Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice."

Transcription

1

2

3 Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before using this service, please review the latest version of the applicable user documentation, which is available from the Help button at the top right of the screens. Trend Micro, the Trend Micro t-ball logo, and TrendLabs are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright Trend Micro Incorporated. All rights reserved. No part of this publication may be reproduced, photocopied, stored in a retrieval system, or transmitted without the express prior written consent of Trend Micro Incorporated. Document part No. TPEM15314/ Release date: April 2012 Document Version No.: 3.00

4 The user documentation for Trend Micro Portable Security introduces the main features of the software and installation instructions for your production environment. Read through it before installing or using the software. Detailed information about how to use specific features within the software are available in the online help file and the online Knowledge Base at the Trend Micro Web site. Trend Micro always seeks to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro document, please contact us at Please evaluate this documentation on the following site:

5 Contents Chapter 1: Introduction About Trend Micro Portable Security Process Overview Management Program Scanning Tool (USB drive) Chapter 2: Installation Installing the Management Program Chapter 3: Using the Management Program Getting Updates and Renewing Your Subscription Checking the Security Pattern File Version Number Editing the Activation Code Configuring the Scanning Tool Activating the Scanning Tool Synchronizing Settings with the Scanning Tool Changing the Name of the Scanning Tool Importing Log Data from a Scanning Tool Upgrading the Scanning Tool Configuring Scan Settings Configuring Settings For Target Computers Configuring Exclusion List Settings

6 Trend Micro Portable Security 1.5 User Guide Managing Log Data Configuring a Proxy Server Removing the Scanning Tool Upgrading Chapter 4: Using the Scanning Tool Getting Started Checking the Scan Results Checking the Scan History Checking the Version of the Pattern File and Scan Engine Chapter 5: Using the Diagnostic Toolkit Using the Trend Micro Portable Security Diagnostic Toolkit Moving Back Files Logging Issues with Trend Micro Portable Security Upgrading the Device Chapter 6: Uninstallation Uninstalling Trend Micro Portable Security Chapter 7: Getting Help Frequently Asked Questions (FAQs) Technical Support

7 Chapter 1 Introduction Trend Micro Portable Security delivers high-performance, cost-effective security services, helping protect businesses against security threats. Topics in this chapter: About Trend Micro Portable Security on page 1-2 Process Overview on page

8 Trend Micro Portable Security 1.5 User Guide About Trend Micro Portable Security With Trend Micro Portable Security, you can use a "Scanning Tool" USB drive to find and remove security threats from computers that do not have security software or an Internet connection. You can also easily manage all of the log data generated by scans. 1-2

9 Introduction Process Overview Trend Micro Portable Security consists of a Management Program and a Scanning Tool. This overview shows how you can use both to help protect other computers. FIGURE 1-1. Overview of how Trend Micro Portable Security works 1-3

10 Trend Micro Portable Security 1.5 User Guide Note: You cannot use the Scanning Tool to scan the computer where the Management Program is installed. Protect this computer with a security software such as Trend Micro OfficeScan. While scanning for security threats, Trend Micro Portable Security may create temporary files on the computer. These files will be deleted after scanning. You can also choose to scan computers without saving the temporary files, refer to More settings on page 3-9. Management Program You can use the Management Program to perform these tasks: Download security pattern file and scan engine components Change the scan settings and synchronize them with the Scanning Tool Exclude files, folders, and extensions from scanning Import and manage log data generated by scans Specify an administrator account and password to enable scanning computers without administrator privileges 1-4

11 Introduction The Management Program can configure scan settings for and import log data from multiple Scanning Tools. To download pattern file and scan engine updates, you must install the Management Program on a computer with access to the Internet. FIGURE 1-2. Main screen of the Management Program Scanning Tool (USB drive) Once connected to a computer, the Scanning Tool can check it for security threats. The Scanning Tool can also fix, quarantine, or just log the threats found. The results of each scan are saved on the Scanning Tool. The Scanning Tool will display the following window on a computer that you want to check after you connect the USB. If the Scanning Tool does not start, you can open Windows Explorer and double-click Launcher.exe from the SECURE partition or TmSync.exe from the TMPS partition. 1-5

12 Trend Micro Portable Security 1.5 User Guide FIGURE 1-3. The Scanning Tool screen FIGURE 1-4. The Scanning Tool screen (If the scan finds a security threat) 1-6

13 Introduction Note: Unlike regular USB drives, you cannot use the Scanning Tool to store files. However, you can store quarantined files on it, instead of on the target computer. You must activate the Scanning Tool with the Management Program before using it. Refer to Activating the Scanning Tool on page 3-5 for more information. 1-7

14 Trend Micro Portable Security 1.5 User Guide 1-8

15 Chapter 2 Installation This chapter describes Trend Micro Portable Security Management Program installation procedures. Topics in this chapter: Installing the Management Program on page

16 Trend Micro Portable Security 1.5 User Guide Installing the Management Program To install the Management Program, you must log onto the computer using an account with Administrator privileges. To upgrade, please refer to Upgrading on page Note: You must install the Management Program on a computer with access to the Internet. To install the Management Program: 1. Connect the Scanning Tool USB drive to the computer where you want to install the Management Program. 2. When a window opens, click Open folder. Tip: If the window does not appear, double-click the My Computer icon and open the TMPS drive. 3. Open the MP folder in the TMPS drive, and double-click the Setup.exe file. For example, TMPS(F):\MP\Setup.exe. Note: The drive letter may be different. 2-2

17 Installation 4. When the End User License Agreement window appears, read the agreement, then select I accept this agreement, and click Next. FIGURE 2-1. License Agreement screen 2-3

18 Trend Micro Portable Security 1.5 User Guide 5. When the Select Location window opens, you can select a different folder, or click Next. Tip: To install the program in a different location, click Browse and select a folder. FIGURE 2-2. Select Location screen 2-4

19 Installation 6. When the Activation Code window appears, type your activation code, and then click Next. FIGURE 2-3. Activation Code screen 7. When the Installation Finished window appears, click Close. If you marked the Open the Management Console now checkbox, the Management Program will open so that you can adjust your settings. Note: To remove the Scanning Tool without adjusting the Management Program settings, follow the instructions under Removing the Scanning Tool on page

20 Trend Micro Portable Security 1.5 User Guide 2-6

21 Chapter 3 Using the Management Program This chapter describes how to use and configure the Trend Micro Portable Security Management Program. Topics in this chapter: Getting Updates and Renewing Your Subscription on page 3-2 Configuring the Scanning Tool on page 3-5 Managing Log Data on page 3-13 Configuring a Proxy Server on page 3-16 Removing the Scanning Tool on page 3-17 Upgrading on page

22 Trend Micro Portable Security 1.5 User Guide Getting Updates and Renewing Your Subscription Use the Overview tab to do the following: Download the latest security pattern file or scan engine updates Change the update settings Change your activation code Confirm the expiration date of your subscription FIGURE 3-1. Overview tab 3-2

23 Using the Management Program Checking the Security Pattern File Version Number The version number of the most recent security pattern file downloaded by Trend Micro Portable Security appears next to Virus Pattern. Click the version number link to see more details about each component and the date of the last update. Update Now Click Update Now to download the most recent security pattern file or scan engine from Trend Micro. Before scanning other computers for security threats, you should always connect the Scanning Tool to the Management Program computer and get the latest updates. The date next to Last Update shows when you last received an update. Update Settings Click Update settings to enable or disable automatic downloads of the most recent security pattern file or scan engines from Trend Micro immediately after starting up the Management Program. Note: Trend Micro recommends enabling this feature to make sure you always have the most recent components. Editing the Activation Code If the activation code has expired, click Edit and enter a new one. Note: After changing the activation code, you must reactivate the Scanning Tool. For more details, please refer to Activating the Scanning Tool on page 3-5. Checking the Expiration Date of the Activation Code The date next to Expires shows when you need to get another activation code. If you have not connected to the Internet for a while, or if you recently entered a new activation code, click Refresh next to Expires to get the latest expiration date. 3-3

24 Trend Micro Portable Security 1.5 User Guide Overview Tab Icons Depending on the number of days remaining before your activation code expires, different messages will appear at the bottom of the window. TABLE 3-1. Icons and messages regarding activation codes ICON MESSAGE You have plenty of time before your activation code expires. Your activation code will expire soon, so you should get a new one. Your activation code has expired, so you should provide a new one. You should get a new activation code before your current one expires to ensure that the Scanning Tool always has the most recent updates. 3-4

25 Using the Management Program Configuring the Scanning Tool Use the Scanning Tool tab to configure and synchronize scan settings and components with a Scanning Tool, change the name of a Scanning Tool, or import log data from previous scans. FIGURE 3-2. Scanning Tool tab Activating the Scanning Tool You must activate the Scanning Tool before using it for the first time. To activate the Scanning Tool, connect it to the computer where you installed the Management Program, then select it from the list of Scanning Tools. Once the Scanning Tool details appear, you have successfully activated the Scanning Tool. 3-5

26 Trend Micro Portable Security 1.5 User Guide Synchronizing Settings with the Scanning Tool You should transfer scan settings and the latest components to the Scanning Tool before using it. If you made changes to the scan settings and did not synchronize the Scanning Tool, the Scanning Tool will continue to use the previous settings. To synchronize settings: 1. Update the components on the Management Program. 2. Connect the Scanning Tool to the computer where you installed the Management Program. 3. Select the Scanning Tool from the list shown in the Management Program and click Synchronize. 4. When the component selection window appears, click OK. FIGURE 3-3. The Components selection window Tip: Select only the items you want to update and click OK. 3-6

27 Using the Management Program Changing the Name of the Scanning Tool If you use more than one Scanning Tool and want to assign them different names, select one from the list and click Change Name. Note: Make sure the new name does not exceed 11 characters. Importing Log Data from a Scanning Tool To transfer log data from a Scanning Tool to the Management Program computer, select a Scanning Tool from the list and click Import Logs. Note: To prevent log data from accumulating on the Scanning Tool, mark the After importing, delete the log file from the scanning tool checkbox. Upgrading the Scanning Tool To upgrade the scanning tool, plug in the scanning tool and then click Upgrade Scanning Tool. Configuring Scan Settings Click the Settings tab to select how the Scanning Tool will check for security threats when connected to target computers. Tip: Synchronize the settings to your device after saving the changes you made to the configuration. 3-7

28 Trend Micro Portable Security 1.5 User Guide FIGURE 3-4. The Settings tab Scanning mode There are two scanning modes: Managed Select this option if you want to retain all Management Program settings when scanning all target computers. This option also automatically starts scanning the computer 30 seconds after the Scanning Tool starts. 3-8

29 Using the Management Program Custom Select this option if you want to be able to customize scan settings after connecting the Scanning Tool. You can select drives and folders to scan. If this option is selected, you will have to manually click Scan Now to start scanning the computer. Scan action The scan action setting determines what the scan will do. Log only The scan will only identify security threats, without taking any action against them. Confirm The scan will identify security threats and then ask what action to perform. Take the recommended action The scan will automatically respond to security threats according to the recommendations of Trend Micro experts. Tip: Whether the scan will remove the security threat, place the file in quarantine, or skip over it depends on the type of threat. Trend Micro reviews and revises the automatic responses periodically, so they may change after an update. More settings You can also enable or disable these additional scan settings: Scan without saving temporary files The Scanning Tool will not copy any files to the target computer. Using this option reduces scanning capability for certain types of malware. Note: Please ensure that the Scan action is set to Log only. Scanning and cleaning will still save some files on the computer. 3-9

30 Trend Micro Portable Security 1.5 User Guide Scan as Administrator Selecting this option means you can specify an administrator username and password for users without administrative privileges. Note: You can use a backslash (\) to separate the username from the domain. Configuring Settings For Target Computers Use the followings setting to identify which drives and folders you want to scan. Tip: Synchronize the settings to your device after saving the changes you made to the configuration. FIGURE 3-5. The Target tab 3-10

31 Using the Management Program Default folders Scan only the folders most vulnerable to system threats (such as the Windows System folder). All folders Scan all folders on the target computer. Specific folders Limit the scan to the drives and folders on the list below it. Click Add to put a drive or folder on the list. Click Delete to take selected drives or folders off the list. Click Edit to make changes to the selected item. Include removable drives as potential scanning targets Enabling this option makes the scan check removable drives, as well. 3-11

32 Trend Micro Portable Security 1.5 User Guide Configuring Exclusion List Settings Use this setting to exclude files, folders, or extensions from being scanned. Note: You can exclude up to 100 files and folders and use commas to exclude different extensions. Additionally, you can do the following as well: Add a drive or folder on the list Delete selected drives or folders from the list Edit list items Tip: Synchronize the settings to your device after saving the changes you made to the configuration. FIGURE 3-6. Exclusion List screen 3-12

33 Using the Management Program Managing Log Data The Logs tab allows you to view, delete, and export log data imported from a Scanning Tool. You can also import log data to the Management Program that you previously exported from another Management Program (refer to Importing Log Data on page 3-15). Note: Some older logs might not be compatible with the current program. FIGURE 3-7. Log tab Trend Micro Portable Security arranges imported log data by date. 3-13

34 Trend Micro Portable Security 1.5 User Guide Viewing Log Data To check the log data, select an item from the list and click View. FIGURE 3-8. Sample of individual log results The Scan Result screen shows the date and time of the scan, the Scanning Tool name, the pattern file version, the scan engine version, the results of the scan, and the names of any security threats found. 3-14

35 Using the Management Program Deleting Log Data To delete the log data, click Delete All. Note: You cannot delete log data files individually. Exporting Log Data To export the log data from the Management Program to a CSV or XML file, click Export All and then follow the directions shown. Importing Log Data To import log data from exported saved CSV or XML files, click Import Logs, then select the folder containing the log data that you wish to import. Note: To import log data, you must specify the complete path to the folder containing the files. For example, to import the log data in C:\SAMPLE\{log data}, you must specify C:\SAMPLE to find the files. 3-15

36 Trend Micro Portable Security 1.5 User Guide Configuring a Proxy Server If the computer where you installed the Management Program connects to the Internet through a proxy server, use the Proxy Settings tab to ensure that you can receive the latest components. FIGURE 3-9. Proxy Settings tab 3-16

37 Using the Management Program Mark the Use a proxy server to connect with the Internet checkbox if your computer is required to use a proxy server to connect to the Internet. Then choose one of the following options: Import the Internet Explorer proxy settings Choose this option if you wish to use the same settings as those set for Microsoft Internet Explorer on the Management Program computer. Enter the necessary proxy server settings in the following fields Choose this option to enter the proxy server settings yourself. Remember to click Save when you finish. Removing the Scanning Tool Follow the procedure below when removing the Scanning Tool from any computer to avoid corrupting the data on the Scanning Tool.. Note: Remove the Scanning Tool only if the light on the USB drive is NOT flashing. For Windows 7 1. Click the system tray icon in the bottom right corner of the Windows desktop to see additional icons. 2. Click the icon to display a list of connected devices. 3. Click Eject TMPS. 4. Unplug the Scanning Tool from the computer. 3-17

38 Trend Micro Portable Security 1.5 User Guide For Windows Vista or Windows XP 1. Double-click the or system tray icon in the bottom right corner of the Windows desktop to open the Safely Remove Hardware window. 2. Select a Scanning Tool from the list and click Stop to open the Stop a Hardware Device window. 3. Click OK to make the "... can now be safely removed from the system" message appear in the bottom right corner of the Windows desktop. 4. Click Close in the Safely Remove Hardware window. 5. Detach the Scanning Tool from the computer. Upgrading If you are using an older version of the Trend Micro Portable Security Management Program, you need to upgrade to enable the new features. To upgrade the Management Program from an older version: 1. Optionally create back up copies of the logs from the Management Program and Scanning Tool: a. Import the logs from the Scanning Tools, Importing Log Data from a Scanning Tool on page 3-7 b. After gathering all the data from the Scanning Tools, export the logs from the Management Program, refer to Exporting Log Data on page Go to the Trend Micro Download Center and download the latest build. 3. Double-click the executable file and follow the instructions to upgrade. 4. Restart the computer. Tip: After upgrading the Management Program, Trend Micro recommends upgrading the Scanning Tool, refer to Upgrading the Scanning Tool on page 3-7. You can also use the Upgrade Device option in the Trend Micro Portable Security Diagnostic Toolkit, refer to Upgrading the Device on page 5-7. This option scans and formats the device to remove any unused or corrupt data. 3-18

39 Chapter 4 Using the Scanning Tool This chapter describes how to use and configure the Trend Micro Portable Security Scanning Tool. Topics in this chapter: Getting Started on page 4-2 Checking the Scan Results on page 4-4 Checking the Scan History on page 4-7 Checking the Version of the Pattern File and Scan Engine on page

40 Trend Micro Portable Security 1.5 User Guide Getting Started Before you can use the Trend Micro Portable Security Scanning Tool, remember the following: If the user account has administrator privileges, you can use Trend Micro Portable Security to scan the computer. If the No device! message displays, open Windows Explorer and double-click Launcher.exe from the SECURE partition or TmSync.exe from the TMPS partition. If the user account does not have administrator privileges, you can enable the Scan as Administrator option from the Management Program (Scan as Administrator on page 3-10) then open Windows Explorer and double-click TmSync.exe from the TMPS partition. Trend Micro Portable Security automatically saves the scan result logs in the Scanning Tool. Note: Before using the Scanning Tool, you must first activate it on the computer where you installed the Management Program (see Activating the Scanning Tool on page 3-5). FIGURE 4-1. The Scanning Tool screen 4-2

41 Using the Scanning Tool To start using the Scanning Tool: 1. Activate the Scanning Tool, refer to Activating the Scanning Tool on page Connect the Scanning Tool to the computer that you want to check. 3. Choose Run Trend Micro Portable Security in the window that automatically opens. Note: If the Scanning Tool window does not open, double-click the My Computer icon, and then double-click Launcher.exe from the SECURE partition or TmSync.exe from the TMPS partition. 4. If you selected the Managed scanning mode (see Managed on page 3-8), then the scan will automatically begin 30 seconds after the Scanning Tool window opens. Note: Click Stop if you want to stop scanning the computer. If you selected the Custom scanning mode (see Custom on page 3-9), click Settings... to choose which drives and folders to scan. Control with the Management Program makes the scan examine drives and folders selected under the Target screen in the Management Program. Control from this tab allows you to specify drives and folders to scan. Full system scan checks the entire drive. Custom scan checks drives and folders that you specify in the list. After selecting the desired settings, click OK to close the window, and then click Scan Now. 4-3

42 Trend Micro Portable Security 1.5 User Guide Checking the Scan Results Follow the appropriate directions below based on the results of the scan. No Security Threats Found If the scan found no threats, then you do not need to take any action. Click Close to shut the window. Tip: If you would like to run a Full or Custom scan after completing a Quick scan, click Scan Again. FIGURE 4-2. No security threats found 4-4

43 Using the Scanning Tool Security Threats Detected If the scan finds a threat, review the results before selecting an option. FIGURE 4-3. Security threats found 4-5

44 Trend Micro Portable Security 1.5 User Guide 1. Check the name of the file and the risk, then select a response from the Action column, or just keep the default response. No Trend Micro Portable Security will take no action against the threat. Yes Trend Micro Portable Security will respond to the threat by trying to clean or quarantine the file involved. Tip: The exact response depends on the type of threat detected. Trend Micro periodically reviews and revises the automatic responses to different threats, so they may change after a pattern file or scan engine update. 2. Click Apply Now. A green checkmark will appear beside each completed action. Note: You can click Scan Again to check for security threats once more. 3. After confirming that no more security threats were found, you can add some notes about the scan in the Comment field, and then click Close. Tip: You can type up to 63 characters in the Comment field. This information will appear along with the log data about the scan when you use the Management Program to check the results (see Viewing Log Data on page 3-14). The name of the computer is the default value of this field. 4-6

45 Using the Scanning Tool Checking the Scan History Use the Previous Scan tab to check the results of earlier scans done on the computer connected to the Scanning Tool. Just choose a scan from the dropdown list next to Last Scan Started. FIGURE 4-4. Previous Scan tab To view more information, click View Log. For more information on the log samples, refer to Viewing Log Data on page For threat specific information, you can click the threat name. To restore a quarantined file selected from the list to its original location, click Restore. You should avoid restoring files that might still pose a security risk. Click Close when you have finished checking the scan history. WARNING! To avoid corrupted data on the Scanning Tool, do not remove it without ejecting it first. Refer to Removing the Scanning Tool on page

46 Trend Micro Portable Security 1.5 User Guide Checking the Version of the Pattern File and Scan Engine The Components tab shows the version of the pattern file and scan engine currently used by the Scanning Tool. FIGURE 4-5. Components tab 4-8

47 Chapter 5 Using the Diagnostic Toolkit This chapter describes how to use the Trend Micro Portable Security Diagnostic Toolkit. Topics in this chapter: Using the Trend Micro Portable Security Diagnostic Toolkit on page

48 Trend Micro Portable Security 1.5 User Guide Using the Trend Micro Portable Security Diagnostic Toolkit You can use the Trend Micro Portable Security Diagnostic Toolkit to do the following: Move back files, refer to page 5-2. Generate debug logs, refer to page 5-5. Upgrade the device, refer to page 5-7. Uninstallation, refer to page 6-4. Moving Back Files You can move quarantined files from the Management Program computer to the Scanning Tool if you have already deleted quarantined files from the Scanning Tool. WARNING! Do this only if you are absolutely sure that the quarantined files are safe and will not harm your computer. 5-2

49 Using the Diagnostic Toolkit To move files from the Management Program to the Scanning Tool: 1. From the Windows Start Menu, select All Programs, click Trend Micro Portable Security, and then choose Trend Micro Portable Security Diagnostic Toolkit. 2. When the End User License Agreement window appears, read the agreement, then select I accept this agreement, and click Next. FIGURE 5-1. Trend Micro Portable Security Diagnostic Toolkit License Agreement screen 5-3

50 Trend Micro Portable Security 1.5 User Guide 3. Go to the Move Files tab. FIGURE 5-2. Move Files screen 4. Click Browse and select the location of the quarantined files. 5. Click Move Files. When the confirmation window appears, click Yes. 6. Click OK after transferring the files. 5-4

51 Using the Diagnostic Toolkit Logging Issues with Trend Micro Portable Security If you have issues with Trend Micro Portable Security and you need to submit log files to Trend Micro Technical Support, turn debugging on and then replicate the issues. The Technical Support team can then identify and help resolve the issues. To generate log files for debugging: 1. From the Windows Start Menu, select All Programs, click Trend Micro Portable Security, and then choose Trend Micro Portable Security Diagnostic Toolkit. 2. When the End User License Agreement window appears, read the agreement, then select I accept this agreement, and click Next. FIGURE 5-3. Trend Micro Portable Security Diagnostic Toolkit License Agreement screen 5-5

52 Trend Micro Portable Security 1.5 User Guide 3. Go to the Debug tab. FIGURE 5-4. Debug screen 4. Select either Management Program or Scanning Tool, depending on which one has an issue. 5. When the Reproduce the Problem screen opens, click Start Debugging Mode, then reproduce the problem. 6. After reproducing the problem, click Stop Debugging Mode, then Collect Data. 7. Send the log files to Trend Micro Technical Support for assessment. 5-6

53 Using the Diagnostic Toolkit Upgrading the Device If you want to upgrade the device, use the Upgrade Device option in the Trend Micro Portable Security Diagnostic Toolkit. If you want to upgrade the Management Program, refer to Upgrading on page 3-18 or Upgrading the Scanning Tool on page 3-7 to upgrade the Scanning Tool. WARNING! Upgrading the device erases all data on the Scanning Tool. To upgrade the device: 1. From the Windows Start Menu, select All Programs, click Trend Micro Portable Security, and then choose Trend Micro Portable Security Diagnostic Toolkit. 2. When the End User License Agreement window appears, read the agreement, then select I accept this agreement, and click Next. FIGURE 5-5. Trend Micro Portable Security Diagnostic Toolkit License Agreement screen 5-7

54 Trend Micro Portable Security 1.5 User Guide 3. Go to the Upgrade Device tab. FIGURE 5-6. Upgrade device screen 4. Specify the location of the device upgrade file. Note: Please make sure that you save all the files you downloaded from the Trend Micro support site in the same folder. 5. Click Yes when the confirmation window opens. 6. Select a format method, then click Upgrade. 5-8

55 Chapter 6 Uninstallation This chapter describes Trend Micro Portable Security uninstallation procedures. Topics in this chapter: Uninstalling Trend Micro Portable Security on page

56 Trend Micro Portable Security 1.5 User Guide Uninstalling Trend Micro Portable Security You only need to remove the Management Program from the computer where you previously installed it. You do not need to do anything to the computers that you have scanned. To uninstall Trend Micro Portable Security: Option A: From the Windows Start Menu 1. From the Windows Start Menu, select All Programs, click Trend Micro Portable Security, and then choose Uninstall Trend Micro Portable Security. 2. When the first uninstallation window opens, click Next. FIGURE 6-1. Uninstallation screen 6-2

57 Uninstallation 3. When the Program Uninstalled window opens, click Close. FIGURE 6-2. Finished uninstallation screen 4. Restart your computer. Option B: From the Control Panel 1. From the Windows Start Menu, go to the Control Panel and select Uninstall a program. 2. Double-click Trend Micro Portable Security from the window that opens. This should start the Uninstallation process. 3. Click Yes when the confirmation window opens. 4. After uninstalling Trend Micro Portable Security, restart your computer. 6-3

58 Trend Micro Portable Security 1.5 User Guide Option C: Use the Trend Micro Portable Security Diagnostic Toolkit 1. From the Windows Start Menu, select All Programs, click Trend Micro Portable Security, and then choose Trend Micro Portable Security Diagnostic Toolkit. 2. When the End User License Agreement window appears, read the agreement, then select I accept this agreement, and click Next. FIGURE 6-3. Trend Micro Portable Security Diagnostic Toolkit License Agreement screen 6-4

59 Uninstallation 3. Go to the Uninstall tab, then click Uninstall software. FIGURE 6-4. The Trend Micro Portable Security Diagnostic Toolkit Uninstallation screen 4. When the Uninstallation screen opens, keep a copy of your activation code, then select the Finished saving the activation code option. FIGURE 6-5. Saving the activation code screen 5. Click the Uninstall button. 6. Click Yes when the confirmation window opens. 7. After uninstalling Trend Micro Portable Security, restart your computer. 6-5

60 Trend Micro Portable Security 1.5 User Guide 8. Go to C:\Program Files\Trend Micro\Portable Security and manually removethe Portable Security folder. 6-6

61 Chapter 7 Getting Help This chapter describes troubleshooting issues that may arise and how to contact support. Topics in this chapter: Frequently Asked Questions (FAQs) on page 7-2 Technical Support on page

62 Trend Micro Portable Security 1.5 User Guide Frequently Asked Questions (FAQs) Where can I find more information about a threat found? Search the Trend Micro Threat Encyclopedia for the name of a threat shown in the imported log data (Importing Log Data from a Scanning Tool on page 3-7) on this website: Why was the log data not saved? Do not remove the Scanning Tool from a computer until the window that displays after you click Close has disappeared. When removing the Scanning Tool from a computer, make sure to follow the Removing the Scanning Tool instructions given on page 3-17, or else the data may become corrupted. Additionally, you can go to the Trend Micro website, which provides answers to questions commonly asked about the software, and covers many useful topics. You can search the website using the product name or keywords to find information not included in the manual or ReadMe file. Trend Micro continually adds and updates the information available online. Technical Support Activating and registering Trend Micro Portable Security qualifies you to receive a variety of support services. The Trend Micro support website provides the latest information on security threats. Please visit it if you have found a security threat, or if you would like to learn more about the support services available. The content of support services is subject to change without notice. Please contact Trend Micro if you have any questions. You can reach the support center by telephone, FAX, or . The Trend Micro website lists contact numbers for different regions worldwide. 7-2

63 Getting Help Support is available for a period of one year once you have completely finished activating your software, although this policy may differ for some licenses. Please make sure to renew your subscription before it expires. If you do not renew your subscription, you will no longer receive security pattern file and scan engine components. For details on how to renew your subscription, contact Trend Micro or an authorized reseller. Note: Before using the Scanning Tool, you must first activate it on the computer where you installed the Management Program (refer to Activating the Scanning Tool on page 3-5). Data Transmissions to Trend Micro About the Web Reputation Service, PhishTrap, Harmful Site/URL Filtering, and TrendProtect 1. Trend Micro uses data received from you to check the security of the pages that you tried to access. Certain information (such as your domain and IP address) about the websites that you have accessed will be encrypted and sent anonymously to Trend Micro for analysis. Trend Micro uses this information to verify the safety of websites and improve the filtering functions. 2. Enabling these features before opening a website may trigger the following results: a. The server providing the page may append information that you have entered to the website as parameters. That means the information you entered (such as your ID, password, etc.) could be sent to Trend Micro as part of the data about the website. Trend Micro uses the data received to check the security of the page you tried to access. b. To check the security of any page that you try to open, Trend Micro examines the specifications of the Web server providing it. Trend Micro also follows a similar process based on URL content parameters when checking a request to open a page. The Trend Micro File Reputation Service sends hash values to Trend Micro to verify the safety of files. Neither the file itself nor any of its content is sent. The Software Safety Evaluation Service sends programs or program information to Trend Micro for risk assessment. 7-3

64 Trend Micro Portable Security 1.5 User Guide The Virus Tracking / Trendcare Program sends information about any security threats found (including the threat name, number found, region, and the URL of the source website, if applicable) to Trend Micro for statistical purposes. The Trend Micro Anti-Spam Toolbar sends the subject line of spam messages to Trend Micro to help improve the accuracy of the spam mail identification system. Trend Micro may disclose the body of the spam mail to government organizations to reduce the quantity of spam mail or the harm caused by it. The Reputation Service sends information about a sender's mail server to Trend Micro for the purpose of identifying spam messages. If a program behaves suspiciously, the Trend Micro Smart Feedback system sends the file checksum, the URL accessed, the size and path of the file, and the name of the executable file to Trend Micro for the purpose of collecting, analyzing, and strengthening protection capabilities. This information is used to determine the safety of the file or program involved. While some personal or confidential information could inadvertently be contained within these files, Trend Micro does not collect or use such information in any way. For more details on how Trend Micro handles information collected from you, please refer to this website: The "Web Reputation Service," "TrendProtect," and other Trend Micro filtering software checks the security of a given website according to proprietary standards set by Trend Micro. Whether or not you can then access a given website may not be entirely up to you after a judgment has been made. Export Controls This product and its technology ("Software") may be subject to export controls, the Foreign Exchange and Foreign Trade Act, Export Trade Control Order, Foreign Exchange Order, and ministerial ordinance or U.S. Export Administration Regulations. It may also be designated an "export control item" by the trade laws of other countries. You may not export or re-export the Software to a company, resident, citizen, or embargoed person or company of any embargoed country or any country with a trade sanction without the appropriate U.S. or foreign government licenses. Nations subject to U.S. embargo include Cuba, Iran, North Korea, Sudan, and Syria as of May

65 Getting Help Further information about embargoed countries is available by searching the following websites. You are responsible for any violation of such export control laws related to the Software. You should take appropriate measures to prevent violations. By using the Software, you confirm that you are not a resident or citizen of any country currently embargoed by the U.S., and that you are not otherwise prohibited under the export laws from receiving it. You also agree not to use this product in the development, design, manufacture, or production of nuclear weapons, chemical weapons, biological weapons, or missiles intended as weapons of mass destruction. Multi-year Contracts Even if you pay for multi-year contracts (by paying more than one year of support fees in advance), Trend Micro sets the period during which support for a product shall be provided without regard to your contract term. Please note that multi-year contracts do not guarantee product support during the applicable contract period, nor do they guarantee upgrades if the product support period has concluded. 7-5

66 Trend Micro Portable Security 1.5 User Guide 7-6

http://downloadcenter.trendmicro.com/

http://downloadcenter.trendmicro.com/ Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Accounts Production Installation Guide

Accounts Production Installation Guide Accounts Production Installation Guide Copyright statement Sage (UK) Limited and Sage Hibernia Limited, 2014. All rights reserved. If this documentation includes advice or information relating to any matter

More information

Symantec Mail Security for Domino

Symantec Mail Security for Domino Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database

More information

www.novell.com/documentation User Guide Novell iprint 1.1 March 2015

www.novell.com/documentation User Guide Novell iprint 1.1 March 2015 www.novell.com/documentation User Guide Novell iprint 1.1 March 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and specifically

More information

Send technical support questions to tmss@support.trendmicro.com. In the United States, call the technical support team toll-free at 1-866-787-TMSS

Send technical support questions to tmss@support.trendmicro.com. In the United States, call the technical support team toll-free at 1-866-787-TMSS Quick Start Guide Send technical support questions to tmss@support.trendmicro.com. In the United States, call the technical support team toll-free at 1-866-787-TMSS (1-866-787-8677). For online support

More information

Barracuda Spam Firewall User s Guide

Barracuda Spam Firewall User s Guide Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information

More information

Barracuda Spam Firewall User s Guide

Barracuda Spam Firewall User s Guide Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information

More information

ez Agent Administrator s Guide

ez Agent Administrator s Guide ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,

More information

ViRobot Desktop 5.5. User s Guide

ViRobot Desktop 5.5. User s Guide ViRobot Desktop 5.5 User s Guide ViRobot Desktop 5.5 User s Guide Copyright Notice Copyright 2007 by HAURI Inc. All rights reserved worldwide. No part of this publication or software may be reproduced,

More information

Hosting Users Guide 2011

Hosting Users Guide 2011 Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure

More information

Software License Registration Guide

Software License Registration Guide Software License Registration Guide When you have purchased new software Chapter 2 Authenticating a License When you would like to use the software on a different PC Chapter 3 Transferring a License to

More information

File Management Utility User Guide

File Management Utility User Guide File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information

Sophos for Microsoft SharePoint Help

Sophos for Microsoft SharePoint Help Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: March 2011 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 4 Reports...27 5 Search...28

More information

Guide to Installing BBL Crystal MIND on Windows 7

Guide to Installing BBL Crystal MIND on Windows 7 Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP

More information

WhatsUp Gold v16.2 Installation and Configuration Guide

WhatsUp Gold v16.2 Installation and Configuration Guide WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X Sophos Anti-Virus standalone startup guide For Windows and Mac OS X Document date: June 2007 Contents 1 What you need for installation...4 2 Installing Sophos Anti-Virus for Windows...5 3 Installing Sophos

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

NOVELL ZENWORKS ENDPOINT SECURITY MANAGEMENT

NOVELL ZENWORKS ENDPOINT SECURITY MANAGEMENT You can read the recommendations in the user, the technical or the installation for NOVELL ZENWORKS ENDPOINT SECURITY MANAGEMENT 4.0. You'll find the answers to all your questions on the NOVELL ZENWORKS

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere

More information

System Planning, Deployment, and Best Practices Guide

System Planning, Deployment, and Best Practices Guide www.novell.com/documentation System Planning, Deployment, and Best Practices Guide ZENworks Application Virtualization 9.0 February 22, 2012 Legal Notices Novell, Inc., makes no representations or warranties

More information

Exchange 2003 Mailboxes

Exchange 2003 Mailboxes Exchange 2003 Mailboxes Microsoft will stop supporting Exchange 2003 mailboxes in 2014 as it comes to the end of it s life. To maintain our levels of support and performance of all our customers, we will

More information

WatchDox for Windows User Guide. Version 3.9.0

WatchDox for Windows User Guide. Version 3.9.0 Version 3.9.0 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals or

More information

Server Installation Guide ZENworks Patch Management 6.4 SP2

Server Installation Guide ZENworks Patch Management 6.4 SP2 Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch

More information

Sage 200 Web Time & Expenses Guide

Sage 200 Web Time & Expenses Guide Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than

More information

Version 5.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.

Version 5.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda. Version 5.x Barracuda Spam & Virus Firewall User s Guide Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com? 1 Copyright Copyright 2005-2012, Barracuda Networks

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

Barracuda Spam & Virus Firewall User's Guide 5.x

Barracuda Spam & Virus Firewall User's Guide 5.x Barracuda Spam & Virus Firewall Barracuda Spam & Virus Firewall User's Guide 5.x This guide describes how you can check your quarantined messages, classify messages as spam and not spam, manage whitelisting

More information

Installation Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Installation Guide

Installation Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Installation Guide Novell Storage Manager 3.1.1 for Active Directory Installation Guide www.novell.com/documentation Installation Guide Novell Storage Manager 3.1.1 for Active Directory October 17, 2013 Legal Notices Condrey

More information

Cyber Security: Software Security and Hard Drive Encryption

Cyber Security: Software Security and Hard Drive Encryption Links in this document have been set for a desktop computer with the resolution set to 1920 x 1080 pixels. Cyber Security: Software Security and Hard Drive Encryption 301-1497, Rev A September 2012 Copyright

More information

Ajera 7 Installation Guide

Ajera 7 Installation Guide Ajera 7 Installation Guide Ajera 7 Installation Guide NOTICE This documentation and the Axium software programs may only be used in accordance with the accompanying Axium Software License and Services

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

HDDtoGO. User Guide. User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual

HDDtoGO. User Guide. User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual HDDtoGO User Guide User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual Table of Contents Table of Contents...1 1. Introduction...2 2. System Requirements...3

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Asset Inventory Reference

Asset Inventory Reference www.novell.com/documentation Asset Inventory Reference ZENworks 11 Support Pack 3 July 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

Archive Add-in Administrator Guide

Archive Add-in Administrator Guide Archive Add-in Administrator Guide RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE OF PROPRIETARY INFORMATION Copyright 2011 McAfee, Inc. This document contains information that is proprietary and confidential

More information

ArcGIS 9. Installation Guide: Workgroup for Microsoft SQL Server Express

ArcGIS 9. Installation Guide: Workgroup for Microsoft SQL Server Express ArcGIS 9 Installation Guide: Workgroup for Microsoft SQL Server Express Copyright 2006 ESRI All Rights Reserved. Printed in the United States of America. The information contained in this document is the

More information

WatchDox for Mac User Guide

WatchDox for Mac User Guide WatchDox for Mac User Guide Version 2.3.0 Confidentiality This document contains confidential material that is proprietary to WatchDox. The information and ideas herein may not be disclosed to any unauthorized

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

Full Disk Encryption Agent Reference

Full Disk Encryption Agent Reference www.novell.com/documentation Full Disk Encryption Agent Reference ZENworks 11 Support Pack 3 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

Trend Micro Hosted Email Security. Best Practice Guide

Trend Micro Hosted Email Security. Best Practice Guide Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described

More information

Lepide Event Log Manager. Users Help Manual. Lepide Event Log Manager. Lepide Software Private Limited. Page 1

Lepide Event Log Manager. Users Help Manual. Lepide Event Log Manager. Lepide Software Private Limited. Page 1 Users Help Manual Lepide Event Log Manager Lepide Software Private Limited. Page 1 Users Help Manual for Lepide Event Log Manager Lepide Software Private Limited, All Rights Reserved This User Guide and

More information

Lab 05: Deploying Microsoft Office Web Apps Server

Lab 05: Deploying Microsoft Office Web Apps Server Lab 05: Deploying Microsoft Office Web Apps Server DISCLAIMER 2013 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Hyper-V, Internet Explorer, Lync, PowerPoint, Silverlight, SQL

More information

Technical Brief for Windows Home Server Remote Access

Technical Brief for Windows Home Server Remote Access Technical Brief for Windows Home Server Remote Access Microsoft Corporation Published: October, 2008 Version: 1.1 Abstract This Technical Brief provides an in-depth look at the features and functionality

More information

Version 3.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.

Version 3.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda. Version 3.x Barracuda Spam & Virus Firewall User s Guide Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com? 1 Copyright Copyright 2005-2009, Barracuda Networks

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Release 2.0. Cox Business Online Backup Quick Start Guide

Release 2.0. Cox Business Online Backup Quick Start Guide Cox Business Online Backup Quick Start Guide Release 2.0 Cox Business Online Backup Quick Start Guide i IMPORTANT: You must notify Cox in advance if you would like to move or relocate your telephone Service.

More information

www.novell.com/documentation Installation Guide Novell Storage Manager 4.1 for Active Directory September 10, 2015

www.novell.com/documentation Installation Guide Novell Storage Manager 4.1 for Active Directory September 10, 2015 www.novell.com/documentation Installation Guide Novell Storage Manager 4.1 for Active Directory September 10, 2015 Legal Notices Condrey Corporation makes no representations or warranties with respect

More information

The United States Office Of Personnel Management eopf Human Resources Specialist Training Manual for eopf Version 4.0.

The United States Office Of Personnel Management eopf Human Resources Specialist Training Manual for eopf Version 4.0. The United States Office Of Personnel Management eopf Human Resources Specialist Training Manual for eopf Version 4.0. Copyright 1994-2007 by Northrop Grumman. All rights reserved. Northrop Grumman, the

More information

Worry-Free TM Remote Manager

Worry-Free TM Remote Manager Worry-Free TM Remote Manager for Small and Medium Business Agent Installation Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products/services described

More information

SSL Management Reference

SSL Management Reference www.novell.com/documentation SSL Management Reference ZENworks 11 Support Pack 4 July 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information

Troubleshooting File and Printer Sharing in Microsoft Windows XP

Troubleshooting File and Printer Sharing in Microsoft Windows XP Operating System Troubleshooting File and Printer Sharing in Microsoft Windows XP Microsoft Corporation Published: November 2003 Updated: August 2004 Abstract File and printer sharing for Microsoft Windows

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide

Sophos Anti-Virus for NetApp Storage Systems startup guide Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp

More information

Contents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security...

Contents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security... Contents Getting Started.....................................................1 Using the Formatting Tool........................................1 Preparing the Software Manually..................................4

More information

Maintaining the Content Server

Maintaining the Content Server CHAPTER 7 This chapter includes the following Content Server maintenance procedures: Backing Up the Content Server, page 7-1 Restoring Files, page 7-3 Upgrading the Content Server, page 7-5 Shutting Down

More information

Sophos Endpoint Security and Control standalone startup guide

Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control version 9 Sophos Anti-Virus for Mac OS X, version 7 Document date: October 2009 Contents 1 Before you

More information

Novell ZENworks 10 Configuration Management SP3

Novell ZENworks 10 Configuration Management SP3 AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Avira Exchange Security Small Business Edition. Quick Guide

Avira Exchange Security Small Business Edition. Quick Guide Avira Exchange Security Small Business Edition Quick Guide Table of contents Table of contents 1 Introduction...3 2 System requirements...4 3 The Avira Exchange Console...5 3.1 Virus Scanner status...6

More information

Clickfree Software User Guide

Clickfree Software User Guide Clickfree Software User Guide Last Revised: Nov 2, 2011 Clickfree_backup_software_user_guide_v1.0 Clickfree and the Clickfree logo are trademarks or registered trademarks of Storage Appliance Corporation.

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Sophos for Microsoft SharePoint Help. Product version: 2.0

Sophos for Microsoft SharePoint Help. Product version: 2.0 Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: September 2015 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 3.1 On-access scan...5 3.2

More information

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016 ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

Installing Microsoft Exchange Integration for LifeSize Control

Installing Microsoft Exchange Integration for LifeSize Control Installing Microsoft Exchange Integration for LifeSize Control September 2005 Part Number 132-00002-001, Version 1.1 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize

More information

User Guide for Mac OS X

User Guide for Mac OS X User Guide for Mac OS X Copyright Webroot SecureAnywhere User Guide for Mac OS X March, 2013 2012-2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is

More information

Installation and Program Essentials

Installation and Program Essentials CS PROFESSIONAL SUITE ACCOUNTING PRODUCTS Installation and Program Essentials version 2015.x.x TL 28970 3/26/2015 Copyright Information Text copyright 1998 2015 by Thomson Reuters. All rights reserved.

More information

Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents

Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents Page 1 Centran Version 4 Getting Started Guide KABA MAS Kaba Mas Welcome Kaba Mas, part of the world-wide Kaba group, is the world's leading manufacturer and supplier of high security, electronic safe

More information

Installation and Configuration Guide

Installation and Configuration Guide www.novell.com/documentation Installation and Configuration Guide GroupWise Coexistence Solution for Exchange November 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect

More information

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government. END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

User Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration

User Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration User Guide DocAve Lotus Notes Migrator for Microsoft Exchange 1.1 Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration This document is intended for anyone wishing to familiarize themselves

More information

Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0

Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0 Sophos Anti-Virus for NetApp Storage Systems user guide Product version: 3.0 Document date: May 2014 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp Storage Systems...4 3 System requirements...5

More information

PCRecruiter Resume Inhaler

PCRecruiter Resume Inhaler PCRecruiter Resume Inhaler The PCRecruiter Resume Inhaler is a stand-alone application that can be pointed to a folder and/or to an email inbox containing resumes, and will automatically extract contact

More information

Diamond II v2.3 Service Pack 4 Installation Manual

Diamond II v2.3 Service Pack 4 Installation Manual Diamond II v2.3 Service Pack 4 Installation Manual P/N 460987001B ISS 26APR11 Copyright Disclaimer Trademarks and patents Intended use Software license agreement FCC compliance Certification and compliance

More information

ATT8367-Novell GroupWise 2014 and the Directory Labs

ATT8367-Novell GroupWise 2014 and the Directory Labs ATT8367-Novell GroupWise 2014 and the Directory Labs ATT8367 Novell Training Services AUTHORIZED COURSEWARE www.novell.com Legal Notices Novell, Inc., makes no representations or warranties with respect

More information

CS SoftDent Practice Management Software Installation Guide for Client/Server Configurations

CS SoftDent Practice Management Software Installation Guide for Client/Server Configurations DE1005-15 CS SoftDent Practice Management Software Installation Guide for Client/Server Configurations Notice Carestream Health, Inc., 2012. No part of this publication may be reproduced, stored in a retrieval

More information

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved. GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...

More information

User Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory

User Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory Copyright 2005 Adobe Systems Incorporated. All rights reserved. NOTICE: All information contained herein is the property

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

Microsoft Dynamics GP. Engineering Data Management Integration Administrator s Guide

Microsoft Dynamics GP. Engineering Data Management Integration Administrator s Guide Microsoft Dynamics GP Engineering Data Management Integration Administrator s Guide Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is

More information

JetAdvice Manager Data Collector v. 2.1. Date: 2014-06-30

JetAdvice Manager Data Collector v. 2.1. Date: 2014-06-30 JetAdvice Manager Data Collector v. 2.1 Date: 2014-06-30 NOTE The information contained in this document is subject to change without notice. EuroForm makes no warranty of any kind with regard to this

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Juris Installation / Upgrade Guide

Juris Installation / Upgrade Guide Juris Installation / Upgrade Guide Version 2.7 2015 LexisNexis. All rights reserved. Copyright and Trademark LexisNexis, Lexis, and the Knowledge Burst logo are registered trademarks of Reed Elsevier Properties

More information

CS SoftDent Practice Management Software Installation Guide for Client/Server Configurations

CS SoftDent Practice Management Software Installation Guide for Client/Server Configurations DE1005-18 CS SoftDent Practice Management Software Installation Guide for Client/Server Configurations Notice Carestream Health, Inc., 2013. No part of this publication may be reproduced, stored in a retrieval

More information

How does the Excalibur Technology SPAM & Virus Protection System work?

How does the Excalibur Technology SPAM & Virus Protection System work? How does the Excalibur Technology SPAM & Virus Protection System work? All e-mail messages sent to your e-mail address are analyzed by the Excalibur Technology SPAM & Virus Protection System before being

More information

C6 Easy Imaging Total Computer Backup. User Guide

C6 Easy Imaging Total Computer Backup. User Guide C6 Easy Imaging Total Computer Backup User Guide Clickfree and the Clickfree logo are trademarks or registered trademarks of Storage Appliance Corporation. Other product names used in this guide are recognized

More information