address
    ping < IP address of Admin Server>
    Example: ping 192.168.100.34
  • If the Endpoint Security site has been configured on Domain Name
    ping < domain name of Admin Server >
    Example: ping seqrite.admin.com
  • In the case of a Domain-based network, if the Endpoint Security site is configured on Domain Name and DNS is not properly configured, the remote system will not be able to ping the Endpoint Security Server system. To solve this problem, the Administrator needs to configure proper DNS settings on the remote system.
  • We recommend you to configure the Endpoint Security Site on the IP Address insted of configuring it on the domain name.
  • Check the Installer logs (Go to Client > Client Settings > View Status > View Installer logs).Here, you will get the exact reason about why Seqrite is not getting installed on the remote system.
  • If any Firewall is running, check whether the URL or Port through which the build is getting downloaded is blocked.
  • Ensure there is sufficient disk space on the Remote System to download and install Seqrite Endpoint Security, if the installer log shows installation failed due to insufficient disk space.
  • Verify if the Agent Server service is started on the Endpoint Security server.

    • Go to Start > Run.
    • Type Services.msc.
    • Click OK.
    • In Services, check the Agent Server Service status is 'Started'.
  • Verify if the Client Agent Service is started on Remote System.

    • Go to Start > Run.
    • Type Services.msc.
    • Click OK.
    • In Services, check the Client Agent Service status is 'Started'.
  • If Internet Connection is configured using Proxy Server, it may not be able to resolve the name or IP of the Endpoint Security server. In this case, bypass the Proxy Settings for the Endpoint Security site.
  • Subnet Mask of the Remote System should be as per the IP class assigned to the Endpoint Security server system.

Possible causes are listed as follows:

  • The Client Agent is not able to connect to the Agent Server OR vice versa.

This problem can be resolved in any of the following ways:

  • Check if both the Endpoint Security server and Remote System are able to communicate with each other on the configured port. To check, follow these steps:

    • Verify if the Agent Server Service is started on the Endpoint Security server.
      • Go to Start > Run.
      • Type Services.msc.
      • Click OK.
      • In Services, check the Agent Server Service status is 'Started'.
    • Verify if the Client Agent Service is started on Remote System.
      • Go to Start > Run.
      • Type Services.msc.
      • Click OK.
      • In Services, check the Client Agent Service status is 'Started'.
    • Telnet < IP Address of Endpoint Security Server > < Agent Server Port > 
      Suppose IP address of the Endpoint Security Server is 192.168.100.34 and 5047 is the port on which Agent Server is listening. Then execute the following command on the remote system.
      Telnet 192.168.100.34 5047
  • If you receive any response from the Agent Server, check whether the Agent Server is able to communicate with the Client Agent.

    • Telnet < IP address of Remote System > < Client Agent Port >
      Suppose the IP address of the remote system is 192.168.100.66 and 62118 is the port on which the Client Agent is listening, then execute the following command on Endpoint Security Server.
      Telnet 192.168.100.66 62118
  • Please check if any Firewall service is installed on the system. If so, then the Firewall can block the communication between Agent Server and Client Agent.

Possible causes are listed as follows:

  • When proxy setting has been configured in Internet Explorer, it tries to resolve the Endpoint Security site via Proxy Server and if Proxy Server is not able to resolve it, the site does not open.

This problem can be resolved in any of the following ways:

Check the Proxy Server configuration of the remote system. Proxy Server should be able to resolve the IP address or domain name on which the Endpoint Security site is configured.

Follow these steps to bypass Proxy Server while opening the Endpoint Security site:

  • Open Internet Explorer.
  • Go to Tools > Internet Options > Connection Tab > Click on LAN Settings.
  • Click the Advance button.
  • In the Exceptions section, type the address of the Endpoint Security website along with the Port number.
  • Click OK.

Taking the latest updates regularly ensures complete computer data security. If the Update Manager is not able to take the updates, the following may be its causes:

  • Firewall is blocking the Update Manager Application.
  • Firewall is blocking the Seqrite URL.
  • Firewall is blocking the extensions like .bin or .dat.
  • Update Manager Connection is configured through Proxy Server.

This problem can be resolved in any of the following ways:

  • Check the Firewall settings and allow Update Manager, the Seqrite URL and extensions like .bin  or .dat  if they are blocked.
  • Clear the cache of the Proxy Server.

Possible causes are listed as follows:

  • Web Server Service is not running.
  • Endpoint Security Site or its port is blocked by Firewall.
  • Request is going through Proxy Server but the Proxy Server is not able to resolve.

This problem can be resolved in any of the following ways:

  • If the Endpoint Security server is configured using IIS Server, check if the IIS Admin Service is running. Also check whether the Endpoint Security website is running in IIS.
  • If the Endpoint Security server is configured using Apache HTTP Server, check if the Apache Service is running.

    • Go to  Start > Run.
    • Type Services.msc.
    • Click  OK.
    • In Services, check the Apache2 Service status is 'Started'.
  • Check for if TERMINATOR (UTM) device in the network is blocking the port. If so, open the port of the Endpoint Security server.

To know about how to upgrade your existing Seqrite Endpoint Security, visit the following link Seqrite Endpoint Security

Microsoft has recommended configuring trusted zones for security solutions, which if not done correctly can give rise to issues such as system getting hanged, slow or non-responsive. These configurations involve excluding certain directories, and file names from file-level scanners.

Note: After you have installed Seqrite Endpoint Security on a system running MS Exchange, as a first step you must follow the guidelines and instructions listed below to exclude files and folders recommended by Microsoft.

Steps to follow:

  • Log on to the Seqrite Endpoint Security web console; click the Settings tab.
  • On the Settings screen, click Scan Settings.
  • Under Exclude File and Folders, click Add.
  • On the Exclude Item screen, select either of the following (Exclude Folder or Exclude File):
    • Exclude Folder(if you select this, follow the steps below)
      • Type the folder path in the Enter folder path.
    • Exclude File(if you select this, follow the step below)
      • Type the folder path in the Enter folder path.
  • Under Exclude from, select Known Virus Detection.
  • Click OK to save your settings.

Note:

  • The steps mentioned above are applicable to the default policy of Seqrite Endpoint Security.
  • If your system on which Microsoft Exchange Server is installed, is in a different group that has some different policy applied, then you need to configure the above mentioned settings for that policy. You can do so from Client Settings > Manage Policies section.

The following list/locations is recommended by Microsoft for Microsoft Exchange server:

Microsoft Exchange Server:

%ProgramFiles%\Microsoft\Exchange Server\Mailbox\*.*

%ProgramFiles%\Microsoft\Exchange Server\GroupMetrics\

%ProgramFiles%\Microsoft\Exchange Server\Logging\*.*

%ProgramFiles%\Microsoft\Exchange Server\ExchangeOAB\

%ProgramFiles%\Microsoft\Exchange Server\Working\OleConvertor\

%ProgramFiles%\Microsoft\Exchange Server\TransportRoles\*.*

%ProgramFiles%\Microsoft\Exchange Server\ClientAccess\*.*

%ProgramFiles%\Microsoft\Exchange Server\UnifiedMessaging\grammars\

%ProgramFiles%\Microsoft\Exchange Server\UnifiedMessaging\Prompts\

%ProgramFiles%\Microsoft\Exchange Server\UnifiedMessaging\voicemail\

%ProgramFiles%\Microsoft\Exchange Server\UnifiedMessaging\badvoicemail\

%ProgramFiles%\Microsoft\Exchange Server\UnifiedMessaging\temp\

%ProgramFiles%\DAGFileShareWitnesses\

%ProgramFiles%\Exchsrvr\MDBDATA\*.edb

%ProgramFiles%\Exchsrvr\MDBDATA\*.stm

%ProgramFiles%\Exchsrvr\MDBDATA\*.chk

%ProgramFiles%\Exchsrvr\MDBDATA\*.log

%ProgramFiles%\Exchsrvr\MDBDATA\*.dat

%ProgramFiles%\Exchsrvr\MDBDATA\*.stf

%ProgramFiles%\Exchsrvr\Mtadata\*.*

%ProgramFiles%\Exchsrvr\%COMPUTERNAME%.log

%ProgramFiles%\Exchsrvr\Mailroot\

%ProgramFiles%\Exchsrvr\Srsdata\*.*

%SystemRoot%\Temp\ExchangeSetup\*.*

%SystemDrive%\inetpub\temp\*.*

%SystemDrive%\inetpub\logs\*.*

Cluster:

%systemroot%\Cluster\*.*

IIS server:

%systemroot%\system32\inetsrv\*.*

Note:

  • %SYSTEMROOT% specifies the location of the Windows folder i.e C:\WINDOWS e.g. %SYSTEMROOT%\System32 = C:\WINDOWS\System32
  • %ProgramFiles% specifies the location of the Program Files folder i.e C:\Program Files.
  • %SYSTEMDRIVE%\ specifies the location of Systems root drive i.e. C:\
  • *.* specifies include Sub Folder.
  • Exclude all files having extensions '.edb,.stm,.chk,.log,.dat,.stf' from '%ProgramFiles%\Exchsrvr\MDBDATA\' location.

For more details, please go through below mentioned links to see complete list of exclusions provided by Microsoft for MS Exchange.

  • For Microsoft Exchange 2013, click here to see the complete list of exclusions.
  • For Microsoft Exchange 2010, click here to see the complete list of exclusions.
  • For Microsoft Exchange 2007, click here to see the complete list of exclusions.

Here is the list of third-party Antivirus solutions that are detected and removed by Seqrite Endpoint Security.

  • Zillya! Antivirus for Business 1
  • Zillya! Internet Security 1
  • Zillya! Antivirus 1
  • Aavast! File Server Security 7
  • Avast Free Antivirus 5 to 12, 17 to 19, 2014 & 2015
  • Avast Business Security 17 to 21
  • Avast Premier 8 to 12, 17, 18
  • Avast Internet Security 7 to 12, 17, 18
  • Avast Pro Antivirus 5 to 12, 17, 18
  • Avast Endpoint Protection Plus 7 to 11
  • Avast Endpoint Protection Suite Plus 7 to 11
  • Avast Endpoint Protection Suite 7 to 11
  • Avast Endpoint Protection 7 to 11
  • AVG AntiVirus 2 to 4, 8, 10, 14, & 2012 to 2016
  • AVG CloudCare 3, 2013, 2014, 2016
  • AVG Premium Security 2013 & 2014
  • AVG Internet Security Business Edition 13, 16
  • AVG Internet Security 2 to 4, 15, to 19 2012 to 2015
  • AVG AntiVirus Business Edition 16
  • AVG AntiVirus Free 17 to 19 & 22
  • AVG Business 18 to 22
  • Acronis Cyber Protection Agent 15
  • Outpost Security Suite Free 7
  • Outpost Antivirus Pro 7 to 9
  • Outpost Security Suite Pro 7 to 9
  • AhnLab V3 Internet Security 8 & 9
  • AhnLab V3 Endpoint Security 9
  • Anvi Smart Defender 1
  • Arcabit Internet Security 2014
  • Arcabit AntiVirus 2014
  • Ashampoo Anti-MalWare 1
  • Ashampoo Anti-Virus 2014 1
  • PC Spyware Protection 1
  • Auslogics Antivirus 2013 16
  • Fix-It Utilities 10 Professional 10
  • Double Anti-Spy Professional 1
  • SystemSuite 10
  • Avira Antivirus Pro 14 & 15
  • Avira Internet Security 12 to 14
  • Avira Server Security 12 & 13
  • Avira AntiVir Personal - Free Antivirus 8 to 10
  • Avira AntiVir Windows Workstation 7
  • Avira Premium Security Suite 7 to 9
  • Avira Antivirus Premium 8, 9, 12, 13
  • Avira Free Antivirus 1,2, 12 to 15
  • Avira Management Console Agent 2
  • Avira Professional Security 8, 9, 12 to 14
  • Avira Family Protection Suite 14
  • Avira Free Antivirus 1, 12 to 14
  • Avira Internet Security Suite 13 & 14
  • Avira Ultimate Protection Suite 14
  • Avira Antivirus Suite 14
  • Avira Endpoint Security 2
  • BeeDoctor 0
  • Baidu Antivirus 4 & 5
  • Huorong Internet Security 5
  • KV Antivirus 13
  • Rising AntiVirus 19 & 21 to 23
  • Rising Internet Security 21 & 23
  • BitSecure Antivirus System 9
  • Bitdefender Windows 8 Security 16
  • Bitdefender Antivirus Free Edition 1
  • Bitdefender Endpoint Security 5
  • Bitdefender Total Security 12 to 23
  • BitDefender Antivirus Pro 10 & 13
  • Bitdefender Endpoint Security Tools 6 & 7
  • Bitdefender Internet Security 13 & 15 to 23
  • Bitdefender Antivirus Plus 15 to 23
  • Bitdefender Business Client 11
  • SpywareBlaster 5
  • BullGuard Antivirus 12, 13 & 17
  • BullGuard Premium Protection 14 & 17
  • BullGuard Internet Security 8, 10, 12, 13, 14, 17
  • ByteFence Anti-Malware 5
  • CA Internet Security Suite 7
  • Returnil System Safe 3
  • CMC Antivirus 2
  • CMC Internet Security 2
  • COMODO Cloud Antivirus 1
  • COMODO Client - Security 8 & 11
  • COMODO Antivirus 5, 6, 8 & 10
  • COMODO Internet Security Premium 10
  • COMODO Internet Security Premium 6, 8 & 11
  • ZoneAlarm Security Suite 4, 8 & 9
  • ZoneAlarm PRO Antivirus + Firewall 11, 13, 14 & 15
  • ZoneAlarm Internet Security Suite 12 to 14
  • ZoneAlarm Free Antivirus + Firewall 13 to 15
  • ZoneAlarm Extreme Security 12 to 15
  • Chili Security for PC 24
  • Cisco Secure Endpoint 7
  • Cisco Secure Endpoint (x86) 7
  • Coranti 1
  • Spyware Terminator 3
  • CrowdStrike Falcon 5 & 6
  • CylancePROTECT 2
  • Advanced Threat Prevention 2
  • CynetEPS 3
  • ProDot Antivirus 1
  • Defender Pro 15-in-1 16
  • Dr.Web Anti-virus for Windows 7
  • Dr.Web Security Space 7
  • Dynamikode USB Security Suite 1
  • ESET Endpoint Antivirus 5 to 9
  • ESET File Security for Microsoft Windows Server 4
  • ESET Endpoint Security 5 to 10
  • ESET NOD32 Antivirus 4 to 14
  • ESET Internet Security 10, 11,12 & 14
  • ESET Smart Security 4 to 12 & 14
  • YAC 4
  • Emsisoft Anti-Malware 5 to 7, 9 & 11
  • Online Armor 7
  • SpyHunter 4
  • PCKeeper Antivirus 1
  • Advanced System Restore 2
  • F-Secure Anti-Virus 10, 12, 14, 15 & 16
  • F-Secure Anti-Virus for Workstations 10
  • F-Secure Client Security 9 to 13
  • WISO Internet Security 10, 13 & 14
  • F-Secure PSB Workstation Security 9, 10 & 12
  • F-Secure Client Security 14
  • Security Suite 18
  • F-Secure Internet Security 2, 9, 10, 12, 14, 16
  • F-PROT Antivirus for Windows 6
  • Faronics Anti-Virus 4
  • Twister Antivirus 7 & 8
  • FortiClient 5, 6 & 25
  • Malware Eraser 1
  • Fujitsu Internet Security 16
  • G Data Security Client 13 to 15
  • G Data TotalCare 22
  • G Data TotalSecurity 22, 23 & 25
  • G Data AntiVirenKit Client 11
  • G Data InternetSecurity 22 to 25
  • G Data AntiVirus 19 to 25
  • G Data TotalProtection 23 to 25
  • G Data NotebookSecurity 21 & 22
  • Gen-X Total Security 1
  • VIPRE Business Agent 5 to 9
  • GFI Cloud - Antivirus 6, 2013, 2014 & 2016
  • VIPRE Business 5 to 7
  • Trojan Killer 2
  • PJMagic Total Security 1
  • ViRobot Internet Security 2011
  • IKARUS anti.virus 2
  • Advanced SystemCare 5 to 7 & 14
  • IObit Malware Fighter 2
  • IObit Security 360 1
  • Advance Spyware Remover 1 & 2
  • RemoveIT Pro Enterprise 2014
  • K7 Endpoint Security 14
  • K7 Anti-Virus Plus 11, 12, 13, 15 & 16
  • K7 AntiVirus Premium 11, 12, 13, 15 & 16
  • K7 Total Security 11 to 16
  • K7 Ultimate Security 13, 15 & 16
  • Kaspersky Endpoint Security 8, 10 & 11
  • Kaspersky Security for Windows Servers 8, 10 & 11
  • Kaspersky Total Security 15 to 19
  • Kaspersky Internet Security 8, 9 & 11 to 16
  • Kaspersky Free 18 & 20
  • Suite de Sécurité Orange 19
  • 安心ネットセキュリティ 20
  • Kaspersky PURE 12 & 13
  • Kaspersky Internet Security 9 to 21
  • Kaspersky Anti-Virus 11 to 21
  • Kaspersky Security Scan 12
  • Kaspersky Small Office Security 9, 13, 15 & 17
  • FreeFixer 1
  • Bazooka Scanner 1
  • Kingsoft Internet Security 2010
  • Kingsoft Antivirus 2012 & 2017
  • LANDesk Antivirus 10
  • Ad-Aware 9 & 10
  • Malwarebytes Anti-Malware Premium 2
  • Malwarebytes Anti-Malware 1 & 2
  • Max Secure Anti Virus 19
  • Max Internet Securіty 19
  • Max Secure Total Security 19
  • Max Spyware Detector 19
  • Max Secure Anti Virus Plus 19
  • McAfee Endpoint Security 10
  • McAfee Security-as-a-Service 5 & 6
  • MOVE AV Client 4
  • BT Virus Protect 16
  • McAfee VirusScan Enterprise 4, 8, 9, 10, 15 to 21
  • McAfee AntiVirus Plus 8 to 10 & 12 to 21
  • McAfee Total Protection 3, 16, 18 to 21
  • McAfee Internet Security 18 to 21
  • McAfee LiveSafe – Internet Security 2, 3, 12 to 16
  • Cerber AntiVirus 0
  • eScan Internet Security Suite for SMB 11
  • eScan Total Security 14
  • eScan Anti-Virus 14
  • eScan Internet Security 14
  • System Center Endpoint Protection 2
  • System Center Endpoint Protection 4
  • Microsoft Forefront Endpoint Protection 1
  • Microsoft Forefront Client Security 1
  • Microsoft Security Essentials 2 & 4
  • Xvirus Personal Guard 4
  • Security Manager AV Defender 5 & 6
  • 常時安全セキュリティ24 7, 19 & 20
  • PC-Clean 1
  • Norman EndPoint Protection 7 to 9 & 11
  • Norman Security Suite 8, 9 & 11
  • Autorun Eater 2
  • The Shield Deluxe 14
  • Security Shield 16
  • PC Tools Internet Security 8 & 9
  • PC Tools Spyware Doctor with AntiVirus 8 & 9
  • PC Tools AntiVirus Free 9
  • Cortex XDR 7
  • Panda Global Protection 4, 6, 7, 15, 16 & 17
  • Panda Free Antivirus 16 & 17
  • Panda Cloud Office Protection 7
  • Panda Global Protection 4 to 7 & 16
  • Panda Endpoint Protection 5 to 8
  • Panda Security for Desktops 4
  • Panda Free Antivirus 18
  • Panda Adaptive Defense 360 7 & 8
  • Panda Dome 18
  • Panda Endpoint Protection Plus 8
  • Panda Gold Protection 7, 16 & 17
  • Panda Cloud Antivirus 0 to 2 & 6
  • Panda Internet Security 15 to 19
  • Panda Antivirus Pro 1, 2, 4, 7, 9 to 13 & 15 to 17
  • XoftSpy AntiVirus Pro 9
  • Fusion360 Anti Spyware 4
  • Gotion天擎 6
  • 360 Total Security 4
  • 360杀毒 5
  • 360安全卫士 11
  • 360 Internet Security 4 & 5
  • Quick Heal AntiVirus Server Edition 12 to 14
  • Seqrite Endpoint Security 17
  • Quick Heal Total Security 12 to 15 & 17
  • Quick Heal Internet Security 12 to 15 & 17
  • Quick Heal AntiVirus 12 to 15 & 17
  • Tech Tune-Up Security 16
  • Shadow Defender 1
  • VIRUSfighter 7
  • SPYWAREfighter 4
  • SUPERAntiSpyware 5 & 6
  • Spybot - Search & Destroy 2
  • EDR终端防护中心 3
  • UnThreat AntiVirus 4
  • Preventon Antivirus 4 & 5
  • Stronghold AntiMalware 1
  • SmadAV 9
  • Sophos Home 1
  • Sophos Endpoint Agent 2 & 2022
  • Sophos Endpoint Security and Control 10 & 11
  • Norton Security Scan 3
  • Norton Security 22
  • Norton Security with Backup 22
  • Symantec Hosted Endpoint Protection 2 & 3
  • Symantec Endpoint Protection Cloud 22
  • Norton Internet Security 10, 15, 16, 17, 19, 20, 21 & 22
  • Norton AntiVirus 14 to 22
  • Norton 360 1 to 6 & 20 to 22
  • Symantec Endpoint Protection 11, 12 & 14
  • Advanced System Protector 2
  • Advanced System Optimizer 3
  • Tech Guard Internet Security 17
  • Vivo Segurança Online 1
  • Tencent PC Manager 10
  • 电脑管家 12
  • Thirtyseven4 AntiVirus 11 to 13
  • VIPRE Business Premium Agent 5 to 9
  • VIPRE Business Agent 5 to 9
  • VIPRE Endpoint Security Agent 12
  • VIPRE Advanced Security 10
  • VIPRE Internet Security 0 & 5 to 9
  • VIPRE Antivirus 5 to 9 & 11
  • Total Defense Internet Security Suite 8 & 9
  • Total Defense Anti-Virus 9
  • Trend Micro Titanium 3, 6 to 10, 16 & 17
  • Trend Micro Apex One Security Agent 13 & 14
  • Trend Micro Maximum Security 6 to 8 & 10 to 12
  • Trend Micro Titanium Internet Security 6 to 8 & 10 to 15
  • Trend Micro Titanium Antivirus+ 7, 10 to 12
  • Trend Micro OfficeScan Client 10 to 12
  • Trend Micro Deep Security Agent 9, 15, 16 & 20
  • Trend Micro Worry-Free Business Security Agent 5 to 8 & 18 to 20
  • TrustPort Internet Security 11 to 14, 2013 & 2014
  • TrustPort Antivirus 11 to 13, 2013 & 2014
  • TrustPort Total Protection 11 to 14, 17, 2013 & 2014
  • Vba32 for Windows Vista 3
  • VoodooShield 2
  • Webroot SecureAnywhere Complete 9
  • Webroot SecureAnywhere 9
  • WinZip Malware Protector 2
  • XANA Evolution Antivirus 5
  • Xyvos Antivirus 1
  • Xyvos WhiteList Antivirus 1
  • adaware antivirus free 12
  • adaware antivirus 12
  • digital-defender Antivirus 2
  • eEye Digital Security Blink Personal 4 to 6
  • eEye Digital Security Blink Professional 4 to 6
  • STOPzilla AntiVirus 6
  • Endpoint Security 5
  • iolo System Mechanic Professional 10 to 12
  • iolo System Shield 4

To enable Microsoft IIS on Windows Server 2008 and 2008 R2

  • Click Start -> click on Control Panel -> click on Programs -> click on Programs and Features -> click Turn Windows Features On or Off. If you are prompted for an administrator password or confirmation, type the password or provide the confirmation.
  • The Windows Server Manager console will open. Now click on Add Roles
  • In the Role Services window select Web Server (IIS) and click on Next
  • In the list of Windows features, click the plus sign (+) next to Internet Information Services, click the plus sign (+) next to Web Management Tools and click on IIS Management Console.
  • In the list of Windows features, click the plus sign (+) next to World Wide Web Services, click the plus sign (+) next to Application Development Features and then select the following:
    SELECT THISTHEN SELECT THIS
    Application Development ASP.NET 4.0 and Later
    CGI
    .NET Extensibility
    ISAPI Extensions
    ISAPI Filters
    Common HTTP Features Default Document
    Static Content
    Management Tools IIS Management Console
  • Click on Next and click on Install. Wait for a few minutes till you see the Installation Succeeded window and then click on Close.

To enable Microsoft IIS on Windows Server 2012 and 2012 R2

  • Open Server Manager
  • Under the Manage menu, select Add Roles and Features
  • Select Role-based or Feature-based Installation
  • Select the appropriate server (local is selected by default)
  • In the Select Server Roles wizard, click on Web Server (IIS) and click Next
  • No additional features are needed for IIS in the Select Features wizard and click Next
  • In the Select Role Services wizard and in the list of Windows features select the following components:
    SELECT THISTHEN SELECT THIS
    Application Development ASP.NET 4.0 and Later
    CGI
    .NET Extensibility
    ISAPI Extensions
    ISAPI Filters
    Common HTTP Features Default Document
    Static Content
    Management Tools IIS Management Console
  • Click on Next and click on Install. Wait for a few minutes till you see the Installation Succeeded window and then click on Close.

To enable Microsoft IIS on Windows Vista / 7 / 8 / 8.1 / 10

  • Click Start -> click on Control Panel -> click on Programs and Features -> click Turn Windows Features On or Off. If you are prompted for an administrator password or confirmation, type the password or provide the confirmation.
  • In the list of Windows features, click the plus sign (+) next to Internet Information Services, click the plus sign (+) next to Web Management Tools and click IIS Management Console.
  • In the list of Windows features, click the plus sign (+) next to World Wide Web Services, click the plus sign (+) next to Application Development Features and then select the following:
    SELECT THISTHEN SELECT THIS
    Web Management Tools IIS Management Console
    Application Development ASP.NET 4.0 and Later
    CGI
    .NET Extensibility
    ISAPI Extensions
    ISAPI Filters
    Common HTTP Features Default Document
    Static Content

To enable Microsoft IIS on Windows Server 2003 and Windows XP

  • Click Start -> click on Settings -> click on Control Panel
  • In the Control Panel, double-click on Add or Remove Programs
  • In the Add or Remove Programs dialog box, click on Add/Remove Windows Components from the left pane
  • On the Windows Components page, in the Components box, click on Application Server/Internet Information Services (IIS) and then click on Next
  • Wait for the installation to finish and then close the wizard

Note: For IIS installation on Windows Server 2003 and Windows XP you may also need the OS installation CD.

 

Try some more options
Submit Ticket

If you have a query relating to our products and services please submit your query here

Product Faq’s

Browse through these FAQs to find answers to commonly raised questions

Download

Seqrite product installer helps you to easily download our product with the license key

Offline Updater

Follow these instructions for offline updates