Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Size: px
Start display at page:

Download "Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice."

Transcription

1

2

3 Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes, and the latest version of the applicable user documentation, which are available from the Trend Micro Web site at: Trend Micro, the Trend Micro t-ball logo, TrendLabs are trademarks or registered trademarks of Trend Micro, Incorporated. Macintosh is a trademark of Apple Inc. All other product or company names may be trademarks or registered trademarks of their owners. Copyright 2009 Trend Micro Incorporated. All rights reserved. Document Part No. CSEM14021/90225 Release Date: March 2009 Patents Pending

4 The Trend Micro Security for Macintosh user documentation contains product feature information, installation, and configuration instructions for your production environment. You should read the documentation prior to installing or using the software. Detailed information about how to use specific features within the software are available in the online help file and the online Knowledge Base at Trend Micro s Web site at: Trend Micro is always seeking to improve its documentation. Your feedback is always welcome. Please evaluate this documentation on the following site:

5 Contents Preface Chapter 1: Chapter 2: Chapter 3: Trend Micro Security for Macintosh Documentation...viii Audience...viii Document Conventions...ix Introducing Trend Micro Security for Macintosh Introducing Trend Micro Security for Macintosh Features and Benefits Malware Protection Web Protection Logs Notifications Installing Trend Micro Security for Macintosh System Requirements Pre-Installation Considerations Installing Trend Micro Security for Macintosh Post Installation Tasks Accessing the Trend Micro Security for Macintosh Product Console Uninstalling Trend Micro Security for Macintosh Managing Trend Micro Security for Macintosh The Trend Micro Security for Macintosh Product Console The Protection Status Screen The Trend Micro Security Standalone Application Menu Items The T-ball Logo Quick Menu Items Configuring the Proxy Server Component Updates Trend Micro Security for Macintosh Updatable Components iii

6 Trend Micro Security for Macintosh User s Guide Update Methods Update Now AutoUpdate Enabling or Disabling AutoUpdate Configuring Update Times for AutoUpdate Specifying Notification Options Viewing Log Entries Viewing Quarantined Files Chapter 4: Chapter 5: Chapter 6: Configuring Trend Micro Security for Macintosh Protection Features Malware Protection Real-time Scan Enable or Disable Real-time Scan Manual Scan Scheduled Scan Specifying Scan Actions Compressed File Scan Configuring Scan Settings Using the Scan Exception List Web Protection Web Threats Web Threat Protection Enabling or Disabling Web Threat Protection Protection Strength Specifying Approved Websites Frequently Asked Questions Frequently Asked Questions Getting Support Contacting Technical Support Sending Infected File Samples Introducing TrendLabs Other Useful Resources iv

7 Contents Appendix A: Threat Descriptions Viruses and Malware... A-1 Network Viruses... A-2 Spyware and Grayware... A-3 Phish Attacks... A-6 Glossary Index v

8 Trend Micro Security for Macintosh User s Guide vi

9 Preface Preface Welcome to the Trend Micro Security for Macintosh User s Guide. This guide contains information about product installation, settings, and service levels. This chapter discusses the following topics: Trend Micro Security for Macintosh Documentation on page viii Audience on page viii Document Conventions on page ix vii

10 Trend Micro Security for Macintosh User s Guide Trend Micro Security for Macintosh Documentation The Trend Micro Security for Macintosh documentation consists of the following: Help Helps you configure product features through the user interface. You can access the help by opening the product console and then clicking the help icon. User s Guide Helps you plan for deployment and configure product settings. Readme File Contains late-breaking product information that might not be found in the other documentation. Topics include a description of features, installation tips, known issues, and product release history. The User s Guide and readme are available at: Audience Trend Micro Security for Macintosh documentation is written for IT managers and end-users. The documentation assumes that the reader has experience working with Apple Macintosh computers and has basic experience installing and using software applications for Macintosh computers. viii

11 Preface Document Conventions To help you locate and interpret information easily, the Trend Micro Security for Macintosh documentation uses the following conventions. TABLE 1-1. Document Conventions CONVENTION ALL CAPITALS Bold Italics Monospace Note: DESCRIPTION ACRONYMS, ABBREVIATIONS, AND NAMES OF CERTAIN COMMANDS AND KEYS ON THE KEY- BOARD Menus and menu commands, command buttons, tabs, options, and Trend Micro Security for Macintosh tasks References to other documentation Examples, sample command lines, program code, Web URL, file name, and program output Configuration notes Tip: Recommendations WARNING! Reminders on actions or configurations that should be avoided ix

12 Trend Micro Security for Macintosh User s Guide x

13 Chapter 1 Introducing Trend Micro Security for Macintosh This chapter introduces Trend Micro Security for Macintosh and provides a brief description of its components and a list of features and benefits. This chapter discusses the following topics: Introducing Trend Micro Security for Macintosh on page 1-2 Features and Benefits on page 1-3 Malware Protection on page 1-3 Web Protection on page 1-4 Logs on page 1-4 Notifications on page

14 Trend Micro Security for Macintosh User s Guide Introducing Trend Micro Security for Macintosh Trend Micro Security for Macintosh is a common security client designed specifically for Mac OS X. Trend Micro Security for Macintosh protects against malware, spyware, and Web threats. The Trend Micro Security for Macintosh Malware Protection feature protects against malware such as viruses, Trojans, worms, and spyware. Trend Micro Security for Macintosh uses the latest Web Threat Protection technology to protect users from fraudulent (Phishing) Web sites, and sites that contain malware. FIGURE 1-1 Trend Micro Security for Macintosh Protection Status screen 1-2

15 Introducing Trend Micro Security for Macintosh Features and Benefits Trend Micro Security for Macintosh provides the following features and benefits: Comprehensive Malware Protection Powerful protection against viruses, Trojans, worms, spyware, grayware, and new variants as they emerge. Complete Web Protection Protects against Web-based malware, data theft, lost productivity, and reputation damage. Blocks access to malicious Web sites based on reputation ratings. Simple Installation Trend Micro Security for Macintosh provides a wizard-type installation program, tmsminstall.mpkg that allows users to install the product on a single computer. Easy to Use Product Console The Trend Micro Security for Macintosh product console provides quick access to the most commonly used security features and settings. Instant and Informative Notifications Configure Trend Micro Security for Macintosh to notify users when it detects malware and Web threats, when content filtering violations occur, and when updates begin and end. Malware Protection Malware Protection provides three scan methods to protect users from Malware. Enable Real-time Scan to have the Trend Micro Security for Macintosh scan for malware when opening, closing, saving, and downloading files. Scan for malware and other threats on demand with Manual Scan. Configure Scheduled Scan to scan for malware at regularly scheduled intervals. 1-3

16 Trend Micro Security for Macintosh User s Guide Web Protection Web Protection uses the Web Threat Protection feature. Web Threat Protection protects users from fraudulent Web sites and Web sites that contain malware. Logs To provide current information about the security of your computer, Trend Micro Security for Macintosh is pre-configured to generate logs based on malware detections, Web threat detections, and component updates. From the Log screen, click Clear to delete specific logs from the computer. Logs, if not regularly deleted, can consume excessive disk space. Trend Micro recommends deleting logs regularly. Notifications Configure Trend Micro Security for Macintosh to display notifications in response to program events and security events. Program events such as scans and updates, and security events such as malware detections, Web site violations, and Web threat detections. 1-4

17 Chapter 2 Installing Trend Micro Security for Macintosh This chapter describes the requirements and process for installing and uninstalling Trend Micro Security for Macintosh. This chapter also includes a list of post installation tasks. This chapter discusses the following topics: System Requirements on page 2-2 Pre-Installation Considerations on page 2-2 Installing Trend Micro Security for Macintosh on page 2-3 Post Installation Tasks on page 2-5 Uninstalling Trend Micro Security for Macintosh on page

18 Trend Micro Security for Macintosh User s Guide System Requirements To run the Trend Micro Security for Macintosh, your computer must meet the following requirements: Hardware: Macintosh computer with PowerPC and Intel core processor 256MB RAM 100MB available hard disk space Software: Mac OS X version (Tiger) or higher Mac OS X version (Leopard) or higher The Trend Micro Security for Macintosh needs an Internet connection to perform the following tasks: Download product and component updates Obtain virus information Browse Web pages on the Trend Micro Web site. Pre-Installation Considerations To guarantee a successful installation and operation of Trend Micro Security for Macintosh, check for and uninstall other installed antivirus and anti-spyware products before installing Trend Micro Security for Macintosh. WARNING! Disabling or uninstalling your antivirus and security products can make your computer susceptible to threats. 2-2

19 Installing Trend Micro Security for Macintosh Installing Trend Micro Security for Macintosh The process of installing Trend Micro Security for Macintosh on a single computer is similar to the installation process for other Macintosh software. Locate and double-click the Trend Micro Security Standalone 1.0.xxx.dmg image. To install Trend Micro Security for Macintosh: 1. Uninstall other security software products. 2. Double-click the Install Trend Micro Security Standalone icon to launch the installation program. FIGURE 2-1 Trend Micro Security for Macintosh files included in the CD 3. Click Continue to view the Introduction screen. 2-3

20 Trend Micro Security for Macintosh User s Guide FIGURE 2-2 Introduction screen 4. Click Continue to view the Important Information screen. 5. Click Continue to read the Software License Agreement screen. 6. Read the License agreement and click Continue to view the agreement confirmation popup. 7. Click Agree if you agree to the setup license conditions. Note: The setup does not continue if you do not agree to the setup license condition. 8. Click Agree to move to the Installation Type screen. 9. Click Install to accept the default installation, otherwise click Change Install Location to select a different location. 2-4

21 Installing Trend Micro Security for Macintosh 10. After selecting Install, fill in the Name and Password fields to begin the installation process. Note: The person entering the name and password needs to have the appropriate administrative credentials to continue with the installation. 11. If the installation is successful, an Installation completed successfully screen appears. Click Close to continue. Post Installation Tasks Immediately after installing Trend Micro Security for Macintosh, perform the following tasks to make sure that the product is working, that it has the newest components, and that your computer is protected and free from malware and spyware/grayware. 1. Access the Trend Micro Security for Macintosh product console. 2. Enable AutoUpdate, Real-time Scan, and Web Threat Protection. 3. Update the product using Update Now. 4. Scan your computer for malware and spyware/grayware using Scan Now. 5. Check for Internet connectivity by opening a Web browser and trying to access a Web site. Accessing the Trend Micro Security for Macintosh Product Console There are two options for opening the Trend Micro Security for Macintosh product console. The quickest method is through the Trend Micro T-ball quick menu on the menu bar at the top-right of the screen. Note: If the T-ball logo is not visible in the menu bar, see Specifying Notification Options on page

22 Trend Micro Security for Macintosh User s Guide To access the Trend Micro Security for Macintosh product console from the T-ball quick menu: From the menu bar, click the Trend Micro T-ball logo > Open Trend Micro Security Standalone FIGURE 2-3 Trend Micro Security for Macintosh T-ball quick menu To access the Trend Micro Security for Macintosh product console from a Finder window: 1. Make sure that Finder is the active application and from the menu bar, click File > New Finder Window. 2. In the Finder window, click Applications > Trend Micro Security for Macintosh. For a more complete description of the features and configuration settings, refer to Managing Trend Micro Security for Macintosh starting on page 3-1. Uninstalling Trend Micro Security for Macintosh The process of uninstalling Trend Micro Security for Macintosh from a single computer is similar to the uninstallation process for other Macintosh software. 2-6

23 Installing Trend Micro Security for Macintosh To uninstall Trend Micro Security for Macintosh: 1. Locate and double-click the Trend Micro Security Standalone 1.0.xxx.dmg image. 2. Double-click the Uninstall Trend Micro Security Standalone icon to launch the uninstaller program. 3. When prompted to confirm the uninstallation of Trend Micro Security for Macintosh, click Uninstall. 2-7

24 Trend Micro Security for Macintosh User s Guide FIGURE 2-4 Uninstallation prompt 4. Provide Name and Password information when prompted and click OK. The Trend Micro Security for Macintosh Standalone uninstaller progress bar appears. Note: The person entering the name and password needs to have the appropriate administrative credentials to continue with the uninstallation. If uninstallation is successful, an Uninstallation Completed screen will appear. Click OK to continue. 2-8

25 Chapter 3 Managing Trend Micro Security for Macintosh This chapter describes the Trend Micro Security for Macintosh product console and provides basic configuration information to get you up and running securely. This chapter discusses the following topics: The Trend Micro Security for Macintosh Product Console on page 3-2 The Trend Micro Security Standalone Application Menu Items on page 3-3 The T-ball Logo Quick Menu Items on page 3-4 Configuring the Proxy Server on page 3-5 Component Updates on page 3-7 Specifying Notification Options on page 3-15 Viewing Log Entries on page 3-17 Viewing Quarantined Files on page

26 Trend Micro Security for Macintosh User s Guide The Trend Micro Security for Macintosh Product Console The Trend Micro Security for Macintosh product console is a Web-based console. The product console allows direct administration of the Trend Micro Security for Macintosh security and product management features. The Protection Status Screen The Protection Status screen provides quick access to commonly used security settings and features. From the Protection Status screen, users can run an on-demand scan and update product components instantly. FIGURE 3-1 Trend Micro Security for Macintosh Protection Status screen 3-2

27 Managing Trend Micro Security for Macintosh The Protection Status screen contains the following items: Protection Status Displays the status of your protection (Protected/At Risk). AutoUpdate Enables or disables Automatic Updates. Real-time Scan Enables or disables Real-time Scan. Web Threat Protection Enables or disables Web Threat Protection. Update Now Performs a Manual Update. Displays the date of the last update and the next update. The product console displays the date of the next update only if a next update is scheduled. During an update, the Update Now label changes to Updating. Scan Now Performs a Manual Scan. Displays the date of the last scan and the next scan. The product console displays the date of the next scan only if a scan is scheduled. During a scan, the Scan Now label changes to Scanning. Trend Micro Security Standalone Application Menu Provides access to the security settings, update settings, notification settings, and logs. The Trend Micro Security Standalone Application Menu Items The Trend Micro Security Standalone application menu is located on the top-left side of the menu bar. FIGURE 3-2 Trend Micro Security Standalone application menu 3-3

28 Trend Micro Security for Macintosh User s Guide About Trend Micro Security Provides version information about Trend Micro Security for Macintosh. Preferences Opens the Trend Micro Security for Macintosh Notification, Scan, and Update settings screen. Hide Trend Micro Security Hides all open Trend Micro Security for Macintosh windows. Hide Others Hides all other open application windows. Show All Opens all other application windows running in the background. Quit Trend Micro Security Quits the Trend Micro Security for Macintosh console application. However, Trend Micro Security for Macintosh still protects your computer; only the product console is closed. The T-ball Logo Quick Menu Items The T-ball logo quick menu is located in the top-right corner of the menu bar. FIGURE 3-3 T-ball logo quick menu Update Now Instantly starts checking for and downloading updated components. Disable/Enable Real-time Scan Disables or enables Real-time Scan. Disable/Enable Web Threat Protection Disables or enables Web Threat Protection. 3-4

29 Managing Trend Micro Security for Macintosh Open Trend Micro Security Opens the Trend Micro Security for Macintosh product console. Open Preferences Opens the Trend Micro Security for Macintosh Notification, Scan, and Update settings screen. Component Version Opens a dialogue to display version and update status of Trend Micro Security for Macintosh components. About Trend Micro Security Provides version information about Trend Micro Security for Macintosh. Configuring the Proxy Server Most enterprises use proxy servers for added security and more efficient use of bandwidth. If your network uses a proxy server, configure the proxy settings to ensure that Trend Micro Security for Macintosh can connect to the Internet and download components. To configure the proxy server settings: 1. Access the Update settings screen: From the Trend Micro Security Standalone application menu, click Preferences. - OR - From the Trend Micro T-ball quick menu, click Open Preferences. 2. Click Update > Proxy Settings. 3-5

30 Trend Micro Security for Macintosh User s Guide FIGURE 3-4 Proxy Settings screen 3. Select Connect using proxy. 4. Type the name of the proxy server in the Server field 5. Type the port number of the proxy server in the Port field. 6. Type the user name for the proxy server in the Username field. 7. Type the password for the proxy server in the Password field. 3-6

31 Managing Trend Micro Security for Macintosh 8. Click OK to apply changes. Note: To make sure that component updates and product registration work correctly, verify the proxy server settings. Component Updates To make sure that your computer stays protected from the latest malware, spyware, grayware, and Web threats, regularly update Trend Micro Security for Macintosh components. Configure Trend Micro Security for Macintosh to automatically check for and download the latest program and component updates. 3-7

32 Trend Micro Security for Macintosh User s Guide FIGURE 3-5 AutoUpdate Settings screen Trend Micro Security for Macintosh Updatable Components Trend Micro Security for Macintosh uses the following components to keep your computer protected: 3-8

33 Managing Trend Micro Security for Macintosh FIGURE 3-6 Component Version screen Virus Scanning Engine Component used to perform multi-threaded real-time scans. Virus Scanning Pattern Collection of telltale signatures used to detect viruses and malware. Security (for Macintosh) Standalone Core Controller Responsible for coordinating Web Protection, Malware Protection, Updates, Notifications, and task management processes. Security (for Macintosh) Standalone Client Responsible for the user interface and for facilitating user action on controller components. Spyware Scanning Pattern Collection of telltale signatures used to detect spyware and other types of grayware. 3-9

34 Trend Micro Security for Macintosh User s Guide Update Methods The Trend Micro Security for Macintosh product console provides two methods for updating product components: Update Now Allows users to check for and install new components on demand. AutoUpdate Allows users to configure a scheduled update frequency. Update Now Use Update Now to instruct Trend Micro Security for Macintosh to check for and download the newest components available. The Update Now icon in the Protection Status screen displays the date and time of the last update and the date and time for the next update. The console displays the date of the next update only if AutoUpdate is enabled and configured. To update components manually with Update Now: From the Trend Micro Security for Macintosh product console, select Protection Status and click Update Now. 3-10

35 Managing Trend Micro Security for Macintosh FIGURE 3-7 Update Now icon on the Protection Status screen Tip: View component details by clicking Preferences from the Trend Micro Security Standalone application menu and then selecting Update. AutoUpdate Use AutoUpdate to make sure that your computer protection remains current. Enable and configure AutoUpdate to check for and download updated components on a regular schedule. 3-11

36 Trend Micro Security for Macintosh User s Guide Enabling or Disabling AutoUpdate Users can enable or disable AutoUpdate from the Protection Status screen or from the Update settings screen. To enable or disable AutoUpdate: 1. Open the Trend Micro Security for Macintosh product console. The Protection Status screen appears. 2. Click the AutoUpdate ON/OFF toggle switch to enable or disable AutoUpdate. FIGURE 3-8 AutoUpdate toggle button Configuring Update Times for AutoUpdate To help make sure that your computer protection remains current, configure Trend Micro Security for Macintosh to regularly check for and download updated components. 3-12

37 Managing Trend Micro Security for Macintosh Note: During times of virus outbreaks, Trend Micro may update virus pattern files more than once a week. Trend Micro updates the scan engine regularly, but less frequently than once a week. Trend Micro recommends updating daily (or even more frequently in times of virus outbreaks). To specify a schedule for AutoUpdate: 1. From the Trend Micro Security Standalone application menu, click Preferences. The Preferences window appears with the Notification tab selected. 2. Click the Update tab. 3-13

38 Trend Micro Security for Macintosh User s Guide FIGURE 3-9 Update settings screen, AutoUpdate tab selected Note: You may be required to unlock the page with administrator level credentials in order to make changes to the AutoUpdate settings. 3. Select Enable AutoUpdate. 4. Select an update frequency. 5. Specify an update start time. 6. Click OK. 3-14

39 Managing Trend Micro Security for Macintosh Note: If the connection request to the update server times out (exceeds 15 seconds), Trend Micro Security for Macintosh will retry to connect to the update source up to three times. Specifying Notification Options Trend Micro Security for Macintosh allows users to enable or disable notifications for system and security events. To specify notifications for system and security events: 1. Access the Notifications settings screen: From the Trend Micro Security Standalone application menu, click Preferences. - OR - From the Trend Micro T-ball quick menu, click Open Preferences. 3-15

40 Trend Micro Security for Macintosh User s Guide FIGURE 3-10 Notification settings screen 2. Select Show status on the menu bar. Tip: If Show status on the menu bar is selected, the Trend Micro T-ball logo will appear on the menu bar (top-right of screen). 3. Select Malware Protection notification options. 4. Select Web Protection notification options. 5. Select Update notification options. 3-16

41 Managing Trend Micro Security for Macintosh Viewing Log Entries Trend Micro Security for Macintosh creates logs for security and system events. Security events include malware, spyware, and grayware detections, Web threat detections, and Web site filtering violations. System events are component updates. To view log entries for security and system events: 1. From the Trend Micro Security for Macintosh product console, click Log. FIGURE 3-11 Malware log screen 2. From the Log Types field, select a log type. 3. From the Date range field, select a date range. After selecting a date range, the log view window automatically updates to display the requested log entries. 3-17

42 Trend Micro Security for Macintosh User s Guide Viewing Quarantined Files From the Quarantine screen users can restore, delete, or clean items infected with malware. To view quarantined files: 1. From the Protection Status screen, click Log. 2. From the Types drop-down menu, select Malware. FIGURE 3-12 Log screen for accessing quarantined files 3. Click View Quarantine List. 3-18

43 Managing Trend Micro Security for Macintosh FIGURE 3-13 Quarantine List screen 3-19

44 Trend Micro Security for Macintosh User s Guide 3-20

45 Chapter 4 Configuring Trend Micro Security for Macintosh Protection Features This chapter describes the Trend Micro Security for Macintosh protection features and functionalities. This chapter discusses the following topics: Malware Protection on page 4-2 Web Protection on page

46 Trend Micro Security for Macintosh User s Guide Malware Protection Trend Micro Security for Macintosh Malware Protection provides highly configurable protection against malware. Malware Protection incorporates two types of scans to make sure that your computer remains free from malware. Real-time Scan checks files for malware as they are opened, saved, or downloaded. Manual and Scheduled Scan checks for Malware from files and folders on your computer. Trend Micro Security for Macintosh Malware Protection can detect malware such as viruses, Trojans, and worms. Real-time Scan Real-time Scan scans files in real time before the files are opened, saved, or downloaded. If Trend Micro Security for Macintosh does not detect malware, users can continue opening, saving, or downloading the file. If Trend Micro Security for Macintosh detects malware, and if the show notification when Real-time Scan detects malware option on the Notifications screen is selected, Trend Micro Security for Macintosh displays a notification message. Enable or Disable Real-time Scan Trend Micro Security for Macintosh provides multiple options for enabling or disabling Real-time Scan. To enable or disable Real-time Scan: From the Protection Status screen, click the Real-time Scan ON/OFF toggle button. - OR - From the Trend Micro T-ball quick menu, click Enable Real-time Scan or Disable Real-time Scan. To enable or disable Real-time Scan from the Protection Status screen: 1. Click the Real-time Scan link. The Real-time Scan settings screen appears. 4-2

47 Configuring Trend Micro Security for Macintosh Protection Features FIGURE 4-1 Real-time Scan link to access settings 2. Select Enable Real-time Scan or uncheck Enable Real-time Scan. 4-3

48 Trend Micro Security for Macintosh User s Guide FIGURE 4-2 Real-time Scan settings screen To enable or disable Real-time Scan from the Trend Micro Security for Macintosh application menu: 1. Click Trend Micro Security Standalone > Preferences. 2. Click Scans > Real-time Scan. 3. Select Enable Real-time Scan to enable or uncheck Enable Real-time Scan to disable Real-time Scan. 4-4

49 Configuring Trend Micro Security for Macintosh Protection Features To enable or disable Real-time Scan from the Trend Micro T-ball quick menu: 1. Click the Trend Micro T-ball logo > Open Preferences. 2. Click Scans > Real-time Scan. 3. Select Enable Real-time Scan to enable or uncheck Enable Real-time Scan to disable Real-time Scan. Note: If the Trend Micro T-ball logo does not appear in the menu bar, select Show Trend Micro Security for Macintosh status on the menu bar from the Notifications screen. Manual Scan Manual Scan is an on-demand scan and starts immediately after a user launches it in the Trend Micro Security for Macintosh product console. Use the Manual Scan screen to scan for malware. Manual Scan also eradicates old infections, if any, to minimize reinfection. Manual Scan starts immediately and scans all the specified files. The duration of the scan depends on your hardware resources and the number of files. During a Manual Scan, Trend Micro Security for Macintosh takes action against threats according to the actions set by the user. To stop the scan, click Stop when the scan is in progress. To run a Manual Scan for malware - Method 1: From the Trend Micro Security for Macintosh product console, Protection Status screen, click Scan Now. 4-5

50 Trend Micro Security for Macintosh User s Guide FIGURE 4-3 Run Manual Scan using Scan Now To run a Manual Scan for malware - Method 2: 1. From the Trend Micro Security for Macintosh product console, click Malware Protection. 4-6

51 Configuring Trend Micro Security for Macintosh Protection Features FIGURE 4-4 Manual Scan screen 2. Specify what Trend Micro Security for Macintosh should scan by selecting one of the following Scan Target options: Recommended files: scans Trend Micro recommended files. All files on your computer: scans all files on your computer except for encrypted or password protected files. Only the files that you select: select the files, folders, and disks you want Trend Micro Security for Macintosh to scan. 3. [Optional] Click Settings: specify performance settings and specify what Trend Micro Security for Macintosh should do if it detects malware in a file. 4-7

52 Trend Micro Security for Macintosh User s Guide FIGURE 4-5 Manual Scan Settings screen 4. Click Scan Now. 4-8

53 Configuring Trend Micro Security for Macintosh Protection Features Scheduled Scan Scheduled Scan performs the same as Manual Scan. The only difference is that Scheduled Scan runs automatically on the scheduled date and time. Use Scheduled Scan to automate routine scans on the computer and improve scan management efficiency. Configure Scheduled Scan to run daily, weekly, or monthly. Specify a time for a Scheduled Scan to begin. FIGURE 4-6 Scheduled Scan settings screen 4-9

54 Trend Micro Security for Macintosh User s Guide To configure a Scheduled Scan: 1. Access the Scheduled Scan settings screen using one of the following options: From the Trend Micro Security for Macintosh product console, click Malware Protection > Scan Settings > Scheduled Scan. - OR - From the Trend Micro Security Standalone application menu, click Preferences > Scan > Scheduled Scan. 2. Select Enable Scheduled Scan. 3. Select CPU Usage options: High: provides the best scan results but may affect computer performance. Low: provides good scan results while limiting impact on computer performance. 4. [Optional] Select Scan compressed files. 5. Specify what Trend Micro Security for Macintosh should scan by selecting one of the following scan target options: Recommended files: scans files recommended by Trend Micro. All files on your computer: scans all files on your computer except encrypted and password protected files. Only the files that you select: select the files, folders, and drives you want Trend Micro Security for Macintosh to scan. 6. Specify a Schedule: select daily, weekly, or monthly scan intervals. 7. Specify Action: select recommended by Trend Micro for the default settings or Customize action to select specific actions on files that contain malware. Specifying Scan Actions Trend Micro Security for Macintosh provides multiple scan action options for files that contain malware. Specify one of the following actions for Trend Micro Security for Macintosh to take when it detects malware in a file: Clean: cleans a cleanable file before allowing full access to the file. Lets the specified next action handle files that Trend Micro Security for Macintosh is unable to clean. Delete: deletes an infected file. 4-10

55 Configuring Trend Micro Security for Macintosh Protection Features Pass: for Manual and Scheduled Scans, Trend Micro Security for Macintosh allows full access to the infected file without doing anything to the file. The file is not moved to a different location (as opposed to the "Quarantine" action); and a user may copy/delete/open the file. However, if Real-time Scan is enabled, it will be triggered when opening the file. For Real-time Scan / "Scan Now", Trend Micro Security for Macintosh denies access to the infected file. An "Access is denied" message appears when attempting to open the file. Trend Micro Security for Macintosh does not move the file to a different location. Trend Micro Security for Macintosh may delete the file. Quarantine: renames and then moves an infected file to the client computer's quarantine directory. Compressed File Scan Compression and archiving are among the most common methods of file storage, especially for file transfers - such as attachments, FTP, and HTTP. Before any malware detection can occur on a compressed file, Trend Micro Security for Macintosh must first decompress it. Recognizing the fundamental importance of decompression in the detection of malware, Trend Micro is committed to supporting all major decompression routines, and up to three levels of compression. For other compression file types, Trend Micro Security for Macintosh performs scan actions on the compressed file, rather than individual files within the compressed file. Configuring Scan Settings To configure Real-time Scan settings: 1. From the Scan screen, select Enable Real-time Scan. 2. Select Scan compressed files to have Trend Micro Security for Macintosh scan compressed files. 3. Specify a scan action that Trend Micro Security for Macintosh should take when it detects malware. 4. Edit the Scan Exception List. 5. Click OK. 4-11

56 Trend Micro Security for Macintosh User s Guide Using the Scan Exception List Trend Micro Security for Macintosh does not scan files that users add to the Scan Exception List. To add files and extensions to the Scan Exception list: 1. Access the Scan settings screen: From the Trend Micro Security Standalone application menu, click Preferences. - OR - From the T-ball quick menu, click Open Preferences. 2. From the Scan settings screen, click Manual Scan. Note: Users can access the Scan Exception List from any of the Scan setting screens. 4-12

57 Configuring Trend Micro Security for Macintosh Protection Features FIGURE 4-7 Accessing the Scan Exception List Note: Users can access the Scan Exception List from the Real-time, Manual, and Scheduled Scan settings windows. 3. Click Scan Exception List. 4. Click Enable the Exception List. 4-13

58 Trend Micro Security for Macintosh User s Guide 5. Select either the File or the Extension tab. FIGURE 4-8 Scan Exception List with the File tab selected 6. Click the Add (+) icon to select a file or to type an extension. Note: Trend Micro Security for Macintosh does not support wildcard characters when entering file extensions. When entering an extension, do not add a period before the extension. 7. Click Done to make sure that changes are applied. Note: The Scan Exception List can contain a maximum of 64 files and extensions. 4-14

59 Configuring Trend Micro Security for Macintosh Protection Features Web Protection Trend Micro Security for Macintosh Web Protection consists of Web Threat Protection. Web Threat Protection checks the reputation score of user requested URLs to make sure that the requested Web site is legitimate and free from malware and Web threats. Web Threats Web threats encompass a broad array of threats that originate from the Internet. Web threats are sophisticated in their methods, using a combination of various files and techniques rather than a single file or approach. For example, Web threat creators constantly change the version or variant used. Because the Web threat is in a fixed location of a Web site rather than on an infected computer, the Web threat creator constantly modifies its code to avoid detection. Web Threat Protection Web Threat Protection, when enabled, validates the authenticity of URLs that users attempt to access. Users sometimes fall victim to elaborately designed Web sites that use social engineering techniques to elicit confidential information (corporate and personal). Social engineering may be used to induce users to visit Web sites that automatically download malicious code or programs. The malicious code or program, once launched, then runs unknown to the user, in the background. These malicious programs, depending on their design, capture keyboard inputs and give unauthorized users access to and control of the infected computer. Web Threat Protection proactively protects users and network environments by warning users and preventing them from visiting dangerous Web sites. 4-15

60 Trend Micro Security for Macintosh User s Guide FIGURE 4-9 Web Threat Protection screen Enabling or Disabling Web Threat Protection Users can enable or disable Web Threat Protection from the Protection Status screen or from the Web Protection screen. To enable or disable Web Threat Protection: 1. Open the Trend Micro Security for Macintosh product console. The Protection Status screen appears. 2. Click the Web Threat Protection ON/OFF toggle switch to enable or disable Web Threat Protection. 4-16

61 Configuring Trend Micro Security for Macintosh Protection Features FIGURE 4-10 Web Threat Protection toggle switch Protection Strength There are three levels of protection strength that help Trend Micro Security for Macintosh determine whether to allow or block access to a Web site. High: blocks Web sites that are unrated, a Web threat, very likely to be a Web threat, or likely to be a Web threat. Medium: blocks Web sites that are a Web threat, or very likely to be a Web threat. Low: blocks only Web sites that are a Web threat. To configure Web Threat Protection: 1. From the Protection Status screen, click Web Protection. 2. Click the Web Threat Protection tab. 4-17

62 Trend Micro Security for Macintosh User s Guide FIGURE 4-11 Web Threat Protection settings screen 3. Select Enable Web Threat Protection. 4. Use the Protection Strength slider to specify Protection Strength. Specifying Approved Websites The Approved Websites list contains a list of user or administrator approved Web sites. Trend Micro Security for Macintosh will not block Web sites on the approved list. The approved Websites lists can each hold a maximum of 500 Web sites. Trend Micro Security for Macintosh approves all sub-sites of Web sites that are on the approved list. To specify Approved Web sites: 1. From the Trend Micro Security for Macintosh product console, click Web Protection. 2. Click the Web Threat Protection tab. 4-18

63 Configuring Trend Micro Security for Macintosh Protection Features FIGURE 4-12 Web Threat Protection Approved Websites 3. Click Approved Websites. The Approved Websites screen appears. 4-19

64 Trend Micro Security for Macintosh User s Guide FIGURE 4-13 Approved Websites list 4. Select the Enable Approved Websites. 5. Click Add (+) and type the URL of the Web site that you want Trend Micro Security for Macintosh to allow. 4-20

65 Chapter 5 Frequently Asked Questions This chapter presents and answers frequently asked questions about Trend Micro Security for Macintosh. This chapter discusses the following topics: Frequently Asked Questions on page

66 Trend Micro Security for Macintosh User s Guide Frequently Asked Questions Installation Why do I receive a warning when I install Trend Micro Security for Macintosh OS X version or or lower? Trend Micro Security for Macintosh supports two separate versions of Mac OS X (Tiger and Leopard). If you are using the Tiger version of the Mac OS X (10.4), you cannot install Trend Micro Security for Macintosh on a version of Tiger lower than If you are using the Leopard version of the Mac OS X (10.5), you can install Trend Micro Security for Macintosh on versions of Leopard that are less than However, Trend Micro Security for Macintosh will issue a warning. Trend Micro recommends using the latest version of the Mac OS. Uninstallation Why does no popup window appear when I try to uninstall Trend Micro Security for Macintosh? When you attempt to uninstall Trend Micro Security for Macintosh, a popup window will usually appear asking for your administrator credentials. If you typed your administrator credentials anytime within the previous 5 minutes, Trend Micro Security for Macintosh will remember them and the uninstallation program will not require you to provide the credentials again. What do I do if I receive an uninstall failed message? 1. Restart your computer. 2. Reinstall Trend Micro Security for Macintosh. 3. Use the uninstall tool to uninstall Trend Micro Security for Macintosh. 5-2

67 Frequently Asked Questions Compatibility What do I do if my computer performance decreases after installing Trend Micro Security for Macintosh? Check if there are other antivirus products installed on your computer. Some antivirus products are not compatible with Trend Micro Security for Macintosh. To determine if Trend Micro Security for Macintosh is causing the performance problem, use the Activity Monitor to identify and close applications that display high resource usage. If the problem persists after closing the other applications, contact your support provider. Product Console Why am I unable to change the Trend Micro Security for Macintosh settings? Check that the lock on the Trend Micro Security for Macintosh product console is unlocked. You will not be able to make changes to the settings if the product console is locked. To make changes to Trend Micro Security for Macintosh settings, click the lock. Trend Micro Security for Macintosh will prompt you for administrator credentials. Type your credentials to unlock the console and you will be able to change settings. Why is the menu in the Trend Micro Security for Macintosh product console grey? If another software program is running, it may have focus. When this happens, the Trend Micro Security for Macintosh product console will appear, but the menu items will be grayed out. Click anywhere on the product console and focus will return to the Trend Micro Security for Macintosh product console and the menu items will return to normal. Why is the Trend Micro Security for Macintosh product console grey? During updates or scans, Trend Micro Security for Macintosh will grey out some menu items. Close and then reopen the product console. Web Threat Protection Why am I unable to connect to the Internet after installing Trend Micro Security for Macintosh? After installing Trend Micro Security for Macintosh, you may not have Internet access until you restart your computer. Restart your computer and if the problem persists, check your network connections. If you are still unable to connect to the Internet, contact your support provider. 5-3

68 Trend Micro Security for Macintosh User s Guide Updates Why does the update take a long time? Network traffic, available bandwidth, and download limitations from your company or Internet Service Provider impact the time it takes Trend Micro Security for Macintosh to download updates. If you experience long update times, choose to download updates when network usage is low. If in a work environment, configure Trend Micro Security for Macintosh to download updates early in the morning or late at night. Why is Trend Micro Security for Macintosh unable to get updates even though the network connection is working? Check if your network uses a proxy server and make sure that the proxy server settings are correct. Check if the network connection is slow. If Trend Micro Security for Macintosh is unable to connect to the update server within 3 minutes, the connection will time out. Why do I not receive a notification before a scheduled update or scan begins? If you did not enable notifications for scheduled scans or updates, Trend Micro Security for Macintosh will not notify you before they begin. Enable notifications for scheduled scans and updates to receive a notification before Trend Micro Security for Macintosh starts an update or scan. Trend Micro Security for Macintosh will ignore a scheduled scan if a manual scan is running. When this scenario occurs, Trend Micro Security for Macintosh will not send a notification. Why didn't Trend Micro Security for Macintosh perform the update I scheduled? Trend Micro Security for Macintosh will not perform an update if it is unable to connect to the Internet, or if it already has the latest updates. Trend Micro Security for Macintosh first checks if there are updated components available, if there are no new components, it will not perform an update. If a manual or scheduled scan or a manual update is in progress, Trend Micro Security for Macintosh will skip the scheduled update. The scheduled update will run again at the next scheduled time. Why are the Update Now button and the AutoUpdate toggle switch grey? If your version of Trend Micro Security for Macintosh has expired, you will be unable to update the product's components. Check if your product has expired. 5-4

69 Frequently Asked Questions Malware Protection What is the difference between the Scan Now on the Protection Status screen and the Scan Now on the Malware Protection screen? Clicking Scan Now from the Protection Status screen triggers a smart scan. Smart scan scans Trend Micro recommended files. Clicking Scan Now from the Malware Protection screen also scans Trend Micro recommended files unless you choose a different scan option. How do I shorten the time it takes for a Manual Scan to complete? 1. Open Preferences. 2. Click Scan > Manual Scan. 3. For CPU Usage, select High. 4. Click OK. Why do I receive "A scan is already in progress" message when I try to run a Manual Scan? Trend Micro Security for Macintosh is able to perform one scan at a time. The message indicates that there is a scan (manual or scheduled) already in progress. Wait until the current scan completes and try again. Why am I unable to close Firefox after I downloaded a file containing a virus? If you have enabled Real-time Scan, and you use Firefox to download a file containing a virus, Trend Micro Security for Macintosh will detect the virus and stop the download process. Firefox hangs when this scenario occurs. Why does Real-time Scan run multiple times and create multiple log entries when I left click a file containing a virus? If you set the Real-time Scan action to Pass, and Trend Micro Security for Macintosh detects a virus in a file, it will neither clean nor quarantine the file. When you click a file, the back-end service for the Mac OS reads the file more than once. If the file has a virus and Trend Micro Security for Macintosh has not cleaned or quarantined the file, each time the back-end service reads the file, a new Real-time Scan runs. 5-5

70 Trend Micro Security for Macintosh User s Guide 5-6

71 Chapter 6 Getting Support Trend Micro is committed to providing service and support that exceeds our users expectations. This chapter contains information on how to get technical support. Remember, you must register your product to be eligible for support. This chapter discusses the following topics: Contacting Technical Support on page 6-2 Sending Infected File Samples on page 6-3 Introducing TrendLabs on page 6-3 Other Useful Resources on page

72 Trend Micro Security for Macintosh User s Guide Contacting Technical Support Before contacting technical support, here are two things you can quickly do to try and find a solution to your questions: Check your documentation: the FAQ section of this User s Guide and Online Help provide comprehensive information about Trend Micro Security for Macintosh. Search both documents to see if they contain your solution. Visit our Technical Support Web site: our Technical Support Web site contains the latest information about all Trend Micro products The support Web site has answers to previous user inquiries. To search the Knowledge Base, visit In addition to phone support, Trend Micro provides the following resources: support support@trendmicro.com Readme: late-breaking product news, installation instructions, known issues, and version specific information Product updates and patches To locate the Trend Micro office nearest you, open a Web browser to the following URL: To speed up the issue resolution, when you contact our staff please provide as much of the following information as you can: Version Exact text of the error message, if any Steps to reproduce the problem 6-2

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

Client Server Security3

Client Server Security3 Client Server Security3 for Small and Medium Business Getting Started Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

2.5. Smart Protection Server Security Made Smarter. Administrator s Guide. Endpoint Security. Messaging Security

2.5. Smart Protection Server Security Made Smarter. Administrator s Guide. Endpoint Security. Messaging Security Smart Protection Server Security Made Smarter 2.5 Administrator s Guide e m p w Endpoint Security Messaging Security Protected t Cloud Web Security Trend Micro Incorporated reserves the right to make

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before installing and using the service, review the readme files, release

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before installing and using the service, review the readme files, release

More information

Document Part No. PPEM27723/ Protected by U.S. Patent No.

Document Part No. PPEM27723/ Protected by U.S. Patent No. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Copyright 2013 Trend Micro Incorporated. All rights reserved.

Copyright 2013 Trend Micro Incorporated. All rights reserved. Trend Micro reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes,

More information

Trend Micro Antivirus for Mac 2015

Trend Micro Antivirus for Mac 2015 H Trend Micro Antivirus for Mac 2015 Product Guide V1.2 Trend Micro Incorporated 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A. Phone: +1 (817) 569-8900 Toll-free: (888) 762-8763

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product/service described herein without notice. Before installing and using the product/service, review the readme

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

TREND MICROTM PortalProtectTM1.5

TREND MICROTM PortalProtectTM1.5 TREND MICROTM PortalProtectTM1.5 Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software,

More information

TREND MICRO. InterScan VirusWall 6. FTP and POP3 Configuration Guide. Integrated virus and spam protection for your Internet gateway.

TREND MICRO. InterScan VirusWall 6. FTP and POP3 Configuration Guide. Integrated virus and spam protection for your Internet gateway. TM TREND MICRO TM TM InterScan VirusWall 6 Integrated virus and spam protection for your Internet gateway for Linux TM FTP and POP3 Configuration Guide Trend Micro Incorporated reserves the right to make

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

FAQ. Safe Anywhere PC 12. Disclaimer:

FAQ. Safe Anywhere PC 12. Disclaimer: FAQ Safe Anywhere PC 12 Disclaimer: You can freely use (copy and edit) the information in this document for your own purposes. You may want to replace all references to F-Secure, F-Secure launch pad, F-Secure

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Administrator s Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X Sophos Anti-Virus standalone startup guide For Windows and Mac OS X Document date: June 2007 Contents 1 What you need for installation...4 2 Installing Sophos Anti-Virus for Windows...5 3 Installing Sophos

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Protegent Total Security Solution USER GUIDE 2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Table of Contents PROTEGENT TOTAL SECURITY...3 INSTALLATION...4 REGISTERING PROTEGENT TOTAL SECURITY...

More information

SecureAPlus User Guide. Version 3.4

SecureAPlus User Guide. Version 3.4 SecureAPlus User Guide Version 3.4 September 2015 Copyright Information Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Document Part No. PPEM25975/ Protected by U.S. Patent No. 5,951,698

Document Part No. PPEM25975/ Protected by U.S. Patent No. 5,951,698 Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

TREND MICROTM IM Security

TREND MICROTM IM Security TREND MICROTM IM Security Proactive Antivirus and Content Security for Instant Messaging Environments for Microsoft TM Live Communications Server Getting Started Guide Trend Micro Incorporated reserves

More information

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved. User s Guide SingNet Desktop Security 2011 Copyright 2010 F-Secure Corporation. All rights reserved. Table of Contents 1. Getting Started... 1 1.1. Installing SingNet Desktop Security... 1 1.1.1. System

More information

Quick Start Guide. Microsoft Windows Vista / XP / 2000 / 2003 / 2008

Quick Start Guide. Microsoft Windows Vista / XP / 2000 / 2003 / 2008 Quick Start Guide Microsoft Windows Vista / XP / 2000 / 2003 / 2008 ESET NOD32 Antivirus provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

F-Secure Mobile Security

F-Secure Mobile Security F-Secure Mobile Security for Windows Mobile User s Guide "F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure product names and symbols/logos are either trademarks

More information

Quick Start Guide. Microsoft Windows 7 / Vista / XP / 2000 / 2003 / 2008

Quick Start Guide. Microsoft Windows 7 / Vista / XP / 2000 / 2003 / 2008 Quick Start Guide Microsoft Windows 7 / Vista / XP / 2000 / 2003 / 2008 ESET NOD32 Antivirus provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning

More information

Antivirus: Proactively detects and disables more known and even unknown new malware threats than any other security product.

Antivirus: Proactively detects and disables more known and even unknown new malware threats than any other security product. Quick Start Guide ESET Cybersecurity provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine first introduced in the award-winning NOD32

More information

ESET ENDPOINT SECURITY FOR ANDROID

ESET ENDPOINT SECURITY FOR ANDROID ESET ENDPOINT SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Endpoint Security 1.1 Installation...3

More information

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central Trend Micro Apex One as a Service / Apex One Best Practice Guide for Malware Protection 1 Best Practice Guide Apex One as a Service / Apex Central Information in this document is subject to change without

More information

Kaspersky Security for Windows Server

Kaspersky Security for Windows Server Kaspersky Security for Windows Server User's Guide Application version: 10.1.0.622 Dear User, Thank you for choosing Kaspersky Lab as your security software provider. We hope that this document helps you

More information

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats. AntiVirus Pro Advanced Protects your computer from viruses, malware, and Internet threats. Features List Ransomware Protection anti-ransomware feature is more effective and advanced than other anti-ransomware

More information

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac. Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to

More information

SOLUTION MANAGEMENT GROUP

SOLUTION MANAGEMENT GROUP InterScan Messaging Security Virtual Appliance 8.0 Reviewer s Guide February 2011 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

FOR macos. Quick Start Guide. Click here to download the most recent version of this document

FOR macos. Quick Start Guide. Click here to download the most recent version of this document FOR macos Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against malicious code. Based

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth

More information

Quick Heal AntiVirus Pro. Tough on malware, light on your PC.

Quick Heal AntiVirus Pro. Tough on malware, light on your PC. Tough on malware, light on your PC. Features List Ransomware Protection Quick Heal anti-ransomware feature is more effective and advanced than other anti-ransomware tools. Signature based detection Detects

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

F-Secure Mobile Security

F-Secure Mobile Security F-Secure Mobile Security for S60 User s Guide "F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure product names and symbols/logos are either trademarks or

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Introducing the CSC SSM

Introducing the CSC SSM CHAPTER 1 This chapter introduces the Content Security and Control (CSC) Security Services Module (SSM), and includes the following sections: Overview, page 1-1 Features and Benefits, page 1-2 Available

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth email

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Zemana Endpoint Security Administration Guide. Version

Zemana Endpoint Security Administration Guide. Version Zemana Endpoint Security Administration Guide Version 1.9.290 Introduction 4 What is Zemana Endpoint Security? 4 What is Zemana Control Center? 4 How do Endpoint Agents and Control Center communicate with

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Sophos Enterprise Console Help. Product version: 5.3

Sophos Enterprise Console Help. Product version: 5.3 Sophos Enterprise Console Help Product version: 5.3 Document date: September 2015 Contents 1 About Sophos Enterprise Console 5.3...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

for Small and Medium Business Quick Start Guide

for Small and Medium Business Quick Start Guide for Small and Medium Business Quick Start Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products/services described herein without notice. Before using

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Chapter 5: Configuring ServerProtect

Chapter 5: Configuring ServerProtect Chapter 5: Configuring ServerProtect Chapter Objectives After completing this chapter, you should be able to achieve the following objectives: Describe the types of ServerProtect tasks Describe which actions

More information

Full User Manual and Quick Start Guide

Full User Manual and Quick Start Guide Full User Manual and Quick Start Guide 2 W hile every precaution has been taken in the preparation of this manual, we assume no responsibility for errors or omissions. Neither, is any liability assumed

More information

Apptix Online Backup by Mozy User Guide

Apptix Online Backup by Mozy User Guide Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing

More information

Internet Security Mail Anti-Virus

Internet Security Mail Anti-Virus Internet Security 2012 Mail Anti-Virus Table of Contents Mail Anti-Virus... 2 What is Mail Anti-Virus... 2 Enabling/disabling Mail Anti-Virus... 2 Operation algorithm of Mail Anti-Virus... 2 Changing Mail

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Comodo Antivirus Software Version 2.2

Comodo Antivirus Software Version 2.2 Comodo Antivirus Software Version 2.2 User Guide Guide Version 2.2.082318 Comodo Security Solutions Inc. 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus... 4 1.1.System

More information

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 2 Contents Chapter 1: Introduction...7 1.1 System requirements...8 1.1.1 Policy Manager Server...8 1.1.2 Policy Manager Console...8

More information

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta ESET Mobile Security for Windows Mobile Installation Manual and User Guide - Public Beta Contents...3 1. Installation of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1

More information

VMware Horizon FLEX Client User Guide

VMware Horizon FLEX Client User Guide Horizon FLEX 1.10 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

Siemens Industrial SIMATIC. Process Control System PCS 7 Configuration Trend Micro OfficeScan Server XG. Security information 1.

Siemens Industrial SIMATIC. Process Control System PCS 7 Configuration Trend Micro OfficeScan Server XG. Security information 1. Security information 1 Preface 2 SIMATIC Configuration 3 Process Control System PCS 7 Configuration Trend Micro OfficeScan Server XG Commissioning Manual Siemens Industrial 03/2018 A5E44395601-AA Legal

More information

Desktop & Laptop Edition

Desktop & Laptop Edition Desktop & Laptop Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion

More information

Installing McAfee VirusScan For Windows 95/98 Kyler Kwock, Wilbur Wong Revised by Therese Nakadomari

Installing McAfee VirusScan For Windows 95/98 Kyler Kwock, Wilbur Wong Revised by Therese Nakadomari WIN9X009 March 2000 Installing McAfee VirusScan For Windows 95/98 Kyler Kwock, Wilbur Wong Revised by Therese Nakadomari Overview 1 Product Overview 1 System Requirements 2 Download Instructions 2 Installation

More information

User Guide. Version R95. English

User Guide. Version R95. English Anti-Malware (Classic) User Guide Version R95 English July 20, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

User Guide Online Backup

User Guide Online Backup User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Getting Started with the Online Backup Software... 2 Installing the Online Backup Software... 2 Configuring a Device...

More information

Zillya Internet Security User Guide

Zillya Internet Security User Guide Zillya Internet Security User Guide Content Download Zillya Internet Security... 4 Installation Zillya Internet Security... 4 System Status... 7 System Scanning... 9 When Zillya Internet Security finds

More information

Mission Control for the Microsoft Cloud. 5nine Cloud Security. Web Portal Version 12.o. Getting Started Guide

Mission Control for the Microsoft Cloud. 5nine Cloud Security. Web Portal Version 12.o. Getting Started Guide Mission Control for the Microsoft Cloud 5nine Cloud Security Web Portal Version 12.o Getting Started Guide 2018 5nine Software Inc. All rights reserved. All trademarks are the property of their respective

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 2.1 November 2011 R3 Copyright 2011, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

Comodo Antivirus Software Version 2.1

Comodo Antivirus Software Version 2.1 Comodo Antivirus Software Version 2.1 User Guide Guide Version 2.1.030515 Comodo Security Solutions Inc. 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus... 4 1.1.System

More information